Beställningsvara. Skickas inom 7-10 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
By the year 2000, a balance was sought between security requirements and a respect for privacy, as well as for individual and collective freedoms. As we progress further into the 21st century, however, security is taking precedence within an increasingly controlled society.This shift is due to advances in innovative technologies and the investments made by commercial companies to drive constant technological progress. Despite the implementation of the General Data Protection Regulation (GDPR) within the EU in 2018 or 2020’s California Consumer Privacy Act (CCPA), regulatory bodies do not have the ability to fully manage the consequences presented by emerging technologies. Security and Its Challenges in the 21st Century provides students and researchers with an international legal and geopolitical analysis; it is also intended for those interested in societal development, artificial intelligence, smart cities and quantum cryptology.
Claudine Guerrier has both a political and a legal background and is a professor of law at the Institut Mines-Télécom Business School in France. Keenly interested in security-related research since 2000, she believes research itself to be an indispensable part of writing.
Introduction ixChapter 1 Security: Actors and Rights 11.1 Numerous actors 11.1.1 Nation-states 11.1.2 Multinationals 31.1.3 The GAFAM 91.2 Rights and security 101.2.1 The law of armed conflict 101.2.2 Environmental law 16Chapter 2 Interceptions 252.1 International interceptions 252.1.1 Interceptions in the 20th century 252.1.2 Interceptions in the 21st century 272.2 Interceptions in France 372.2.1 The 1991 law 382.2.2 The law of March 9, 2004 412.2.3 The 2015 Intelligence Act 422.2.4 Reform of the code of criminal procedure 52Chapter 3 Geolocation and Video Protection 593.1 International standards for both geolocation and video protection/video surveillance 593.1.1 Comparative legal issues in the era of geolocalization 593.1.2 Belgian legislation on geolocation 613.1.3 Video surveillance/video protection 633.2 France 673.2.1 The legislative and regulatory framework 673.2.2 The case law just before the LOPPSI 2 and the Jean-Marc Philippe establishments 693.2.3 The entry into force of the LOPPSI 2 743.2.4 Jurisprudence after LOPPSI 2 743.2.5 Video protection and terrorism 88Chapter 4 Biometrics or “the Second Circle” 894.1 Biometrics and international law 904.1.1 The United States: a historical outline 904.1.2 Standardization 934.1.3 The European Union and biometrics 944.2 France 984.2.1 Visa control 984.2.2 Passports 994.2.3 The TES database 1014.2.4 Setting up Alicem 1174.3 Facial recognition at the heart of globalization 119Chapter 5 Personal Data in the United States and Europe 1215.1 The United States and the protection of personal data in the European Union: Directive 95/46 1225.1.1 Sensitive data 1225.1.2 The right of access 1235.1.3 Security 1235.1.4 The directive of December 15, 1997, followed by the directive of July 12, 2002 and supplemented by the directive of November 25, 2009 1245.1.5 Geolocalization 1255.1.6 Cookies 1255.2 The GDPR 1265.2.1 Consent 1275.2.2 Metadata and the “Privacy” bill 1345.3 Cloud computing 1385.3.1 Definition 1385.3.2 The Safe Harbor Principles agreement 1395.3.3 Privacy Shields 1405.3.4 Two models 140Chapter 6 Cybersecurity and Privacy 1456.1 Cybersecurity itself 1466.1.1 Cybersecurity in the United States 1466.1.2 Cybersecurity in China 1476.1.3 Cybersecurity in Japan 1476.1.4 Cybersecurity and the European Union 1486.1.5 Cybersecurity in the United Kingdom 1496.1.6 Cybersecurity in France 1496.1.7 The dangers of cyber-attacks 1516.1.8 Two interesting cases 1546.2 Cybersecurity and cryptology 1586.2.1 Cryptology: the science of secrecy 1586.2.2 Risks 1616.3 PNR data 1646.3.1 Element of definition 1646.3.2 PNR data and nation-states 1666.4 Smart cities 1796.4.1 The development of standardization and certification 1816.4.2 Strategies and CSIRTs 182Chapter 7 Security Instruments in Texts Relating to Terrorism 1857.1 Security instruments 1857.1.1 The millimeter-wave scanner 1857.1.2 The body camera 1967.1.3 UAVs: a dual use – military and civilian 2027.2 Standards in relation to terrorism 2087.2.1 The law of 2014 2097.2.2 The law strengthening internal security and the fight against terrorism 219Chapter 8 Security and Democracy 2258.1 Fake news 2268.1.1 The definition 2278.1.2 Obligations 2278.2 Hate speech 2378.2.1 The report 2378.2.2 The proposed new mechanism 239Conclusion 245References 249Index 251