E-Book, Englisch, Band 15, 140 Seiten, Format (B × H): 153 mm x 227 mm
Reihe: Robotik und Recht
Hilgendorf / Feldle Digitization and the Law
1. Auflage 2018
ISBN: 978-3-8452-8930-4
Verlag: Nomos
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, Band 15, 140 Seiten, Format (B × H): 153 mm x 227 mm
Reihe: Robotik und Recht
ISBN: 978-3-8452-8930-4
Verlag: Nomos
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
New technologies represent new challenges for the law. The Internet is no longer uncharted territory, but rather sensitive issues such as cyber-attacks, privacy, the protection of minors or even cloud computing are still hotly debated subjects. Technization and digitization go well beyond the World Wide Web. Automated road transport is an equally future-oriented topic, the development of which must be accompanied by changes in the law. This volume contains contributions on research being conducted in Germany, the USA, Canada and Greece.
The series Robotics and Law, edited by Prof. Eric Hilgendorf and Prof. Susanne Beck, deals with legal questions relevant to practical work which are related to robotics, technization and digitization.
With contributions by
Prof. Eric Hilgendorf, Prof. Susanne Beck, Prof. Mark Kende, Prof. Ari Ezra Waldman, Prof. Maria Kaiafa-Gbandi, Prof. Sara Sun Beale and Peter Berris, Prof. Frank Peter Schuster
Autoren/Hrsg.
Fachgebiete
- Rechtswissenschaften Öffentliches Recht Umweltrecht Umweltrecht allg., Technikrecht, Immissionsschutzrecht
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Rechtliche Aspekte der EDV
- Technische Wissenschaften Elektronik | Nachrichtentechnik Elektronik Robotik
- Rechtswissenschaften Wirtschaftsrecht Medienrecht Telekommunikationsrecht, IT-Recht, Internetrecht
Weitere Infos & Material
1;Cover;1
2; Introduction: Digitization and the Law – a European Perspective;9
2.1; I. New Technologies and their Convergence;9
2.2; II. The Digital Revolution and the Law;10
2.2.1; (1) New Tools and Methodologies in the Law;10
2.2.2; (2) Application of the Law: Can it Accommodate the Change?;11
2.2.3; (3) Legal Policy;12
2.2.4; (4) From Programming to the Algorithmization of the Law;13
2.2.5; (5) New Ways of Disseminating and Consuming Legal Content;15
2.2.6; (6) The Consequences of Digitization for the Perception, Acceptance and Functioning of the Law;17
2.2.7; (7) Societal and Political Consequences;18
2.3; III. Summary and Outlook;19
3; Hacking the Internet of Things: Vulnerabilities, Dangers, and Legal Responses;21
3.1; Introduction;21
3.2; I. Threats and Vulnerabilities;22
3.2.1; A. How the IoT has been hacked;22
3.2.2; B. Other ways the IoT could be hacked;25
3.3; II. Why is the IoT so insecure and vulnerable to hacking?;26
3.4; III. The Internet of Things and the Current Legal Regime;28
3.4.1; A. Scenario one: hacking with the intention of controlling an object;28
3.4.1.1; 1. The Computer Fraud and Abuse Act;29
3.4.1.2; 2. Other laws;33
3.4.2; B. Scenario two: botnets;34
3.5; IV. Improving the Security of the IoT;35
3.5.1; A. The Standards Approach;36
3.5.2; B. Agency Regulation;37
3.5.3; C. Legalizing Strikebacks;39
3.6; V. Conclusion;40
4; Robotics and Criminal Law. Negligence, Diffusion of Liability and Electronic Personhood;41
4.1; 1. The Current Development of Robotics from a Legal Perspective;42
4.2; 2. Legal Questions – Overview;43
4.2.1; 2.1. Public Law: Controlling the Risks;44
4.2.2; 2.2. Civil Law: Liability for Damages;45
4.2.3; 2.3. Criminal Law: Responsibility for the Robot`s Action?;46
4.3; 3. Focus: Robotics and Criminal Law;46
4.4; 4. Responsibility – Challenged by Robotics?;50
4.5; 5. Potential Legal Solutions and Their Consequences for Concepts;53
4.6; 6. Conclusion: What are we discussing?;54
5; The dilemma of autonomous driving: Reflections on the moral and legal treatment of automatic collision avoidance systems;57
5.1; Introduction;57
5.2; I. Automated driving and the law;58
5.3; II. Ethical and legal guidelines as well as a proposed solution;63
5.3.1; 1. “Setting off” human lives vs. a humane orientation in the law;63
5.3.2; 2. A proposed solution: Degrees of wrong;65
5.3.3; 3. Use of deadly force in especially grave emergency situations involving or not involving risk communities;70
5.4; III. The quantification of human life in current applicable law;72
5.5; IV. Special problems;74
5.5.1; 1. The probability of being injured;75
5.5.2; 2. Self-protection measures;75
5.5.3; 3. Actions and omissions;76
5.6; V. The liability of manufacturers of collision avoidance systems;78
5.6.1; 1. Exclusion of liability using the concept of “accepted risk”;78
5.6.2; 2. Counterarguments;82
5.6.3; 3. Passenger protection;84
5.6.4; 4. What risks should be considered “accepted” risks?;85
5.7; VI. Closing remarks;87
6; Criminalizing attacks against information systems in the EU and the impact of the European legal instruments on the Greek legal order;91
6.1; 1. Introduction;91
6.2; 2. The European and international institutional framework concerning attacks against information systems;93
6.2.1; 2.1. A comparative survey of a complex framework;93
6.2.2; 2.2. The reasons for the E.U. directive and the core questions arising in a comparative context;95
6.2.3; 2.3. A comparative survey of the criminal law rules on attacks against information systems on a European and international level;97
6.2.3.1; 2.3.1. An initial approach;97
6.2.3.2; 2.3.2. Proscribed types of conduct;98
6.2.3.3; 2.3.3. Criminal sanctions;102
6.2.3.4; 2.3.4. Assessing the E.U. policy on criminalizing attacks against information systems in a comparative context;103
6.3; 3. The EU directive on attacks against information systems and the Greek legal order: points of convergence and some pertinent problems;105
6.4; 4. Instead of a conclusion;108
7; The U.S. Supreme Court’s First Amendment refusal to protect children regarding sexually explicit speech on the Internet;111
7.1; 1. Intoduction;111
7.2; 2. Background;112
7.3; 3. Reno v. ACLU;113
7.4; 4. Ashcroft v. ACLU II;117
7.5; 5. Ashcroft v. Free Speech Coalition;119
7.6; 6. Recent Developments;121
7.6.1; a. Elonis v. United States;122
7.6.2; b. Packingham v. North Carolina;124
7.7; 7. Conclusion;126
8; Trust: Privacy in the Digital Age;127
8.1; Introduction;127
8.2; I. A New Way of Looking at Privacy;129
8.3; II. Applying Privacy-As-Trust: A Case Study;132
8.3.1; A. The Current Approach: Notice and Choice;133
8.3.2; B. A New Approach: Trust;134
8.4; Conclusion;138