Handbook of Research on Cyber Law, Data Protection, and Privacy 1st edition by Dewani Nisha – Ebook PDF Instant Download/DeliveryISBN: 1799886441, 9781799886440
Full download Handbook of Research on Cyber Law, Data Protection, and Privacy 1st edition after payment.
Product details:
ISBN-10 : 1799886441
ISBN-13 : 9781799886440
Author : Dewani Nisha
The advancement of information and communication technology has led to a multi-dimensional impact in the areas of law, regulation, and governance. Many countries have declared data protection a fundamental right and established reforms of data protection law aimed at modernizing the global regulatory framework. Due to these advancements in policy, the legal domain has to face many challenges at a rapid pace making it essential to study and discuss policies and laws that regulate and monitor these activities and anticipate new laws that should be implemented in order to protect users. The Handbook of Research on Cyber Law, Data Protection, and Privacy focuses acutely on the complex relationships of technology and law both in terms of substantive legal responses to legal, social, and ethical issues arising in connection with growing public engagement with technology and the procedural impacts and transformative potential of technology on traditional and emerging forms of dispute resolution. Covering a range of topics such as artificial intelligence, data protection, and social media, this major reference work is ideal for government officials, policymakers, industry professionals, academicians, scholars, researchers, practitioners, instructors, and students.
Handbook of Research on Cyber Law, Data Protection, and Privacy 1st Table of contents:
Chapter 1: Principles of Data Privacy and Security in a Cyber World
ABSTRACT
INTRODUCTION
PRIVATE DATA
PREVENTION OF PRIVATE DATA AND CYBER ENVIRONMENTS (PART 1)
INTERNATIONAL REGULATIONS (PART 2)
MEASURES TO BE TAKEN AGAINST PRIVATE DATA VIOLATIONS (PART 3)
CONCLUSION
REFERENCES
Chapter 2: Data Access, Privacy, Protection Methods, and Challenges
ABSTRACT
INTRODUCTION
RELATED STUDIES
OTHER DATA PROTECTION PRINCIPLES
CHALLENGES OF DATA ACCESS, PRIVACY, AND PROTECTION
SOME NEW RESEARCH TRENDS IN DATA PRIVACY
CONCLUSION
REFERENCES
Chapter 3: Privacy and Other Legal Concerns in the Wake of Deepfake Technology
ABSTRACT
INTRODUCTION
BACKGROUND
SOLUTIONS AND RECOMMENDATIONS
FUTURE RESEARCH DIRECTIONS
CONCLUSION
REFERENCES
KEY TERMS AND DEFINITIONS
Chapter 4: Social Media and Cyber Security
ABSTRACT
INTRODUCTION
RESEARCH OBJECTIVES
RESEARCH METHODOLOGY
SOCIAL MEDIA IN NIGERIA: HISTORY, PENETRATION AND USAGE
CYBERCRIME: CASES IN NIGERIA
SCHEMES UTILIZED BY CYBERCRIMINALS
CYBERCRIMES IN NIGERIA: CAUSES AND EFFECTS
CYBERSECURITY – MITIGATING AGAINST CYBER BREACHES IN NIGERIA
CONCLUSION
REFERENCES
Chapter 5: The European Union’s Proposed Artificial Intelligence Legislation and the Path Ahead for Asian Approaches to Artifical Intelligence
ABSTRACT
INTRODUCTION
THE RELATIONSHIP BETWEEN DATA PROTECTION LAWS AND ARTIFICIAL INTELLIGENCE
THE PROPOSED EU REGULATION AT A GLANCE
A LEGISLATIVE FIRST AMIDST A SEA OF “STRATEGIES”
HUMAN-CENTRIC APPROACH: FROM STRATEGY TO LEGISLATION
CONCLUSION
REFERENCES
Chapter 6: Blockchain Technology in the Agricultural Supply Chain
ABSTRACT
INTRODUCTION
FARMERS’ ISSUES AND NECESSITY OF BLOCKCHAIN TECHNOLOGY
BLOCKCHAIN TECHNOLOGY: HOW IT WORKS?
