Punish Seduce or Persuade by LEEUWMany kinds of interventions have been designed and implemented to combat digital copyright infringement, a type of cyber-deviance that is also known as 'digital piracy'. However, it is not clear whether such measures are indeed effective in reducing this type of deviance. This research sets out out to examine the functioning of these interventions from an empirical perspective. The persistence of digital copyright infringement presents various challenges to governments, the creative industries and other stakeholders that attempt to curtail digital piracy. The author combines both traditional and innovative research methods in order to establish whether and to what extent these interventions are able to curtail digital piracy. This book is of interest to organisations and individuals that are in charge of developing copyright laws and policy or the enforcement thereof. The focus on the evaluation of digital policy also makes the book relevant to evaluators, criminologists and those interested in digital behaviour and digital policy. Revised Dissertation. [Subject: Criminology, Digital Crime]~
This link opens in a new window
Call Number: K1485 L44 2017
ISBN: 9462367418
Publication Date: 2017-07-27
Hate Crimes in Cyberspace by Danielle Keats CitronMost Internet users are familiar with trollingâe"aggressive, foul-mouthed posts designed to elicit angry responses in a siteâe(tm)s comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible to stop, Hate Crimes in Cyberspace reveals the serious emotional, professional, and financial harms incurred by victims. Persistent online attacks disproportionately target women and frequently include detailed fantasies of rape as well as reputation-ruining lies and sexually explicit photographs. And if dealing with a single attackerâe(tm)s âeoerevenge pornâe#157; were not enough, harassing posts that make their way onto social media sites often feed on one another, turning lone instigators into cyber-mobs. Hate Crimes in Cyberspace rejects the view of the Internet as an anarchic Wild West, where those who venture online must be thick-skinned enough to endure all manner of verbal assault in the name of free speech protection, no matter how distasteful or abusive. Cyber-harassment is a matter of civil rights law, Citron contends, and legal precedents as well as social norms of decency and civility must be leveraged to stop it.
Call Number: HV6773.15.C92C57 2014
ISBN: 0674368290
Publication Date: 2014-09-22
Global Internet Law (Hornbook Series) by Michael L. RustadGlobal Internet Law Hornbook provides law students, practitioners, judges, and policymakers with a comprehensive examination of the most important concepts and methods of this rapidly evolving field of law. Each chapter is a detailed examination of cases, statutes, industry standards, norms, as well as, academic commentaries from around the world. While the emphasis is on U.S. developments, each chapter compares U.S. to EU regulations, directives, and conventions, as well as, other cross-border Internet law developments from diverse legal systems around the world. This timely and up-to-date Hornbook comprehensively examines Internet technologies, Internet governance, private international law (jurisdiction, choice of law, forum selection and enforcement of judgment), online contacts (mass market, cloud computing service level agreements, software licensing, and e-commerce terms of service), consumer protection in cyberspace (FTC, state and foreign developments), cybertorts (including CDA Section 230 developments, Internet security, information torts, and negligent enablement), Internet-related privacy (including the EU Data Directive) cybercrimes (including state, federal and international developments), content regulations (U.S. vs. foreign), copyrights in cyberspace, trademarks and domain names, Internet-related trade secrets and patent law developments. Global Internet law is increasingly important for all lawyers, whether they are policymakers, transactional lawyers, or litigators. This Hornbook is organized around the major issues in each substantive and procedural area of law in the most accessible, contemporary, and effective manner. To help readers come to grips with the necessity of approaching the subject from a transnational perspective, this book surveys the best available U.S. and foreign cases, statutes, and commentaries covering global Internet Law developments.
Lessons from the Identity Trail by Ian Kerr (Editor); Carole Lucock; Valerie M. Steeves
Call Number: K3264.C65 L47 2009
ISBN: 0195372476
Publication Date: 2009
The Criminal Law of Intellectual Property and Information by Geraldine Szott Moohr
Call Number: KF2979.M655 2008
ISBN: 0314154310
Publication Date: 2008-02-01
Cyberlaw by Roy J. Girasa
Call Number: KF390.5.C6G57 2002
ISBN: 0130655643
Publication Date: 2001-10-18
Law and Internet Cultures by Kathy Bowrey
Call Number: KF390.5.C6B599 2005
ISBN: 0521600480
Publication Date: 2005-05-30
The Digital Person by Daniel J. Solove
Call Number: KF1263.C65 S668 2004
ISBN: 0814798462
Publication Date: 2004
Cybercrime by Ralph D. Cliiford (Editor)
Call Number: KF390.5.C6C934 2001
ISBN: 0890897239
Publication Date: 2001-10-01
The Law of Defamation and the Internet by Matthew Collins
Call Number: KF1266.C65 2001
ISBN: 0199244685
Publication Date: 2001-12-13
Regulating Cyberspace by Richard A. Spinello
Call Number: TK5102.5.S6633 2002
ISBN: 1567204457
Publication Date: 2002-06-30
From the...
Cybersecurity for the Home and Office by John BandlerThis title helps individuals take control of their cybersecurity. Every day in the news, we see cybercrime -- a multi-billion-dollar-a-year criminal industry whose actors have little fear of law enforcement. Incidents of cybercrime and cybercrime-related identity theft continue to grow exponentially. As a result, governments, regulators, and professional bodies increasingly require that lawyers and other professionals take reasonable cybersecurity measures. Beyond protecting workplaces from cybertheft or intrusion, there's also a need to protect ourselves and our families from these threats. Cybersecurity for the Home and Office: The Lawyer's Guide to Taking Charge of Your Own Information Security will make it easier to understand cyber risks so a decision can be made as to where to set the "cybersecurity dial" in home and office.
