Information Technology LawPsychology Press, 2005 - 573 sider Examining the current challenges presented to the law by the rapid changes and developments taking place in the field of information technology, this new edition, written with students in mind, provides technical explanations where necessary and is supported throughout by extracts from a wide range of cases and materials. Exploring developments in the areas of criminal, tort, contract and intellectual property law, this fully updated and revised edition discuses a wide range of new issues, including:
This is an essential read for all those interested in the interface between law and technology and the effect of new technological developments on the law |
Inni boken
Resultat 1-5 av 71
Side xii
... practice Viruses and similar programs 433 447 449 REGULATION OF CONTENT ON COMPUTER NETWORKS 455 EUROPEAN AND INTERNATIONAL INITIATIVES 477 CONCLUDING REMARKS 486 9 ASPECTS OF THE PROTECTION OF INTELLECTUAL PROPERTY RIGHTS ON THE ...
... practice Viruses and similar programs 433 447 449 REGULATION OF CONTENT ON COMPUTER NETWORKS 455 EUROPEAN AND INTERNATIONAL INITIATIVES 477 CONCLUDING REMARKS 486 9 ASPECTS OF THE PROTECTION OF INTELLECTUAL PROPERTY RIGHTS ON THE ...
Side xx
Beklager, innholdet på denne siden er tilgangsbegrenset..
Beklager, innholdet på denne siden er tilgangsbegrenset..
Side xxxvii
Beklager, innholdet på denne siden er tilgangsbegrenset..
Beklager, innholdet på denne siden er tilgangsbegrenset..
Side xxxix
... Practice ) Order 2003 ( SI 2003/3175 ) Sale and Supply of Goods to Consumers Regulations 2002 ( SI 2002/3045 ) Unfair Terms in Consumer Contracts Regulations 1994 ( SI 1994/3159 ) Unfair Terms in Consumer Contracts Regulations 1999 ( SI ...
... Practice ) Order 2003 ( SI 2003/3175 ) Sale and Supply of Goods to Consumers Regulations 2002 ( SI 2002/3045 ) Unfair Terms in Consumer Contracts Regulations 1994 ( SI 1994/3159 ) Unfair Terms in Consumer Contracts Regulations 1999 ( SI ...
Side xli
Beklager, innholdet på denne siden er tilgangsbegrenset..
Beklager, innholdet på denne siden er tilgangsbegrenset..
Innhold
VIII | 5 |
IX | 21 |
X | 23 |
XI | 35 |
XII | 47 |
XIII | 51 |
XIV | 54 |
XV | 58 |
LXXIX | 227 |
LXXX | 241 |
LXXXI | 242 |
LXXXII | 243 |
LXXXIV | 251 |
LXXXV | 252 |
LXXXVIII | 263 |
LXXXIX | 266 |
XVI | 60 |
XVII | 69 |
XVIII | 75 |
XIX | 80 |
XX | 82 |
XXI | 84 |
XXII | 100 |
XXIII | 101 |
XXIV | 102 |
XXVI | 103 |
XXVII | 105 |
XXVIII | 106 |
XXIX | 107 |
XXX | 110 |
XXXI | 111 |
XXXII | 112 |
XXXIII | 113 |
XXXIV | 114 |
XXXV | 116 |
XXXVI | 118 |
XXXVII | 121 |
XXXVIII | 127 |
XXXIX | 128 |
XL | 131 |
XLI | 133 |
XLII | 137 |
XLIII | 138 |
XLIV | 139 |
XLV | 141 |
XLVI | 146 |
XLVII | 147 |
XLVIII | 149 |
XLIX | 152 |
L | 153 |
LI | 155 |
LIII | 157 |
LIV | 162 |
LV | 164 |
LVI | 166 |
LVIII | 168 |
LIX | 172 |
LXI | 178 |
LXII | 179 |
LXIV | 180 |
LXV | 182 |
LXVI | 183 |
LXVII | 184 |
LXVIII | 191 |
LXIX | 193 |
LXX | 194 |
LXXI | 195 |
LXXII | 203 |
LXXIII | 213 |
LXXV | 214 |
LXXVI | 219 |
LXXVII | 221 |
LXXVIII | 223 |
XC | 271 |
XCII | 272 |
XCIII | 273 |
XCIV | 275 |
XCV | 282 |
XCVI | 284 |
XCVIII | 285 |
XCIX | 292 |
C | 298 |
CI | 299 |
CII | 303 |
CIII | 309 |
CIV | 322 |
CV | 323 |
CVI | 325 |
CVII | 326 |
CVIII | 328 |
CIX | 331 |
CX | 332 |
CXI | 333 |
CXII | 343 |
CXIII | 347 |
CXV | 358 |
CXVII | 360 |
CXVIII | 361 |
CXIX | 362 |
CXXI | 363 |
CXXIII | 368 |
CXXIV | 373 |
CXXV | 380 |
CXXVI | 391 |
CXXVII | 392 |
CXXVIII | 393 |
CXXIX | 395 |
CXXX | 419 |
CXXXI | 421 |
CXXXII | 433 |
CXXXIII | 447 |
CXXXIV | 449 |
CXXXV | 455 |
CXXXVI | 477 |
CXXXVII | 486 |
CXXXVIII | 489 |
CXXXIX | 494 |
CXL | 499 |
CXLI | 504 |
CXLII | 511 |
CXLIII | 524 |
CXLIV | 526 |
CXLV | 528 |
CXLVI | 530 |
CXLVII | 538 |
CXLVIII | 542 |
543 | |
559 | |
Vanlige uttrykk og setninger
acceptance action activities agreement apply approach argument Article breach buyer child pornography clause commercial computer networks computer program computer software concerned considered consumer contract copying copyright protection Council of Europe Court of Appeal criminal cybersquatting damage data controller data protection Data Protection Registrar data subject database decision defect defendant Directive discussion disk domain name e-commerce effect Electronic Commerce exemption expression fact function further identified implied term individual information society infringement intellectual property intended Internet issue jurisdiction legislation liability licence literary material means Member Napster offence operation particular parties patent personal data Playboy Enterprises principles problems processing purpose question reasonable referred regulation relation relevant restrict rules seller service provider software patents source code specific standard substantial supplier supply technical trademark UDRP
Referanser til denne boken
Business, Information Technology and Society Stephen D. Tansey Ingen forhåndsvisning tilgjengelig - 2003 |