Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
Mistaken Identity, Identity Theft And Problems Of Remote Authentication In E-Commerce, Eliza Mik
Mistaken Identity, Identity Theft And Problems Of Remote Authentication In E-Commerce, Eliza Mik
Research Collection Yong Pung How School Of Law
The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. The technological characteristics of the Internet have a tendency to turn traditional legal doctrines on their head, or, at least expose flaws in existing legal arguments. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity. The latter must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence …
Defamation Via Hyperlinks: More Than Meets The Eye, Gary Kok Yew Chan
Defamation Via Hyperlinks: More Than Meets The Eye, Gary Kok Yew Chan
Research Collection Yong Pung How School Of Law
Hyperlinks make the World Wide Web go round. They find and connect information and content from a wealth of sources on the web including, from time to time, defamatory material. Newton, the owner and operator of a website in British Columbia, posted an article entitled “Free Speech in Canada”. The article itself was not alleged to be defamatory of Crookes, a politician. However, it incorporated hyperlinks to other internet websites that contained defamatory material. Notwithstanding requests from Crookes and his lawyer, Newton refused to remove the hyperlinks. Did Newton’s act of hyperlinking to internet websites constitute “publication” of the defamatory …
The Future Of Digital Lockers, Warren B. Chik
The Future Of Digital Lockers, Warren B. Chik
Research Collection Yong Pung How School Of Law
This article discusses the legalissues and legitimacy of changing online data storage and delivery facilities.
From Clay Tablets To Ajax: Replicating Writing And Documents In Internet Transactions, Eliza Mik
From Clay Tablets To Ajax: Replicating Writing And Documents In Internet Transactions, Eliza Mik
Research Collection Yong Pung How School Of Law
This article addresses the absence of paper and the challenges of transposing the traditional legal concepts of “writing” and “document” into an environment consisting of interactive and interconnected files. Both “writing” and “documents” are concepts that rely on tangible carriers, such as paper. [FN1] Accordingly, legal principles involving either concept presume not only a certain durability, but also the stability and confinement of the information conveyed. What happens when writing is no longer contained on paper? Can writing exist without documents? Is it correct to speak of a “document” if its contents are transient and its scope is difficult to …