Law for computer scientists and other folk:
This is the first textbook introducing law to computer scientists. The book covers privacy and data protection law, cybercrime, intellectual property, private law liability and legal personhood and legal agency, next to introductions to private law, public law, criminal law and international and sup...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford
Oxford University Press
2020
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | This is the first textbook introducing law to computer scientists. The book covers privacy and data protection law, cybercrime, intellectual property, private law liability and legal personhood and legal agency, next to introductions to private law, public law, criminal law and international and supranational law. It provides an overview of the practical implications of law, their theoretical underpinnings and how they affect the study and construction of0computational architectures. In a constitutional democracy everyone is under the Rule of Law, including those who develop code and systems, and those who put applications on the market. It is pivotal that computer scientists and developers get to know what law and the Rule of Law require. Before talking about0ethics, we need to make sure that the checks and balances of law and the Rule of Law are in place and complied with. Though it is focused on European law, it also refers to US law and aims to provide insights into what makes law, law, rather than brute force or morality, demonstrating the operations of law in a way that has global relevance. This book is geared to those who have no wish to become lawyers but are nevertheless forced to consider the salience of legal rights and obligations with0regard to the construction, maintenance and protection of computational artefacts.0This is an open access title available under the terms of a CC BY-NC-ND 4.0 International licence. It is offered as a free PDF download from OUP and selected open access locations |
Beschreibung: | XXII, 318 pages Illustrationen, Diagramme |
ISBN: | 0198860870 9780198860877 9780198860884 0198860889 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046791367 | ||
003 | DE-604 | ||
005 | 20240212 | ||
007 | t| | ||
008 | 200703s2020 xx a||| |||| 00||| eng d | ||
020 | |a 0198860870 |9 0-19-886087-0 | ||
020 | |a 9780198860877 |9 978-0-19-886087-7 | ||
020 | |a 9780198860884 |9 978-0-19-886088-4 | ||
020 | |a 0198860889 |9 0-19-886088-9 | ||
035 | |a (OCoLC)1158594985 | ||
035 | |a (DE-599)BVBBV046791367 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-M382 |a DE-739 | ||
084 | |a ST 660 |0 (DE-625)143688: |2 rvk | ||
100 | 1 | |a Hildebrandt, Mireille |d 1958- |e Verfasser |0 (DE-588)1047247321 |4 aut | |
245 | 1 | 0 | |a Law for computer scientists and other folk |c Mireille Hildebrandt |
264 | 1 | |a Oxford |b Oxford University Press |c 2020 | |
300 | |a XXII, 318 pages |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 3 | |a This is the first textbook introducing law to computer scientists. The book covers privacy and data protection law, cybercrime, intellectual property, private law liability and legal personhood and legal agency, next to introductions to private law, public law, criminal law and international and supranational law. It provides an overview of the practical implications of law, their theoretical underpinnings and how they affect the study and construction of0computational architectures. In a constitutional democracy everyone is under the Rule of Law, including those who develop code and systems, and those who put applications on the market. It is pivotal that computer scientists and developers get to know what law and the Rule of Law require. Before talking about0ethics, we need to make sure that the checks and balances of law and the Rule of Law are in place and complied with. Though it is focused on European law, it also