Standaard Boekhandel gebruikt cookies en gelijkaardige technologieën om de website goed te laten werken en je een betere surfervaring te bezorgen.
Hieronder kan je kiezen welke cookies je wilt inschakelen:
Technische en functionele cookies
Deze cookies zijn essentieel om de website goed te laten functioneren, en laten je toe om bijvoorbeeld in te loggen. Je kan deze cookies niet uitschakelen.
Analytische cookies
Deze cookies verzamelen anonieme informatie over het gebruik van onze website. Op die manier kunnen we de website beter afstemmen op de behoeften van de gebruikers.
Marketingcookies
Deze cookies delen je gedrag op onze website met externe partijen, zodat je op externe platformen relevantere advertenties van Standaard Boekhandel te zien krijgt.
Je kan maximaal 250 producten tegelijk aan je winkelmandje toevoegen. Verwijdere enkele producten uit je winkelmandje, of splits je bestelling op in meerdere bestellingen.
This book deals with questions of democracy and governance relating to new technologies. The deployment and application of new technologies is often a...Lees meer
Human information and communication technology (ICT) implants have developed for many years in a medical context. Such applications have become increa...Lees meer
This open access book focuses on the impact of Artificial Intelligence (AI) on individuals and society from a legal perspective, providing a comprehen...Lees meer
This book provides a snapshot of privacy laws and practices from a varied set of jurisdictions in order to offer guidance on national and internationa...Lees meer
This open access book focuses on the impact of Artificial Intelligence (AI) on individuals and society from a legal perspective, providing a comprehen...Lees meer
The book presents timely and needed contributions on privacy and data protection seals as seen from general, legal, policy, economic, technological, a...Lees meer
Topical issue as Google is used by millions of people every day Analyzes whether accusations against Google are well-founded Explores if existing lega...Lees meer
New technologies affect the legal system, but do they and should they also affect constitutional rights? These are questions that every country has to...Lees meer
This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. It considers the right to data...Lees meer
In this book, the protection of personal data is compared for eight EU member states, namely France, Germany, the United Kingdom, Ireland, Romania, It...Lees meer
Topical issue as Google is used by millions of people every day Analyzes whether accusations against Google are well-founded Explores if existing lega...Lees meer
This book presents an evaluation of recent legislative initiatives against unsolicited commercial e-mail (spam) in the European Union. The authors pro...Lees meer
Chapter 1 INTRODUCTION 1. 1 Research Objective 1 The modern State is unlikely to be the end configuration of organized political life. Throughout hist...Lees meer
Human information and communication technology (ICT) implants have developed for many years in a medical context. Such applications have become increa...Lees meer
Given the popularity of drones and the fact that they are easy and cheap to buy, it is generally expected that the ubiquity of drones will significant...Lees meer
This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. It considers the right to data...Lees meer
INTRODUCTION George Bernard Shaw wrote - 'when a stupid man is doing something he is ashamed 1 of, he always declares that it is his duty. ' Years ear...Lees meer
The collected essays in this book concern the intriguing matter of the interaction between law and technology and the normative role of information te...Lees meer
'Is private regulation of the Internet over? Have states taken over?' This book examines the function of self-regulation in cyberspace. It argues that...Lees meer
How does the 'on-line' world relate to the 'off-line' world? Is it different, separate, or even unique compared to the off-line world, or just a part ...Lees meer
Fighting the War on File Sharing aims at a multi-faceted understanding of why peer-to-peer services currently fail to gain their full potential in our...Lees meer
Interdisciplinary approach of the topic of identity theft Gives an insight how identity theft occurs and how perpetrators of the crime manage to take ...Lees meer
This book centres on Webcam Child Sex Tourism and the Sweetie Project initiated by the children's rights organization Terre des Hommes in 2013 in resp...Lees meer
Customary Law of the Internet is the first book that deals comprehensively with the emergence of a new kind of law on the Internet that could be utili...Lees meer