Zone Labs

Spyware - Computer Security - Computer Protection - Software

Phishing - Spam - Email Virus - Antivirus






Data Protection In A Profiled World

RRP $24.95

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever- increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy. The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer, technology assessment and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting. This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.


Data Protection In A Profiled World

RRP $407.99

One of the most challenging issues facing our current information society is the accelerating accumulation of data trails in transactional and communication systems, which may be used not only to profile the behaviour of individuals for commercial, marketing and law enforcement purposes, but also to locate and follow things and actions. Data mining, convergence, interoperability, ever increasing computer capacities and the extreme miniaturisation of the hardware are all elements which contribute to a major contemporary challenge: the profiled world. This interdisciplinary volume offers twenty contributions that delve deeper into some of the complex but urgent questions that this profiled world addresses to data protection and privacy.

The chapters of this volume were all presented at the second Conference on Privacy and Data Protection (CPDP2009) held in Brussels in January 2009 (www.cpdpconferences.org). The yearly CPDP conferences aim to become Europe's most important meeting where academics, practitioners, policy-makers and activists come together to exchange ideas and discuss emerging issues in information technology, privacy and data protection and law. This volume reflects the richness of the conference, containing chapters by leading lawyers, policymakers, computer expets, technology assessment practitioners and social scientists. The chapters cover generic themes such as the evolution of a new generation of data protection laws and the constitutionalisation of data protection and more specific issues like security breaches, unsolicited adjustments, social networks, surveillance and electronic voting.

This book not only offers a very close and timely look on the state of data protection and privacy in our profiled world, but it also explores and invents ways to make sure this world remains a world we want to live in.


A Theory Of Computer Semiotics

RRP $40.95

Semiotics is the science of signs: graphical, such as pictures; verbal (writing or sounds); or others such as body gestures and clothes. Computer semiotics studies the special nature of computer-based signs and how they function in use. This 1991 book is based on ten years of empirical research on computer usage in work situations and contains material from a course taught by the author. It introduces basic traditional semiotic concepts and adapts them so that they become useful for analysing and designing computer systems in their symbolic context of work. It presents a novel approach to the subject, rich in examples, in that it is both theoretically systematic and practical. The author refers to and reinterprets techniques already used so that readers can deepen their understanding. In addition, it offers new techniques and a consistent perspective on computer systems that is particularly appropriate for new hardware and software (e.g. hypermedia) whose main functions are presentation and communication. This is a highly important work whose influence will be wide and longlasting.


International Trademark Protection

RRP $344.99

It is an unquestioned assumption of trade mark law that trade marks are territorial. But is territoriality relevant in a global marketplace? If trade marks are not dependent upon territoriality what are the alternative models for their protection? Professor Dinwoodie considers these important issues in this thought-provoking scholarly treatment of the concept and relevance of territoriality in modern trade mark law.

Professor Dinwoodie provides numerous key insights in this books. First, he highlights three alternative models that might facilitate the move to international protection: (a) protection through international institutions, (b) protection through evolution of national doctrine, and (c) protection through regional unitary rights.

Second, by focusing on the surprising evolutions in national regimes, the resistance of European Union trade mark law to embrace fully the logic of the Community Trade Mark, and the weaknesses of the explicitly international system, Professor Dinwoodie identifies the key variables that will determine the ability of trade mark law to reflect a new post-national era.

Third, by comparing and critiquing the different models, Professor Dinwoodie lays bare the policy choices and political dilemmas that underlie what is thought to be a relatively technical area of law, and advances a prescription for reconciling global markets with local values, cultures and institutions.

Finally, Professor Dinwoodie draws these insights together to illuminate a number of characteristics of trade mark law: its role in industrial and economic policy developments; the extent of its subservience to political rather than commercial forces; the relationship between protecting goodwill and registration systems; the complexity of the values pursued by trademark protection; and, perhaps most fundamentally, why territoriality operates differently in trade mark law than in other intellectual property regimes.



Search

Zone Labs Articles

Spyware Computer Security Computer Protection Software
Phishing Spam Email Virus Antivirus
Email Protection Spam Protection Virus Protection Reduce Spam

Zone Labs Books

Spyware Computer Security Computer Protection Software
Phishing Spam Email Virus Antivirus
Email Protection Spam Protection Virus Protection Reduce Spam

Zone Labs