-
- Абу Даби+971 2 644 43 30
- Дубаи +971 4 368 97 27
- Шарджа +971 6 526 41 28
Impact of Artificial intelligence on Legal Sector The stimulation of human intelligence process by a machine is termed as Artificial intelligence. Mostly this is done by the computer systems. The Specific applications of Artificial intelligence include natural language processing, speech recognition and machine vision. In simple words it is programming a…
Read moreEconomic and Fraud Provisions in the Middle East “There is one and only one social responsibility of business – to use its resources and engage in activities designed to increase its profits so long as it stays within the rules of the game, which is to say, engages in open…
Read moreElectronic Contracting Law in E-commerce Introduction to Contract Law A contract is a legally binding force between two entities, companies, or parties that link the parties in a contract protected by law. An agreement between the parties may be made orally, in writing, in action, or any of these ways.…
Read moreIT: Future of digital forensics Introduction The IT industry is constantly evolving, and as a result, many people are becoming victims of malware, corporate spearfishing and whaling exploits, mobile devices, and the theft of confidential private data. The collection, storage, study, and presentation of evidence from digital media are all…
Read moreAutonomous Machine Testimony Smart objects have taken over our homes, workplaces and communities, and over the coming decades, the volume of legally admissible data from these devices is likely to be more. The new culture is to have voice-activated technology as digital assistants, smart appliances, and personal wearable devices. Lawyers…
Read moreSoftware Infringement in UAE Software piracy or violation of a software license, is an illegal action that occurs due to unsanctioned use, distribution, exploitation and/or reproduction of copyrighted software. With the technology roar, it is very fundamental that an economy in its full strength and thrive be able to protect…
Read moreCCTV & Invasion to Privacy in the GCC The world in this millennium is techno-dependent for almost every aspect of life whether its payment of debts through credit card, entering into contracts by parties distant through online, i.e. e-contracts, e-booking of railway or air tickets and even social networking platforms.…
Read morePolitical Boundaries in Cyberspace As Information and Communication Technologies (ICTs) continue to suffuse through every aspect of human life in the twenty-first century, they have skewed the perceptions of citizens, and the outlook of jurisdictions worldwide. As societies continue to reshape themselves into digital economies, there has been a surge…
Read moreE-contracts in UAE Introduction In today's modern E-world, it should come as no surprise that businesses prefer communicating officially online. From arranging meetings to agreeing on legally binding contracts, this trend of electronic business is fast growing. This trend of communicating through emails and applications led to the formation of…
Read more5g Introduction ICTs, short for Information and Communication Technologies, is used for social and economic development. With the introduction of new technology, there is an improvement in the quality of life of people using such technology because of the unique benefits and conveniences that this new technology has to offer.…
Read moreCan artificial intelligence machines be patented or sued? Introduction Hollywood movies introduced the concept of artificial intelligence to the world. Following the portrayal of artificial intelligence, many have speculated that robots will one day take over the world and subdue humans as their subjects. For this to happen, artificial intelligence…
Read moreDomain Name Protection in UAE Nowadays, all kinds of information can be found on the internet. As a result, Governments, companies, organizations and individuals use websites to provide information online. These websites are domain names used in URLs, for example in the URL https://www.stalawfirm.com/en.html; the domain name is stalalawfirm.com.…
Read moreCybersecurity in Corporate Governance- A Global Purview The historical backdrop of cybersecurity started with a research venture. A man named Bob Thomas understood that it was feasible for a computer program to move over a system, leaving a little trail wherever it went. He named the program Creeper, and structured…
Read moreShould Robots be Granted Citizenship? It’s 2019 and with the world progressively stepping towards technological advancement, active presence of machines is no surprise. Within considerable amount of time, Artificial Intelligence has taken over the world with its ideas and promises. Human beings are doing everything possible to ease out their…
Read more