refers to US law and aims to provide insights into what makes law, law, rather than brute force or morality, demonstrating the operations of law in a way that has global relevance. This book is geared to those who have no wish to become lawyers but are nevertheless forced to consider the salience of legal rights and obligations with0regard to the construction, maintenance and protection of computational artefacts.0This is an open access title available under the terms of a CC BY-NC-ND 4.0 International licence. It is offered as a free PDF download from OUP and selected open access locations | |
650 | 0 | 7 | |a Rechtsinformatik |0 (DE-588)4048802-0 |2 gnd |9 rswk-swf |
653 | 0 | |a Computers / Law and legislation | |
653 | 0 | |a Internet / Law and legislation | |
653 | 0 | |a Computers / Law and legislation | |
653 | 0 | |a Internet / Law and legislation | |
689 | 0 | 0 | |a Rechtsinformatik |0 (DE-588)4048802-0 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032200296&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-032200296 |
Datensatz im Suchindex
_version_ | 1822792498198609920 |
---|---|
adam_text |
Table of Contents List ofAbbreviations xxi 1. Introduction: Textbook and Essay 1 Middle Ground: Architecture Law in‘Speakerspace’ Law in‘Manuscriptspace’ Law in‘Bookspace’ 1 2 3 5 1.1 1.2 1.3 1.4 1.5 Law in Cyberspace: A New'Onlife World' 1.6 Outline 1.6.1 What law does 1.6.2 Domains of cyberlaw 1.6.3 Frontiers of law in an onlife world 1.6.4 Finals 6 8 9 9 10 11 PARTI WHAT LAW DOES 2. Law, Democracy, and the Rule of Law 2.1 What is Law? 2.1.1 Sources of law 2.1.2 What law does 2.1.2.1 Legal effect 2.1.2.2 Effective and practical individual rights 2.1.3 Legal reasoning 2.2 What is Law in a Constitutional Democracy? 2.2.1 Law, morality, and politics, and the nature of legal rules 2.2.2 Legal certainty, justice, instrumentality 3. Domains of Law: Private, Public, and Criminal Law 3.1 Private, Public, and Criminal Law: Conceptual Distinctions 3.1.1 Absolute rights and relative rights 3.1.2 Private law and public law 3.1.3 Private law and criminal law 3.2 Private Law 3.2.1 Property law: transfer of movables 3.2.2 Contract law and property law: sale and transfer of real estate 3.2.3 Tort liability 3.3 Public Law and Criminal Law 3.3.1 Public law 3.3.1.1 Constitutional law 3.3.1.2 Administrative law 17 17 18 20 20 25 28 31 32 34 39 39 40 41 45 47 48 51 54 57 58 58 58
xvi Table of Contents 3.3.2 Criminallaw 3.3.2.1 Substantive criminallaw 3.3.2.2 Criminal procedure, including police investigation 4. International and Supranational Law 4.1 Jurisdiction in Western Legal Systems 4.1.1 An example 4.1.2 Nationaljurisdiction 4.2 International Law 4.2.1 Sources of internationallaw 4.2.2 Monism and dualism in international law 4.3 Supranational Law 4.3.1 Transferofsovereignty 4.3.2 Sources of EU law 4.3.3 Case law of the CJ EU 4.4 International Rule of Law 60 60 66 75 76 77 78 80 81 82 86 87 89 91 93 PART II DOMAINS OF CYBERLAW 5. Privacy and Data Protection 5.1 Human Rights Law 5.1.1 Human rights as defence rights against the modern state 5.1.2 From liberty rights to social, economic, and further rights 5.2 The Concept of Privacy 5.2.1 Taxonomies and family resemblance 5.2.2 Privacy and technology 5.3 The Right to Privacy 5.3.1 The rightto privacy: constitutional law 5.3.2 The rightto privacy: international law 5.3.3 The rightto privacy: supranational law 5.3.4 ArticlesECHR 5.3.5 CaselawArticle8ECHRregardingsurveillance 5.3.5.1 Post-crime surveillance 5.3.5.2 Pre-crime surveillance (includingsurveillance by the intelligence services) 5.4 Privacy and Data Protection 5.4.1 Defaults: an opacity right and a transparency right 5.4.2 Distinctive but overlapping rights: a Venn diagram 5.4.3 Legal remedies in case of violation 5.5 Data Protection Law 5.5.1 EU and US data protection law 5.5.2 EU data protection law 5.5.2.1 SourcesoflawregardingEUdataprotectionlaw 5.5.2.2 Material and territorial scope 5.5.2.3 Personal data and data subject 5.S.2.4 Data
