Muutke küpsiste eelistusi

E-raamat: Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective

  • Formaat: EPUB+DRM
  • Sari: Progress in IS
  • Ilmumisaeg: 14-Oct-2022
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783031142642
  • Formaat - EPUB+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Sari: Progress in IS
  • Ilmumisaeg: 14-Oct-2022
  • Kirjastus: Springer International Publishing AG
  • Keel: eng
  • ISBN-13: 9783031142642

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book provides an overview of the topics of data, sovereignty, and governance with respect to data and online activities through a legal lens and from a cybersecurity perspective. This first chapter explores the concepts of data, ownerships, and privacy with respect to digital media and content, before defining the intersection of sovereignty in law with application to data and digital media content. The authors delve into the issue of digital governance, as well as theories and systems of governance on a state level, national level, and corporate/organizational level. Chapter three jumps into the complex area of jurisdictional conflict of laws and the related issues regarding digital activities in international law, both public and private. Additionally, the book discusses the many technical complexities which underlay the evolution and creation of new law and governance strategies and structures. This includes socio-political, legal, and industrial technical complexities which can apply in these areas. The fifth chapter is a comparative examination of the legal strategies currently being explored by a variety of nations. The book concludes with a discussion about emerging topics which either influence, or are influenced by, data sovereignty and digital governance, such as indigenous data sovereignty, digital human rights and self-determination, artificial intelligence, and global digital social responsibility. 

Cumulatively, this book provides the full spectrum of information, from foundational principles underlining the described topics, through to the larger, more complex, evolving issues which we can foresee ahead of us.
1 Data Sovereignty
1(38)
1.1 Topic Overview
2(1)
1.2 Defining Data in Context
2(15)
1.2.1 Types and Features
3(1)
1.2.2 Data as Property
4(2)
1.2.3 Ownership and Interest
6(3)
1.2.4 Data Privacy
9(2)
1.2.5 Data Security
11(2)
1.2.6 Corporate Data/Media Content
13(4)
1.3 Data Storage
17(7)
1.3.1 Physical Storage Devices
19(1)
1.3.2 Cloud Storage
20(1)
1.3.3 Cloud Infrastructure: Benefits and Challenges
20(4)
1.4 Data Sovereignty
24(6)
1.4.1 Sovereignty for Data
27(1)
1.4.2 Governmental Risks
28(1)
1.4.3 Risk Mitigation Strategies
29(1)
1.5 Residency and Localisation
30(5)
1.5.1 Data Residency
31(1)
1.5.2 Data Localisation
31(2)
1.5.3 Localisation Models
33(2)
1.6 Legal Considerations
35(2)
1.7 Summary
37(2)
2 Digital Governance
39(46)
2.1 Topic Overview
40(1)
2.2 Governance
40(6)
2.2.1 Types of Governance
40(6)
2.3 Social Responsibility in Governance
46(15)
2.3.1 Sustainability
47(2)
2.3.2 Accountability
49(1)
2.3.3 Transparency
50(1)
2.3.4 The Social Contract
51(6)
2.3.5 Comparative Provisions
57(4)
2.4 Digital Governance
61(4)
2.4.1 Elements
61(2)
2.4.2 Types of Electronic Governance
63(2)
2.5 Corporate Governance
65(16)
2.5.1 Corporate Social Responsibility
67(1)
2.5.2 Objectives
68(3)
2.5.3 User-Generated/Earned Content
71(6)
2.5.4 Legal Considerations
77(2)
2.5.5 Digital UCG Stakeholders
79(2)
2.6 Summary
81(4)
3 Conflicts of Law
85(32)
3.1 Topic Overview
85(1)
3.2 Jurisdictionality
86(14)
3.2.1 Jurisdictional Authority
86(1)
3.2.2 Determining Jurisdictional Authority
87(2)
3.2.3 Personal Connecting Factors
89(6)
3.2.4 Subtypes of Jurisdiction
95(5)
3.3 International Law
100(6)
3.3.1 Sources of International Law
100(3)
3.3.2 Key Determinants in International Law
103(1)
3.3.3 International Human Rights Laws
104(2)
3.4 International Legal Strategies
106(3)
3.4.1 Silence
107(1)
3.4.2 Existential Disagreements
108(1)
3.4.3 Interpretive Questions
108(1)
3.4.4 Attribution
108(1)
3.4.5 Accountability
109(1)
3.5 Interjurisdictional Sovereignty and Governance
109(6)
3.5.1 Internet Jurisdiction
110(2)
3.5.2 Global Costs and Fatal Consequences
112(2)
3.5.3 Common Law Evolution of International Online Defamation
114(1)
3.6 Summary
115(2)
4 Technical Complexities
117(64)
4.1 Topic Overview
117(1)
4.2 Current Challenges
118(10)
4.2.1 Increased Legislation
118(2)
4.2.2 Increased Data Awareness
120(2)
4.2.3 Larger Data Vaults and Data Location
122(1)
4.2.4 Metadata
123(2)
4.2.5 Data Ownership and Control
125(1)
4.2.6 Data Breaches
126(1)
4.2.7 Cyber Exceptionalism
127(1)
4.3 Internet Governance
128(35)
4.3.1 Access
129(1)
4.3.2 Censorship
130(13)
4.3.3 Digital Divide
143(1)
4.3.4 Digital Rights
144(3)
4.3.5 Freedom of Information
147(4)
4.3.6 Net Neutrality and the Open Internet
151(6)
4.3.7 Privacy
157(6)
4.4 Resurgence of Sovereignty
163(6)
4.4.1 Encryption and the Hybrid Cloud
163(3)
4.4.2 Data Localisation
166(1)
4.4.3 Breach Prevention, Remediation, and Planning
167(2)
4.5 Global Complexity
169(10)
4.5.1 Global Internet Standards
170(3)
4.5.2 Network Latency for Data Transmission
173(1)
4.5.3 Cyberbalkanization
174(1)
4.5.4 Internet Shutdowns
175(1)
4.5.5 Media Freedom
176(2)
4.5.6 Privacy and Encryption
178(1)
4.6 Summary
179(2)
5 Comparative Legal Strategies
181(24)
5.1 Topic Overview
181(1)
5.2 National Data Strategies
182(18)
5.2.1 Canada
182(2)
5.2.2 China
184(1)
5.2.3 Egypt
185(1)
5.2.4 European Union
186(1)
5.2.5 Germany
186(1)
5.2.6 India
187(1)
5.2.7 Indonesia
188(1)
5.2.8 Japan
189(1)
5.2.9 Kazakhstan
189(1)
5.2.10 Kuwait
190(1)
5.2.11 Malaysia
191(1)
5.2.12 Russia
191(2)
5.2.13 Saudi Arabia
193(1)
5.2.14 Switzerland
194(1)
5.2.15 Turkey
195(1)
5.2.16 United Arab Emirates (UAE)
196(1)
5.2.17 United States
197(1)
5.2.18 Uzbekistan
198(1)
5.2.19 Vietnam
198(2)
5.3 Data Residency Comparative
200(4)
5.4 Summary
204(1)
6 Emerging Topics in Data Sovereignty and Digital Governance
205(74)
6.1 Topic Overview
205(1)
6.2 Digital Rights
206(27)
6.2.1 Moral/Human Rights
207(16)
6.2.2 Legal Rights
223(7)
6.2.3 Indigenous Rights
230(3)
6.3 Indigenous Data Sovereignty
233(8)
6.3.1 Care Principles
234(1)
6.3.2 Example: Indigenous Sovereignty in Canada
235(6)
6.4 Data Centres and Data Mines
241(7)
6.4.1 Functions
241(2)
6.4.2 Social Impact
243(1)
6.4.3 Environmental Impacts
244(2)
6.4.4 Challenges
246(2)
6.5 Digital Self-Determination
248(6)
6.5.1 Theories of Self-Determination
249(2)
6.5.2 Elements of Digital Self-Determination
251(3)
6.6 Artificial Intelligence
254(13)
6.6.1 Artificial Intelligence and Intellectual Property
255(7)
6.6.2 Artificial Intelligence and Contract Law
262(1)
6.6.3 Data Protection, Privacy, and Equality
262(3)
6.6.4 Human Rights, Violence, and Legal Ethics
265(2)
6.7 Social Responsibility
267(9)
6.7.1 Digital Colonialism
267(3)
6.7.2 Digital Apartheid
270(3)
6.7.3 Digital Redlining
273(1)
6.7.4 Censorship, Shutdowns, and Blackouts
274(2)
6.8 Relevance to our Collective Future
276(1)
6.9 Summary
277(2)
Conclusion 279(2)
References 281
Melissa Lukings is a Research Assistant at York University (Canada). She is a graduated Juris Doctor (JD) from the Faculty of Law, University of New Brunswick (Canada), a former graduate of Memorial University of Newfoundland (MUN), and an intersectional research assistant with a background in social justice, grassroots organization, data privacy and cybersecurity law. Lukings is currently working on a handful of research projects covering a wide variety of topics, ranging from cybersecurity and privacy law to legal reform and access to justice within the Canadian judicial system.





