Muutke küpsiste eelistusi

E-raamat: Understanding Cybersecurity Law and Digital Privacy: A Common Law Perspective

  • Formaat - PDF+DRM
  • Hind: 147,58 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Cybersecurity, data privacy law, and the related legal implications overlap into a relevant and developing area in the legal field. However, many legal practitioners lack the foundational understanding of computer processes which are fundamental for applying existing and developing legal structures to the issue of cybersecurity and data privacy. At the same time, those who work and research in cybersecurity are often unprepared and unaware of the nuances of legal application. This book translates the fundamental building blocks of data privacy and (cyber)security law into basic knowledge that is equally accessible and educational for those working and researching in either field, those who are involved with businesses and organizations, and the general public.
1 Legal Foundations
1(36)
1.1 Purpose and Principles of Law
1(3)
1.1.1 Salmond on the Classifications of Law
2(1)
1.1.2 The Rule of Law
2(2)
1.2 Jurisprudence
4(6)
1.2.1 Natural Law Jurisprudence: Observation and Realization
5(1)
1.2.2 Analytical Jurisprudence: Definition and Clarification
6(3)
1.2.3 Normative Jurisprudence: Evaluation and Reformation
9(1)
1.3 Sources of Law
10(3)
1.3.1 Legislation/Statutory Law
10(1)
1.3.2 Legal Precedent/Case Law/Common Law
11(1)
1.3.3 Sources of Legal Influence
12(1)
1.4 Systems of Law
13(4)
1.4.1 Common Law
14(1)
1.4.2 Civil Law
14(1)
1.4.3 Religious Law
15(1)
1.4.4 Customary Law
16(1)
1.4.5 Legal Pluralism
16(1)
1.4.6 Case Hypothetical: Systems of Law
16(1)
1.5 Categories of Law
17(3)
1.5.1 International Law vs Domestic Law
17(1)
1.5.2 Recognition of Sovereignty
18(1)
1.5.3 Public Law versus Private Law
19(1)
1.5.4 Case Hypothetical: Categories of Law
19(1)
1.6 Legal Governance
20(7)
1.6.1 Authoritarianism
21(3)
1.6.2 Monarchism
24(1)
1.6.3 Elitism
24(1)
1.6.4 Socialism
25(1)
1.6.5 Democracy
26(1)
1.6.6 Case Hypothetical: Legal Governance
27(1)
1.7 Constitutionalism
27(4)
1.7.1 Division of Jurisdictional Powers
29(1)
1.7.2 Branches of Legal Governance
30(1)
1.8 Summary
31(6)
References
32(5)
2 Property and Privacy in Context
37(22)
2.1 Perceptions of Property
37(1)
2.2 Ownership, Possession, and Interest
38(6)
2.2.1 Distinguishing Ownership from Possession
38(1)
2.2.2 Ownership
39(1)
2.2.3 Possession
39(2)
2.2.4 Interest
41(2)
2.2.5 Case Hypothetical: Ownership, Possession, and Interest
43(1)
2.3 Property and Privacy
44(7)
2.3.1 Classifications of Property
45(2)
2.3.2 Private Property Versus Public Property
47(1)
2.3.3 Privacy
47(1)
2.3.4 Differentiating Personal from Private
47(2)
2.3.5 Legislative Example: Canadian Consumer Privacy Protection
49(1)
2.3.6 Case Hypothetical: Consumer Privacy Protection
50(1)
2.4 The Intersection of Property, Privacy, and Cybersecurity Law
51(4)
2.4.1 Criminal Law/Statutory Law
52(1)
2.4.2 Tort Law/Common Law
53(1)
2.4.3 Case Hypothetical: Intersection of Criminal and Tort Law
53(2)
2.5 Summary
55(4)
References
56(3)
3 Cybersecurity and Cybercrimes
59(38)
3.1 Categorizing Cybercrimes
59(32)
3.1.1 Cyber-Enabled Offences (On/Offline)
60(5)
3.1.2 Cyber-Dependent Offences (Online)
65(15)
3.1.3 Computer/Cyber-Supported Offences
80(5)
3.1.4 National (Cyber)Security Offences
85(6)
3.2 Growing Prevalence of Cybercrime
91(1)
3.3 Categorizing Cybercrimes in the Law
91(2)
3.4 Summary
93(4)
References
95(2)
4 Global Relevance
97(40)
4.1 Review of Canadian Cybersecurity Laws
98(4)
4.1.1 Regulating Governmental Relationships
98(1)
4.1.2 Regulating Businesses, Organizations, and Commercial Enterprises
99(1)
4.1.3 Regulating Interpersonal Relationships and Criminal Activities
100(2)
4.2 Review of Australian Cybersecurity Laws
102(6)
4.2.1 Regulating Governmental, Business, and Organizational Relationships
102(3)
4.2.2 Regulating Interpersonal Relationships and Criminal Activities
105(3)