This link opens in a new window
Call Number: KF390.5 C6 B34 2017
ISBN: 1634259076
Publication Date: 2018-09-07
Intellectual Privacy : rethinking civil liberties in the digital age by Neil RichardsMost people believe that the right to privacy is inherently at odds with the right to free speech. Courts all over the world have struggled with how to reconcile the problems of media gossip with our commitment to free and open public debate for over a century. The rise of the Internet hasmade this problem more urgent. We live in an age of corporate and government surveillance of our lives. And our free speech culture has created an anything-goes environment on the web, where offensive and hurtful speech about others is rife. How should we think about the problems of privacy and free speech? In Intellectual Privacy, Neil Richards offers a different solution, one that ensures that our ideas and values keep pace with our technologies. Because of the importance of free speech to free and open societies, he argues that whenprivacy and free speech truly conflict, free speech should almost always win. Only when disclosures of truly horrible information are made (such as sex tapes) should privacy be able to trump our commitment to free expression. But in sharp contrast to conventional wisdom, Richards argues that speechand privacy are only rarely in conflict. America's obsession with celebrity culture has blinded us to more important aspects of how privacy and speech fit together. Celebrity gossip might be a price we pay for a free press, but the privacy of ordinary people need not be. True invasions of privacylike peeping toms or electronic surveillance will rarely merit protection as free speech. And critically, Richards shows how most of the law we enact to protect online privacy pose no serious burden to public debate, and how protecting the privacy of our data is not censorship.More fundamentally, Richards shows how privacy and free speech are often essential to each other. He explains the importance of "intellectual privacy", protection from surveillance or interference when we are engaged in the processes of generating ideas - thinking, reading, and speaking withconfidantes before our ideas are ready for public consumption. In our digital age, in which we increasingly communicate, read, and think with the help of technologies that track us, increased protection for intellectual privacy has become an imperative. What we must do, then, is to worry less aboutbarring tabloid gossip, and worry much more about corporate and government surveillance into the minds, conversations, reading habits, and political beliefs of ordinary people. A timely and provocative book on a subject that affects us all, Intellectual Privacy will radically reshape the debate about privacy and free speech in our digital age.
Cyberlaw by Michael Worls; Gerald R. Ferrera; Stephen D. Lichtenstein; Margo E. K. Reder; Ray August; William T. Schiano; Scott Person; Susanna Smart; Kelly Keeler
Call Number: KF390.5.C6C935 2001
ISBN: 0324074735
Publication Date: 2001-07-24
The Law and the Information Superhighway by Henry H. Perritt
Call Number: KF2765.P48 1996
ISBN: 0471126241
Publication Date: 1995
Cyberlaw - Problems of Policy and Jurisprudence in the Information Age by Patricia Bellia; Paul Schiff Berman; David G. Post
Call Number: KF390.5.C6B44 2004
ISBN: 9780314155122
Publication Date: 2004-07-01
In Search of Jefferson's Moose by David G. Post
Call Number: K564.C6P67 2009
ISBN: 0195342895
Publication Date: 2009-01-21
Privacy and the Media by Solove & Schwartz
Call Number: KF1263.M43 S65 2008
ISBN: 9780735582576
Publication Date: 2008
Real Law @ Virtual Space by Susan J. Drucker; Gary Gumpert
Call Number: K564.C6R43 2005
ISBN: 1572735511
Publication Date: 2004-12-01
...FSU Catalog!
The Cambridge Handbook of Surveillance Law by David Gray (Editor); Stephen E. Henderson (Editor)Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting privacy and individual liberty. From police officers to corporations to intelligence agencies, surveillance law is tasked with striking this difficult and delicate balance. That challenge is compounded by ever-changing technologies and evolving social norms. Following the revelations of Edward Snowden and a host of private-sector controversies, there is intense interest among policymakers, business leaders, attorneys, academics, students, and the public regarding legal, technological, and policy issues relating to surveillance. This handbook documents and organizes these conversations, bringing together some of the most thoughtful and impactful contributors to contemporary surveillance debates, policies, and practices. Its pages explore surveillance techniques and technologies; their value for law enforcement, national security, and private enterprise; their impacts on citizens and communities; and the many ways societies do - and should - regulate surveillance.
Guide to cybersecurity due diligence in M&A transactions by Thomas J. Smedinghoff and Roland L. Trope, editors."In the digital era, ubiquitous connectivity has spared no enterprise the risks of being hacked from anywhere in the world. The reality of this threat, coupled with the near total dependence of today's businesses on networked digital technology, presents a major risk of catastrophic consequences to most businesses. And acquiring or merging with any business involves taking on that risk. Thus, in any M&A transaction, an evaluation of the target's cybersecurity capabilities and experience is critical. [This book] is designed to assist companies and their counsel in assessing that risk. Detailed and easy-to-read, this comprehensive guide includes discussions on recent cyber incidents, including Nieman Marcus, Yahoo, Target Corporation, Sony Pictures, and Volkswagen."-- Provided by publisher.