Academic literature on the topic 'Computer networks, law and legislation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer networks, law and legislation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer networks, law and legislation"

1

Qin, Di, Zhaonan Mu, and Sijialu Yue. "The Value Orientation of Electronic Commerce Law Based on Computer Network." MATEC Web of Conferences 365 (2022): 01030. http://dx.doi.org/10.1051/matecconf/202236501030.

Full text
Abstract:
In the era of legal globalization, e-commerce platform increasingly mature environment, in order to better meet the practical requirements of e-commerce activities, in the process of e-commerce legislation, practice, should always adhere to the value orientation of fair and equitable legal benefits, and by respecting the existing legal framework, integrate the operation and development environment of computer networks, and formulate e-commerce law in line with the modern e-commerce environment, effectively safeguard the order of e-commerce activities. Based on the analysis of the current situation of e-commerce practice and the legislation of e-commerce law, this paper puts forward the value orientation and practical suggestions of e-commerce law based on computer network.
APA, Harvard, Vancouver, ISO, and other styles
2

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Full text
Abstract:
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chips; or the subject of the crime, such as ‘hacking’ or ‘cracking’. The involvement of computers may challenge traditional criminal concepts, such as fraud, as well as facilitating particular types of crime, such as child pornography. This article is concerned with the computer as the subject of the crime and with laws that have been established to specifically address activities that attack the integrity of computer and communications networks, such as the distribution of computer viruses. This article examines various initiatives to harmonise substantive criminal law to address the threat of computer integrity crimes, focusing specifically on a draft Council Framework Decision on ‘attacks against information systems’. Consideration is given to the impact the Decision may have when transposed into UK law, through an amendment of existing legislation, the Computer Misuse Act 1990.
APA, Harvard, Vancouver, ISO, and other styles
3

ZONTOVA, Daria. "Foreign experience in regulating criminal liability for interfering in the activities of judicial bodies and institutions of justice of Ukraine." Economics. Finances. Law 9/1, no. - (September 16, 2022): 23–26. http://dx.doi.org/10.37634/efp.2022.9(1).5.

Full text
Abstract:
The paper examines the peculiarities of the application of the positive experience of legislative activity of foreign countries in regulating criminal liability for interference in the activities of judicial bodies and judicial institutions of Ukraine. Various approaches to the legal regulation of criminal liability for interfering in the activities of judicial bodies (judicial authorities) are analyzed. It is stated that the criminalization of the act in the national legislation is due to a number of different factors, including the peculiarities of certain branches of law and legal culture. Тhe description of the signs of a criminal offense in a separate norm of the criminal law is not in itself a sign of its effectiveness. The fact that in the vast majority of foreign countries interference in the work of automated systems of judicial bodies and institutions of justice is carried out within the criminal law protection of the use of computers, systems and computer networks and networks or information security, does not indicate that national law considers criminal offenses against justice to be less socially dangerous.
APA, Harvard, Vancouver, ISO, and other styles
4

Maile, A. D. "Legislation on Administrative Procedures: The German Experience." Siberian Law Review 18, no. 2 (October 20, 2021): 204–15. http://dx.doi.org/10.19073/2658-7602-2021-18-2-204-215.

Full text
Abstract:
This article provides an overview of the main provisions of German administrative procedural law. It outlines in a systematic way the particularities of administrative procedures and the possibilities for a citizen to seek administrative remedy. The essence of the basic principles of administrative procedural law as well as the particularities of temporary legal protection and the possibilities for an extrajudicial appeal against an administrative act are explained to the reader. The Author points out that administrative proceedings in Germany are, in a broad sense, any decision-making activity of a public administration body. According to the German Administrative Procedure Act, an administrative procedure in the sense of the law is an externally imposed activity of the administrative authorities that is aimed at verifying the conditions, preparing and issuing an administrative act or entering into a public-law contract. At the same time, the activities of a public administration body are not bound by a specific form, unless there are specific rules on the form of procedure. It is stated that current German administrative law distinguishes between an administrative act and a general order. The latter is also an administrative act, the range of addressees, however, is wider. An administrative act according to the law is any order, decision or other authoritative action of an administrative body aimed at regulating a single case in the field of public law and having direct legal consequences of an external nature. A general order is an administrative act, which is addressed to a certain or defined by general features, or which concerns the public-law properties of a thing or the use of it by the public. The author notes that an administrative act must be specific in content, justified and announced to the participants in the proceedings. As long as the act has not been declared, it is invalid. An administrative act is valid from the moment it is announced, unless it itself provides otherwise. It continues in force until it is revoked, cancelled, terminated by a deadline or for any other reason specified in the law. Based on the analysis, it is concluded that the lack of a law on administrative procedures in Russia is a negative indicator of the modern Russian administrative legal system.
APA, Harvard, Vancouver, ISO, and other styles
5

