Добірка наукової літератури з теми "Digital enforcement"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Digital enforcement".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Digital enforcement"

1

Streltsova, E. G. "Digital Enforcement Proceedings." Lex Russica 76, no. 10 (November 5, 2023): 135–45. http://dx.doi.org/10.17803/1729-5920.2023.203.10.135-145.

Повний текст джерела
Анотація:
One of the directions of digitalization is the introduction of digital enforcement proceedings. The paper analyzes the specifics of digital enforcement proceedings in relation to the previous stage of legal protection — judicial and extrajudicial procedures; the problems of eliminating legal and factual errors made at the stage of confirming the right and the compatibility of the mechanism of restitution with digital enforcement proceedings. The compatibility of the current rules of enforcement proceedings with summary digital enforcement proceedings and the risks of additional budget expenditures associated with an imperfect mechanism for a writ of restitution in digital enforcement proceedings are evaluated. There are three ways to enforce proceedings in which information technologies can be involved: simplified foreclosure on funds, foreclosure on other property, foreclosure on digital assets. It is proved that the summary enforcement proceedings applied to monetary penalties should exclude the possibility of recovery through banks and the employer. Based on the analysis of statistical data, it is demonstrated that most of the penalties will require a transition from digital enforcement proceedings to ordinary enforcement proceedings, therefore, a solution is required to regulate the issues of granting a term for voluntary execution, collection of enforcement fees, seizure of property, etc. In ordinary enforcement proceedings, the use of information technology should be aimed at solving the problem of detecting the property of a non-performing debtor; this requires legislative and technological solutions for cross-analysis of information, a single database of information on debt obligations, available funds, the property of a person and their expenses, combined with a base that provides the possibility of applying typical prohibitions, deprivation of typical benefits and privileges. It is concluded that in order to promote national jurisdiction in cross-border disputes, it is necessary to develop the direction of dispute resolution in relation to digital assets, and specific measures for this development are proposed.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Khatov, Eduard B. "Digital Prosecutor’s Assistant or Digital Prosecutor?" Russian Journal of Legal Studies (Moscow) 10, no. 1 (April 18, 2023): 87–92. http://dx.doi.org/10.17816/rjls109325.

Повний текст джерела
Анотація:
The research examines some aspects of the digitalization of law enforcement. The author selectively analyzes relevant regulatory framework and a number of domestic and foreign examples of the use of artificial intelligence in the activities of law enforcement agencies and the prosecutor's office. He notes the problems of introducing artificial intelligence into the work of law enforcement officers and identifies the most promising areas of activity, primarily analytical ones, for the use of digital assistants by prosecutors. Based on the results of the study, the author concludes that the proliferation of digital assistant programs which eliminate routine work and increase the effectiveness of supervision is inevitable, and he also predicts the emergence of digital prosecutors in the foreseeable future.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Shondirov, Ruslan Khazrailovich. "DIGITAL TRANSFORMATIONS IN LAW ENFORCEMENT." Journal of Applied Research, no. 3 (2023): 157–60. http://dx.doi.org/10.47576/2949-1878_2023_3_157.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Tešić, Nenad. "On enforcement in digital assets." Zbornik radova Pravnog fakulteta, Novi Sad 57, no. 4 (2023): 1161–206. http://dx.doi.org/10.5937/zrpfns57-48237.

Повний текст джерела
Анотація:
Digital assets are becoming increasingly important in today's society. Crypto currencies and crypto-tokens are considered as property by market participants and, more recently, by the courts. Recognition of the economic value of digital assets has also raised the issue of the possibility of forced execution on this subject - matter. As of 2020, digital property in the Republic of Serbia is regulated by a special law, including the collection of claims secured by digital assets. However, for the execution of unsecured claims on digital assets, the legislator refers to the general rules of the Law on Enforcement and Security. Such a legislative approach raises numerous dilemmas. It remains unclear: which enforceable title can be used as a basis for execution against digital assets; what kind of claims can be settled in this way; how the creditor has to specify the subject - matter of the enforcement; how to prevent the debtor from disposing of digital assets despite the commencement of enforcement procedure; how to secure the cooperation of debtors as well as third parties (i.e. custodians) in terms of information disclosure, transfer of private key etc. The very nature of crypto assets implies decentralisation, volatility and the ability to vanish ("disappearability"). These inherent characteristics make cryptoassets the challenging subject for enforcement. Accordingly the legal rules in this case should be fine-tuned in a way that is to a reasonable extent creditor-friendly in terms of efficiency, without neglecting the appropriate balance with the principle of proportionality in enforcement, as well as the compliance of enforcement agents' actions with fundamental rights and ethical principles, such as the protection of privacy etc. Digital assets can easily be transferred - "in the blink of an eye" - from one account to another, from an online wallet to an offline wallet, from one owner to another or (divided into smaller parts) to multiple owners, from one digital assets to another, from one jurisdiction to several etc., which makes the enforcement process extremely complex and, in some cases, even impossible. Therefore, enforcement procedure on digital assets must be particularly urgent. In this context, it is common for the creditor to request some form of interim measure - a pre-judgment attachment of digital assets - which the court should decide on in a short period of time. Ideally, this measure should have global effect, not limited to a single state or jurisdiction. In legal literature, such a measure is generally referred to as a "worldwide freezing order", which is intended to be universally enforceable without prior recognition by national courts. In addition, the law should allow the creditor to seek an injunction in respect of specific digital assets without identifying the holder(s) - in relation to unknown person(s).
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Achleitner, Ranjana Andrea. "Das Durchsetzungsregime im Digital Markets Act: Private Enforcement unerwünscht?" Zeitschrift für öffentliches Recht 78, no. 2 (2023): 287. http://dx.doi.org/10.33196/zoer202302028701.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Samusevich, A. G. "Digital law enforcement: Theory and practice." Siberian Law Herald 4 (2022): 22–28. http://dx.doi.org/10.26516/2071-8136.2022.4.22.

Повний текст джерела
Анотація:
The problems of theoretical understanding and practical development of digital law enforcement are considered. Various modern scien-tific approaches to the concept and features of digital law enforcement, as well as to the digitalization of individual stages of the law enforcement process in various legal procedures are analyzed. The characteristic of digitalization of the stages of law enforcement is given. It is concluded that the process of law enforcement can be digitalized only at some stages (stages) of law enforcement activity. When making legal decisions, the use of digital tools today seems difficult due to a variety of theoretical and technical circumstances. The author comes to the conclusion that it is premature to talk about the complete digitalization of the law enforcement process at the present time.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Wolski, Dominik. "Private antitrust enforcement in digital market." Bratislava Law Review 4, no. 2 (December 31, 2020): 147–60. http://dx.doi.org/10.46282/blr.2020.4.2.210.

