Information & Communications Technology Law最新文献

筛选
英文 中文
Information and communications technology law in changing times 信息和通信技术法在不断变化的时代
IF 1.5
Information & Communications Technology Law Pub Date : 2021-01-02 DOI: 10.1080/13600834.2020.1807135
B. Simpson, L. Collingwood
{"title":"Information and communications technology law in changing times","authors":"B. Simpson, L. Collingwood","doi":"10.1080/13600834.2020.1807135","DOIUrl":"https://doi.org/10.1080/13600834.2020.1807135","url":null,"abstract":"The articles in this special issue arise from papers presented at the Socio-Legal Studies Association Annual Conference in Leeds in 2019. Few would have predicted that within twelve months the Covi...","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"30 1","pages":"1 - 2"},"PeriodicalIF":1.5,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1807135","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46671181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Digital disclosure: HIV status, mobile dating application design and legal responsibility 数字披露:艾滋病毒状况,手机约会应用程序设计和法律责任
IF 1.5
Information & Communications Technology Law Pub Date : 2021-01-02 DOI: 10.1080/13600834.2020.1807119
C. Giles
{"title":"Digital disclosure: HIV status, mobile dating application design and legal responsibility","authors":"C. Giles","doi":"10.1080/13600834.2020.1807119","DOIUrl":"https://doi.org/10.1080/13600834.2020.1807119","url":null,"abstract":"ABSTRACT Location-based mobile dating applications are often one of the richest sources of personal information readily accessible to strangers on the internet and in many cases this information now extends to a user’s HIV status and the date of their most recent sexual health test. Drawing on qualitative data collected from dating application users, this article considers how these features construct sexual health in a manner which reinforces the uneven distribution of responsibility for preventing HIV transmission. Examining the current legal framework covering HIV transmission criminalisation in England and Wales, this piece aims to illustrate the importance of understanding how these applications are used in practice, if they are to be used at trial.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"30 1","pages":"35 - 53"},"PeriodicalIF":1.5,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1807119","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41527013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart contracts: a remedial analysis 智能合约:一种补救分析
IF 1.5
Information & Communications Technology Law Pub Date : 2020-08-12 DOI: 10.1080/13600834.2020.1807134
Robert Herian
{"title":"Smart contracts: a remedial analysis","authors":"Robert Herian","doi":"10.1080/13600834.2020.1807134","DOIUrl":"https://doi.org/10.1080/13600834.2020.1807134","url":null,"abstract":"ABSTRACT The perpetual script of a smart contract, that executes an agreement machine-to-machine without prejudice, guarantees performance of ‘contractual terms’ enabling the exchange or transaction of cryptoassets and other forms of property. Yet, smart contracts as recognisable or valid legal instruments within the boundaries of contract or property law remain uncertain and contentious. Contrary to perceptions of contractual streamlining and efficiency, understanding the uncertainty smart contracts produce lies in the technology's failure to meet many of the fundamental principles of contract law and theory concerning, for example, breach of promise and remedy for breach. Smart contracts appear to reduce contracting to a form and standard well below that developed by contract law and theory over many centuries in both civil and common law jurisdictions. Including elements of the law of restitution, this article's remedial analysis will examine smart contracts considering ‘traditional’ contract law to understand and, where possible, test the legal legitimacy of this post-human technology, and explore the potential of smart contracts to supplement or, in time, supersede traditional contract law.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"30 1","pages":"17 - 34"},"PeriodicalIF":1.5,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1807134","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48454630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Leveraging the ‘power’ of big data in the production of ‘responsible gamblers’: a Foucauldian perspective 利用大数据的“力量”培养“负责任的赌徒”:傅的观点
IF 1.5
Information & Communications Technology Law Pub Date : 2020-08-12 DOI: 10.1080/13600834.2020.1807117
Rachel Allsopp
{"title":"Leveraging the ‘power’ of big data in the production of ‘responsible gamblers’: a Foucauldian perspective","authors":"Rachel Allsopp","doi":"10.1080/13600834.2020.1807117","DOIUrl":"https://doi.org/10.1080/13600834.2020.1807117","url":null,"abstract":"ABSTRACT This article examines the big data practices employed by the online gambling industry to illustrate the wider societal power structures involved. As well as using data for commercial ends, gambling operators in the UK market are obligated by law to utilise gamblers’ data to protect problem gamblers. This paper argues that the use of data in this way can be interpreted as a form of social control when observed through a Foucauldian lens. Contrary to the dominant narrative of free and informed choice, gamblers’ behaviour is arguably being governed both at an individual level through disciplinary mechanisms of surveillance and correction, and at the level of the population through governmentality techniques applied to the gambling environment. Through big data practices and industry discourse, these mechanisms of power are used to frame the choices of individuals and shape them into a productive population of ‘responsible gamblers’.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"30 1","pages":"54 - 74"},"PeriodicalIF":1.5,"publicationDate":"2020-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1807117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43447253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Deepfakes and image manipulation: criminalisation and control 深度造假和图像操纵:犯罪化和控制