BloomBecker, J. J. Buck. "US computer security legislation H.R. 145: A step toward greater computer security?" Computer Law & Security Review 3, no. 5 (January 1988): 30–31. http://dx.doi.org/10.1016/0267-3649(88)90115-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zamakhin, A. L. "Object and Subject of Cri¬minal Offenses in the Field of Use of Electronic Computers, Systems and Computer Networks and Telecommunication Networks." Analytical and Comparative Jurisprudence, no. 6 (December 27, 2023): 576–81. http://dx.doi.org/10.24144/2788-6018.2023.06.101.

Full text
Abstract:
The article deals with the object and subject matter of computer criminal offenses. The purpose of the article is to study the object and subject matter of computer criminal offenses, to analyze the current state of legal regulation of computer criminal offenses, and to provide suggestions and comments to the legislation. It is proved that due to the development of scientific and technological progress at the end of the twentieth century, a new type of social relations in the field of computer information circulation emerged in the State, which were subsequently taken under the protection of criminal law. The information security (cybersecurity) of the state has become one of the components of Ukraine's national security. Unlike other scholars, we believe that the direct object of computer criminal offenses is social relations to ensure the integrity and safety of computer information and the safe operation of information systems. The foundation of an information system is a set of information resources in the form of computer information, computer technologies and equipment, as well as related computer infrastructure, including telecommunication networks. Not all computer information requires criminal legal protection and, accordingly, can be the subject of computer criminal offenses, so the legislator should amend the dispositions of Articles XVI of the Special Part of the Criminal Code of Ukraine and replace the term "information” with "information protected by law”. It seems that by limiting the ways of influencing computer information in the law, the legislator has provided opportunities to avoid criminal liability to persons who otherwise cause damage to the owners of computer information. The complexity of protecting legal relations in the field of computer information lies not only in the evolution of technologies for its registration and transfer, but also in the evolution of legal relations themselves and the ways of influencing them. The backwardness of the articles of Section XVI of the Criminal Code of Ukraine and the problems of qualification of acts under these articles which arise in modern judicial practice cannot be solved by changing the dispositions of these corpus delicti only.
APA, Harvard, Vancouver, ISO, and other styles
7

Thorne, Clive D. "Copyright legislation." Computer Law & Security Review 3, no. 4 (November 1987): 12. http://dx.doi.org/10.1016/0267-3649(87)90053-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sterling, J. A. L. "Legislation update." Computer Law & Security Review 4, no. 1 (May 1988): 42–43. http://dx.doi.org/10.1016/0267-3649(88)90103-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sterling, J. A. L. "Copyright legislation." Computer Law & Security Review 3, no. 5 (January 1988): 2–9. http://dx.doi.org/10.1016/0267-3649(88)90106-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

López Jiménez, David, Patricia Vargas Portillo, and Eduardo Carlos Dittmar. "SAFEGUARDING PRIVACY IN SOCIAL NETWORKS." Law, State and Telecommunications Review 12, no. 1 (April 21, 2020): 58–76. http://dx.doi.org/10.26512/lstr.v12i1.31238.

Full text
Abstract:
Purpose ”“ The purpose is to examine the degree of privacy protection in the social networking field. In this sense, we analyze the benefits of the self-regulation of the industry as a complement to the regulations. Methodology/approach/design ”“ We study the Spanish and the European regulations regarding personal data protection with respect to social networks. Findings ”“ The legislative regulations on this subject are insufficient due to their intrinsic limitations in the field. Therefore, we should encourage the approval of good legislation that complements and fills the gaps. Practical implications ”“ The advantages that are derived from the research on this subject are useful for service providers and the public and private sectors in the information society. Therefore, they are useful for society in general. Originality/value ”“ This research article includes the examination of the general utility of society. The aspects that are addressed are applicable to the industry and those who use social networks. The government must prevent infractions that damage consumers and/or users.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer networks, law and legislation"

1

Mik, Eliza. "Contract formation in open electronic networks." Phd thesis, Faculty of Law, 2007. http://hdl.handle.net/2123/4995.

