1–50 of
225 results.
-
Bukola Faturoti
Websites have provided a very strong platform for businesses to reach their customers. They surpass the regular billboards by providing portals through which transactions are conducted without any phy...
-
Nomthandazo Ntlama
The release of the Public Protector’s final report on the allegations of maladministration against the chairperson of the Independent Electoral Commission has put under the microscope the developmen...
-
Nucharee Nuchkoom Smith
When Thailand and Australia entered into a Free Trade Agreement in 2005 the public focus was largely on the trade in goods and the benefits that would accrue to each country with a more open market....
-
Huala Adolf
In March 2014, the Government of the Republic Indonesia promulgated the Law No. 7 of 2014 on Trade. The Law is a new legislation. No law on trade has ever been promulgated before. The Law contains var...
-
Carlos Alberto Rohrmann
Cloud computing is a technological reality that is being widely adopted by large companies. This study discusses cloud computing and information security. It also includes some of the advantages and r...
-
Mpakwana Annastacia Mthembu
The last three decades has experienced the introduction of computers and information technology at many levels of human transaction, namely transfer of funds, data collation and conclusion of contract...
-
Gã¶Nenã§ Gã¼Rkaynak
•
İLay Yä±Lmaz
•
Burak Yeåÿilaltay
This contribution discusses the legal framework of online advertising and common legal issues pertaining thereto. This paper also addresses the implementation of general legal provisions to online adv...
-
Poomintr Sooksripaisarnkit
With ever increasing access and use of internet worldwide, torts committed via internet are seen more often while legal positions in common law fail to keep pace with such developments. This can be se...
-
Suhail Almerdas
This article examines the extent to which legal measures enacted in Saudi Arabia are able to tackle the problem of widespread cybercrime, namely identity theft. It examines to what extent the Saudi ...
-
Atip Latipulhayat
Telecommunications is one sector historically subject to state monopolies in both developed and developing countries for many reasons. The Indonesian legislation stipulates that the telecommunications...
-
Giovanni Tamburrin
•
Sergey Butakov
IParadigms, a company involved in plagiarism detection, was hold not liable for the unauthorized use and archival of students’ papers. Both the District and Appellate Courts of Virginia, in fact, ma...
-
Sã©Bastien Ziegler
•
Kã©Mo Sonko
The Privacy Risk Area Assessment Tool (PRAAT) for audio monitoring has been developed in the frame of EAR-IT, a European research project exploring the potential of audio monitoring for smart building...
-
Jie Hua
The revision of copyright law is influenced by the development of technologies. The emergence of personal computer and internet brings technological innovation reshaping copyright law in a continuou...
-
Batu Kinikoglu
This paper aims to critically examine internet access regime in Turkey within the framework of freedom of speech set by International human rights agreements. The enactment of the Law No. 5651 in 2007...
-
Katja Weckstrã¶M
Book Title: Information Technology and Intellectual Property LawSixth EditionEditor: David BainbridgeYear of Publication: January,2014Price: £ 130.00ISBN: 978 1 84766 712 0Format: PaperbackAvailabili...
-
(Jerry) Jie Hua
The expansion of the rights of copyright owners caused by digital network technology greatly reduces the capabilities of users to obtain access and exploitation of the copyrighted information and work...
-
Farisa Tasneem
The maxim that ‘information is power’ is relevant now more than ever. Until recently, most information was scattered, disorganized and awkward to find then acquire. Google was one of the first to ...
-
Olli Vilanka
It may be questioned whether traditional concepts of individualistic droit d' auteur copyright theory apply to digital communication networks such as Internet. Due to mass of information it may be esp...
-
Alejandro Laje
Argentine and American courts have a similar understanding of privacy and Privacy Right. However, the theoretical frameworks and actual rulings in both countries differ in their perspectives and found...
-
Ahmed Adnan Al-Nuemat
Crimes targeting to damage the property of natural and legal individuals including states are in existence while the objective of people, groups and the entire organizations when committing crimes is ...
-
Sophie Stalla-Bourdillon
Book Title: Telecommunication Laws in Europe 6th EditionEditor : Joachim SchererPublisher: The Bloomsbury Group Year of Publication: February, 2013Price: £195.00ISBN: 978 1 84766 885 1Format: Hardb...
-
F. Willem Grosheide
•
Herwin Roerdink
•
Karianne Thomas
Video games are fast becoming one of the most popular media of choice. The global market for video games is still expected to grow substantially in the upcoming years. The legal framework for protecti...
-
Antonis Mouhtaropoulos
•
Chang-Tsun Li
•
Marthie Grobler
Digital Forensic Readiness is defined as the pre-incident plan that deals with an organization’s ability to maximize digital evidence USAge and anticipate litigation. The inadequacy of technical res...
-
Eliza Mik
This book is basic. Basic in the good sense: it is the first go-to work for IT professionals, especially procurement or contract managers and possibly also for lawyers that are starting their careers...