controllerand data processor 99 99 100 101 102 103 108 110 111 112 113 114 117 118 121 128 129 130 131 132 134 135 136 138 139 142
Table of Contents 5.5.2.5 Legal ground for lawful processing of personal data 5.5.2.6 Principlesoflawful,fair,andtransparentprocessing 5.5.2.7 Valid consent 5.5.2.8 Special categories of data 5.5.2.Θ Data protection by design and default (DPbDD) 5.5.2.10 Data protection impact assessment 5.5.2.11 Compliance and enforcement 5.6 Privacy and Data Protection Revisited 6. Cybercrime 6.1 The Problem of Cybercrime 6.1.1 Computer crime 6.1.2 Cybercrime 6.2 Cybercrime and Public Law 6.2.1 The Cybercrime Convention 6.2.1.1 Substantive taw 6.2.1.2 Procedurallaw 6.2.1.3 Extraterritorial jurisdiction to enforce or investigate 6.2.2 Limitations on investigative powers 6.2.2.1 Proportionality test for police access to personal data 6.2.2.2 Proportionality test, balancing tests, and the image of the scale 184 6.3 The EU Cybercrime and Cybersecurity Directives 7. Copyright in Cyberspace 7.1 IP Law as Private Law 7.2 Overview of IP Rights 7.2.1 Copyright 7.2.2 Patents 7.2.3 Trademark 7.3 History, Objectives, and Scope of Copyright Protection 7.4 EU Copyright Law 7.4.1 The Copyright Directive and the Enforcement Directive 7.4.1.1 Thescopeofprotection (restrictions) and the limitations 7.4.1.2 The home copy case of the CJEU 7.4.1.3 IP enforcement against intermediaries 7.4.1.4 Injunctions to cease unlawful sharing: Sabamv. Netlog 7.4.1.5 Injunctions to cease unlawful sharing: Breinv.Ziggo 7.4.1.6 The update ofthe Copyright Directive 7.4.2 The Software Copyright Directive 7.4.2.1 Exceptionstotheexclusionarysoftwarecopyright:S4Sv. WLP 7.4.2.2 Exceptions to the exclusionary software copyright:
Microsoft 7.5 Open Source and Free Access 8. Private Law Liability for Faulty ICT 8.1 Back to Basics 8.1.1 Chapter 3: private law distinctions xvii 144 148 151 153 154 156 158 160 163 164 165 166 168 168 170 174 181 182 183 187 191 192 194 194 195 197 197 201 202 202 203 204 206 207 210 211 212 213 215 219 220 220
xviiî Table of Contents 8.1.2 Chapter4: international and supranational law 8.1.3 Chapters: data protection law 8.2 Tort Law in Europe 8.3 Third-Party Liability for Unlawful Processing and Other Cyber Torts 8.3.1 Privacy harms 8.3.1.1 Canadian‘tort of intrusion upon seclusion’ 8.3.1.2 UK’tort of misuse of private information’ 8.3.2 Cyber torts? 222 223 225 229 231 231 232 233 PART III FRONTIERS OF LAW IN AN ONLIFE WORLD 9. Legal Personhood for Al? 9.1 9.2 9.3 9.4 Legal Subjectivity Legal Agency Artificial Agents Private Law Liability 10. ‘Legal by Design’ or'Legal Protection by Design’? 10.1 Machine Learning (ML) 10.1.1 Exploratory and confirmatory ML research design 10.1.2 Implications of micro-targeting 10.1.3 Implications ofmicro-targetingforthe rule of law 10.2 Distributed LedgerTechnologies(DLTs),SmartContracts, and Smart Regulation 10.2.1 Smart contracts and smart regulation 237 240 243 245 246 251 252 253 254 256 258 260 10.2.2 The legal status of'smart contracts'under private law 263 10.2.3 The legal status of‘smart regulation’ under public law 10.3 ‘Legal by Design’ or ‘Legal Protection by Design’? 10.3.1 Legal by design (LbD) 10.3.2 Legal protection by design (LPbD) 10.3.3 LPbDintheGDPR 10.3.3.1 Data protection impact assessment 10.3.3.2 Data protection bydefaultand by design (DPbDD) 10.3.3.3 Automated decisions 266 267 267 269 270 270 272 273 PART IV FINALS 11. Closure: On Ethics, Code, and Law 11.1 Distinctions between Law, Code, and Ethics 11.1.1 Utilitarianism and methodological individualism 11.1.2 Deontological reasoning: respect for human autonomy 11.1.3
Virtueethics:perceivingthegoodanddoingwhatisright 11.1.4 Pragmatist ethics: taking into account 11.1.5 The difference that makes a difference: closure 11.2 The Conceptual Relationship between Law, Code, and Ethics 11.2.1 Justice, legal certainty, and instrumentality 11.2.2 Law, code, and the rule of law 283 284 285 288 291 293 295 297 298 299
Table of Contents 11.3 The Interaction between Law, Code, and Ethics 11.3.1 ‘By design’approaches in law and ethics 11.3.2 Fairness by design and‘fair computing’paradigms 301 302 304 306 11.3.2.1 The case of COM PAS 11.3.2.2 A computational ‘fairness by design’ approach to detain/release court decisions xix 310 11.3.2.3 An ethical ‘fairness by design’ approach to detain/release court decisions 11.3.2.4 A legal ‘fairness by design’ approach to detain/release court decisions 11.4 Closure: The Force of Technology and the Force of Law 312 314 315 |
adam_txt |
Table of Contents List ofAbbreviations xxi 1. Introduction: Textbook and Essay 1 Middle Ground: Architecture Law in‘Speakerspace’ Law in‘Manuscriptspace’ Law in‘Bookspace’ 1 2 3 5 1.1 1.2 1.3 1.4 1.5 Law in Cyberspace: A New'Onlife World' 1.6 Outline 1.6.1 What law does 1.6.2 Domains of cyberlaw 1.6.3 Frontiers of law in an onlife world 1.6.4 Finals 6 8 9 9 10 11 PARTI WHAT LAW DOES 2. Law, Democracy, and the Rule of Law 2.1 What is Law? 2.1.1 Sources of law 2.1.2 What law does 2.1.2.1 Legal effect 2.1.2.2 Effective and practical individual rights 2.1.3 Legal reasoning 2.2 What is Law in a Constitutional Democracy? 2.2.1 Law, morality, and politics, and the nature of legal rules 2.2.2 Legal certainty, justice, instrumentality 3. Domains of Law: Private, Public, and Criminal Law 3.1 Private, Public, and Criminal Law: Conceptual Distinctions 3.1.1 Absolute rights and relative rights 3.1.2 Private law and public law 3.1.3 Private law and criminal law 3.2 Private Law 3.2.1 Property law: transfer of movables 3.2.2 Contract law and property law: sale and transfer of real estate 3.2.3 Tort liability 3.3 Public Law and Criminal Law 3.3.1 Public law 3.3.1.1 Constitutional law 3.3.1.2 Administrative law 17 17 18 20 20 25 28 31 32 34 39 39 40 41 45 47 48 51 54 57 58 58 58
xvi Table of Contents 3.3.2 Criminallaw 3.3.2.1 Substantive criminallaw 3.3.2.2 Criminal procedure, including police investigation 4. International and Supranational Law 4.1 Jurisdiction in Western Legal Systems 4.1.1 An example 4.1.2 Nationaljurisdiction 4.2 International Law 4.2.1 Sources of internationallaw 4.2.2 Monism and dualism in international law 4.3 Supranational Law 4.3.1 Transferofsovereignty 4.3.2 Sources of EU law 4.3.3 Case law of the CJ EU 4.4 International Rule of Law 60 60 66 75 76 77 78 80 81 82 86 87 89 91 93 PART II DOMAINS OF CYBERLAW 5. Privacy and Data Protection 5.1 Human Rights Law 5.1.1 Human rights as defence rights against the modern state 5.1.2 From liberty rights to social, economic, and further rights 5.2 The Concept of Privacy 5.2.1 Taxonomies and family resemblance 5.2.2 Privacy and technology 5.3 The Right to Privacy 5.3.1 The rightto privacy: constitutional law 5.3.2 The rightto privacy: international law 5.3.3 The rightto privacy: supranational law 5.3.4 ArticlesECHR 5.3.5 CaselawArticle8ECHRregardingsurveillance 5.3.5.1 Post-crime surveillance 5.3.5.2 Pre-crime surveillance (includingsurveillance by the intelligence services) 5.4 Privacy and Data Protection 5.4.1 Defaults: an opacity right and a transparency right 5.4.2 Distinctive but overlapping rights: a Venn diagram 5.4.3 Legal remedies in case of violation 5.5 Data Protection Law 5.5.1 EU and US data protection law 5.5.2 EU data protection law 5.5.2.1 SourcesoflawregardingEUdataprotectionlaw 5.5.2.2 Material and territorial scope 5.5.2.3 Personal data and data subject 5.S.2.4 Data
controllerand data processor 99 99 100 101 102 103 108 110 111 112 113 114 117 118 121 128 129 130 131 132 134 135 136 138 139 142
Table of Contents 5.5.2.5 Legal ground for lawful processing of personal data 5.5.2.6 Principlesoflawful,fair,andtransparentprocessing 5.5.2.7 Valid consent 5.5.2.8 Special categories of data 5.5.2.Θ Data protection by design and default (DPbDD) 5.5.2.10 Data protection impact assessment 5.5.2.11 Compliance and enforcement 5.6 Privacy and Data Protection Revisited 6. Cybercrime 6.1 The Problem of Cybercrime 6.1.1 Computer crime 6.1.2 Cybercrime 6.2 Cybercrime and Public Law 6.2.1 The Cybercrime Convention 6.2.1.1 Substantive taw 6.2.1.2 Procedurallaw 6.2.1.3 Extraterritorial jurisdiction to enforce or investigate 6.2.2 Limitations on investigative powers 6.2.2.1 Proportionality test for police access to personal data 6.2.2.2 Proportionality test, balancing tests, and the image of the scale 184 6.3 The EU Cybercrime and Cybersecurity Directives 7. Copyright in Cyberspace 7.1 IP Law as Private Law 7.2 Overview of IP Rights 7.2.1 Copyright 7.2.2 Patents 7.2.3 Trademark 7.3 History, Objectives, and Scope of Copyright Protection 7.4 EU Copyright Law 7.4.1 The Copyright Directive and the Enforcement Directive 7.4.1.1 Thescopeofprotection (restrictions) and the limitations 7.4.1.2 The home copy case of the CJEU 7.4.1.3 IP enforcement against intermediaries 7.4.1.4 Injunctions to cease unlawful sharing: Sabamv. Netlog 7.4.1.5 Injunctions to cease unlawful sharing: Breinv.Ziggo 7.4.1.6 The update ofthe Copyright Directive 7.4.2 The Software Copyright Directive 7.4.2.1 Exceptionstotheexclusionarysoftwarecopyright:S4Sv. WLP 7.4.2.2 Exceptions to the exclusionary software copyright:
Microsoft 7.5 Open Source and Free Access 8. Private Law Liability for Faulty ICT 8.1 Back to Basics 8.1.1 Chapter 3: private law distinctions xvii 144 148 151 153 154 156 158 160 163 164 165 166 168 168 170 174 181 182 183 187 191 192 194 194 195 197 197 201 202 202 203 204 206 207 210 211 212 213 215 219 220 220
xviiî Table of Contents 8.1.2 Chapter4: international and supranational law 8.1.3 Chapters: data protection law 8.2 Tort Law in Europe 8.3 Third-Party Liability for Unlawful Processing and Other Cyber Torts 8.3.1 Privacy harms 8.3.1.1 Canadian‘tort of intrusion upon seclusion’ 8.3.1.2 UK’tort of misuse of private information’ 8.3.2 Cyber torts? 222 223 225 229 231 231 232 233 PART III FRONTIERS OF LAW IN AN ONLIFE WORLD 9. Legal Personhood for Al? 9.1 9.2 9.3 9.4 Legal Subjectivity Legal Agency Artificial Agents Private Law Liability 10. ‘Legal by Design’ or'Legal Protection by Design’? 10.1 Machine Learning (ML) 10.1.1 Exploratory and confirmatory ML research design 10.1.2 Implications of micro-targeting 10.1.3 Implications ofmicro-targetingforthe rule of law 10.2 Distributed LedgerTechnologies(DLTs),SmartContracts, and Smart Regulation 10.2.1 Smart contracts and smart regulation 237 240 243 245 246 251 252 253 254 256 258 260 10.2.2 The legal status of'smart contracts'under private law 263 10.2.3 The legal status of‘smart regulation’ under public law 10.3 ‘Legal by Design’ or ‘Legal Protection by Design’? 10.3.1 Legal by design (LbD) 10.3.2 Legal protection by design (LPbD) 10.3.3 LPbDintheGDPR 10.3.3.1 Data protection impact assessment 10.3.3.2 Data protection bydefaultand by design (DPbDD) 10.3.3.3 Automated decisions 266 267 267 269 270 270 272 273 PART IV FINALS 11. Closure: On Ethics, Code, and Law 11.1 Distinctions between Law, Code, and Ethics 11.1.1 Utilitarianism and methodological individualism 11.1.2 Deontological reasoning: respect for human autonomy 11.1.3
Virtueethics:perceivingthegoodanddoingwhatisright 11.1.4 Pragmatist ethics: taking into account 11.1.5 The difference that makes a difference: closure 11.2 The Conceptual Relationship between Law, Code, and Ethics 11.2.1 Justice, legal certainty, and instrumentality 11.2.2 Law, code, and the rule of law 283 284 285 288 291 293 295 297 298 299
Table of Contents 11.3 The Interaction between Law, Code, and Ethics 11.3.1 ‘By design’approaches in law and ethics 11.3.2 Fairness by design and‘fair computing’paradigms 301 302 304 306 11.3.2.1 The case of COM PAS 11.3.2.2 A computational ‘fairness by design’ approach to detain/release court decisions xix 310 11.3.2.3 An ethical ‘fairness by design’ approach to detain/release court decisions 11.3.2.4 A legal ‘fairness by design’ approach to detain/release court decisions 11.4 Closure: The Force of Technology and the Force of Law 312 314 315 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Hildebrandt, Mireille 1958- |
author_GND | (DE-588)1047247321 |
author_facet | Hildebrandt, Mireille 1958- |
author_role | aut |
author_sort | Hildebrandt, Mireille 1958- |
author_variant | m h mh |
building | Verbundindex |
bvnumber | BV046791367 |
classification_rvk | ST 660 |
ctrlnum | (OCoLC)1158594985 (DE-599)BVBBV046791367 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV046791367</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240212</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">200703s2020 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0198860870</subfield><subfield code="9">0-19-886087-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780198860877</subfield><subfield code="9">978-0-19-886087-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780198860884</subfield><subfield code="9">978-0-19-886088-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0198860889</subfield><subfield code="9">0-19-886088-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1158594985</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046791367</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-M382</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 660</subfield><subfield code="0">(DE-625)143688:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hildebrandt, Mireille</subfield><subfield code="d">1958-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1047247321</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Law for computer scientists and other folk</subfield><subfield code="c">Mireille Hildebrandt</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 318 pages</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">This is the first textbook introducing law to computer scientists. The book covers privacy and data protection law, cybercrime, intellectual property, private law liability and legal personhood and legal agency, next to introductions to private law, public law, criminal law and international and supranational law. It provides an overview of the practical implications of law, their theoretical underpinnings and how they affect the study and construction of0computational architectures. In a constitutional democracy everyone is under the Rule of Law, including those who develop code and systems, and those who put applications on the market. It is pivotal that computer scientists and developers get to know what law and the Rule of Law require. Before talking about0ethics, we need to make sure that the checks and balances of law and the Rule of Law are in place and complied with. Though it is focused on European law, it also refers to US law and aims to provide insights into what makes law, law, rather than brute force or morality, demonstrating the operations of law in a way that has global relevance. This book is geared to those who have no wish to become lawyers but are nevertheless forced to consider the salience of legal rights and obligations with0regard to the construction, maintenance and protection of computational artefacts.0This is an open access title available under the terms of a CC BY-NC-ND 4.0 International licence. It is offered as a free PDF download from OUP and selected open access locations</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechtsinformatik</subfield><subfield code="0">(DE-588)4048802-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computers / Law and legislation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet / Law and legislation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computers / Law and legislation</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet / Law and legislation</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechtsinformatik</subfield><subfield code="0">(DE-588)4048802-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032200296&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032200296</subfield></datafield></record></collection> |