Full text
Abstract:
Thesis (Ph. D.)--University of Sydney, 2007.
Title from title screen (viewed 28 May 2009) Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy to the Faculty of Law. Degree awarded 2007. Includes bibliography references. Also available in print format.
APA, Harvard, Vancouver, ISO, and other styles
2

Ital, Eric Guy. "Copyright law and the Internet : in modern South African law." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51666.

Full text
Abstract:
Thesis (LLM)--University of Stellenbosch, 2000.
ENGLISH ABSTRACT: The Internet is coming more and more into focus of national and international legislation. Especially with regard to copyright law, the rapid growth of the Internet, its global character, its novel technical applications and its private and commercial use by millions of people makes the control over a work complicated and raises copyright problems all over the world. Present legislation is therefore challenged to avoid gaps in the law. Considering the rapid growth of online providers and users in South Africa, it is likely that copyright disputes with regard to the Internet will evolve here soon. In this dissertation, the "world" of the Internet and its lawfulness with regard to existing South African copyright law will be examined. The examination tries to establish whether South African copyright law is able to cope with the present Internet problems and whether it leads to reasonable results. The first chapter of this dissertation will give an overview of the basic principles of the Internet, including the history, development and function of the Internet. Furthermore the changing aspects by means of diqital technology will be discussed. Because the global character of the Internet lead to "international" infringements, governments are considering the prospect of reaching international accord on the protection of intellectual property in the digital era. In chapter two, the present international harmonisation of copyright law will be introduced. Especially the quick adoption of the World Intellectual Property Organisation Treaties in December 1996 demonstrated that an international realisation for a call for action is existing. In chapter three, the application of South African copyright law with regard to the Internet will be discussed. First, it will be examined if a digital work on the Internet is protected in the same way as a "traditional" work. Second, the various rights of the copyright holder are discussed in connection with the use of a work on the Internet. Third, the potential application of the exclusive rights of the copyright holder to various actions on the Internet, such as caching, Web linking and operating an online service will be discussed. The Internet is a worldwide entity, and, as such, copyright infringement on this system is an international problem. The scenario of global, simultaneous exploitation of works on the Internet conflicts sharply with the current system of international copyright protection, which is firmly based on national copyright laws with territorial effects. Section four provides therefore an overview of the applicable law on an international net and analyses the necessity and borders of protection.
AFRIKAANSE OPSOMMING: Nasionale en internasionale wetgewing fokus in In toenemende mate op die Internet. Die versnelde groei van die Internet, sy wêreldkarakter, sy nuwe tegnologiese aanwendings en sy private en kommersiële gebruik deur miljoene mense maak beheer oor In werk baie gekompliseerd en skep veral outeursregprobleme regoor die wêreld. Wetgewing soos dit tans is, word dus uitgedaag om die leemtes in die reg te ondervang. Gegewe die vinnige groei van gekoppelde verskaffers en gebruikers in Suid-Afrika, is dit waarskynlik dat - outeursreggeskille met betrekking tot die Internet binnekort ook hier gaan ontwikkel. In hierdie verhandeling gaan die "wêreld" van die Internet en sy wettigheid onder bestaande Suid-Afrikaanse outeursregwetgewing ondersoek word. In die ondersoek word gepoog om vas te stelof Suid-Afrikaanse outeursregwetgewing geskik is om die Internetprobieme wat tans bestaan te hanteer en of dit lei tot aanvaarbare resultate. Die eerste hoofstuk van die verhandeling sal In oorsig gee van die basiese beginsels van die Internet, insluitende die geskiedenis, ontwikkeling en funksie van die Internet. Verder sal die veranderende aspekte as gevolg van digitale tegnologie bespreek word. Die wêreldkarakter van die Internet gee aanleiding tot "internasionale" inbreukmakings en om hierdie rede oorweeg regerings die moontlikheid van internasionale ooreenkomste oor die beskerming van intellektuele eiendom in die digitale era. In hoofstuk twee word die bestaande internasionale harmonisering van outeursreg bespreek. Veral die vinnige aanname van die World Intellectual Property Organisation se verdrae in Desember 1996, illustreer dat daar In internasionale bewustheid is dat iets in die verband gedoen moet word. In die derde hoofstuk word die aanwending van die Suid-Afrikaanse outeursreg met betrekking tot die Internet bespreek. Eerstens word ondersoek of a digitale werk op die Internet op dieselfde wyse as 'n "tradisionele" werk beskerm kan word. Tweedens word die verskillende regte van die outeursreghebbende in verband met die gebruik van 'n werk op die Internet, bespreek. Derdens word die potensiële aanwending van die eksklusiewe regte van die outeursreghebbende op verskillende aksies op die Internet, soos byvoorbeeld kasberging, web koppeling en die werking van 'n gekoppelde diens, bespreek. Die Internet is 'n wêreldwye verskynsel en sodanig is outeursreginbreukmaking op hierdie stelsel 'n internasionale probleem. Die scenario van 'n wêreldwye, gelyktydige uitbuiting van werke op die Internet is in skerp konflik met die huidige stelsel van internasionale outeursregbeskerming wat stewig gegrond is op nasionale wetgewing met territoriale werking. Hoofstuk vier bied daarom 'n oorsig oor die toepaslike reg op 'n internasionale netwerk en analiseer die nodigheid en ook grense van beskerming.
APA, Harvard, Vancouver, ISO, and other styles
3

