Automatic Digital Document Processing and Management


Book Description

This text reviews the issues involved in handling and processing digital documents. Examining the full range of a document’s lifetime, the book covers acquisition, representation, security, pre-processing, layout analysis, understanding, analysis of single components, information extraction, filing, indexing and retrieval. Features: provides a list of acronyms and a glossary of technical terms; contains appendices covering key concepts in machine learning, and providing a case study on building an intelligent system for digital document and library management; discusses issues of security, and legal aspects of digital documents; examines core issues of document image analysis, and image processing techniques of particular relevance to digitized documents; reviews the resources available for natural language processing, in addition to techniques of linguistic analysis for content handling; investigates methods for extracting and retrieving data/information from a document.




Economic and Policy Implications of Artificial Intelligence


Book Description

This book presents original research articles addressing various aspects of artificial intelligence as applied to economics, law, management and optimization. The topics discussed include economics, policies, finance, law, resource allocation strategies and information technology. Combining the input of contributing professors and researchers from Italian and international universities, the book will be of interest to students, researchers and practitioners, as well as members of the general public interested in the economic and policy implications of artificial intelligence.




Data Protection in the Internet


Book Description

This book identifies and explains the different national approaches to data protection – the legal regulation of the collection, storage, transmission and use of information concerning identified or identifiable individuals – and determines the extent to which they could be harmonised in the foreseeable future. In recent years, data protection has become a major concern in many countries, as well as at supranational and international levels. In fact, the emergence of computing technologies that allow lower-cost processing of increasing amounts of information, associated with the advent and exponential use of the Internet and other communication networks and the widespread liberalization of the trans-border flow of information have enabled the large-scale collection and processing of personal data, not only for scientific or commercial uses, but also for political uses. A growing number of governmental and private organizations now possess and use data processing in order to determine, predict and influence individual behavior in all fields of human activity. This inevitably entails new risks, from the perspective of individual privacy, but also other fundamental rights, such as the right not to be discriminated against, fair competition between commercial enterprises and the proper functioning of democratic institutions. These phenomena have not been ignored from a legal point of view: at the national, supranational and international levels, an increasing number of regulatory instruments – including the European Union’s General Data Protection Regulation applicable as of 25 May 2018 – have been adopted with the purpose of preventing personal data misuse. Nevertheless, distinct national approaches still prevail in this domain, notably those that separate the comprehensive and detailed protective rules adopted in Europe since the 1995 Directive on the processing of personal data from the more fragmented and liberal attitude of American courts and legislators in this respect. In a globalized world, in which personal data can instantly circulate and be used simultaneously in communications networks that are ubiquitous by nature, these different national and regional approaches are a major source of legal conflict.




Cyber Law in Italy


Book Description

Derived from the renowned multi-volume International Encyclopaedia of Laws, this practical guide to cyber law – the law affecting information and communication technology (ICT) – in Italy covers every aspect of the subject, including intellectual property rights in the ICT sector, relevant competition rules, drafting and negotiating ICT-related contracts, electronic transactions, privacy issues, and computer crime. Lawyers who handle transnational matters will appreciate the detailed explanation of specific characteristics of practice and procedure. Following a general introduction, the book assembles its information and guidance in seven main areas of practice: the regulatory framework of the electronic communications market; software protection, legal protection of databases or chips, and other intellectual property matters; contracts with regard to software licensing and network services, with special attention to case law in this area; rules with regard to electronic evidence, regulation of electronic signatures, electronic banking, and electronic commerce; specific laws and regulations with respect to the liability of network operators and service providers and related product liability; protection of individual persons in the context of the processing of personal data and confidentiality; and the application of substantive criminal law in the area of ICT. Its succinct yet scholarly nature, as well as the practical quality of the information it provides, make this book a valuable time-saving tool for business and legal professionals alike. Lawyers representing parties with interests in Italy will welcome this very useful guide, and academics and researchers will appreciate its value in the study of comparative law in this relatively new and challenging field.




Handbook of Research on Applying Emerging Technologies Across Multiple Disciplines


Book Description

In recent decades, there has been a groundbreaking evolution in technology. Every year, technology not only advances, but it also spreads throughout industries. Many fields such as law, education, business, engineering, and more have adopted these advanced technologies into their toolset. These technologies have a vastly different effect ranging from these different industries. The Handbook of Research on Applying Emerging Technologies Across Multiple Disciplines examines how technologies impact many different areas of knowledge. This book combines a solid theoretical approach with many practical applications of new technologies within many disciplines. Covering topics such as computer-supported collaborative learning, machine learning algorithms, and blockchain, this text is essential for technologists, IT specialists, programmers, computer scientists, engineers, managers, administrators, academicians, students, policymakers, and researchers.










Copyright and Information Privacy


Book Description

Federica Giovanella examines the on-going conflict between copyright and informational privacy rights within the judicial system in this timely and intriguing book.




Intellectual Property Liability of Consumers, Facilitators and Intermediaries


Book Description

With reports from all major jurisdictions where the responsibility of facilitators and intermediaries for copyright and trade mark infringement have been litigated, this very useful book is the first comprehensive global survey of the liability regime that intermediaries may face when assisting others to directly infringe copyright and trade mark rights, or when providing others with the means to do so. It addresses such issues as the following: ISP liability; contributory and secondary liability for trade mark, copyright, and patent infringement; time- and geo-shifting devices and services; consumer identification through dynamic IP addresses; infringements committed on a “commercial scale”; liability of hosting providers; requirements for a breach of duty of care; notice to users to refrain from infringements; filters and other due diligence measures; “actual knowledge”; privacy and infringers’ personal data; file sharing services; online storage services; and liability of transporters and freighters. After a general introduction analysing relevant aspects of trade mark and copyright law, local experts provide detailed reports on positions in the EU (at the Community level), Germany, France, Italy, The United States, Japan, Korea, Australia, and New Zealand. As well as dealing with the issues, each report pays close attention to case law, legislative developments, and procedural issues of injunctive relief and damages. A final chapter covers comparative contributory patent infringement. Along with the very practical value the book offers corporate counsel charged with IP rights litigation, the authors shed light on the fundamental issue of whether attempts to broaden liability in this area are compatible with established IP principles such as territoriality, freedom to operate, and freedom of competition. As a result, the book will be welcomed by a wide spectrum of lawyers and others working in this rapidly growing field, including practitioners, policymakers, academics, and jurists.




Crime Science and Digital Forensics


Book Description

This volume is a collation of articles on counter forensics practices and digital investigative methods from the perspective of crime science. The book also shares alternative dialogue on information security techniques used to protect data from unauthorised access and manipulation. Scandals such as those at OPCW and Gatwick Airport have reinforced the importance of crime science and the need to take proactive measures rather than a wait and see approach currently used by many organisations. This book proposes a new approach in dealing with cybercrime and unsociable behavior involving remote technologies using a combination of evidence-based disciplines in order to enhance cybersecurity and authorised controls. It starts by providing a rationale for combining selected disciplines to enhance cybersecurity by discussing relevant theories and highlighting the features that strengthen privacy when mixed. The essence of a holistic model is brought about by the challenge facing digital forensic professionals within environments where tested investigative practices are unable to provide satisfactory evidence and security. This book will be of interest to students, digital forensic and cyber security practitioners and policy makers. It marks a new route in the study of combined disciplines to tackle cybercrime using digital investigations and crime science.