Повний текст джерела
Анотація:
The increasing popularity of private antitrust enforcement in the EU is reflected by number of antitrust damages claims in the member states, following the transposition of the Damages Directive. Meanwhile, rapid growth of digitization in every aspect of social and economic life, particularly in business like commerce and services, has taken place. Recently, the above phenomenon was intensified by COVID-19. This paper aims at discussing private antitrust enforcement and antitrust damages claims in the context of digital transformation of the market. To this extent, there are several main characteristics of the market (e.g. multi-sided platforms, the role of third-party sellers, etc.), that have to be taken into consideration in the above discussion.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Gayer, A. "Copyright Enforcement in the Digital Era." CESifo Economic Studies 51, no. 2-3 (January 1, 2005): 477–89. http://dx.doi.org/10.1093/cesifo/51.2-3.477.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Danaher, Brett, Michael D. Smith, and Rahul Telang. "Copyright enforcement in the digital age." Communications of the ACM 60, no. 2 (January 23, 2017): 68–75. http://dx.doi.org/10.1145/2979673.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Balogh, Virág. "Digitalization and consumer protection enforcement." Institutiones Administrationis 2, no. 1 (July 22, 2022): 85–99. http://dx.doi.org/10.54201/iajas.v2i1.42.

Повний текст джерела
Анотація:
The era of “new consumer protection” is marked by maximum harmonization rather minimum harmonization, (more) policy-based approach, legislation driven by the fast-emerging ecosystem of digital platforms, the strengthening of collective remedy and agency enforcement, and more cooperation between Member State regulatory bodies and EU Commission. All of the above phenomenae emphasize changing directions and methods of consumer protection enforcement: digital platforms present a unique set of issues that trigger different policy solutions, mostly based on the findings of behavioral economics. The practices of digital platforms usually affect consumers in more than one Member State, thus EU-wide cooperation is more likely to happen vis-à-vis digital platforms than other traders. Individual remedies against digital platforms – due to their immense size – result in little change. The European Consumer Protection Cooperation Network is highly likely to open cases with regards to digital platforms. In Hungarian law, EU-wide coordination complements an already existing rich practice of the Hungarian Competition Authority in the field of unfair commercial practices. In the future, where quite possibly, the number of cases against digital platforms will grow, the issue of cooperation will grow even more important.
Стилі APA, Harvard, Vancouver, ISO та ін.

Дисертації з теми "Digital enforcement"

1

DeCicco, Emma E. "Work-related exposure to child exploitation material: The experiences of Western Australian digital forensic officers and their spouses." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1692.

Повний текст джерела
Анотація:
Researchers contend that chronic exposure to child exploitation material (CEM) contributes to stress, psychological and interpersonal problems among police officers in digital forensic roles. The spouses of these officers have been identified as key supports, who potentially influence the officers’ coping experiences. The existing research is, however, limited in that no studies have specifically examined Western Australian officers’ experiences nor investigated the support role of the officers’ spouses. Psychologists and managers of Australian digital forensic officers therefore have little evidence to inform policies, programs, and interventions that act to minimise adverse outcomes among these personnel. As such, across four stages, this research project used interpretative phenomenological analysis to explore the experience and effects of work-related CEM exposure in Western Australian digital forensic officers and their spouses. Stage one involved individual, semi-structured interviews with 13 members of the Western Australian Police Computer Crime Squad to examine “What is the meaning and essence of the lived experience of working with CEM?” Six themes emerged: context and culture over time; construction of identity; perceptions of work role; cognitive structures of CEM; perceived outcomes of CEM exposure; and coping. Stage two involved a single group interview which explored the perspectives of two of the squad’s supervisors, revealing three focal points: perceptions of stage one findings; perceived stressors and outcomes; and supervisory perspectives. Stage three used individual, semi-structured interviews with three of the offices’ spouses to investigate “What is the meaning and lived experience of being the spouse of a digital forensic officer who is exposed to CEM?” Six themes emerged: sense making of identity; perceptions of officer partner’s work experiences; perceptions of CEM exposure; gatekeeping role; perceived stress experiences of officer partner; perceptions of coping and support. In stage four the experiences of four new, less-experienced squad, members were explored. Five themes emerged across the individual, semi-structured interviews which closely reflected those of stage one, though more comprehensively captured early experiences with CEM exposure. Taken together, four conclusions emerged. First, adjusting to CEM exposure, although somewhat neglected in previous research, is a crucial evolving process during early exposures. Second, working with CEM transcends professional and personal lived experience, and these effects are not necessarily negative; for example, many officers derive a sense of meaning through their work. Third, consistent with previous findings, coping with CEM exposure is a complex and dynamic experience. Fourth, organisational and cultural practices are critical in these experiences. These findings contribute to the evidence-base upon which policies, practices and education programs that support these police officers and their spouses, can be developed and implemented. Psychologists need to be aware that work-related CEM exposure is qualitatively distinct from other policing stressors and that efforts to minimise risk, while promoting adaptive coping and supports, are crucial to the wellbeing of digital forensic officers.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Cervantes, Milagros. "Success factors and challenges in digital forensics for law enforcement : A Systematic Literature Review." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20154.

Повний текст джерела
Анотація:
Context: The widespread use of communication and digital technology in the society has affected the number of devices requiring analysis in criminal investigations. Additionally, the increase of storage volume, the diversity of digital devices, and the use of cloud environment introduce more complexities to the digital forensic domain. Objective: This work aims to supply a taxonomy of the main challenges and success factors faced in the digital forensic domain in law enforcement. Method: The chosen method for this research is a systematic literature review of studies with topics related to success factors and challenges in digital forensics for law enforcement. The candidate studies were 1,428 peer-reviewed scientific articles published between 2015 and 2021. Those studies were retrieved from five digital databases following a systematic process. From those candidate studies, twenty were selected as primary studies due to their relevance to the topic. After backward searching, eight other studies were also included in the group of primary studies. A total of twentyeight primary studies were analyzed by applying thematic coding. Furthermore, a survey of digital forensic practitioners from the Swedish Police was held to triangulate the results achieved with the systematic literature review.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Lin, Chienting. "Examining technology usability and acceptance in digital government: A case study in law enforcement." Diss., The University of Arizona, 2004. http://hdl.handle.net/10150/280521.