Desai, Mohammed Reza. "An integrated approach for information security compliance in a financial services organisation." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2396.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.
The aim of this research is to identify and explore the factors affecting information security compliance of information security policies and regulations, in a financial services organisation. The organisation has to comply with information security regulations and legislations by righteousness of its operations in light of the fact that any wrong doing together with misuse of data, are continually expanding. Corporate embarrassments comes about due to rupture of security, results in expanded thoughtfulness regarding corporate consistency. Legislature and policies have been set up to counter information security issues. This legislature and policies are not adequately addressing the compliance issues that arise, but are needed within organisations. Compliance targets are not met due to inconsistent guidelines that turns out to be significant in diminishing the financial position, reputation and security of information. This research further aims to explore whether employees comply with laws and regulations regarding information in an organisation. This is done in order to confirm whether governance and human factors play any significant part in compliance. The research is an exploratory study and specifically analyses the governance function and which stakeholders influence its operations in information compliance. The research investigates certain questions on organisational culture and the human factor, do influence employee’s compliance to laws and regulations. The objectives of the research are to investigate which factors, and how such factors influence compliance of information security policies and compliance with the goal of designing an integrated framework to assist in counteracting these findings. The research is underpinned by the Neo-institutional theory, Agency Theory and Rational choice theory. The Denison organisational cultural model and a framework proposed by von Solms are used as lenses to interpret the data of the research.
APA, Harvard, Vancouver, ISO, and other styles
4

O'Brien, N. D. "The liability of Internet service providers for unlawful content posted by third parties." Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1149.

Full text
Abstract:
Internet Service Providers (ISP’s) are crucial to the operation and development of the Internet. However, through the performance of their basic functions, they faced the great risk of civil and criminal liability for unlawful content posted by third parties. As this risk threatened the potential of the Internet, various jurisdictions opted to promulgate legislation that granted ISP’s safe harbours from liability. The South African (RSA) response is Chapter XI of the Electronic Communications and Transactions Act (ECTA). The protection it provides is however not absolute. It is limited to ISP’s that are members of an Industry Representative Body (IRB) and those ISP’s must perform particular functions in relation to third party content in a certain manner to obtain limited liability. Due to the ECTA’s limited application and a lack of authority, the question is raised as to what is the liability of ISP’s for unlawful content posted by third parties? This dissertation pays particular attention to ISP liability for third party defamatory statements, hate speech, and obscene and indecent material. The role and characteristics of ISP’s in the functioning of the Internet is described. It is determined that a wide legal definition would be required to encompass the many roles they perform. The definition provided by the ECTA is wide and many different types of ISP can fall underneath it. This may have unintended consequences as entities may receive protection that the legislature did not intend. The appropriate laws in the United States of America (USA) and the United Kingdom are surveyed and suggestions as to the extent of ISP liability in circumstances where the ECTA does not apply are made. It is established that their position is uncertain due to difficulties in applying the law to the Internet. This could result in the law being applied incorrectly and ISP’s erroneously found liable. The ECTA’s threshold requirements limit the availability of the safe harbor provisions to ISP’s that are members of a recognised IRB. The IRB must comply with an extensive set of requirements to obtain recognition. The purpose of these requirements is to ensure that only responsible ISP’s obtain the protection provided by the act. After an examination of these requirements, their necessity is questioned as their purpose appears to be contrary to the logic of the safe harbours provided by the ECTA. The safe harbours are analysed and comparisons made to similar legislation that exists in the USA and the European Union (EU). It was established that the ECTA is a hybrid of the USA and EU legislation, and to a certain extent improves on them. It was suggested that the extent of ISP liability in relation to certain unlawful content is clearer under the ECTA. However, exceptions may exist in relation to hate speech and obscene and indecent content as a result of legislation that does not properly take the technology of the Internet into account. It was recommended that certain action be taken to correct this position to prevent any negative effects on the Internet industry and conflict with the objectives of the ECTA. The provision of limited liability contained in the ECTA is balanced with a notice and takedown procedure, which provides relief to victims of unlawful content. This procedure is analysed and it appears to be effective in providing relief. However, through an examination of concerns raised in relation to this type of procedure as it exists in the USA and the EU, it is suggested that certain flaws exist. The take-down procedure negatively effects the freedom of expression and the third party’s rights to due process. Further, the threshold requirements result in not all the users of the Internet being provided with the same remedies. It is recommended that certain action be taken to correct these flaws. The solution provided by the ECTA should be favoured over the uncertainty that existed before it promulgation. It may be necessary to correct particular flaws that exist. Certain recommendations are suggested in this regard and the concluding chapter.
APA, Harvard, Vancouver, ISO, and other styles
5

Gottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.

Full text
Abstract:
Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identifying Critical Infrastructure and its interdependencies. The purpose of this research is to highlight the importance of protecting Critical Infrastructure as well as proposing a high level framework aiding in the identification and securing of Critical Infrastructure. To achieve this, key case studies involving Cyber crime and Cyber warfare, as well as the identification of attack vectors and impact on against Critical Infrastructure (as applicable to Critical Infrastructure where possible), were identified and discussed. Furthermore industry related material was researched as to identify key controls that would aid in protecting Critical Infrastructure. The identification of initiatives that countries were pursuing, that would aid in the protection of Critical Infrastructure, were identified and discussed. Research was conducted into the various standards, frameworks and methodologies available to aid in the identification, remediation and ultimately the protection of Critical Infrastructure. A key output of the research was the development of a hybrid approach to identifying Critical Infrastructure, associated vulnerabilities and an approach for remediation with specific metrics (based on the research performed). The conclusion based on the research is that there is often a need and a requirement to identify and protect Critical Infrastructure however this is usually initiated or driven by non-owners of Critical Infrastructure (Governments, governing bodies, standards bodies and security consultants). Furthermore where there are active initiative by owners very often the suggested approaches are very high level in nature with little direct guidance available for very immature environments.
APA, Harvard, Vancouver, ISO, and other styles
6

Andre, Edward E. "Investigating information management weaknesses in a local government organisation: A critical hermeneutic ethnographic case study of internet documents from information warfare and legal perspective(s)." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/633.

Full text
Abstract:
In this thesis I develop an approach to analyse and interpret internet documents belonging to a particular organisation in a State of Australia. My intention in the research is to find ways to protect a local government organisation from litigation and other threats due to weaknesses in information management on the internet. Based on Gadamer's (1985) approach to the interpretation of text discourse, this thesis is a critical hermeneutic ethnographic case study of one local government organisation investigating internet docunents from information warfare and legal perspective(s).
APA, Harvard, Vancouver, ISO, and other styles
7

孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Harte, David. "Internet content control in Australia : data topology, topography and the data deficit." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2001. https://ro.ecu.edu.au/theses/1073.

Full text
Abstract:
The success of the online adult industry has provoked a public policy controversy over the need for internet censorship, and in recent times there has emerged desire to protect minors from possibly unsuitable content. On January 1st 2000, the Broadcasting Services Amendment (Online Services) Act (Cwlth, 1999) (BSA) was proclaimed. The Act purports to regulate and control Internet content in Australia. Operating in tandem with the Act is the Internet Industry Association Code of Practice, giving Australia a co-regulatory approach to Internet content control. The Australian Broadcasting Authority (ABA) is charged with implementing the regime. This study sets out examine the Internet content control problem in the Australian context. The political issues surrounding the topic of Internet censorship and the lack of reliable operational statistics, revealed the difficulty of estimating the effectiveness of the current control regime. Pivotal questions for the study concerned the scope and scale of content control in the Australian context and trends in hosting. This study used website typology, as defined by data topology and data topography, to examine the scope and scale of the content control task, and the implications for the effectiveness of the BSA. It was expected that if the BSA was to have an impact, that a discernible change in user download behaviour should ensue. This study used information provided by the adult Internet Content Provider (ICP) industry to gauge the BSA's impact-on user download behaviour as a measure of the control regime’s effectiveness. It was suggested by some observers that the so-called 'data deficit' between Australia and the US would be exacerbated by the new content control regime, with possible negative implications for the conduct of e-commerce in Australia generally. A study of Australian adult website hosting arrangements and data topography was conducted to examine the implications of the control regime for the "data deficit'. This study suggests that most Australian online adult content is in fact hosted in the US. The reasons for offshore hosting are almost totally financial and pre-date the introduction of the Broadcasting Services Act (Online Services) Amendment Act 1999. The study also suggests that any effect on the 'data deficit' should be minimal, and that the typology of adult content websites in such that the current co-regulatory regime may prove ineffective in controlling access to adult content.
APA, Harvard, Vancouver, ISO, and other styles
9