-
Hayyan Ul Haq
Evaluating the consequences of the existing creator and inventor doctrine on access to public goods, this paper investigates the ways of finding the most adequate legal protection that may bridge publ...
-
Denise Wong
Litigation practice has been significantly altered by the advent of electronically stored information in daily corporate life. It is argued that the laws of disclosure should be updated to recognise t...
-
Fang Zhou
In order to protect intangible cultural heritage (ICH), the United Kingdom (UK) and China have issued a series of laws in recent years. By comparing these two legal systems, this article analyses the ...
-
Stephen E. Blythe
In the digital age, the E-signature has replaced the handwritten signature. Since 1995, there have been three generations of E-signature law: the first mandated use of the digital signature, the secon...
-
Althaf Marsoof
The Sale of Goods Act 1979 (“SGAâ€) that is in force in the United Kingdom (UK) is ill suited for the Twenty First Century. Since the term “goods†defined in the SGA does not extend to the sale...
-
Lawal Oluwaseun Sadiq
The article provides a thorough examination of the fair and equitable treatment standard by considering what constitutes an act to be regarded as fair and equitable treatment of an investor and his in...
-
Thilla Rajaretnam
The application of data mining techniques to health-related data is beneficial to medical research. However, the use of data mining or knowledge discovery in databases, and data matching and profiling...
-
Carlos A. Rohrmann
•
Cristiane Rego
This article analyses the adverse effect of paternalistic attitudes adopted by the State, especially the legal regulation of private life. Often, the State has adopted certain positions, especially ...
-
Khadijah Mohamed
•
Ratnaria Wahid
Counterfeiting has currently been labelled as the crime of the twenty-first century. It has evolved into a much more lucrative business in very sophisticated ways. While there are many contributing fa...
-
Ratnaria Wahid
•
Khadijah Mohamed
Access to copyrighted materials and resources for research purposes have been increasingly conducted across borders. In certain circumstances, access to copyright materials that may be needed for re...
-
Omer Tene
In this article I explore some of the legal issues arising from the transformation of SNS operators to providers of digital identity. I consider the implications of the involvement of private sector e...
-
Brendon Beheshti
The internet has become a pervasive and established part of modern life and along with it legal frameworks for establishment and enforcement of consumer contracts have and continue to develop. Regulat...
-
Edward Elliot
This article compares the right of publicity of celebrities with that of professional and college athletes. Sec.I of this article introduces and defines the concept of right of publicity. Sec.2 begins...
-
Lazaros G. Grigoriadis
In “UsedSoft GmbH v. Oracle International Corp.â€, the Europeam Court of Justice opened the way for the sale of "second-hand software" across Europe. The decision UsedSoft gives rise to new data...
-
Edgar Whitley
This paper reviews the arguments for technology neutral e–identity policies. It uses the recent experience of identity policy in the UK, as well as a consideration of technological developments, t...
-
Sylvain Mã©Tille
Switzerland, like the European Union, has an extensive protection of privacy. An omnibus law, the Data Protection Act, ensures a high level of protection for every data relating to an identified or id...
-
Junwei Fu
In modern contract law, freedom of contract is of an underlying principle that people have struggled for centuries. Both China and Europe fully realized its value, although in distinct ways that are d...
-
Eric Everson
As technology is increasingly integrated into every aspect of the commercial environment, the amount of data generated from each transaction multiplies. Electronic discovery (eDiscovery) represents ...
-
Tobias Mahler
Current implementations of electronic identity in Europe are rather diverse; they include state-driven identity management frameworks as well as private sector frameworks and different forms of public...
-
Michael Filby
Western legislatures tend towards the use of regulatory policies that favour strong intellectual property rights over public access in the battle to regulate file sharing. It has become apparent that ...
-
Tian Gerber
•
Kerry-Lynn Thomson
•
Mariana Gerber
Since the deregulation of Voice over Internet Protocol (VoIP) in 2005, many South African organizations are now attempting to leverage its cost saving and competitive values. However it has been recen...
-
Eric Samuel Heidel
The government now regularly gathers information from individuals’ smartphones. Cellular providers are allowing the government to access the GPS data that users’ smartphones exchange with the pr...
-
Editorial Board
This article has been retracted at the request of Dr. Alana Maurushat. Reason: The author has plagiarised some sections of the articles from various sources, notably from the published work of Alana M...
-
Eliza Mik
Singapore is the first Asian country to accede to the UNCITRAL Convention on the Use of Electronic Communications in International Contracts. Singapore is not only the first Asian nation to accede to ...
-
Norberto Norberto Nuno Gomes De Andrade
Electronic Identity (eID) is the backbone of modern communications and transactions in the digital world, as well as a key driver for the growth of the EU economy and the completion of the Digital Sin...
-
Hilton Staniland
In this paper, it is argued that Lord Jim provides verisimilitude in relation to the law and practice of contemporary inquiries and investigations into marine casualties; and that the novel is a case ...