421 research outputs found

    Book review: intellectual property rights: legal and economic challenges for development edited by Mario Cimoli et al.

    Get PDF
    This volume aims to address the effects of Intellectual Property Rights on the processes of innovation and innovation diffusion with respect to developing countries. Contributions cover ethical incentives for innovation, green innovation, and growth in agriculture. Catherine Easton writes that this collection has the potential to be innovative and influential

    You will never walk again … but you will fly:human augmentation in the known world

    Get PDF
    This article explores how interactions in the known world can provide insights into the regulatory environment relating to human augmentation technology. While drawing upon wider aspects of the known world, the main focus for this debate is Brandon, Bran Stark, fourth child of Eddard and Catelyn Stark. These fictional characters are found in the fantasy world created by George R. R. Martin in his “Game of Thrones” series. As his journey develops he connects with his surroundings in a number of ways which enhance his core self and support his progress. Through placing Bran’s story within the legal environment relating to enhancement technology, observations can be made about the current regulatory framework and how it can evolve to address technological advancements

    Information systems for crisis response and management:The EU data protection regulation, privacy by design and certification

    Get PDF
    With technological development in crisis management reaching a point at which there is wide-scale aggregation of data, including social media, there is a need to focus strongly upon the position of end users in order to uphold data protection principles. Recent wide-ranging European Union legal reforms, finalized in 2016, have enshrined the concept of data protection by design and paved the way for certification schemes to validate compliance. There is a need for those involved with the practical development of information systems for crisis management to understand these new developments and determine their practical implications. This paper presents a critical analysis of the reforms, focusing on the interplay between the law and technological design and predicting their impact on crisis management system development

    Analysing the role of privacy impact assessments in technological development for crisis management

    Get PDF
    The ability to harness technology in crisis management has enabled an increase in wide-scale interagency collaboration. This development has occurred alongside a move to accumulate and analyse crowdsourced responses. Given the scale and the nature of the information accessed and collected, there is a pressing need to ensure that technology is developed in a way that protects the interests of end-users and stakeholders. Privacy impact assessments (PIAs) are increasingly used, in certain jurisdictions legally mandated, in projects to foresee risks to privacy and to plan strategies to avoid these. Once implemented, the EU's General Data Protection Regulation will, in certain circumstances, require the need for a PIA. This study focuses upon the PIA process in an EU-funded project with the aim of developing cloud-based disaster response technology. It introduces the project and then gives a background to the PIA process. Insights and observations are then made relating to how the PIA operates, with the aim of drawing conclusions that can both improve the current project and be transferable to other crisis management-focused projects

    Intellectual Property Law

    Get PDF

    The role of the privacy impact assessment in IT Innovation in Crises: An Example

    Get PDF
    ABSTRACT Privacy Impact Assessments (PIA) are increasingly used and, in certain jurisdictions, legally mandated in projects to foresee risks to privacy and to plan strategies to avoid these. Once adopted and implemented, the EU's Data Protection Regulation will, in certain circumstances require the need for a PIA. This short paper focuses upon the PIA process in an EU-funded project to develop cloud-based disaster response technology. It introduces the project and then gives a background to the PIA process. Insights and observations are then made on how the PIA operates, with the aim of drawing conclusions that can both improve the current project and be transferable to others

    The combined application of force under Article 2(4) and Article 51 of the United Nations Charter for cyber warfare : Examining and learning lessons from the Iranian cyber warfare threat to Saudi Arabi

    Get PDF
    This thesis is written by MONIRAH FAHAD ALHAMDAN on the combined application of force under Article 2(4) and Article 51 of the United Nations Charter for cyber warfare: Examining and learning lessons from the Iranian cyber warfare threat to Saudi Arabia. In the absence of formal international legal regulation on cyber warfare and cyber-attacks, countries must apply the traditional rules for determining whether an armed conflict exists (jus ad bellum) to this new type of conflict. Nonetheless, applying jus ad bellum norms to this issue is a very controversial matter. Article 2(4) of the UN Charter prohibits using force between states, whereas Article 51 makes an exception for self-defence against an armed attack. To what extent can these Articles be applied to prevent and punish the source of cyber operations? This and other questions will be discussed in this study. The International Court of Justice (ICJ) clarified the use of force in the Nicaragua case. Also, it recognised the right of self-defence in customary international law. Moreover, the present study is timely and significant because of the increased number of ‘cyber operations’ influencing other states, such as in the long-lasting regional struggle for power between Saudi Arabia and Iran. That regional struggle will provide the backdrop to this thesis, although global examples will also be examined. Also, to understand its responsibility and scope of cyber-attacks, this research will attempt to assess the lawfulness of the Security Council to authorize the use of cyber weapons as a tool to maintain peace and security in the world. This body of research will furthermore look into the jus ad bellum norms in Traditional Islamic Rules in a cyber-context. Moreover, it will help researchers do further research in applying international law norms to cyber operations. This thesis undertakes a robust doctrinal analysis of the existing exalt in this field and proposes some future developments. This thesis will not use measurements of quantity and amounts as its essential tools but instead a qualitative method

    Effects of glycerol and creatine hyperhydration on doping-relevant blood parameters

    Get PDF
    Glycerol is prohibited as an ergogenic aid by the World Anti-Doping Agency (WADA) due to the potential for its plasma expansion properties to have masking effects. However, the scientific basis of the inclusion of Gly as a “masking agent” remains inconclusive. The purpose of this study was to determine the effects of a hyperhydrating supplement containing Gly on doping-relevant blood parameters. Nine trained males ingested a hyperhydrating mixture twice per day for 7 days containing 1.0 g•kg<sup>−1</sup> body mass (BM) of Gly, 10.0 g of creatine and 75.0 g of glucose. Blood samples were collected and total hemoglobin (Hb) mass determined using the optimized carbon monoxide (CO) rebreathing method pre- and post-supplementation. BM and total body water (TBW) increased significantly following supplementation by 1.1 ± 1.2 and 1.0 ± 1.2 L (BM, P < 0.01; TBW, P < 0.01), respectively. This hyperhydration did not significantly alter plasma volume or any of the doping-relevant blood parameters (e.g., hematocrit, Hb, reticulocytes and total Hb-mass) even when Gly was clearly detectable in urine samples. In conclusion, this study shows that supplementation with hyperhydrating solution containing Gly for 7 days does not significantly alter doping-relevant blood parameters
    corecore