Повний текст джерела
Анотація:
Increasingly, government agencies are facing the challenge of effective implementation of information technologies that are critical to their digital government programs and initiatives. This dissertation reports two user-centric evaluation studies of COPLINK, a criminal knowledge management system that supports and enhances law enforcement officers' crime-fighting activities. Specifically, these aforementioned evaluations concentrated on system usability and user acceptance in a law enforcement setting. The chapters of this dissertation describe the study design, highlight the analysis results, and discuss their implications for digital government research and practices. Overall, the models used in this study showed a reasonably good fit with officers' usability and acceptance assessments and exhibited satisfactory explanatory power. The analysis also showed that individuals included in the current study exhibited important characteristics common to individual professionals. Compared to end-users and knowledge workers in business settings, law enforcement officers appear to be pragmatic in their technology acceptance assessments, concentrating more on the usefulness of a technology than on its ease of use. Participating officers also attached limited weight to the suggestions or opinions of significant referents. Findings from this study should provide valuable insights to digital government systems evaluation and, at the same time, shed light on how government agencies can design management interventions to foster technology acceptance and use.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Helmi, Amr Shoukry. "The enforcement of digital copyright in Egypt : the role and liability of internet service providers." Thesis, Brunel University, 2013. http://bura.brunel.ac.uk/handle/2438/12628.

Повний текст джерела
Анотація:
The thesis examines to what extent copyright holders can enforce the online reproduction and communication rights against online service providers in Egypt. The objective of the thesis is therefore to highlight that the existing Egyptian copyright law 2002/82 is insufficient to impose liability on internet service providers, both substantively and also with regards to enforcement. Various recommendations are thus made to improve the legislative framework in Egypt, all with a view of achieving that a fair balance is struck for all those parties, who/which are involved in digital communications, particularly online end users, so that their rights to online privacy and access to information are preserved. For this purpose, a comparative methodology has been adopted and recourse is made to US and European laws. This comparative approach is further complemented by a critical examination of existing deficiencies within the legislative liability regime for internet service providers in the US and Europe in order to ensure that foreign laws are not merely transplanted, but that the best and most suitable legislative framework is adopted by the Egyptian legislator.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Brandt, Johan, and Oscar Wärnling. "Addressing the Digital Forensic Challenges Within Modern Law Enforcement : A study of digital forensics and organizational buying behavior from a DF-company perspective." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279595.

Повний текст джерела
Анотація:
Today’s law enforcement agencies are presented with challenges regarding how to navigate the rapidly changing technical landscape. The proliferation of digital devices in society has presented opportunities for modern criminals, resulting in substantial changes in criminal behavior. Digital devices have, thus, become a crucial piece of evidence within forensic investigation processes, which has caused the field of digital forensics to emerge as a central part of modern law enforcement. However, law enforcement is experiencing substantial challenges in regard to handling the complexity of modern digital devices, as well as the data quantities that these devices imply. While digital forensics literature commonly discusses the challenges that law enforcement agencies are facing, it fails to address the role and responsibilities that the digital forensic companies have in ensuring that law enforcement agencies possess the necessary means to counteract criminal activity. Therefore, this study aims to investigate how the companies that supply the tools that law enforcement depends on, can help the agencies to overcome these challenges. Although the need for digital forensics is at an all time high, the consensus among practitioners is that they lack the necessary means to adequately handle digital evidence. Moreover, it is identified that lack of organizational understanding is impeding law enforcement from prioritizing allocation of capital towards digital forensics. Thus, this study also assesses how digital forensic companies can adapt their marketing approaches based on the purchasing behavior of law enforcement, in order to efficiently communicate the need within the customer organizations and ensure that law enforcement agencies possess the necessary means to counteract modern criminality. In order to investigate this area of research and address the identified problems, ii the study is set up as a case study in collaboration with a European digital forensic company. The study includes several internal interviews with company representatives, as well as a large amount of external interviews with digital forensic experts from different European law enforcement agencies. The empirical evidence is assessed against renowned literature within digital forensics and organizational buying behavior to acquire a comprehensive understanding of the problems and help answer the proposed research questions. The study concludes that the main challenges that law enforcement is facing in regard to digital forensics originate from a lack of organizational understanding. This results in insufficient resources being allocated towards digital forensics. In turn, this limits law enforcement’s ability to properly educate their staff and purchase the necessary tools to effectively handle the complexity and quantity of evidence that modern digital forensics implies. To address this, digital forensic companies are required to adapt their business models to the resource limitations of their customers by offering more flexible training solutions and tailor the tools based on specific user needs. Moreover, it is determined that companies should be involved in pursuing law enforcement management to improve the organizational understanding regarding the importance of digital forensics. The study also identifies that the organizational structure of law enforcement agencies highly impact their purchasing behavior. Depending on the degree of law enforcement centralization, the buying center structure varies. For centralized organizations the scale of the buying center is generally larger and the same applies for its purchases. The individual members of the buying center have minor influence over the decision making process, instead the decisions are a consequence of collective decision making by different departments. In contrast, decentralized organizations make smaller purchases through smaller buying centers. The individual members within the decentralized buying center have far more influence over the buying behaviour in comparison to the members of a centralized organization’s buying center. Therefore, digital forensic companies need to employ different marketing strategies to anchor their products within different law enforcement organizations. It is established that companies should aspire to identify the buying centers of potential and existing customer organizations, to improve efficiency of marketing efforts. Mapping out organizational and authoritative structure is, thus, concluded to be crucial in order to successfully capitalize on the purchasing behavior of different law enforcement organizations. To enable digital forensic companies to practically apply these suggestions within the context of their marketing strategies, applicable models based on theory and empirics are proposed.
Dagens brottsbekämpande myndigheter står inför en stor mängd utmaningar när det kommer till att navigera i det snabbföränderliga tekniska landskapet. Spridningen av digitala enheter i samhället har presenterat möjligheter för kriminella, vilket har resulterat i väsentliga förändringar i kriminellt beteende. Digitala enheter har därför blivit viktiga som bevis inom moderna forensiska utredningsprocesser, vilket har lett till att digital forensik har blivit en central del av modern brottsutredning. Brottsutredande myndigheter upplever dock betydande utmaningar när det kommer till att hantera komplexiteten hos moderna digitala enheter, samt den mängd data som dessa enheter medför. Litteratur om digital forensik tar frekvent upp utmaningarna som brottsbekämpande myndigheter står inför. Däremot tar litteraturen inte upp rollen och ansvaret som digital forensik-företagen har i att säkra att brottsutredande myndigheter har de nödvändiga verktygen för att bekämpa brottslighet. Därför är syftet med studien att undersöka hur företagen som förser brottsutredande myndigheter med verktyg, kan hjälpa till att lösa dessa problem. Trots att behovet av digital forensik är rekordhögt, är konsensusen bland utövare att de saknar de nödvändiga medlen för att hantera digitalt bevismaterial. Dessutom identifieras det att organisatorisk förståelse hindrar brottsutredande myndigheter från att prioritera allokering av kapital för digital forensik. Därmed undersöker denna studie också hur digital forensik-företag kan anpassa sina marknadsföringsstrategier baserat på brottsutredande myndigheters inköpsbeteende, för att effektivt kunna kommunicera behovet inom kundorganisationerna och försäkra att brottsutredande myndigheter innehar de nödvändiga medlen för att kunna bekämpa kriminalitet. För att undersöka detta forskningsområde och hantera de identifierade problemen, är studien strukturerad som en fallstudie i samarbete med ett Europeiskt digital forensik-företag. Studien inkluderar ett mindre antal interna intervjuer iv med företagsrepresentanter, samt ett flertal externa intervjuer med digital forensikexperter från olika brottsutredande myndigheter i Europa. Det empiriska underlaget analyseras med hjälp av erkänd litteratur inom digital forensik samt ramverk inom organisationellt köpbeteende för att få en omfattande förståelse för problemen och kunna besvara de föreslagna forskningsfrågorna. Studien drar slutsatsen att de mest omfattande utmaningarna som brottsutredande myndigheter står inför när det gäller digital kriminalteknik, grundas i brist på organisatorisk förståelse. Detta resulterar i att de resurser som allokeras till digital brottsbekämpning är otillräckliga. I sin tur begränsar detta brottsutredande myndigheters möjligheter att i tillräcklig utsträckning utbilda personal samt anskaffa de nödvändiga verktygen för att effektivt hantera komplexiteten och beviskvantiteten som dagens digitala brottsbekämpning innebär. För att hantera detta krävs att digital forensik-företag anpassar sina affärsmodeller efter kundernas resursbegränsningar genom att erbjuda mer flexibla utbildningslösningar och verktyg som är skräddarsydda utifrån specifika användarbehov. Dessutom fastställs det att företagen bör vara involverade i att övertyga brottsutredande myndigheter på ledningsnivå om digital brottsbekämpnings betydelse och relevans. Studien identifierar också organisatorisk struktur inom brottsutredande myndigheter som en faktor som har stor inverkan på inköpsbeteende. Beroende på graden av centralisering, så kommer “buying center”-strukturen att förändras. För centraliserade organisationer är både skalan av buying centret och inköpen stora. De individuella medlemmarna av buying centret har lite inflytande över beslutsprocessen, istället så är besluten en konsekvens av kollektiva beslut fattade av flertalet avdelningar. I kontrast till centraliserade organisationer så gör decentraliserade organisationer mindre inköp genom mindre buying centers. De individuella medlemmarna inom decentraliserade buying centers har betydligt mer inflytande över köpbeteendet i jämförelse med medlemmarna i en centraliserad organisations buying center. Därför behöver digital forensikföretag adoptera olika marknadsföringsstrategier för att lyckas nå ut och förankra produkterna inom brottutredingsorganisationer. Det fastställs att företag borde sträva efter att identifiera potentiella och befintliga kunders så kallade buying centers för att effektivisera marknadsföringsinsatserna. Kartläggning av organisatoriska och auktoritära strukturer är därför nödvändigt för att framgångsrikt kapitalisera på rättsutredande organisationers inköpsbeteenden. För att göra det möjligt för digital forensik-företag att praktiskt tillämpa dessa förslag på deras marknadsföringsstrategier, har applicerbara modeller baserade på teori och empiri föreslagits.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Giovanella, Federica. "Balancing conflicting rights in the digital age: the case of information privacy vs. copyright enforcement against file sharing." Doctoral thesis, Università degli studi di Trento, 2012. https://hdl.handle.net/11572/368706.

