Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Series

Singapore Management University

Internet Law

Articles 1 - 4 of 4

Full-Text Articles in Law

Mistaken Identity, Identity Theft And Problems Of Remote Authentication In E-Commerce, Eliza Mik Aug 2012

Mistaken Identity, Identity Theft And Problems Of Remote Authentication In E-Commerce, Eliza Mik

Research Collection Yong Pung How School Of Law

The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. The technological characteristics of the Internet have a tendency to turn traditional legal doctrines on their head, or, at least expose flaws in existing legal arguments. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity. The latter must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence …


Defamation Via Hyperlinks: More Than Meets The Eye, Gary Kok Yew Chan Jul 2012

Defamation Via Hyperlinks: More Than Meets The Eye, Gary Kok Yew Chan

Research Collection Yong Pung How School Of Law

Hyperlinks make the World Wide Web go round. They find and connect information and content from a wealth of sources on the web including, from time to time, defamatory material. Newton, the owner and operator of a website in British Columbia, posted an article entitled “Free Speech in Canada”. The article itself was not alleged to be defamatory of Crookes, a politician. However, it incorporated hyperlinks to other internet websites that contained defamatory material. Notwithstanding requests from Crookes and his lawyer, Newton refused to remove the hyperlinks. Did Newton’s act of hyperlinking to internet websites constitute “publication” of the defamatory …


The Future Of Digital Lockers, Warren B. Chik Apr 2012

The Future Of Digital Lockers, Warren B. Chik

Research Collection Yong Pung How School Of Law

This article discusses the legalissues and legitimacy of changing online data storage and delivery facilities.


From Clay Tablets To Ajax: Replicating Writing And Documents In Internet Transactions, Eliza Mik Feb 2012

From Clay Tablets To Ajax: Replicating Writing And Documents In Internet Transactions, Eliza Mik

Research Collection Yong Pung How School Of Law

This article addresses the absence of paper and the challenges of transposing the traditional legal concepts of “writing” and “document” into an environment consisting of interactive and interconnected files. Both “writing” and “documents” are concepts that rely on tangible carriers, such as paper. [FN1] Accordingly, legal principles involving either concept presume not only a certain durability, but also the stability and confinement of the information conveyed. What happens when writing is no longer contained on paper? Can writing exist without documents? Is it correct to speak of a “document” if its contents are transient and its scope is difficult to …