BNA's Electronic Information Policy & Law Report

BNA's Electronic Information Policy & Law Report PDF Author:
Publisher:
ISBN:
Category : Communication policy
Languages : en
Pages : 964

Get Book Here

Book Description

BNA's Electronic Information Policy & Law Report

BNA's Electronic Information Policy & Law Report PDF Author:
Publisher:
ISBN:
Category : Communication policy
Languages : en
Pages : 964

Get Book Here

Book Description


BNAs Bankruptcy Law Reporter, 9, 1997

BNAs Bankruptcy Law Reporter, 9, 1997 PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 1606

Get Book Here

Book Description


Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities

Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309138507
Category : Technology & Engineering
Languages : en
Pages : 391

Get Book Here

Book Description
The United States is increasingly dependent on information and information technology for both civilian and military purposes, as are many other nations. Although there is a substantial literature on the potential impact of a cyberattack on the societal infrastructure of the United States, little has been written about the use of cyberattack as an instrument of U.S. policy. Cyberattacks-actions intended to damage adversary computer systems or networks-can be used for a variety of military purposes. But they also have application to certain missions of the intelligence community, such as covert action. They may be useful for certain domestic law enforcement purposes, and some analysts believe that they might be useful for certain private sector entities who are themselves under cyberattack. This report considers all of these applications from an integrated perspective that ties together technology, policy, legal, and ethical issues. Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.

Monthly Catalogue, United States Public Documents

Monthly Catalogue, United States Public Documents PDF Author:
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 1592

Get Book Here

Book Description


Monthly Catalog of United States Government Publications

Monthly Catalog of United States Government Publications PDF Author:
Publisher:
ISBN:
Category : Government publications
Languages : en
Pages : 1168

Get Book Here

Book Description


Scientific and Technical Aerospace Reports

Scientific and Technical Aerospace Reports PDF Author:
Publisher:
ISBN:
Category : Aeronautics
Languages : en
Pages : 308

Get Book Here

Book Description


American Association of Law Libraries Newsletter

American Association of Law Libraries Newsletter PDF Author:
Publisher:
ISBN:
Category : Law libraries
Languages : en
Pages : 526

Get Book Here

Book Description


Federal Securities Law Reporter

Federal Securities Law Reporter PDF Author:
Publisher:
ISBN:
Category : Mutual funds
Languages : en
Pages : 2726

Get Book Here

Book Description


American Law Reports Annotated

American Law Reports Annotated PDF Author:
Publisher:
ISBN:
Category : Law reports, digests, etc
Languages : en
Pages : 1642

Get Book Here

Book Description


Regulating Gig Work

Regulating Gig Work PDF Author: Joellen Riley Munton
Publisher: Taylor & Francis
ISBN: 1003827802
Category : Business & Economics
Languages : en
Pages : 83

Get Book Here

Book Description
Digital revolution demands new approaches to regulating work. The ‘Uberisation’ of work is not, in reality, a new phenomenon. It reintroduces the practices of ‘on-demand’ engagement of labour, common prior to the development of continuing employment. What is new, however, is the capacity of digital technology to engage labour in ways that avoid characterisation as employment according to the legal tests developed in the 20th century. This book tackles the challenge of ensuring that the emerging tribes of ‘gig’ workers in labour markets across the globe are afforded decent standards of work. This book discusses how to provide decent conditions and safe working standards for on-demand workers engaged through digital platforms. It interrogates the rise of gig work, and the legal strategies that might be engaged to deal with the risk that on-demand work will fall and remain outside of employment protections. It draws on observations of practices across the globe but focusses particularly on regulatory solutions developed in Australia. The book will be a useful reference to policy making and legal reforms to address vulnerabilities of gig workers.