Повний текст джерела
Анотація:
The research, employing a comparative and multidisciplinary approach, aims at understanding the conflict between information privacy and copyright enforcement in the digital era. Throughout the whole study attention will be paid to the effect that technology has on these rights. The systems under scrutiny will be the European one (with particular regard to Italy) and the North American ones (US and Canada). The starting point of this analysis are a number of selected lawsuits in which copyright holders have tried to enforce their rights against Internet users suspected of illegal peer-to-peer downloading. In so doing, copyright enforcement collided with users’ information privacy. In analyzing the way in which these decisions were taken, I shall try to understand how technology affects society. Many studies have demonstrated the interaction between technology and society. Copyright and information privacy laws are themselves a product of technology and innovation. The idea behind my analysis is that technology not only affects society, but that it also affects lawmakers, and even judges (who, directly or indirectly, are lawmakers as well). Indeed, judges do not live a secluded life, but operate within a society. Therefore, it is at least plausible, if not necessary, that their decisions reflect the values of that society. In other words, technology influences society, which, in turn, affects judicial opinion. To assess if my statement is sound, I shall consider the perception of copyright, limited to file-sharing activities, in the three normative systems. The same analysis will be undertaken with regard to information privacy. As will be seen, unsurprisingly, technology has affected in many ways the substance of both privacy and copyright norms. But technology has also affected people’s lives, people’s way of behaving, and, in the end, people’s minds. This has led to a different perception of the need to protect the aforementioned rights, even if in opposite directions. Privacy concerns have been increasing, while copyright is more and more seen as something “negative†, for a variety of reasons. Given this, a plausible answer to my main line of inquiry is that courts’ decisions reflect this common sense position of prioritizing privacy over copyright. In particular, I shall examine the literature related to the way courts judge and if and how they can be influenced by the society and culture in which they operate. Importance will be given to the way that this influence could enter into judicial reasoning. If it is true that technology changes society, which in turn affects the judicial mind, then technology enters into this contextual backdrop for adjudication. Therefore, the question I would like to answer is the following: could this be a reason why, despite similar legal frameworks, the outcomes of lawsuits are quite different among the considered legal systems? This would be the goal of my research, conscious of the fact that anyway my answer would be just one of the many possible explanations.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Giovanella, Federica. "Balancing conflicting rights in the digital age: the case of information privacy vs. copyright enforcement against file sharing." Doctoral thesis, University of Trento, 2012. http://eprints-phd.biblio.unitn.it/732/1/Giovanella_Tesi_di_dottorato.pdf.

