The aim of this book is to analyze four dimensions of innovating government and the use of new technologies: legal, ethical, policy and technological dimensions. By joining authors from a diversity of backgrounds (law, ethics, public administration, political science, sociology, communications science, information science, and computer science) in one book, readers (academics, policy makers, legislators and others) are confronted with a variety of disciplinary perspectives on persistent themes, like privacy, biometrics, surveillance, e-democracy, electronic government, and identity...
The aim of this book is to analyze four dimensions of innovating government and the use of new technologies: legal, ethical, policy and technological ...
The book in front of you is the first international academic volume on the legal, philosophical and economic aspects of the rise of 3D printing.
In recent years 3D printing has become a hot topic. Some claim that it will revolutionize production and mass consumption, enabling consumers to print anything from clothing, automobile parts and guns to various foods, medication and spare parts for their home appliances. This may significantly reduce our environmental footprint, but also offers potential for innovation and creativity.
At the same time 3D printing raises social,...
The book in front of you is the first international academic volume on the legal, philosophical and economic aspects of the rise of 3D printing.
With financial identity theft a growing problem around the world, this book provides an understanding of methods and context through an in-depth comparative analysis illustrating how society's structures facilitate this crime in the USA and the Netherlands.
With financial identity theft a growing problem around the world, this book provides an understanding of methods and context through an in-depth compa...
Google s has proved to be one of the most successful business models in today s knowledge economy. Its services and applications have become part of our day-to-day life. However, Google has repeatedly been accused of acting outside the law in the development of services such as Adwords, Googlebooks or YouTube. One of the main purposes of this book is to assess whether those accusations are well-founded. But more important than that, this book provides a deeper reflection: are current legal systems adapted to business models such as that of Google or are they conceived for an industrial...
Google s has proved to be one of the most successful business models in today s knowledge economy. Its services and applications have become part of o...
Human information and communication technology (ICT) implants have developed for many years in a medical context. Such applications have become increasingly advanced, in some cases modifying fundamental brain function. Today, comparatively low-tech implants are being increasingly employed in non-therapeutic contexts, with applications ranging from the use of ICT implants for VIP entry into nightclubs, automated payments for goods, access to secure facilities and for those with a high risk of being kidnapped. Commercialisation and growing potential of human ICT implants have generated debate...
Human information and communication technology (ICT) implants have developed for many years in a medical context. Such applications have become increa...
The existence of financial identity theft in the United States, and its (gradual) spread to other areas of the world, increases the need to understand how identity theft occurs and how perpetrators of the crime manage to take advantage of developments within contemporary society. This book aims to provide such an understanding through an in-depth comparative analysis which illustrates how states, financial service providers, consumers, and others facilitate the occurrence of financial identity theft in the United States and the Netherlands.
The existence of financial identity theft in the United States, and its (gradual) spread to other areas of the world, increases the need to understand...
Ensuring online safety has become a topic on the regulatory agenda in many Western societies. However, regulating for online safety is far from easy, due to the wide variety of national and international, private and public actors and stakeholders that are involved. When regulating online risks for children it is important to strike the right balance between protection against harms on the one hand and safeguarding their fundamental freedoms and rights on the other. The authors in this book attempt to grapple with precisely this theme: striking the right balance between ensuring safety for...
Ensuring online safety has become a topic on the regulatory agenda in many Western societies. However, regulating for online safety is far from easy, ...
Google s has proved to be one of the most successful business models in today s knowledge economy. Its services and applications have become part of our day-to-day life. However, Google has repeatedly been accused of acting outside the law in the development of services such as Adwords, Googlebooks or YouTube. One of the main purposes of this book is to assess whether those accusations are well-founded. But more important than that, this book provides a deeper reflection: are current legal systems adapted to business models such as that of Google or are they conceived for an industrial...
Google s has proved to be one of the most successful business models in today s knowledge economy. Its services and applications have become part of o...
Privacy-invading technologies (PITs) such as Body scanners; Public space CCTV microphones; Public space CCTV loudspeakers and Human-implantable microchips (RFID implants/GPS implants) are dealt with in this book. The book shows how and why laws that regulate the design and development of privacy-invading technologies (PITs) may more effectively ensure the protection of privacy than laws that only regulate data controllers and the use of such technologies. The premise is supported and demonstrated through a discussion on these four specific PITs as case studies. In doing so, the book overall...
Privacy-invading technologies (PITs) such as Body scanners; Public space CCTV microphones; Public space CCTV loudspeakers and Human-implantable microc...
Human information and communication technology (ICT) implants have developed for many years in a medical context. Such applications have become increasingly advanced, in some cases modifying fundamental brain function. Today, comparatively low-tech implants are being increasingly employed in non-therapeutic contexts, with applications ranging from the use of ICT implants for VIP entry into nightclubs, automated payments for goods, access to secure facilities and for those with a high risk of being kidnapped. Commercialisation and growing potential of human ICT implants have generated debate...
Human information and communication technology (ICT) implants have developed for many years in a medical context. Such applications have become increa...