During 2020 and 2021, Melissa Lukings co-authored a ten-part article series, entitled Understanding Canadian Cybersecurity Laws, which was published by IT World Canada. The article series was recognized with a Gold Medal for the Best Blog Column in the Business Division of the 2020 Canadian Online Publishing Awards, which was remotely held in February 2021. Following the publication of thefinal series article, in April 2021, Lukings was invited to appear as an experiential witness and individual advocate in a hearing before the Parliamentary Ethics Committee for the House of Commons of Canada formally known as the Standing Committee on Access to Information, Privacy and Ethics.

Arash Habibi Lashkari is a Canada Research Chair (CRC) in Cybersecurity. He is a senior member of the IEEE and an Associate Professor at York University (Canada). Prior to this, he was an Associate Professor at the Faculty of Computer Science, University of New Brunswick (Canada), and the Research Coordinator of the Canadian Institute for Cybersecurity (CIC). His research focuses on cyber threat modeling and detection, malware analysis, big data security, internet traffic analysis, and cybersecurity dataset generation.

Arash Lashkari has over 22 years of teaching experience, spanning several international universities, and was responsible for designing the first cybersecurity Capture the Flag (CTF) competition for post-secondary students in Canada. He has been the recipient of 15 awards at international computer security competitions - including three gold awards - and was recognized as one of Canadas Top 150 Researchers for 2017. In 2020, Dr. Lashkari was recognized with the University of New Brunswicks prestigious Teaching Innovation Award for his personally created teaching methodology, the Think-Que-Cussion Method.

He is the author of ten published books and more than 100 academic articles on a variety of cybersecurity-related topics and the co-author of the national award-winning article series, Understanding Canadian Cybersecurity Laws, which was recently recognized with a Gold Medal at the 2020 Canadian Online Publishing Awards.