Повний текст джерела
Анотація:
The research, employing a comparative and multidisciplinary approach, aims at understanding the conflict between information privacy and copyright enforcement in the digital era. Throughout the whole study attention will be paid to the effect that technology has on these rights. The systems under scrutiny will be the European one (with particular regard to Italy) and the North American ones (US and Canada). The starting point of this analysis are a number of selected lawsuits in which copyright holders have tried to enforce their rights against Internet users suspected of illegal peer-to-peer downloading. In so doing, copyright enforcement collided with users’ information privacy. In analyzing the way in which these decisions were taken, I shall try to understand how technology affects society. Many studies have demonstrated the interaction between technology and society. Copyright and information privacy laws are themselves a product of technology and innovation. The idea behind my analysis is that technology not only affects society, but that it also affects lawmakers, and even judges (who, directly or indirectly, are lawmakers as well). Indeed, judges do not live a secluded life, but operate within a society. Therefore, it is at least plausible, if not necessary, that their decisions reflect the values of that society. In other words, technology influences society, which, in turn, affects judicial opinion. To assess if my statement is sound, I shall consider the perception of copyright, limited to file-sharing activities, in the three normative systems. The same analysis will be undertaken with regard to information privacy. As will be seen, unsurprisingly, technology has affected in many ways the substance of both privacy and copyright norms. But technology has also affected people’s lives, people’s way of behaving, and, in the end, people’s minds. This has led to a different perception of the need to protect the aforementioned rights, even if in opposite directions. Privacy concerns have been increasing, while copyright is more and more seen as something “negative”, for a variety of reasons. Given this, a plausible answer to my main line of inquiry is that courts’ decisions reflect this common sense position of prioritizing privacy over copyright. In particular, I shall examine the literature related to the way courts judge and if and how they can be influenced by the society and culture in which they operate. Importance will be given to the way that this influence could enter into judicial reasoning. If it is true that technology changes society, which in turn affects the judicial mind, then technology enters into this contextual backdrop for adjudication. Therefore, the question I would like to answer is the following: could this be a reason why, despite similar legal frameworks, the outcomes of lawsuits are quite different among the considered legal systems? This would be the goal of my research, conscious of the fact that anyway my answer would be just one of the many possible explanations.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Staud, Shawna. "The Use of Digital Media by State Dental Boards in Licensure and Enforcement of Oral Health Professionals; A Survey." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1461234272.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Homem, Irvin. "LEIA: The Live Evidence Information Aggregator : A Scalable Distributed Hypervisor‐based Peer‐2‐Peer Aggregator of Information for Cyber‐Law Enforcement I." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177902.

Повний текст джерела
Анотація:
The Internet in its most basic form is a complex information sharing organism. There are billions of interconnected elements with varying capabilities that work together supporting numerous activities (services) through this information sharing. In recent times, these elements have become portable, mobile, highly computationally capable and more than ever intertwined with human controllers and their activities. They are also rapidly being embedded into other everyday objects and sharing more and more information in order to facilitate automation, signaling that the rise of the Internet of Things is imminent. In every human society there are always miscreants who prefer to drive against the common good and engage in illicit activity. It is no different within the society interconnected by the Internet (The Internet Society). Law enforcement in every society attempts to curb perpetrators of such activities. However, it is immensely difficult when the Internet is the playing field. The amount of information that investigators must sift through is incredibly massive and prosecution timelines stated by law are prohibitively narrow. The main solution towards this Big Data problem is seen to be the automation of the Digital Investigation process. This encompasses the entire process: From the detection of malevolent activity, seizure/collection of evidence, analysis of the evidentiary data collected and finally to the presentation of valid postulates. This paper focuses mainly on the automation of the evidence capture process in an Internet of Things environment. However, in order to comprehensively achieve this, the subsequent and consequent procedures of detection of malevolent activity and analysis of the evidentiary data collected, respectively, are also touched upon. To this effect we propose the Live Evidence Information Aggregator (LEIA) architecture that aims to be a comprehensive automated digital investigation tool. LEIA is in essence a collaborative framework that hinges upon interactivity and sharing of resources and information among participating devices in order to achieve the necessary efficiency in data collection in the event of a security incident. Its ingenuity makes use of a variety of technologies to achieve its goals. This is seen in the use of crowdsourcing among devices in order to achieve more accurate malicious event detection; Hypervisors with inbuilt intrusion detection capabilities to facilitate efficient data capture; Peer to Peer networks to facilitate rapid transfer of evidentiary data to a centralized data store; Cloud Storage to facilitate storage of massive amounts of data; and the Resource Description Framework from Semantic Web Technologies to facilitate the interoperability of data storage formats among the heterogeneous devices. Within the description of the LEIA architecture, a peer to peer protocol based on the Bittorrent protocol is proposed, corresponding data storage and transfer formats are developed, and network security protocols are also taken into consideration. In order to demonstrate the LEIA architecture developed in this study, a small scale prototype with limited capabilities has been built and tested. The prototype functionality focuses only on the secure, remote acquisition of the hard disk of an embedded Linux device over the Internet and its subsequent storage on a cloud infrastructure. The successful implementation of this prototype goes to show that the architecture is feasible and that the automation of the evidence seizure process makes the otherwise arduous process easy and quick to perform.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Rivera, Polanco Sergio A. "AUTOMATED NETWORK SECURITY WITH EXCEPTIONS USING SDN." UKnowledge, 2019. https://uknowledge.uky.edu/cs_etds/87.

Повний текст джерела
Анотація:
Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network interactions must abide by. While users are the audience for AUP documents produced by an organization's PWC, network administrators are the responsible party enforcing the contents of such policies using low-level CLI instructions and configuration files that are typically difficult to understand and are almost impossible to show that they do, in fact, enforce the AUPs. In other words, mapping the contents of imprecise unstructured sentences into technical configurations is a challenging task that relies on the interpretation and expertise of the network operator carrying out the policy enforcement. Moreover, there are multiple places where policy enforcement can take place. For example, policies governing servers (e.g., web, mail, and file servers) are often encoded into the server's configuration files. However, from a security perspective, conflating policy enforcement with server configuration is a dangerous practice because minor server misconfigurations could open up avenues for security exploits. On the other hand, policies that are enforced in the network tend to rarely change over time and are often based on one-size-fits-all policies that can severely limit the fast-paced dynamics of emerging research workflows found in campus networks. This dissertation addresses the above problems by leveraging recent advances in Software-Defined Networking (SDN) to support systems that enable novel in-network approaches developed to support an organization's network security policies. Namely, we introduce PoLanCO, a human-readable yet technically-precise policy language that serves as a middle-ground between the imprecise statements found in AUPs and the technical low-level mechanisms used to implement them. Real-world examples show that PoLanCO is capable of implementing a wide range of policies found in campus networks. In addition, we also present the concept of Network Security Caps, an enforcement layer that separates server/device functionality from policy enforcement. A Network Security Cap intercepts packets coming from, and going to, servers and ensures policy compliance before allowing network devices to process packets using the traditional forwarding mechanisms. Lastly, we propose the on-demand security exceptions model to cope with the dynamics of emerging research workflows that are not suited for a one-size-fits-all security approach. In the proposed model, network users and providers establish trust relationships that can be used to temporarily bypass the policy compliance checks applied to general-purpose traffic -- typically by network appliances that perform Deep Packet Inspection, thereby creating network bottlenecks. We describe the components of a prototype exception system as well as experiments showing that through short-lived exceptions researchers can realize significant improvements for their special-purpose traffic.
Стилі APA, Harvard, Vancouver, ISO та ін.