IF 1.5
Information & Communications Technology Law Pub Date : 2020-07-16 DOI: 10.1080/13600834.2020.1794615
Tyrone Kirchengast
{"title":"Deepfakes and image manipulation: criminalisation and control","authors":"Tyrone Kirchengast","doi":"10.1080/13600834.2020.1794615","DOIUrl":"https://doi.org/10.1080/13600834.2020.1794615","url":null,"abstract":"ABSTRACT Deepfakes are a form of human image synthesis where an existing picture or image is superimposed into a video to change the identity of those depicted in the video. The technology relies on machine learning or artificial intelligence to map an existing image, usually a photo of a person's face, to transfer that image to an existing video image. The technology emerged into the latter part of 2017, and has since given rise to apps and other programmes that allow users to create their own deepfakes. We already use filters and emojis to alter images by consent, however, deepfakes are particularly problematic because they allow for production of videos that are highly convincing, taken to be a real video of the person depicted. Deepfakes provide for the manipulation of all manner of video, but particular risks include videos produced to incite political deception, voter manipulation, commercial fraud, and ‘revenge porn’. The production of deepfake ‘revenge porn’ presents as especially insidious given the ability to transfer the face of any person onto an already existing pornographic video. Harm is exacerbated where that video is then disseminated, via the internet or by social media.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"308 - 323"},"PeriodicalIF":1.5,"publicationDate":"2020-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1794615","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43028756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Regulating law enforcement access to electronic evidence across borders: the United States approach 监管执法部门跨境获取电子证据:美国的做法
IF 1.5
Information & Communications Technology Law Pub Date : 2020-07-14 DOI: 10.1080/13600834.2020.1794617
Halefom H. Abraha
{"title":"Regulating law enforcement access to electronic evidence across borders: the United States approach","authors":"Halefom H. Abraha","doi":"10.1080/13600834.2020.1794617","DOIUrl":"https://doi.org/10.1080/13600834.2020.1794617","url":null,"abstract":"ABSTRACT Several initiatives are underway to address the jurisdictional and conflicts-of-law challenges triggered by the ubiquity of cloud data storage. By introducing a new approach for international cooperation through the Clarifying Lawful Overseas Use of Data Act (CLOUD Act), the United States of America (US) leads the cross-border data access reform agenda. The US approach deserves closer scrutiny, given its impact in shaping international standards that govern law enforcement access to cloud data, as well as its influence on other impending reform initiatives. While a number of blogs and reports have been written about the CLOUD Act, a comprehensive academic analysis appears to be lacking. This article addresses this gap by examining the extraterritorial reach of the US government’s law enforcement powers, and conversely the powers of foreign governments to obtain data held by US-based service providers. Most importantly, this article scrutinises the adequacy of the substantive and procedural safeguards stipulated under the CLOUD Act.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"4 2","pages":"324 - 353"},"PeriodicalIF":1.5,"publicationDate":"2020-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1794617","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41293569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The controller’s role in determining ‘high risk’ and data protection impact assessment (DPIA) in developing digital smart city 控制器在确定“高风险”和数据保护影响评估(DPIA)中的作用,以发展数字智慧城市
IF 1.5
Information & Communications Technology Law Pub Date : 2020-07-07 DOI: 10.1080/13600834.2020.1790092
Shakila Bu-Pasha
{"title":"The controller’s role in determining ‘high risk’ and data protection impact assessment (DPIA) in developing digital smart city","authors":"Shakila Bu-Pasha","doi":"10.1080/13600834.2020.1790092","DOIUrl":"https://doi.org/10.1080/13600834.2020.1790092","url":null,"abstract":"ABSTRACT Article 35 of the General Data Protection Regulation (GDPR) states that data controllers are required to carry out data protection impact assessment (DPIA) if a processing operation, particularly involving the use of new technologies, is ‘likely to result in a high risk to the rights and freedoms of natural persons’. The focus in this paper is on the role and responsibilities of data controllers in a smart city platform in assessing ‘high risk’ and the importance of impact assessment in relation to data processing with the latest technologies for the protection of personal data.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"391 - 402"},"PeriodicalIF":1.5,"publicationDate":"2020-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1790092","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49611479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The (UK) Freedom of Information Act’s disclosure process is broken: where do we go from here? (英国)《信息自由法》的披露程序被打破了:我们该何去何从?