Sundstrom, Linda-Marie. "Internet radio: Identifying administrative and regulatory gaps in a cyberspace world without borders." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2137.

Full text
Abstract:
The purpose of this paper is to identify gaps in regulatory policies resulting from the emergence of Internet radio. To accomplish this purpose, the paper seeks to: 1) provide insights into agencies that may have direct involvement in potentially regulating Internet radio; 2) explore the concepts of jurisdiction in cyberspace; and 3) address the regulatory challenges that exist when traditional country borders no longer apply.
APA, Harvard, Vancouver, ISO, and other styles
10

Spencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer networks, law and legislation"

1

H, Smith Graham J., and Bird & Bird (Firm), eds. Internet law and regulation. 2nd ed. London: Sweet & Maxwell, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1950-, Dumortier Jos, ed. Cyber law. The Hague: Kluwer Law International, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grigello, Raymond S. Computer networks: Legal policies, programs and issues. Hauppauge, N.Y: Nova Science, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Spang-Hanssen, H. Stakemann. Public international computer network law issues. Copenhagen, Denmark: DJØF Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

H, Chang Jesse T., Qu Philip, and Wan Isabelle I. H, eds. China's internet policy & legislation. Hong Kong: TransAsia Pub., 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Guadamuz, Andrés. Networks, complexity and internet regulation: Scale-free law. Cheltenham, UK: Edward Elgar, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Teubner, Gunther. Networks as connected contracts. Oxford, [England]: Hart Pub., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1957-, Matsuura Jeffrey H., ed. Law of the Internet. 3rd ed. Frederick, MD: Aspen Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

1957-, Matsuura Jeffrey H., ed. Law of the Internet. New York: Aspen Law & Business, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Imparl, Steven D. Internet law: The complete guide. North Vancouver, B.C., Canada: Specialty Technical Publishers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer networks, law and legislation"

1

Dreier, Thomas. "Projecting Images of Families into the Law—the Example of Internet-Related Cases Decided by the German Courts." In Families and New Media, 151–72. Wiesbaden: Springer Fachmedien Wiesbaden, 2023. http://dx.doi.org/10.1007/978-3-658-39664-0_7.

Full text
Abstract:
AbstractFamily and Internet may appear to be an “unlikely combination,” since technology is generally considered to be neutral and thus not gender-related, even if a clear gender imbalance can be observed among computer science students and professionals who are largely male. From the point of view of the networked structures of the Internet, and hence from the point of view of Internet law, no fundamental distinction is made between family and non-family relationships and connections. Despite this, it may be worthwhile to search legislation and case law for existing rules and decisions that discuss issues of families and their members who use the Internet.
APA, Harvard, Vancouver, ISO, and other styles
2

Radoniewicz, Filip. "Cybercrime and Cyberterrorism in Polish Law." In Cybersecurity in Poland, 405–18. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_24.

