Note to Reader |
|
ix | |
|
Foreword |
|
xi | |
|
Introduction |
|
xv | |
|
|
Part 1 Social Issues: Textbook Cases |
|
|
1 | (94) |
|
|
3 | (2) |
|
|
Chapter 1 From Connected Objects to Robots |
|
|
5 | (22) |
|
|
|
7 | (1) |
|
Reminders on data protection and freedom |
|
|
8 | (3) |
|
|
11 | (5) |
|
|
16 | (6) |
|
Toward a European status for robots? |
|
|
22 | (3) |
|
|
25 | (2) |
|
Chapter 2 A Textbook Case: Regulating Algorithms |
|
|
27 | (20) |
|
|
|
|
Typology of risks and applications |
|
|
30 | (3) |
|
Market arrangement and public mechanisms |
|
|
33 | (1) |
|
Various modes of governance |
|
|
34 | (1) |
|
Solutions offered by services |
|
|
35 | (7) |
|
Measures adapted to the risks |
|
|
42 | (1) |
|
Linking governance and innovation? |
|
|
43 | (1) |
|
|
43 | (4) |
|
Chapter 3 Digital Health: Foresight for French-speaking Switzerland |
|
|
47 | (18) |
|
|
|
Health in the Homo Numericus era |
|
|
49 | (2) |
|
Back to the foresight method |
|
|
51 | (2) |
|
What is the projected future by 2024? |
|
|
53 | (1) |
|
Megatrends, points of inflection and weak signals |
|
|
54 | (3) |
|
|
57 | (3) |
|
|
60 | (1) |
|
|
61 | (1) |
|
|
62 | (3) |
|
Chapter 4 From the Eurodollar to Cybercurrencies: Nature and Scope of Monetary Disruption |
|
|
65 | (30) |
|
|
|
|
Has disruption gotten out of control since 2009? |
|
|
67 | (5) |
|
|
72 | (5) |
|
Renewal of scriptural money |
|
|
77 | (2) |
|
|
79 | (2) |
|
Appendix A F.A. Hayek's thought experiment: denationalizing currency? |
|
|
81 | (6) |
|
Appendix B Are central banks overwhelmed? |
|
|
87 | (3) |
|
Appendix C How does the global derivatives market work? |
|
|
90 | (2) |
|
|
92 | (3) |
|
Part 2 Political Issues: Evolution of Failure? |
|
|
95 | (106) |
|
|
97 | (2) |
|
|
Chapter 5 Variations on Network Neutrality |
|
|
99 | (18) |
|
|
Net neutrality: a polysemous notion |
|
|
103 | (2) |
|
Ensuring network rate neutrality |
|
|
105 | (4) |
|
Single market and European network neutrality |
|
|
109 | (2) |
|
|
111 | (5) |
|
|
116 | (1) |
|
Chapter 6 State Surveillance: How Much is Too Much? |
|
|
117 | (30) |
|
|
Digital surveillance update |
|
|
122 | (4) |
|
The French, in the wake of America? |
|
|
126 | (3) |
|
Risks and scope of expanded surveillance |
|
|
129 | (3) |
|
Does the rule of law apply to states? |
|
|
132 | (3) |
|
What is to be done in France? |
|
|
135 | (2) |
|
Moral solutions, not very effective |
|
|
137 | (4) |
|
Snowden, Assange and Wikileaks |
|
|
141 | (3) |
|
|
144 | (1) |
|
|
145 | (2) |
|
Chapter 7 The Right to be Forgotten |
|
|
147 | (14) |
|
|
Toward a new rule of law? |
|
|
149 | (3) |
|
Continuation of the Google Spain litigation |
|
|
152 | (3) |
|
The GDPR coming into effect |
|
|
155 | (1) |
|
Perspectives on the right to be forgotten |
|
|
155 | (2) |
|
|
157 | (1) |
|
|
158 | (3) |
|
Chapter 8 Computers and Privacy, the Test of Time |
|
|
161 | (30) |
|
|
|
The French example: a multilateral framework |
|
|
164 | (9) |
|
Internet platforms: a European issue |
|
|
173 | (7) |
|
What rights for the subject? |
|
|
180 | (5) |
|
|
185 | (4) |
|
|
189 | (2) |
|
Chapter 9 Epilogue: Security Delusion or Scandinavian Common Sense? |
|
|
191 | (10) |
|
|
|
Facing terrorism: six countries, six examples |
|
|
193 | (2) |
|
Lessons from these six cases |
|
|
195 | (1) |
|
Insurance, risk and prevention |
|
|
196 | (2) |
|
From terrorism to Covid-19 |
|
|
198 | (2) |
|
|
200 | (1) |
Conclusion |
|
201 | (26) |
|
Appendices |
|
227 | (2) |
Appendix 1 List of Tables |
|
229 | (2) |
Appendix 2 List of Boxes |
|
231 | (2) |
List of Authors |
|
233 | (2) |
Index of Names and Brands |
|
235 | (4) |
Index of Notions |
|
239 | |