IF 1.5
Information & Communications Technology Law Pub Date : 2020-06-25 DOI: 10.1080/13600834.2020.1785663
Henry Pearce
{"title":"The (UK) Freedom of Information Act’s disclosure process is broken: where do we go from here?","authors":"Henry Pearce","doi":"10.1080/13600834.2020.1785663","DOIUrl":"https://doi.org/10.1080/13600834.2020.1785663","url":null,"abstract":"ABSTRACT This article builds on previous literature in the data protection and freedom and information field, which has argued that the ‘release and forget’ disclosure model utilised by the (UK) Freedom of Information Act 2000 (FOIA) is unfit for purpose in the context of personal data that have been subject to a process of anonymisation, and that reform is necessary. Rather than outlining a detailed proposal for reform, the article intends to stoke debate in this area by highlighting a range of issues and factors that could help inform discussions regarding what shape any reform of the FOIA’s disclosure model should take. The article argues that the notions of privacy and data protection by design, data licensing, risk, contextual controls, metadata, and privacy enhancing technologies, should all have a role to play in respect of improving how anonymised data are disclosed under the FOIA.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"354 - 390"},"PeriodicalIF":1.5,"publicationDate":"2020-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1785663","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46134681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sharing national security information in Finland 在芬兰共享国家安全信息
IF 1.5
Information & Communications Technology Law Pub Date : 2020-05-12 DOI: 10.1080/13600834.2020.1759277
Mikael Lohse
{"title":"Sharing national security information in Finland","authors":"Mikael Lohse","doi":"10.1080/13600834.2020.1759277","DOIUrl":"https://doi.org/10.1080/13600834.2020.1759277","url":null,"abstract":"ABSTRACT Safeguarding Finland’s national security is a collaborative function of the intelligence authorities and their clients and partners. This collaboration requires a sharing of national security information within the intelligence community, and with other public authorities – both domestic and foreign – as well as with enterprises and corporations. The first objective of this article is to distinguish norms regulating the sharing of national security information from the intelligence and data processing legislation, and to organise this legal substance into three categories: Disclosure of information in (1) national co-operation, (2) international co-operation, and for (3) crime prevention. The second objective is to identify areas of development in each of these three categories and accordingly suggest law and policy recommendations for the future.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"279 - 290"},"PeriodicalIF":1.5,"publicationDate":"2020-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1759277","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48964031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predictions from data analytics: Does Malaysian data protection law apply? 来自数据分析的预测:马来西亚数据保护法是否适用?
IF 1.5
Information & Communications Technology Law Pub Date : 2020-05-04 DOI: 10.1080/13600834.2020.1759276
T. San
{"title":"Predictions from data analytics: Does Malaysian data protection law apply?","authors":"T. San","doi":"10.1080/13600834.2020.1759276","DOIUrl":"https://doi.org/10.1080/13600834.2020.1759276","url":null,"abstract":"ABSTRACT As data analytics become prevalent in industries in Malaysia to draw predictions about individuals’ habits and behaviour, it is important that certainty exists about the legal status of predictions vis-à-vis data protection law. The predictions can be privacy-intrusive and threaten individuals’ autonomy, although this may not always be so. The Malaysian Personal Data Protection Act 2010 is silent on the legal status of predictions. This paper examines whether the Malaysian Parliament should extend the Act to provide control to individuals over predictions about themselves. In doing so, the paper explores the position in the EU, Japan, Australia and the USA. The finding is that in those jurisdictions, predictions are within the remit of data protection law. It is argued that this is an over-generalisation and is inconsonant with commercial realities. The author advocates that a different approach be adopted to achieve a balance between individuals’ interest to control their data and commercial needs to use predictions without undue hindrance.","PeriodicalId":44342,"journal":{"name":"Information & Communications Technology Law","volume":"29 1","pages":"291 - 307"},"PeriodicalIF":1.5,"publicationDate":"2020-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13600834.2020.1759276","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48876872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信