Vulnerable Consumers and the Law


Book Description

This book charts the difficulties encountered by vulnerable consumers in their access to justice, through the contributions of prominent authors (academic, practitioners and consultants) in the field of consumer law and access to justice. It demonstrates that despite the development of ADR, access to justice is still severely lacking for the vulnerable consumer. The book highlights that a broad understanding of access to justice, which encompasses good regulation and its public enforcement, is an essential ingredient alongside access to the mechanisms of traditional private justice (courts and ADR) to protect the vulnerable consumer. Indeed, many of the difficulties are linked to normative obstacles and lack of access to justice is primarily a vulnerability in itself that can exacerbate existing ones. In addition, because it may contribute to ‘pushing’ already vulnerable consumers into social exclusion it is not simply about economic justice but also about social justice. The book shows that lack of access to justice is not irreversible nor is it necessarily linked to consumer apathy. New technologies could provide solutions. The book concludes with a plea for developing ‘inclusive’ justice systems with more emphasis on public enforcement alongside effective courts systems to offer the vulnerable with adequate means to defend themselves. This book will be suitable for both students and practitioners, and all those with an interest in the justice system.




Consumer Vulnerability


Book Description

This book demonstrates that marketing scholarship has much to contribute to our understanding of consumer vulnerability and potential solutions. It brings to the fore ways in which so‐called vulnerable consumers navigate various marketplace and service interactions and develop specific consumer skills in order to empower themselves in such exchanges. It does so by exploring how consumer vulnerability is experienced across a range of different contexts such as poverty and disability, and the potential impact of vulnerability from childhood to old age. Other chapters extend focus from the consumer to the organisational perspective or consider more macro issues such as socio-spatial disadvantages. The fundamental aim of many of the contributors is to produce work that can benefit individual and societal well-being. They draw on various methodological approaches that generate both marketing management and policy-focused implications. A series of commentaries are also included to stimulate critical reflection and new insights into consumer vulnerability. This book was originally published as a special issue of the Journal of Marketing Management.




Consumer Policy Toolkit


Book Description

This book examines how markets have evolved and provides insights for improved consumer policy making. It explores, for the first time, how what we have learned through the study of behavioural economics is changing the way policy makers are addressing problems.




The Digital Person


Book Description

Daniel Solove presents a startling revelation of how digital dossiers are created, usually without the knowledge of the subject, & argues that we must rethink our understanding of what privacy is & what it means in the digital age before addressing the need to reform the laws that regulate it.




Digital Existence


Book Description

Digital Existence: Ontology, Ethics and Transcendence in Digital Culture advances debates on digital culture and digital religion in two complementary ways. First, by focalizing the themes ‘ontology,’ ‘ethics’ and ‘transcendence,’ it builds on insights from research on digital religion in order to reframe the field and pursue an existential media analysis that further pushes beyond the mandatory focus in mainstream media studies on the social, cultural, political and economic dimensions of digitalization. Second, the collection also implies a broadening of the scope of the debate in the field of media, religion and culture – and digital religion in particular – beyond ‘religion,’ to include the wider existential dimensions of digital media. It is the first volume on our digital existence in the budding field of existential media studies.




Cryptography's Role in Securing the Information Society


Book Description

For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptographyâ€"the representation of messages in codeâ€"and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examplesâ€"some alarming and all instructiveâ€"from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users.




Digital and Social Media Marketing


Book Description

This book examines issues and implications of digital and social media marketing for emerging markets. These markets necessitate substantial adaptations of developed theories and approaches employed in the Western world. The book investigates problems specific to emerging markets, while identifying new theoretical constructs and practical applications of digital marketing. It addresses topics such as electronic word of mouth (eWOM), demographic differences in digital marketing, mobile marketing, search engine advertising, among others. A radical increase in both temporal and geographical reach is empowering consumers to exert influence on brands, products, and services. Information and Communication Technologies (ICTs) and digital media are having a significant impact on the way people communicate and fulfil their socio-economic, emotional and material needs. These technologies are also being harnessed by businesses for various purposes including distribution and selling of goods, retailing of consumer services, customer relationship management, and influencing consumer behaviour by employing digital marketing practices. This book considers this, as it examines the practice and research related to digital and social media marketing.




OECD Recommendation of the Council on Consumer Protection in E-Commerce


Book Description

The OECD has revised its Recommendation on Consumer Protection in E-commerce in order to adapt consumer protection to the current environment and reinforce fair business practices, information disclosures, payment protections, dispute resolution and education.




Evidence-based Patient Choice


Book Description

This book's focus is on the decisions taken in consultations between health care patients and professionals. Clinician- patient partnerships in health care decisions are increasingly advocated. Evidence- based patient choice describes a model of health care in which the evidence-based approach can integrate with the promotion of consumer choice. The book examines the traditional approach and the changing experience and expectations of consumers. It describes with many clinical examples and patient narratives how to practice evidence-based patient choice, and explores the ethical, sociological and economic issues raised. It also addresses the future modifications to professional training and organisational change which are required if evidence-based patient choice is to become the norm and speculates about what is likely to be achieved in the next few years. The book provides a summary of current perspectives in this area, which will be of interest to consumers, their representative groups, and to professionals in practice and training alike. From the foreword by Richard Grol: 'An enormous challenge lies before us. In this new and challenging field Evidence-based patient choice is manna from heaven. It summarises the current state of knowledge about these new patient involvement approaches. It is by far the most comprehensive account of scientific and ethical thinking about patient choice at this moment. And, it manages to show us the way to a potential future: health care provision where patients and professionals operate as real partners with shared goals...'




Emerging Cyber Threats and Cognitive Vulnerabilities


Book Description

Emerging Cyber Threats and Cognitive Vulnerabilities identifies the critical role human behavior plays in cybersecurity and provides insights into how human decision-making can help address rising volumes of cyberthreats. The book examines the role of psychology in cybersecurity by addressing each actor involved in the process: hackers, targets, cybersecurity practitioners and the wider social context in which these groups operate. It applies psychological factors such as motivations, group processes and decision-making heuristics that may lead individuals to underestimate risk. The goal of this understanding is to more quickly identify threat and create early education and prevention strategies. This book covers a variety of topics and addresses different challenges in response to changes in the ways in to study various areas of decision-making, behavior, artificial intelligence, and human interaction in relation to cybersecurity. - Explains psychological factors inherent in machine learning and artificial intelligence - Discusses the social psychology of online radicalism and terrorist recruitment - Examines the motivation and decision-making of hackers and "hacktivists" - Investigates the use of personality psychology to extract secure information from individuals