Security and Law
Legal and Ethical Aspects of Public Security, Cyber Security and Critical Infrastructure Security
Samenvatting
This book combines theoretical discussions of the concepts at stake and case studies following the relevant developments of ICT and data-driven technologies.
Few people doubt the importance of the security of a state, its society and its organizations, institutions and individuals, as an unconditional basis for personal and societal flourishing. Equally, few people would deny being concerned by the often occurring conflicts between security and other values and fundamental freedoms and rights, such as individual autonomy or privacy for example. While the search for a balance between these public values is far from new, ICT and data-driven technologies have undoubtedly given it a new impulse. These technologies have a complicated and multifarious relationship with security.
Part I sets the scene by considering definitions of security. Part II questions whether and, if so, to what extent the law has been able to regulate the use of ICT and datadriven technologies as a means to maintain, protect or raise security, in search of a balance between security and other public values, such as privacy and equality. Part III investigates the regulatory means that can be leveraged by the law-maker in attempts to secure products, organizations or entities in a technological and multiactor environment. Lastly, Part IV, discusses typical international and national aspects of ICT, security and the law.
Specificaties
Inhoudsopgave
Chapter 2. Safety, Security and Ethics (p. 11)
Chapter 3. National and Public Security within and beyond the Police Directive (p. 27)
Chapter 4. Criminal Profiling and Non-Discrimination: On Firm Grounds for the Digital Era? (p. 63)
Chapter 5. Operationalization of Information Security through Compliance with Directive 2016/680 in Law Enforcement Technology and Practice (p. 97)
Chapter 6. Protecting Human Rights through a Global Encryption Provision (p. 129)
Chapter 7. Identity Management and Security (p. 161)
Chapter 8. Towards an Obligation to Secure Connected and Automated Vehicles “by Design”? (p. 183)
Chapter 9. The Cybersecurity Requirements for Operators of Essential Services under the NIS Directive – An Analysis of Potential Liability Issues from an EU, German and UK Perspective (p. 215)
Chapter 10. The ‘by Design’ Turn in EU Cybersecurity Law: Emergence, Challenges and Ways Forward (p. 239)
Chapter 11. Promoting Coherence in the EU Cybersecurity Strategy (p. 253)
Chapter 12. Challenges of the Cyber Sanctions Regime under the Common Foreign and Security Policy (CFSP) (p. 277)
Chapter 13. International (Cyber)security of the Global Aviation Critical Infrastructure as a Community Interest (p. 299)
Cumulative Bibliography (p. 343)
Anderen die dit boek kochten, kochten ook
Rubrieken
- cadeauboeken
- computer en informatica
- economie
- filosofie
- flora en fauna
- geneeskunde
- geschiedenis
- gezondheid
- jeugd
- juridisch
- koken en eten
- kunst en cultuur
- literatuur en romans
- mens en maatschappij
- naslagwerken
- non-fictie informatief/professioneel
- paramedisch
- psychologie
- reizen
- religie
- schoolboeken
- spiritualiteit
- sport, hobby, lifestyle
- thrillers en spanning
- wetenschap en techniek
- woordenboeken en taal