DOES A BLOCKCHAIN WORKS IN AGRICULTURAL SUPPLY CHAIN?
BLOCKCHAIN IN FOOD SUPPLY CHAIN
CHALLENGES AND RISKS INVOLVED IN BLOCK CHAIN
ASSURANCE OF TRANSPARENCY AND ACCOUNTABILITY VIA BLOCKCHAIN IN AGRICULTURE SUPPLY CHAIN
HOW BLOCKCHAIN TECHNOLOGY WILL BE BENEFICIAL FOR INDIA?
CONCLUSION
REFERENCES
Chapter 7: Gauging the Scale of Intertwinement
ABSTRACT
INTRODUCTION AND EVOLUTION OF BIOMETRIC DATA SYSTEM
INTERSECTING DIMENSION BETWEEN BIOMETRIC DATA SYSTEM AND PRIVACY ISSUES
LEGAL PARAPHERNALIA GOVERNING RIGHT TO PRIVACY IN INDIA
INTRODUCTION OF THE DATA PROTECTION BILL: A RELIEF?
CONCLUSION AND SUGGETSIONS FOR A BETTER FRAMEWORK
REFERENCES
KEY TERMS AND DEFINITIONS
Chapter 8: Cybersquatting
ABSTRACT
INTRODUCTION
CONCEPT OF DOMAIN NAMES
SCOPE OF PROTECTION
MEANING AND CONCEPT OF CYBERSQUATTING
DIFFERENT FORMS OF CYBERSQUATTING
POSITION IN USA
WIPO ON CYBERSQUATTING
POSITION IN INDIA
JUDICIAL RESPONSES IN INDIA
RECOMMENDATIONS AND SUGGESTIONS
CONCLUSION
REFERENCES
Chapter 9: Evolution of Cryptocurrency
ABSTRACT
INTRODUCTION
BACKGROUND
KINDS OF CRYPTOCURRENCY
MINING AS A MODE OF ACQUIRING CRYPTOCURRENCY
EFFECT OF CRYPTOCURRENCY ON THE GLOBAL ECONOMY
LEGALITY OF CRYPTOCURRENCY IN VARIOUS JURISDICTIONS
CRYPTOCURRENCY IN INDIA
SOLUTIONS AND RECOMMENDATIONS
CONCLUSION
REFERENCES
KEY TERMS AND DEFINITIONS
Chapter 10: Cryptocurrency
ABSTRACT
INTRODUCTION
BLOCKCHAIN ARCHITECTURE
IMPLEMENTATION OF BLOCKCHAIN – CRYPTOCURRENCY
FUTURE OF CRYPTOCURRENCY
CONCLUSION
REFERENCES
KEY TERMS AND DEFINITIONS
Chapter 11: Blockchain Technology Efficiently Managing Information and Cyber Security
ABSTRACT
INTRODUCTION
HOW THE CYBER SECURITY THREAT LANDSCAPE IS CHANGING
INTRODUCING BLOCKCHAIN
HOW IS BLOCKCHAIN USED TO IMPROVE CYBERSECURITY?