Книги з теми "Digital enforcement"

1

Institute of Police Technology and Management, ed. Photography and digital imaging in law enforcement. Jacksonville, Fla: Institute of Police Technology and Management, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

United States. Congress. Office of Technology Assessment., ed. Electronic surveillance in a digital age. Washington, DC: U.S. Congress, Office of Technology Assessment, 1995.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

United States. Office of Justice Programs. and National Institute of Justice (U.S.), eds. Forensic examination of digital evidence: A guide for law enforcement. Washington, D.C: U.S. Dept. of Justice, Office of Justice Programs, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

National Institute of Justice (U.S.), ed. Forensic examination of digital evidence: A guide for law enforcement. Washington, D.C: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2004.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mamalian, Cynthia A. The use of computerized crime mapping by law enforcement: Survey results. [Washington, DC]: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

G, Massingale Joseph, ed. Digital surveillance: Laws, security and related issues. New York: Nova Science Publishers, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

G, Massingale Joseph, ed. Digital surveillance: Laws, security and related issues. New York: Nova Science Publishers, 2009.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Vu, Mimi. Digital consumer protection: How federal & state enforcement agencies can regulate unfair & deceptive click-through agreements. Cambridge, Mass: John F. Kennedy School of Government, 2012.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Albert, Donald Patrick, and Mark R. Leipnik. GIS in law enforcement: Implementation issues and case studies. London: Taylor and Francis, 2003.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Police Foundation (U.S.) and United States. Department of Justice. Office of Community Oriented Policing Services, eds. Mapping for community-based prisoner reentry efforts: A guidebook for law enforcement agencies and their partners. Washington, D.C: Police Foundation, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Digital enforcement"

1

Domingo-Ferrer, Josep. "Co-utile Enforcement of Digital Oblivion." In Studies in Systems, Decision and Control, 71–85. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60234-9_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Horcas, Jose-Miguel, Mónica Pinto, and Lidia Fuentes. "Automatic Enforcement of Security Properties." In Trust, Privacy and Security in Digital Business, 19–31. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-44341-6_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Huber, Florian, Yara Abdel Samad, Theoni Spathi, Karen Latricia Hough, Alessandro Caforio, Carmen Munteanu, Maryam Karimi, et al. "Shaping ICT Policies for Integrative and Inclusive Digital Services." In Security Informatics and Law Enforcement, 367–80. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93266-4_21.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hale-Ross, Simon. "Introduction: approaching terrorism." In Digital Privacy, Terrorism and Law Enforcement, x—10. New York, NY : Routledge, 2018. | Series: Routledge research in terrorism and the law: Routledge, 2018. http://dx.doi.org/10.4324/9781351118989-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Hale-Ross, Simon. "The United Kingdom’s legal definition of terrorism." In Digital Privacy, Terrorism and Law Enforcement, 11–43. New York, NY : Routledge, 2018. | Series: Routledge research in terrorism and the law: Routledge, 2018. http://dx.doi.org/10.4324/9781351118989-2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Hale-Ross, Simon. "The 21st Century terrorist threat: how terrorist groups and terrorists communicate and the unknown threat." In Digital Privacy, Terrorism and Law Enforcement, 44–59. New York, NY : Routledge, 2018. | Series: Routledge research in terrorism and the law: Routledge, 2018. http://dx.doi.org/10.4324/9781351118989-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Hale-Ross, Simon. "The necessity of bulk communications data surveillance." In Digital Privacy, Terrorism and Law Enforcement, 60–96. New York, NY : Routledge, 2018. | Series: Routledge research in terrorism and the law: Routledge, 2018. http://dx.doi.org/10.4324/9781351118989-4.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Hale-Ross, Simon. "The necessity of pre-emptive legal counterterrorism measures." In Digital Privacy, Terrorism and Law Enforcement, 97–112. New York, NY : Routledge, 2018. | Series: Routledge research in terrorism and the law: Routledge, 2018. http://dx.doi.org/10.4324/9781351118989-5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hale-Ross, Simon. "Implications of the UK’s legal response: striking the right balance between individual privacy and collective security in the digital age." In Digital Privacy, Terrorism and Law Enforcement, 113–36. New York, NY : Routledge, 2018. | Series: Routledge research in terrorism and the law: Routledge, 2018. http://dx.doi.org/10.4324/9781351118989-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Hale-Ross, Simon. "The international nature of the 21st Century terrorism threat: preserving international intelligence exchange and the implications of the UK leaving the European Union." In Digital Privacy, Terrorism and Law Enforcement, 137–55. New York, NY : Routledge, 2018. | Series: Routledge research in terrorism and the law: Routledge, 2018. http://dx.doi.org/10.4324/9781351118989-7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Digital enforcement"

1

Guler, Sadiye. "Advanced digital video surveillance." In Enabling Technologies for Law Enforcement, edited by Simon K. Bramble, Edward M. Carapezza, and Lenny I. Rudin. SPIE, 2001. http://dx.doi.org/10.1117/12.417565.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Domingo-Ferrer, Josep. "Rational enforcement of digital oblivion." In the 4th International Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/1971690.1971692.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Geradts, Zeno J., Jurrien Bijhold, Martijn Kieft, Kenji Kurosawa, Kenro Kuroki, and Naoki Saitoh. "Methods for identification of images acquired with digital cameras." In Enabling Technologies for Law Enforcement, edited by Simon K. Bramble, Edward M. Carapezza, and Lenny I. Rudin. SPIE, 2001. http://dx.doi.org/10.1117/12.417569.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hadžiarapović, Nerko, Marlies van Steenbergen, and Pascal Ravesteijn. "Copyright Enforcement in the Dutch Digital Music Industry." In Digital Support from Crisis to Progressive Change. University of Maribor Press, 2021. http://dx.doi.org/10.18690/978-961-286-485-9.41.