Full text
Abstract:
AbstractThe aim of the paper is to analyze the provisions criminalizing the phenomenon of “computer crimes” (“cybercrimes”) in the strict sense, i.e. acts in which a computer or network is the target of a crime (“a victim”). The paper consists of two parts—the main part in which analysis of articles 267-269c of the Penal Code of 1997 (Chapter XXXIII, entitled “Offenses against the protection of information”)—in which the Polish legislator defined these offenses—is carried out. The second part refers to the “cyberterrorist offense” which is an “ordinary” computer crime carried out with a “terrorist purpose”.
APA, Harvard, Vancouver, ISO, and other styles
3

Raj P. M., Krishna, Ankith Mohan, and K. G. Srinivasa. "Power Law." In Computer Communications and Networks, 203–32. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96746-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McNealy, Jasmine, and Angelyn Flowers. "Privacy Law and Regulation: Technologies, Implications, and Solutions." In Computer Communications and Networks, 189–205. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-08470-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walden, Ian. "Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent." In Computer Communications and Networks, 45–71. London: Springer London, 2012. http://dx.doi.org/10.1007/978-1-4471-4189-1_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Elsässer, Robert. "On Randomized Broadcasting in Power Law Networks." In Lecture Notes in Computer Science, 370–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11864219_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shen, Yilin, Nam P. Nguyen, and My T. Thai. "Exploiting the Robustness on Power-Law Networks." In Lecture Notes in Computer Science, 379–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22685-4_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Makarov, Valery, Vladimir Gaponenko, Boris Toropov, and Alexander Kupriyanov. "Theoretical and Applied Aspects of Orthogonal Coding in Computer Networks Technologies." In Big Data-driven World: Legislation Issues and Control Technologies, 47–58. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-01358-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Elsässer, Robert, and Adrian Ogierman. "Efficient Broadcasting in Random Power Law Networks." In Graph Theoretic Concepts in Computer Science, 279–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16926-7_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tang, Mingdong, Jianxun Liu, and Guoqing Zhang. "Improved Compact Routing Schemes for Power-Law Networks." In Lecture Notes in Computer Science, 44–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24403-2_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer networks, law and legislation"

1

TROFIMOV, Egor, and Oleg METSKER. "Computer Techniques and Indicators in the Policy of Optimization of Legislation and Law Enforcement." In Proceedings of the International Conference Digital Age: Traditions, Modernity and Innovations (ICDATMI 2020). Paris, France: Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.201212.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Xin, Qiangwei, and Wei Zhang. "Research on Law of RSSI Fluctuation of Wireless Sensor Networks." In 2022 3rd International Conference on Computer Vision, Image and Deep Learning & International Conference on Computer Engineering and Applications (CVIDL & ICCEA). IEEE, 2022. http://dx.doi.org/10.1109/cvidliccea56201.2022.9825114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ghadge, Shilpa, Timothy Killingback, Bala Sundaram, and Duc A. Tran. "A Parsimonious Statistical Protocol for Generating Power-Law Networks." In 2009 Proceedings of 18th International Conference on Computer Communications and Networks - ICCCN 2009. IEEE, 2009. http://dx.doi.org/10.1109/icccn.2009.5235257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mandl, Peter, Pirmin Pezzei, David Veit, and Erich Leitgeb. "Selected health and law issues regarding mobile communications." In 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2017. http://dx.doi.org/10.23919/softcom.2017.8115581.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shi, Yi, Canming Jiang, Y. Thomas Hou, and Sastry Kompella. "On Capacity Scaling Law of Cognitive Radio Ad Hoc Networks." In 2011 20th International Conference on Computer Communications and Networks - ICCCN 2011. IEEE, 2011. http://dx.doi.org/10.1109/icccn.2011.6006062.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xingzhao, Peng, and Yao Hong. "Power-law-alterable SF networks' cascading invulnerability under intentional attack." In 2012 2nd International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2012. http://dx.doi.org/10.1109/iccsnt.2012.6525989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ribeiro, Bruno, Prithwish Basu, and Don Towsley. "Multiple random walks to uncover short paths in power law networks." In IEEE INFOCOM 2012 - IEEE Conference on Computer Communications Workshops. IEEE, 2012. http://dx.doi.org/10.1109/infcomw.2012.6193500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Puljiz, Z., and M. Mikuc. "A hierarchical approach to generating power law Internet-like topologies." In 2007 15th International Conference on Software, Telecommunications and Computer Networks. IEEE, 2007. http://dx.doi.org/10.1109/softcom.2007.4446097.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kun Zhao, Zhendong Niu, Yumin Zhao, and Jun Yang. "Search with index replication in power-law like peer-to-peer networks." In 2010 2nd International Conference on Computer Engineering and Technology. IEEE, 2010. http://dx.doi.org/10.1109/iccet.2010.5485466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gumzej, Nina, and Drazen Dragicevic. "Cloud computing data protection aspects under Croatian and European union law." In 2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM). IEEE, 2014. http://dx.doi.org/10.1109/softcom.2014.7039084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography