Hilgendorf / Feldle | Digitization and the Law | E-Book | sack.de
E-Book

E-Book, Englisch, Band 15, 140 Seiten, Format (B × H): 153 mm x 227 mm

Reihe: Robotik und Recht

Hilgendorf / Feldle Digitization and the Law


1. Auflage 2018
ISBN: 978-3-8452-8930-4
Verlag: Nomos
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, Band 15, 140 Seiten, Format (B × H): 153 mm x 227 mm

Reihe: Robotik und Recht

ISBN: 978-3-8452-8930-4
Verlag: Nomos
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



New technologies represent new challenges for the law. The Internet is no longer uncharted territory, but rather sensitive issues such as cyber-attacks, privacy, the protection of minors or even cloud computing are still hotly debated subjects. Technization and digitization go well beyond the World Wide Web. Automated road transport is an equally future-oriented topic, the development of which must be accompanied by changes in the law. This volume contains contributions on research being conducted in Germany, the USA, Canada and Greece.

The series Robotics and Law, edited by Prof. Eric Hilgendorf and Prof. Susanne Beck, deals with legal questions relevant to practical work which are related to robotics, technization and digitization.
With contributions by
Prof. Eric Hilgendorf, Prof. Susanne Beck, Prof. Mark Kende, Prof. Ari Ezra Waldman, Prof. Maria Kaiafa-Gbandi, Prof. Sara Sun Beale and Peter Berris, Prof. Frank Peter Schuster

Hilgendorf / Feldle Digitization and the Law jetzt bestellen!

Weitere Infos & Material


1;Cover;1
2; Introduction: Digitization and the Law – a European Perspective;9
2.1; I. New Technologies and their Convergence;9
2.2; II. The Digital Revolution and the Law;10
2.2.1; (1) New Tools and Methodologies in the Law;10
2.2.2; (2) Application of the Law: Can it Accommodate the Change?;11
2.2.3; (3) Legal Policy;12
2.2.4; (4) From Programming to the Algorithmization of the Law;13
2.2.5; (5) New Ways of Disseminating and Consuming Legal Content;15
2.2.6; (6) The Consequences of Digitization for the Perception, Acceptance and Functioning of the Law;17
2.2.7; (7) Societal and Political Consequences;18
2.3; III. Summary and Outlook;19
3; Hacking the Internet of Things: Vulnerabilities, Dangers, and Legal Responses;21
3.1; Introduction;21
3.2; I. Threats and Vulnerabilities;22
3.2.1; A. How the IoT has been hacked;22
3.2.2; B. Other ways the IoT could be hacked;25
3.3; II. Why is the IoT so insecure and vulnerable to hacking?;26
3.4; III. The Internet of Things and the Current Legal Regime;28
3.4.1; A. Scenario one: hacking with the intention of controlling an object;28
3.4.1.1; 1. The Computer Fraud and Abuse Act;29
3.4.1.2; 2. Other laws;33
3.4.2; B. Scenario two: botnets;34
3.5; IV. Improving the Security of the IoT;35
3.5.1; A. The Standards Approach;36
3.5.2; B. Agency Regulation;37
3.5.3; C. Legalizing Strikebacks;39
3.6; V. Conclusion;40
4; Robotics and Criminal Law. Negligence, Diffusion of Liability and Electronic Personhood;41
4.1; 1. The Current Development of Robotics from a Legal Perspective;42
4.2; 2. Legal Questions – Overview;43
4.2.1; 2.1. Public Law: Controlling the Risks;44
4.2.2; 2.2. Civil Law: Liability for Damages;45
4.2.3; 2.3. Criminal Law: Responsibility for the Robot`s Action?;46
4.3; 3. Focus: Robotics and Criminal Law;46
4.4; 4. Responsibility – Challenged by Robotics?;50
4.5; 5. Potential Legal Solutions and Their Consequences for Concepts;53
4.6; 6. Conclusion: What are we discussing?;54
5; The dilemma of autonomous driving: Reflections on the moral and legal treatment of automatic collision avoidance systems;57
5.1; Introduction;57
5.2; I. Automated driving and the law;58
5.3; II. Ethical and legal guidelines as well as a proposed solution;63
5.3.1; 1. “Setting off” human lives vs. a humane orientation in the law;63
5.3.2; 2. A proposed solution: Degrees of wrong;65
5.3.3; 3. Use of deadly force in especially grave emergency situations involving or not involving risk communities;70
5.4; III. The quantification of human life in current applicable law;72
5.5; IV. Special problems;74
5.5.1; 1. The probability of being injured;75
5.5.2; 2. Self-protection measures;75
5.5.3; 3. Actions and omissions;76
5.6; V. The liability of manufacturers of collision avoidance systems;78
5.6.1; 1. Exclusion of liability using the concept of “accepted risk”;78
5.6.2; 2. Counterarguments;82
5.6.3; 3. Passenger protection;84
5.6.4; 4. What risks should be considered “accepted” risks?;85
5.7; VI. Closing remarks;87
6; Criminalizing attacks against information systems in the EU and the impact of the European legal instruments on the Greek legal order;91
6.1; 1. Introduction;91
6.2; 2. The European and international institutional framework concerning attacks against information systems;93
6.2.1; 2.1. A comparative survey of a complex framework;93
6.2.2; 2.2. The reasons for the E.U. directive and the core questions arising in a comparative context;95
6.2.3; 2.3. A comparative survey of the criminal law rules on attacks against information systems on a European and international level;97
6.2.3.1; 2.3.1. An initial approach;97
6.2.3.2; 2.3.2. Proscribed types of conduct;98
6.2.3.3; 2.3.3. Criminal sanctions;102
6.2.3.4; 2.3.4. Assessing the E.U. policy on criminalizing attacks against information systems in a comparative context;103
6.3; 3. The EU directive on attacks against information systems and the Greek legal order: points of convergence and some pertinent problems;105
6.4; 4. Instead of a conclusion;108
7; The U.S. Supreme Court’s First Amendment refusal to protect children regarding sexually explicit speech on the Internet;111
7.1; 1. Intoduction;111
7.2; 2. Background;112
7.3; 3. Reno v. ACLU;113
7.4; 4. Ashcroft v. ACLU II;117
7.5; 5. Ashcroft v. Free Speech Coalition;119
7.6; 6. Recent Developments;121
7.6.1; a. Elonis v. United States;122
7.6.2; b. Packingham v. North Carolina;124
7.7; 7. Conclusion;126
8; Trust: Privacy in the Digital Age;127
8.1; Introduction;127
8.2; I. A New Way of Looking at Privacy;129
8.3; II. Applying Privacy-As-Trust: A Case Study;132
8.3.1; A. The Current Approach: Notice and Choice;133
8.3.2; B. A New Approach: Trust;134
8.4; Conclusion;138



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.