Повний текст джерела
Анотація:
There is a lack of interest and empirical analysis in the existing literature on composers’ relations with their publishers and the role of Collective Management Organizations (CMOs) within the system of music copyright. The purpose of this paper is to explore and understand the influence of digitization within the music industry on the copyright enforcement in the Netherlands and on rights holders and the CMOs. Also to explore and understand how their mutual relationships are affected by digitization of the music industry. A qualitative analysis was done by reviewing scientific literature, performing a documents analysis and doing open interviews. In the existing economics of copyright literature, the main focus is set on transaction costs, efficiency and welfare topics. The findings can be used to understand and model how rights holders and CMOs cope with the digitization and contribute to the policy makers and economic actor’s discussion about future improvement of the copyright enforcement system.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Shakeel, Ibrahim, Ali Dehghan Tanha, and Hoorang Ghasem Broujerdi. "A Framework for Digital Law Enforcement in Maldives." In 2010 Second International Conference on Computer Research and Development. IEEE, 2010. http://dx.doi.org/10.1109/iccrd.2010.93.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Stahel, Lea, and Katja Rost. "Angels and Devils of Digital Social Norm Enforcement." In the 8th International Conference. New York, New York, USA: ACM Press, 2017. http://dx.doi.org/10.1145/3097286.3097304.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Hosmer, Chet. "Using SmartCards and digital signatures to preserve electronic evidence." In Enabling Technologies for Law Enforcement and Security, edited by Kathleen Higgins. SPIE, 1999. http://dx.doi.org/10.1117/12.334542.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bullard, Barry D., and Brian Birge. "Applications of a digital darkroom in the forensic laboratory." In Enabling Technologies for Law Enforcement and Security, edited by John Hicks, Peter R. De Forest, and Vivian M. Baylor. SPIE, 1997. http://dx.doi.org/10.1117/12.266298.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Shidong, Zhu, Jiang Liu, Yang Sheng, and Zhang Xiaorui. "Research and Implementation of Digital Evidence Enforcement Protection Program." In 2013 6th International Conference on Intelligent Networks and Intelligent Systems (ICINIS). IEEE, 2013. http://dx.doi.org/10.1109/icinis.2013.15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Appenzeller, Arno, Ewald Rode, Erik Krempel, and Jürgen Beyerer. "Enabling data sovereignty for patients through digital consent enforcement." In PETRA '20: The 13th PErvasive Technologies Related to Assistive Environments Conference. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3389189.3393745.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Digital enforcement"

1

Yilmaz, Ihsan, and Raja M. Ali Saleem. https://www.populismstudies.org/hindutva-civilizational-populist-bjps-enforcement-of-digital-authoritarianism-in-india/. European Center for Populism Studies (ECPS), December 2022. http://dx.doi.org/10.55271/pp0017.

Повний текст джерела
Анотація:
The largest democracy in the world is now moving towards authoritarianism under the Hindutva civilizational populist prime minister Narendra Modi-led Bharatiya Janata Party (BJP)’s rule. This article focuses on digital rights in India that have seen a sharp decline in recent years. It explores the transformation of the internet and social media, from a relatively open and liberal space to a restricted one. This survey of India’s digital landscape finds that the rise of civilizational populist Modi and his eight years long rule have led to an upsurge in digital surveillance and control and has fostered an environment of online harassment and bullying for those who are critical of the BJP’s views and politics. The article uses a four-level framework (Full Network, Sub-Network, Proxies, and Network Nodes) to explore digital authoritarianism by the BJP government. At each of these levels, the Hindutva populist government has closed avenues of open discussion and exchange of views by enforcing new rules and regulations.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Robinson, Eric. Digital Rights Management, Fair Use, and Privacy: Problems for Copyright Enforcement through Technology. SOAR@USA: Scholarship and Open Access Repository, December 2009. http://dx.doi.org/10.46409/sr.jkvn1411.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Pritam, Banerjee, Chattopadhyay Soumya, Sinha Deepankar, and Sharma Prashant. Technology Framework for India's Road Freight Transport: Compliance and Enforcement Architecture Reform. Asian Development Bank, August 2021. http://dx.doi.org/10.22617/wps210271-2.

Повний текст джерела
Анотація:
In India, different agencies conduct inspections on road freight in transit, which can cause unscheduled stoppages that result in delays and add to operational costs. Compliance and enforcement architecture reform involving road freight transport in the country involves the application of data-based and integrated digital tools that can enable inspection facilities and units to immediately identify potential noncompliance and minimize multiple physical inspections that the current enforcement model entails. This paper presents an alternative model for enforcement agencies with regulatory mandates on the on-road movement and conveyance of cargo. The importance of road freight transport in India can benefit from a technology-based reform, which has become critical to improving the efficiency of domestic trade facilitation.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Mattheis, Ashley A. Atomwaffen Division and its Affiliates on Telegram: Variations, Practices, and Interconnections. RESOLVE Network, April 2022. http://dx.doi.org/10.37805/remve2022.1.

Повний текст джерела
Анотація:
This research brief details findings from a recent collaborative project exploring different groups related to Atomwaffen Division (AWD) on Telegram. The brief provides an initial foray into understanding the digital communicative practices these AWD-related groups use to maintain their loose structure as a transnational, digitally networked extremist culture. Groups affiliated with the meta-brand of AWD are continuing to develop globally and building a transnational, digital networked culture, despite increased scrutiny. This indicates that their structure as a digitally networked, transnational culture provides resilience to traditional policy and law enforcement approaches. Addressing this threat requires insight into the practices that such groups use to interconnect their now multi-nodal, supranational organization.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Marty, Frédéric, and Thierry Warin. Deciphering Algorithmic Collusion: Insights from Bandit Algorithms and Implications for Antitrust Enforcement. CIRANO, December 2023. http://dx.doi.org/10.54932/iwpg7510.

Повний текст джерела
Анотація:
This paper examines algorithmic collusion from legal and economic perspectives, highlighting the growing role of algorithms in digital markets and their potential for anti-competitive behavior. Using bandit algorithms as a model, traditionally applied in uncertain decision-making contexts, we illuminate the dynamics of implicit collusion without overt communication. Legally, the challenge is discerning and classifying these algorithmic signals, especially as unilateral communications. Economically, distinguishing between rational pricing and collusive patterns becomes intricate with algorithm-driven decisions. The paper emphasizes the imperative for competition authorities to identify unusual market behaviors, hinting at shifting the burden of proof to firms with algorithmic pricing. Balancing algorithmic transparency and collusion prevention is crucial. While regulations might address these concerns, they could hinder algorithmic development. As this form of collusion becomes central in antitrust, understanding through models like bandit algorithms is vital, since these last ones may converge faster towards an anticompetitive equilibrium.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Almorjan, Dr Abdulrazaq, Dr Kyounggon Kim, and Ms Norah Alilwit. NAUSS Ransomware Trends Report in Arab Countries 2020-2022. Naif University Press, January 2024. http://dx.doi.org/10.26735/orro4624.

