Approaches to legal ontologies constitutes a collective reflection on the foundations of legal ontology engineering, by exploring current methodologies and theoretical approaches to defining legal ontologies, their divergences and complementarity and the challenges still to be faced. It gathers contributions from leading experts regarding their theoretical commitments and methodological approaches derived from a long experience in the area and presents a mature reflection on achievements and current shortcomings. The various authors reconstruct their concrete methodological frameworks by...
Approaches to legal ontologies constitutes a collective reflection on the foundations of legal ontology engineering, by exploring current methodologie...
This volume examines the basic layers of the standard-based creation and usage of legislation. In particular, it addresses the identification of legislative documents, their structure, the basic metadata and legislative changes. Since mature technologies and established practices are already in place for these layers, a standard-based approach is a necessary aspect of the up-to-date management of legislative resources. Starting out with an overview of the context for the use of XML standards in legislation, the book next examines the rationale of standard-based management of legislative...
This volume examines the basic layers of the standard-based creation and usage of legislation. In particular, it addresses the identification of legis...
With mobile phones now the most ubiquitous mode of communication, this publication shows their ideal potential as a tool for conflict prevention and management. It details innovative uses of mobile technologies such as early warning and humanitarian relief.
With mobile phones now the most ubiquitous mode of communication, this publication shows their ideal potential as a tool for conflict prevention and m...
This compact, highly engaging book examines the international legal regulation of both the conduct of States among themselves and conduct towards individuals, in relation to the use of cyberspace.
This compact, highly engaging book examines the international legal regulation of both the conduct of States among themselves and conduct towards indi...
Virtually all organisations collect, use, process and share personal data from their employees, customers and/or citizens. In doing so, they may be exposing themselves to risks, from threats and vulnerabilities, of that data being breached or compromised by negligent or wayward employees, hackers, the police, intelligence agencies or third-party service providers. A recent study by the Ponemon Institute found that 70 per cent of organisations surveyed had suffered a data breach in the previous year. Privacy impact assessment is a tool, a process, a methodology to identify, assess,...
Virtually all organisations collect, use, process and share personal data from their employees, customers and/or citizens. In doing so, they may be ex...
Virtually all organisations collect, use, process and share personal data from their employees, customers and/or citizens. In doing so, they may be exposing themselves to risks, from threats and vulnerabilities, of that data being breached or compromised by negligent or wayward employees, hackers, the police, intelligence agencies or third-party service providers. A recent study by the Ponemon Institute found that 70 per cent of organisations surveyed had suffered a data breach in the previous year. Privacy impact assessment is a tool, a process, a methodology to identify, assess,...
Virtually all organisations collect, use, process and share personal data from their employees, customers and/or citizens. In doing so, they may be ex...
More and more transactions, whether in business or related to leisure activities, are mediated automatically by computers and computer networks, and this trend is having a significant impact on the conception and design of new computer applications. The next generation of these applications will be based on software agents to which increasingly complex tasks can be delegated, and which interact with each other in sophisticated ways so as to forge agreements in the interest of their human users. The wide variety of technologies supporting this vision is the subject of this volume. It...
More and more transactions, whether in business or related to leisure activities, are mediated automatically by computers and computer networks, an...
This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority and the actions of digital dissidents.
This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, libe...
Mobile phones are the most ubiquitous communications technology in the world. Besides transforming the way in which we communicate, they can also be used as a powerful tool for conflict prevention and management. This book presents innovative uses of mobile technologies in the areas of early warning, disaster and humanitarian relief, governance, citizens' participation, etc. and cuts across different regions. The book brings together experts and practitioners from different fields-mobile technologies, information systems, computer sciences, online dispute resolution, law, etc.-to reflect...
Mobile phones are the most ubiquitous communications technology in the world. Besides transforming the way in which we communicate, they can also b...
This book explores how the design, construction, and use of robotics technology may affect today's legal systems and, more particularly, matters of responsibility and agency in criminal law, contractual obligations, and torts. By distinguishing between the behaviour of robots as tools of human interaction, and robots as proper agents in the legal arena, jurists will have to address a new generation of "hard cases." General disagreement may concern immunity in criminal law ("e.g.," the employment of robot soldiers in battle), personal accountability for certain robots in contracts ("e.g.,"...
This book explores how the design, construction, and use of robotics technology may affect today's legal systems and, more particularly, matters of...