4.3 Review of United Kingdom Cybersecurity Laws
108(2)
4.3.1 Regulating Government, Businesses, and Organizations
108(1)
4.3.2 Regulating Interpersonal Relationships and Criminal Activities
109(1)
4.4 Review of United States Cybersecurity Laws
110(4)
4.4.1 Regulating the Federal Government and Governmental Agencies
111(1)
4.4.2 Regulating Sector-Specific Industries: Healthcare
111(1)
4.4.3 Regulating Sector-Specific Industries: Banks/Financial Institutions
112(1)
4.4.4 Regulating Interpersonal Relationships and Criminal Activities
113(1)
4.5 Common Law Countries, in Brief
114(1)
4.6 National Considerations
115(6)
4.6.1 Identity and Diversity
115(3)
4.6.2 Identity in Politics
118(3)
4.6.3 Constitutional Values
121(1)
4.7 International Considerations
121(14)
4.7.1 Treaties and International Agreements
123(2)
4.7.2 The Tallinn Manual and Cyber Warfare
125(8)
4.7.3 International Legal Principles in Cyberspace
133(1)
4.7.4 International Dispute Resolution
133(2)
4.8 Summary
135(2)
References
135(2)
5 Emerging Issues
137(42)
5.1 Globalization and Jurisdictionally
137(5)
5.1.1 Determining Jurisdiction
138(1)
5.1.2 Online Jurisdiction
139(1)
5.1.3 Case Hypothetical: Jurisdiction
139(3)
5.2 Digital Marketplaces and the Consumer
142(6)
5.2.1 Rights of the Consumer in the Global Marketplace
142(2)
5.2.2 Commercial Electronic Messages
144(2)
5.2.3 International Commercial Application
146(2)
5.3 Anonymized DarkNet Markets and Cryptocurrencies
148(17)
5.3.1 Illegal Content and Dark Web Marketplaces
150(3)
5.3.2 Differentiating the Dark from the Deep
153(6)
5.3.3 Cryptocurrencies
159(1)
5.3.4 Corporate Considerations
160(5)
5.4 Challenges to Law Enforcement
165(6)
5.4.1 Decentralization
166(1)
5.4.2 Detection, Tracing and Localization
166(2)
5.4.3 Jurisdiction and Enforcement
168(1)
5.4.4 Digital Evidence Collection
168(1)
5.4.5 Example in Law: Canada's Evidence Act
169(1)
5.4.6 Case Hypothetical: Challenges to Law Enforcement
170(1)
5.5 Digital Sovereignty and Data Governance
171(4)
5.5.1 Challenges to Digital Sovereignty in International Cyber Law
171(1)
5.5.2 Online Content Regulation
172(1)
5.5.3 Digital Content Creation and the Gig Economy
172(3)
5.6 Future Directions
175(1)
5.7 Summary
175(4)
References
176(3)
Conclusion 179
Arash Habibi Lashkari is a senior member of the IEEE, an Associate Professor at the Faculty of Computer Science, University of New Brunswick (UNB), and the Research Coordinator of the Canadian Institute for Cybersecurity (CIC). Dr. Lashkari has over 20 years of teaching experience, spanning several international universities, and has been the recipient of 15 awards at international computer security competitions - including three gold awards. In 2017, he was recognized as one of Canadas Top 150 researchers who will shape the future of Canada. In 2020, Dr. Lashkari was recognized with the University of New Brunswicks prestigious Teaching Innovation Award for his personally created teaching methodology, the Think-Que-Cussion Method. He is the author of ten published books and more than 90 academic papers on various cybersecurity-related topics. He is the founder of the Understanding Cybersecurity Series, which is an ongoing five-year research and development project, toculminate with a varied collection of online articles, published books, open-source packages, and datasets tailored for researchers and readers at all levels.





Melissa Lukings is a Juris Doctor (JD) candidate at the Faculty of Law, University of New Brunswick (Canada), a former graduate of Memorial University of Newfoundland holding a Bachelor of Arts degree in Linguistics, and an intersectional research assistant with a background in social justice, grassroots organization, data privacy and cybersecurity law. Melissa Lukings is currently working on a handful of research projects covering a wide variety of topics, ranging from cybersecurity and privacy law to legal reform and access to justice within the Canadian judicial system.