Повний текст джерела
Анотація:
Threat actors, including infamous cybercrime groups and financially driven ransomware gangs, have focused on Arab countries› businesses and organizations as they grow and move toward digital transformation. In particular, ransomware is a very serious type of cyber-attack worldwide, and many organizations are severely affected by it. INTERPOL indicates that the ransomware gangs are targeting different regions such as Africa, Americas, Caribbean, Asia-Pacific, Europe, Middle East, and North Africa 1. The Center of Excellence in Cybercrime and Digital Forensics (CoECDF) at NAUSS has conducted a deep web search, collecting, analyzing, and classifying data on ransomware gangs targeting Arab countries and organizations from 2020 to 2022. We have collected the information of ransomware victims through the darknet and dark web, focusing on leaked information. This report focuses on the Arab countries, organizations, and sectors victimized by ransomware gangs and whose information has been leaked on the darknet. Moreover, it investigated ransomware gangs that carried out cyberattacks against Arab countries, and the tactics, techniques, and procedures (TTPs) they were using. The number of organizations that are attacked by ransomware gangs is increasing significantly. Some organizations pay ransom to ransomware gangs in order not to publish their information on the darknet. As a result of not paying the ransom demanded by the ransomware gangs, certain organizations and countries had their private and sensitive data leaked to the dark web. The purpose of this report is to help law enforcement agencies combat ransomware cyberattacks by providing them with insights into the evolving tactics of ransomware gangs. By understanding how these gangs operate, law enforcement agencies can better prepare to combat and respond to ransomware attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Goyeneche, Laura, Cynthia Boruchowicz, Florencia Lopez Boo, Luis Tejerina, Benjamin Roseth, and Jennifer Nelson. Pandemics, privacy, and adoption of technology: Perceptions of the use of digital tools and data sharing during COVID-19 from 10 Latin American countries. Inter-American Development Bank, December 2022. http://dx.doi.org/10.18235/0004546.

Повний текст джерела
Анотація:
This study describes the perception, adoption, and acceptance factors involved in the deployment of digital technologies for public health in Latin America and considers the implications for future digital health interventions. We conducted a descriptive analysis using nationally representative data from a phone survey conducted in 2020 in 10 countries in Latin America. We found that early in the pandemic, in countries with existing applications, 74% of the population used a smartphone, 47% had knowledge of the government app to report symptoms, but only 2% reported using it. Those interviewed reported that they are willing to share their personal data during a pandemic (61%) 50 percentage points higher than in non-pandemic times, although understanding how their personal data was used by the government and private companies was extremely low. More than 70% reported that they would use an application to report symptoms and would use an app that accesses their location or that uses contact tracing technology to alert them about possible exposure. Also, at least half of the users agree with preventive measures against COVID-19 such as daily follow-up calls, tracking via GPS for quarantine enforcement, and daily visits. In all countries, adoption of digital technologies increases if individuals or their relatives report they are infected; it decreases when end-users do not trust the anonymity policies or are concerned about government surveillance. Yet, encouraging greater adoption of digital technologies strongly depends on who designed the technology. Results show that 73% of users would prefer an app designed by an international organization such as the WHO to an app designed by the local government (64%) or a telephone company (56%). The study concludes with a reflection on the promising results of digital technologies and discusses the importance of considering users perceptions, factors for acceptance, and trust when pursuing adoption of digital technologies.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

bin Ahsan, Wahid, Imran Hossain, Habibur Rahman, Nasir Uddin, Kazi Harunur Rashid, Shahariar Ratul, Zannatul Ferdous, Fariha Islam, and Abu MD Ehsan. Global Mobile App Accessibility: A Comparative Study of WCAG Compliance Across 12 Countries. Userhub, April 2024. http://dx.doi.org/10.58947/mxrc-rzkh.

Повний текст джерела
Анотація:
This study assesses the accessibility of mobile applications across twelve countries, including the USA, Vietnam, Turkey, Ireland, and South Korea. Our evaluation of 60 popular apps reveals a widespread failure to meet the Web Content Accessibility Guidelines (WCAG), with Vietnam exhibiting the highest average of 41.2 violations per app. These violations were particularly prevalent in essential areas such as touch target size and color contrast, critical for users with visual and motor impairments. Despite robust accessibility laws such as the Americans with Disabilities Act (ADA) in the USA and the European Accessibility Act (EAA) in the EU, our findings indicate a significant gap between these legal frameworks and their practical application. Our study highlights the urgent need for a multifaceted approach that includes strict enforcement, enhanced developer education with a focus on cross-cultural accessibility, and international cooperation. This research underscores the importance of integrating accessibility as a core component of digital infrastructure development to ensure mobile applications are truly accessible to all users.
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Cachalia, Firoz, and Jonathan Klaaren. Digitalisation, the ‘Fourth Industrial Revolution’ and the Constitutional Law of Privacy in South Africa: Towards a public law perspective on constitutional privacy in the era of digitalisation. Digital Pathways at Oxford, July 2021. http://dx.doi.org/10.35489/bsg-dp-wp_2021/04.

Повний текст джерела
Анотація:
In this working paper, our focus is on the constitutional debates and case law regarding the right to privacy, adopting a method that is largely theoretical. In an accompanying separate working paper, A South African Public Law Perspective on Digitalisation in the Health Sector, we employ the analysis developed here and focus on the specific case of digital technologies in the health sector. The topic and task of these papers lie at the confluence of many areas of contemporary society. To demonstrate and apply the argument of this paper, it would be possible and valuable to extend its analysis into any of numerous spheres of social life, from energy to education to policing to child care. In our accompanying separate paper, we focus on only one policy domain – the health sector. Our aim is to demonstrate our argument about the significance of a public law perspective on the constitutional right to privacy in the age of digitalisation, and attend to several issues raised by digitalisation’s impact in the health sector. For the most part, we focus on technologies that have health benefits and privacy costs, but we also recognise that certain technologies have health costs and privacy benefits. We also briefly outline the recent establishment (and subsequent events) in South Africa of a contact tracing database responding to the COVID-19 pandemic – the COVID-19 Tracing Database – a development at the interface of the law enforcement and health sectors. Our main point in this accompanying paper is to demonstrate the value that a constitutional right to privacy can bring to the regulation of digital technologies in a variety of legal frameworks and technological settings – from public to private, and from the law of the constitution to the ‘law’ of computer coding.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Schiffbauer, Marc, Philip Keefer, and Ishac Diwan. Pyramid Capitalism: Cronyism, Regulation, and Firm Productivity in Egypt. Inter-American Development Bank, October 2016. http://dx.doi.org/10.18235/0011766.

Повний текст джерела
Анотація:
Using a large, original database of 385 politically connected firms under the Mubarak regime in Egypt, we document for the first time the negative impact of cronyism on economic growth. In the early 2000s, a policy shift in Egypt led to the expansion of crony activities into new, previously unconnected sectors. 4-digit sectors that experienced crony entry between 1996 and 2006 experienced lower aggregate employment growth during the period than those that did not. A wide array of supporting evidence indicates that this effect was causal, reflecting the mechanisms described in Aghion et al. (2001), and not due to selection. Crony entry skewed the distribution of employment toward smaller, less productive firms; crony firms did not enter into sectors that would have also grown more slowly even in the absence of crony entry; and they enjoyed multiple regulatory and fiscal privileges that reduced competition and investments by non-crony firms, including trade protection, energy subsidies, access to land, and favorable regulatory enforcement. Moreover, energy subsidies and trade protection account for the higher profits of politically connected firms.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії