1–20 of
225 results.
-
Bukola Faturoti
Websites have provided a very strong platform for businesses to reach their customers. They surpass the regular billboards by providing portals through which transactions are conducted without any phy...
-
Nomthandazo Ntlama
The release of the Public Protector’s final report on the allegations of maladministration against the chairperson of the Independent Electoral Commission has put under the microscope the developmen...
-
Nucharee Nuchkoom Smith
When Thailand and Australia entered into a Free Trade Agreement in 2005 the public focus was largely on the trade in goods and the benefits that would accrue to each country with a more open market....
-
Huala Adolf
In March 2014, the Government of the Republic Indonesia promulgated the Law No. 7 of 2014 on Trade. The Law is a new legislation. No law on trade has ever been promulgated before. The Law contains var...
-
Carlos Alberto Rohrmann
Cloud computing is a technological reality that is being widely adopted by large companies. This study discusses cloud computing and information security. It also includes some of the advantages and r...
-
Mpakwana Annastacia Mthembu
The last three decades has experienced the introduction of computers and information technology at many levels of human transaction, namely transfer of funds, data collation and conclusion of contract...
-
Gã¶Nenã§ Gã¼Rkaynak
•
İLay Yä±Lmaz
•
Burak Yeåÿilaltay
This contribution discusses the legal framework of online advertising and common legal issues pertaining thereto. This paper also addresses the implementation of general legal provisions to online adv...
-
Poomintr Sooksripaisarnkit
With ever increasing access and use of internet worldwide, torts committed via internet are seen more often while legal positions in common law fail to keep pace with such developments. This can be se...
-
Suhail Almerdas
This article examines the extent to which legal measures enacted in Saudi Arabia are able to tackle the problem of widespread cybercrime, namely identity theft. It examines to what extent the Saudi ...
-
Atip Latipulhayat
Telecommunications is one sector historically subject to state monopolies in both developed and developing countries for many reasons. The Indonesian legislation stipulates that the telecommunications...
-
Giovanni Tamburrin
•
Sergey Butakov
IParadigms, a company involved in plagiarism detection, was hold not liable for the unauthorized use and archival of students’ papers. Both the District and Appellate Courts of Virginia, in fact, ma...
-
Sã©Bastien Ziegler
•
Kã©Mo Sonko
The Privacy Risk Area Assessment Tool (PRAAT) for audio monitoring has been developed in the frame of EAR-IT, a European research project exploring the potential of audio monitoring for smart building...
-
Jie Hua
The revision of copyright law is influenced by the development of technologies. The emergence of personal computer and internet brings technological innovation reshaping copyright law in a continuou...
-
Batu Kinikoglu
This paper aims to critically examine internet access regime in Turkey within the framework of freedom of speech set by International human rights agreements. The enactment of the Law No. 5651 in 2007...
-
Katja Weckstrã¶M
Book Title: Information Technology and Intellectual Property LawSixth EditionEditor: David BainbridgeYear of Publication: January,2014Price: £ 130.00ISBN: 978 1 84766 712 0Format: PaperbackAvailabili...
-
(Jerry) Jie Hua
The expansion of the rights of copyright owners caused by digital network technology greatly reduces the capabilities of users to obtain access and exploitation of the copyrighted information and work...
-
Farisa Tasneem
The maxim that ‘information is power’ is relevant now more than ever. Until recently, most information was scattered, disorganized and awkward to find then acquire. Google was one of the first to ...
-
Olli Vilanka
It may be questioned whether traditional concepts of individualistic droit d' auteur copyright theory apply to digital communication networks such as Internet. Due to mass of information it may be esp...
-
Alejandro Laje
Argentine and American courts have a similar understanding of privacy and Privacy Right. However, the theoretical frameworks and actual rulings in both countries differ in their perspectives and found...
-
Ahmed Adnan Al-Nuemat
Crimes targeting to damage the property of natural and legal individuals including states are in existence while the objective of people, groups and the entire organizations when committing crimes is ...