BLOCKCHAIN APPLICATIONS IN HEALTH CARE FOR COVID-19 AND BEYOND
CONCLUSION
REFERENCES
Chapter 12: The Cryptocurrency “Pump-and-Dump”
ABSTRACT
INTRODUCTION
CRYPTOCURRENCY
MECHANISMS OF ACTION: REDDIT, DISCORD, AND BINANCE
THE LEGALITY OF PUMP-AND-DUMP SCHEMES
CONCLUSION
REFERENCES
Chapter 13: Considerations for Blockchain-Based Online Dispute Resolution
ABSTRACT
INTRODUCTION
BLOCKCHAIN AND AI IN ARBITRATION: A CREDIBLE MECHANISM
BLOCKCHAIN BASED ODR PLATFORMS
EFFICIENCY AND SECURITY OF BLOCKCHAIN SYSTEMS
CHALLENGES AND BARRIERS
CONCLUSION
REFERENCES
KEY TERMS DEFINITIONS
Chapter 14: A Decade in Pixels
ABSTRACT
INTRODUCTION
ANALYZING SURVEILLANCE FROM CONTEMPORARY EXAMPLES
SURVEILLANCE REGIME IN CHINA
AN ASPHYSIATING RESULT OF SURVEILLANCE: THE CHILLING EFFECT
THE WAY FORWARD
REFERENCES
Chapter 15: A Survey on Privacy-Preserving Data Publishing Models for Big Data
ABSTRACT
INTRODUCTION
BIG DATA
NEED FOR PRIVACY AND SECURITY IN BIG DATA
TAXONOMY OF BIG DATA
DATA PRIVACY LAW AND ACT TIMELINE
EXISTING MODELS FOR PRIVACY-PRESERVING DATA PUBLISHING (PPDP)
THE CLASSIFICATION OF PRIVACY-PRESERVING TECHNIQUES
INFERENCE AND FUTURE DIRECTIONS
REFERENCES
Chapter 16: Critical Appraisal of Challenges to Online Consumer Fissures in Information Technology Law in India
ABSTRACT
INTRODUCTION
DEVELOPMENT OF ELECTRONIC COMMERCE
THE TRENCHES – DETERMINATIONS AND CONSEQUENCES
ONLINE SHOPPING IN INDIA: STATISTICS AND FACTS
LITERATURE REVIEW
RESEARCH GAPS
CHALLENGES AND ISSUES TO ONLINE SHOPPING
FUTURE OF E-COMMERCE
CONCLUSION AND SUGGESTIONS
REFERENCES
KEY TERMS AND DEFINITIONS
Chapter 17: OTT Platforms and Their Distributorship Agreement With Content Makers
ABSTRACT
INTRODUCTION
BACKGROUND
AGREEMENT BETWEEN CONTENT MAKER (PRODUCERS/DIRECTORS) AND DISTRIBUTORS
HITCHES PERCEPTIBLE IN AN AGREEMENT BETWEEN CONTENT MAKER AND OTT DISTRIBUTORS
CONCLUSION
RECOMMENDATIONS
REFERENCES
Chapter 18: Mapping the Changing Contours of Electronic Evidence in India
ABSTRACT
INTRODUCTION
ARJUN PANDITRAO JUDGMENT
THE MANDATORY CERTIFICATE REQUIREMENT: REVISITED STANCE?
THE PRIMARY-SECONDARY EVIDENCE RULE: AN INVESTIGATION
COMPARATIVE ANALYSIS
CONCLUSION
REFERENCES
Chapter 19: The Vulnerability of Children in Cyberspace
ABSTRACT
INTRODUCTION
CHILDREN IN CYBERSPACE
MEANING OF CYBERCRIME
DEFINITION OF CYBERCRIME
IMPACT OF CYBERSPACE ON CHILDREN
CYBERCRIMES AND CHILD ABUSE
INTERNATIONAL CONVENTIONS AND NATIONAL LAWS TO ENSURE CYBER SAFETY OF CHILDREN
CONCLUSION AND SUGGESTIONS
REFERENCES
KEY TERMS AND DEFINITIONS
Chapter 20: Artificial Intelligence
ABSTRACT
INTRODUCTION
ARTIFICIAL INTELLIGENCE: CONCEPT AND NEED
AI AND IT’S IMPACT
ROLE OF AI
CONCLUSION
REFERENCES
People also search for Handbook of Research on Cyber Law, Data Protection, and Privacy 1st:
networking for beginners
how to learn networking for beginners
computer networking for beginners
home networking for beginners
best books for networking for beginners