Welcome to the Globethics.net Library!


  • From Space to Earth: assessing the legal framework of big data in the space technologies sector

    Prof. Mario Marchetti; DI LULLO, Ludovica (2019)
    The amount of data and information collected and processed by space technologies, in particular through Earth observation programs and telecommunication services, is increasing day by day. Meanwhile, the socio-economic environment surrounding such activities is rapidly changing: data are employed for new purposes, private actors are involved in the dissemination of these information and new users get access to space data. In this context, international law is required to addressed the new challenges deriving from such changes such as the protection of data protection and the right to privacy.
 The paper aims at analysing the state of the art, focusing on the main provisions of international space law, including both hard law and soft law instruments, covering the collection and dissemination of space data, especially those coming from remote sensing satellites. Then, the focus will shift on assessing the scope of application of new legal provisions which are applicable to this matter, in particular the recent regulation on data protection adopted by the European Union (GDPR).
 In conclusion, the research aims at assessing a legal framework for the big data, which represents a necessary step to minimize the risks and maximize the benefits stemming from those technologies.
  • Big Data: Privacy and Intellectual Property in a Comparative Perspective

    Sartore, Federico (Università degli studi di Trento, 2016)
    Big Data is the fastest technology trend of the last few years. Its promises ranges from a philosophical revolution to a massive boost to business and innovation.
 These great expectations come along with risks and fears about the dissolution of the traditional categories of privacy and anti-competitive effects on business. In particular, the dark side of Big Data concerns the incremental adverse effect on privacy, the notorious predictive analysis and its role as an effective barrier for the market. The first stage of the legal analysis consists in an operative definition of Big Data, useful to build up a common background for further legal speculations. Data deluge, the exponential growth of data produced on a daily basis in every field of knowledge, is considered the base for the existence of a Big Data world. As a result, the practical applications of the data analysis involve healthcare, smart grids, mobile devices, traffic management, retail and payments. Moreover, the role played by open data initiatives around the world may strongly synergize with Big Data. The main issues identified are studied through a comparative analysis of three different legal systems: US, Canada and EU.
 Notably, the origins of privacy in the US are considered to sketch the line toward the US policy is moving. On the other hand, the current draft of the General Data Protection Regulation on EU level is completely changing the landscape of data protection. Finally, the European influence is clearly perceivable on the Canadian legislation. Although the level of protection granted slightly differ, it is still possible to identify the common consequences of the rise of Big Data on the legal categories. In particular, the fall and redefinition of the concept of PII, the question whether the binomial anonymization/re-identification may still exist, data minimization and individual control. The attempt of this paper is to provide a multi-layered solution given to the so-called Big Data conundrum. Consequently, the single layers are represented by: proactive privacy protection methods, self regulation and transparency, a model of due process applicable to data processing. The second part of this paper is dedicated to answer a challenging question: whether or not IP traditional categories are suited to work with Big Data practices. This section of the work focuses on the different practices used in the market before summing up the common traits. In this way, pros and cons of the application of the traditional IP legal constructs are considered having regard of a general category of Big Data practice. Eventually, the lack in the current legal landscape of an IP construct able to meet the needs of the industry suggests to imagine the main characteristics of a new dataright.
  • Regulation of Big Data: perspectives on strategy, policy, law and privacy

    Casanovas, Pompeu; de Koker, Louis; Mendelson, Danuta; Watts, David (Springer Verlag, 2017-05-08)
  • An Island Apart? Risks and Prices in the Australian Cryptomarket Drug Trade

    Cunliffe, Jack; Martin, James; Décary-Hétu, David; Aldridge, Judith (2017-12)
  • Cybersecurity: Authoritative Reports and Resources

    Cybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated by individuals, as well as countries. Targets have included government networks, military defenses, companies, or political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which also makes a response problematic. Congress has been actively involved in cybersecurity issues, holding hearings every year since 2001. There is no shortage of data on this topic: government agencies, academic institutions, think tanks, security consultants, and trade associations have issued hundreds of reports, studies, analyses, and statistics. This report provides links to selected authoritative resources related to cybersecurity issues. This report includes information on Legislation Executive Orders and Presidential Directives Data and Statistics Cybersecurity Glossaries CRS Reports by Topic Government Accountability Office (GAO) reports White House/Office of Management and Budget reports Military/DOD Cloud Computing Critical Infrastructure National Strategy for Trusted Identities in Cyberspace (NSTIC) Cybercrime/Cyberwar International Education/Training/Workforce Research and Development (R&amp;D) Related Resources: Other Websites

View more