Showing all 9 results
Editors: Gimigliano, Gabriella (Ed.)This book provides a critical analysis of The European Union’s regulatory framework for mobile payments and bitcoin. Chapters discuss the creation of the EU single market for e-payments and combine legal analysis with comparative case studies in their exploration of the regulatory challenges surrounding e-payments. The contributing authors analyse the key economic and legal issues of the development of bitcoin and mobile payments within the EU framework through a comparative lens.
The internet opens up new opportunities for citizens to organize and mobilize for action but it also provides new channels that established political, social and economic interests can use to extend their powers. Will the internet revolutionize politics? The Prospect of Internet Democracy is a rich and detailed exploration of the theoretical implications of the internet and related information and communication technologies (ICTs) for democratic theory. Focusing in particular on how political uses of the internet have affected or seem likely to affect patterns of influence among citizens, interest groups and political institutions, the authors examine whether the internet’s impact on democratic politics is destined to repeat the history of other innovative ICTs.
OpenStreetMap is the free and open wiki map of the world made by millions of volunteers whoíre just like you. Contributors use paper, pens, GPS devices, phones and laptops to capture the world around them (like a street name and location) and then upload it to OSM. The map data is then given away for free, all just like wikipedia. This book contains 15 interviews conducted by OSM founder Steve Coast with the people who were there as the project began and grew. Starting in 2004, the interviews trace how a rag tag collection of volunteers was able to produce a map which compares in quality to maps produced by multi-billion dollar corporations.
"Bitcoin For Dummies" is the fast, easy way to start trading crypto currency, with clear explanations and expert advice for breaking into this exciting new market. Understanding the mechanisms and risk behind Bitcoin can be a challenge, but this book breaks it down into easy-to-understand language to give you a solid grasp of just where your money is going. You’ll learn the details of Bitcoin trading, how to set up your Bitcoin wallet, and everything you need to get started right away.
A completely revised update of the First Edition, this book focuses exclusively on outsourcing information technology such as data processing, computer systems, and specialized software programs essentially an intellectual property transaction. It covers, among other topics, licensing and software development agreements, sales of tangible assets, human resources management, and more.
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one’s messages. Yet for every system there is a cryptanalyst creating a new technique to break that system.
What is the appropriate balance between privacy, security, and accountability? What do we owe each other in terms of information sharing and access? Why is privacy valuable and is it more or less important than other values like security or free speech? Is Edward Snowden a hero or villain? Within democratic societies, privacy, security, and accountability are seen as important values that must be balanced appropriately. If there is too much privacy, then there may be too little accountability – and more alarmingly, too little security.
This manual approaches the combination of voice, video and data within the new communications paradigm of IP convergence and examines how these different types of communication will be delivered to any environment from LAN to WAN at much less cost and complexity than either ISDN or ATM. Featuring references to important IP convergence-related Web sites throughout, this book provides comprehensive information on the technologies that will make convergence possible, and it examines the benefits, applications, vendor approaches, migration strategies, and regulatory issues that will affect this new technology.
Cybersecurity and Human Rights in the Age of Cyberveillance is a collection of articles by distinguished authors from the US and Europe and presents a contemporary perspectives on the limits online of human rights. By considering the latest political events and case law, including the NSA PRISM surveillance program controversy, the planned EU data protection amendments, and the latest European Court of Human Rights jurisprudence, it provides an analysis of the ongoing legal discourse on global cyberveillance.
Showing all 9 results