id | DE-604.BV046791367 |
illustrated | Illustrated |
index_date | 2024-07-03T14:53:10Z |
indexdate | 2025-01-31T19:06:29Z |
institution | BVB |
isbn | 0198860870 9780198860877 9780198860884 0198860889 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032200296 |
oclc_num | 1158594985 |
open_access_boolean | |
owner | DE-M382 DE-739 |
owner_facet | DE-M382 DE-739 |
physical | XXII, 318 pages Illustrationen, Diagramme |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Oxford University Press |
record_format | marc |
spelling | Hildebrandt, Mireille 1958- Verfasser (DE-588)1047247321 aut Law for computer scientists and other folk Mireille Hildebrandt Oxford Oxford University Press 2020 XXII, 318 pages Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier This is the first textbook introducing law to computer scientists. The book covers privacy and data protection law, cybercrime, intellectual property, private law liability and legal personhood and legal agency, next to introductions to private law, public law, criminal law and international and supranational law. It provides an overview of the practical implications of law, their theoretical underpinnings and how they affect the study and construction of0computational architectures. In a constitutional democracy everyone is under the Rule of Law, including those who develop code and systems, and those who put applications on the market. It is pivotal that computer scientists and developers get to know what law and the Rule of Law require. Before talking about0ethics, we need to make sure that the checks and balances of law and the Rule of Law are in place and complied with. Though it is focused on European law, it also refers to US law and aims to provide insights into what makes law, law, rather than brute force or morality, demonstrating the operations of law in a way that has global relevance. This book is geared to those who have no wish to become lawyers but are nevertheless forced to consider the salience of legal rights and obligations with0regard to the construction, maintenance and protection of computational artefacts.0This is an open access title available under the terms of a CC BY-NC-ND 4.0 International licence. It is offered as a free PDF download from OUP and selected open access locations Rechtsinformatik (DE-588)4048802-0 gnd rswk-swf Computers / Law and legislation Internet / Law and legislation Rechtsinformatik (DE-588)4048802-0 s DE-604 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032200296&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Hildebrandt, Mireille 1958- Law for computer scientists and other folk Rechtsinformatik (DE-588)4048802-0 gnd |
subject_GND | (DE-588)4048802-0 |
title | Law for computer scientists and other folk |
title_auth | Law for computer scientists and other folk |
title_exact_search | Law for computer scientists and other folk |
title_exact_search_txtP | Law for computer scientists and other folk |
title_full | Law for computer scientists and other folk Mireille Hildebrandt |
title_fullStr | Law for computer scientists and other folk Mireille Hildebrandt |
title_full_unstemmed | Law for computer scientists and other folk Mireille Hildebrandt |
title_short | Law for computer scientists and other folk |
title_sort | law for computer scientists and other folk |
topic | Rechtsinformatik (DE-588)4048802-0 gnd |
topic_facet | Rechtsinformatik |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032200296&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT hildebrandtmireille lawforcomputerscientistsandotherfolk |