You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Village Potters of the Troodos Mountains: Ceramic Production in Agios Demetrios, Cyprus 1891-2002, by Gloria London, is a study of four generations of female potters working in a remote Cypriot mountain village. Their coil-built jars, jugs, cookware, beehives, ovens, and decorative pots are the subject of the author's ethnoarchaeological research, including her quantitative data on pot sizes, production rates, firing times, and rate of loss. This data will serve archaeologists worldwide who are concerned with craft specialization and standardization, learning frameworks, markings on pots, and identifying production locations.
How does one ensure information security for a computer that is entangled with the structures and processes of a human brain – and for the human mind that is interconnected with such a device? The need to provide information security for neuroprosthetic devices grows more pressing as increasing numbers of people utilize therapeutic technologies such as cochlear implants, retinal prostheses, robotic prosthetic limbs, and deep brain stimulation devices. Moreover, emerging neuroprosthetic technologies for human enhancement are expected to increasingly transform their human users’ sensory, motor, and cognitive capacities in ways that generate new ‘posthumanized’ sociotechnological realit...
This comprehensive textbook by the editor of Law and the Internet seeks to provide students, practitioners and businesses with an up-to-date and accessible account of the key issues in internet law and policy from a European and UK perspective. The internet has advanced in the last 20 years from an esoteric interest to a vital and unavoidable part of modern work, rest and play. As such, an account of how the internet and its users are regulated is vital for everyone concerned with the modern information society. This book also addresses the fact that internet regulation is not just a matter of law but increasingly intermixed with technology, economics and politics. Policy developments are closely analysed as an intrinsic part of modern governance. Law, Policy and the Internet focuses on two key areas: e-commerce, including the role and responsibilities of online intermediaries such as Google, Facebook and Uber; and privacy, data protection and online crime. In particular there is detailed up-to-date coverage of the crucially important General Data Protection Regulation which came into force in May 2018.
Digitising personal information is changing our ways of identifying persons and managing relations. What used to be a "natural" identity, is now as virtual as a user account at a web portal, an email address, or a mobile phone number. It is subject to diverse forms of identity management in business, administration, and among citizens. Core question and source of conflict is who owns how much identity information of whom and who needs to place trust into which identity information to allow access to resources. This book presents multidisciplinary answers from research, government, and industry. Research from states with different cultures on the identification of citizens and ID cards is combined towards analysis of HighTechIDs and Virtual Identities, considering privacy, mobility, profiling, forensics, and identity related crime. "FIDIS has put Europe on the global map as a place for high quality identity management research." –V. Reding, Commissioner, Responsible for Information Society and Media (EU)
This book examines the discourse and developments surrounding privacy and data protection in the digital realm, featuring papers and discussions from the 2024 CPDP.ai international conference. The question of governance-whether to lead or be led-has never been more relevant. Thus, the book not only addresses privacy and data protection, but also highlights issues related to the governance of artificial intelligence and the regulatory changes introduced by the EU AI Act. The book features comprehensive discussions on the adequacy and effectiveness of the governance mechanisms established by the EU AI Act, particularly emphasising standardisation, co-regulation, and human oversight, while also...
This book covers the outcome of a four-year European Community FP-VI PRIME Project on privacy-enhancing identity management techniques and systems supporting the sovereignty of users over their private sphere, and enterprises’ privacy-compliant data processing.
In the aftermath of the invalidated Data Retention Directive, the Court of Justice of the European Union (CJEU) published extensive case law that shaped the rules, requirements, and safeguards on the retention of traffic and location data and their subsequent access for law enforcement purposes in accordance with EU law. Against this backdrop, Data Retention in Europe and Beyond unites leading scholars and practitioners to offer a cutting-edge and multifaceted analysis of issues relating to data retention. The chapters in this book explore the development of the EU case law, the interaction with European Court of Human Rights (ECtHR) jurisprudence, the interplay between data retention and ma...
Today, consent is a fundamental concept in the European legal framework on data protection. The analysis of the historical and theoretical context carried out in this book reveals that consent was not an intrinsic notion in the birth of data protection. The concept of consent was included in data protection legislation in order to enhance the role of the data subject in the data protection arena, and to allow the data subject to have more control over the collection and processing of his/her personal information. This book examines the concept of consent and its requirements in the Data Protection Directive, taking into account contemporary considerations on bioethics and medical ethics, as well as recent developments in the framework of the review of the Directive. It further studies issues of consent in electronic communications, carrying out an analysis of the consent-related provisions of the ePrivacy Directive.
You don’t know how far you can trust what you see or feel or remember, because it could all just be a byproduct of your neural implant or illusions fabricated by a neurohacker. Self-evolving computer viruses and stray nanorobotic swarms have taken up residence in the components of your robotic prosthetic arm. Battles over access to neurocybernetic enhancement, life-extension biotech, and immersive VR paradises are fragmenting humanity into new strata of haves and have-nots. You can never tell whether the full-body cyborgs that you see in the street belong to military units, megacorps, or bands of hackers-for-hire… or maybe all three at once. Such near-future cyberdystopias provide the pe...