Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Selected Works

Institution
Keyword
Publication Year
Publication
File Type

Articles 61 - 83 of 83

Full-Text Articles in Social and Behavioral Sciences

Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik Jan 2012

Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik

Warren Bartholomew CHIK

Unsolicited messages have grown into an intractable parasite on the underbelly of an otherwise effectual and vibrant electronic communications regime. There has been a sudden surge in the enactment of anti-spam laws globally within the last couple of years. On 25 May 2004, the Infocomm Development Authority of Singapore and the Attorney-General’s Chambers of Singapore jointly released a Consultation Paper on a Proposed Legislative Framework for the Control of E-mail Spam in Singapore. It is timely to consider the proposed anti-spam legislation model for Singapore in the light of such existing laws in other countries and their levels of effectiveness …


Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael Jan 2012

Book Review: Security Risk Management: Building An Information Security Risk Management Program From The Ground Up, Katina Michael

Associate Professor Katina Michael

In an age of outsourcing tasks that are not considered to be a core competency of the business, organisations have often relied on external consultants for matters pertaining to security. In actual fact, most companies could have utilized existing skill-sets in-house to produce a security risk management program, if only they knew what steps to take, and how to go about it all. Evan Wheeler in his book on information security risk management does just that- he equips professionals tasked with security, with the thinking required to create a program that is more preoccupied with the complex strategic-level questions than …


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …


Minecraft As Web 2.0: Amateur Creativity In Digital Games, Greg Lastowka Jan 2012

Minecraft As Web 2.0: Amateur Creativity In Digital Games, Greg Lastowka

Greg Lastowka

This book chapter considers how the digital game Minecraft has both enabled and benefited from various Web 2.0 practices. I begin with an explanation of the concept of Web 2.0 and then consider how that concept applies to the space of digital games.


Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor Jan 2012

Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor

Jonathan I. Ezor

In the fields of digital privacy and data protection in the business world, effective compliance and risk management require not only knowledge of applicable laws and regulations, but at least a basic understanding of relevant technologies and the processes of the company or other organization that is collecting and/or using the personal information or monitoring behavior. This book is structured to provide a framework for law and other students to both learn the law and place it in the necessary technological and practical context, divided into topic areas such as children’s privacy, health information, governmental requirements, employee data and more. …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei Dec 2011

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael Nov 2011

The Social And Behavioral Implications Of Location-Based Services, Katina Michael, M.G. Michael

Associate Professor Katina Michael

The social and behavioral implications of location-based services (LBS) are only now beginning to come to light in advanced markets where the services have been adopted by just a little over half the market (Microsoft 2011). Depending on one’s definition of what constitutes location-based services, statistics on the level of adoption differ considerably. While it is helpful to provide as broad a list of applications as possible in what constitutes LBS (e.g. everything from in-vehicle navigation systems to downloading a map using a computer), it can also cloud the real picture forming behind this emerging technology. Emerging not in the …


Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas Sep 2011

Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas

Professor Katina Michael

Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

M. G. Michael

No abstract provided.


The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael Aug 2011

The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael

Professor Katina Michael

No abstract provided.


Commons / Commodity: Peer Production Caught In The Web Of The Commercial Market, Bingchun Meng, Fei Wu Jan 2011

Commons / Commodity: Peer Production Caught In The Web Of The Commercial Market, Bingchun Meng, Fei Wu

Philip F Wu

The development of digital technology and computer networks has enabled many kinds of online collaboration. This article examines Zimuzu, a Chinese case of online peer production, which provides an opportunity to extend our understanding of how the tensions between the commodity and commons production models are being articulated in an online setting. Using empirical evidence collected from face-to-face interviews, online posts and online ethnographic observation, our analysis demonstrates that there is constant negotiation over which aspects of the two seemingly opposing models will be adopted by the community. We argue that it is important to conceptualize the peer production process …


Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes Jan 2010

Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes

Ronald Leenes

Social Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymo- ron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of ‘friend’. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network …


The Google Book Search Settlement And The View From The Public Interest World, Laura Quilter Nov 2009

The Google Book Search Settlement And The View From The Public Interest World, Laura Quilter

Laura Quilter

No abstract provided.


Hack Your Blog (Lightning Talk), Laura Quilter Sep 2009

Hack Your Blog (Lightning Talk), Laura Quilter

Laura Quilter

A short 101-level lightning talk on "hacking your blog" for Software Freedom Day, Boston, 2009.


Looking For Fair Use In The Dmca's Safety Dance, Ira Nathenson Jan 2009

Looking For Fair Use In The Dmca's Safety Dance, Ira Nathenson

Ira Steven Nathenson

Like a ballet, the notice-and-take-down provisions of the Digital Millennium Copyright Act ("DMCA") provide complex procedures to obtain take-downs of online infringement. Copyright owners send notices of infringement to service providers, who in turn remove claimed infringement in exchange for a statutory safe harbor from copyright liability. But like a dance meant for two, the DMCA is less effective in protecting the "third wheel," the users of internet services. Even Senator John McCain - who in 1998 voted for the DMCA - wrote in exasperation to YouTube after some of his presidential campaign videos were removed due to take-downs. McCain …


Diabolical Frivolity Of Neoliberal Fundamentalism, Sefik Tatlic Jan 2009

Diabolical Frivolity Of Neoliberal Fundamentalism, Sefik Tatlic

Sefik Tatlic

Today, we cannot talk just about plain control, but we must talk about the nature of the interaction of the one who is being controlled and the one who controls, an interaction where the one that is “controlled” is asking for more control over himself/herself while expecting to be compensated by a surplus of freedom to satisfy trivial needs and wishes. Such a liberty for the fulfillment of trivial needs is being declared as freedom. But this implies as well the freedom to choose not to be engaged in any kind of socially sensible or politically articulated struggle.


Google Booksearch And Library Digitization, Laura Quilter, Jack Lerner Mar 2008

Google Booksearch And Library Digitization, Laura Quilter, Jack Lerner

Laura Quilter

No abstract provided.


The Blogosphere And The New Pamphleteers, Donald J. Kochan Dec 2005

The Blogosphere And The New Pamphleteers, Donald J. Kochan

Donald J. Kochan

The future of the free dissemination of information lies in the blog, some may say. The internet has entirely transformed how we receive and consume information. It’s the newest incarnation of information dissemination. From the insights of Alexis de Tocqueville, “Feelings and opinions are recruited, the heart is enlarged, and the human mind is developed only by the reciprocal influence of men upon one another.” Bloggers are a powerful force in the distribution of information and ideas and the creation of communities of conversation. Throughout history, the dissemination of information, news, opinions, and ideas has continuously transformed. In the 18th …


Tattoos On Our Digital Skin: Anonymity, Privacy, And Accountability In Cyberspace, Sam Grey Dec 2004

Tattoos On Our Digital Skin: Anonymity, Privacy, And Accountability In Cyberspace, Sam Grey

Sam Grey

While it may be oddly flattering that Chapters, Amazon or HMV knew you would like the new Johnny Cash compilation album, you may be less than thrilled to discover that they also knew about your prescription drug addiction, your crabs, your bankruptcy, or your having skipped out on the rent one month back in 1993. When you add the possibility of your favourite e-retailer sharing your personal information- for a profit- to the frank probability of their having known it in the first place, what you initially found flattering may begin to appear more offensive and ominous. Simply put, there …


Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner Oct 2004

Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner

Laura Quilter

No abstract provided.


Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner Oct 2004

Radio Frequency Id And Privacy With Information Goods, Laura Quilter, Nathan Good, John Han, Elizabeth Miles, David Molnar, Deirdre Mulligan, Jennifer M. Urban, David Wagner

Jennifer M. Urban

No abstract provided.


Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson Jan 1998

Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson

Ira Steven Nathenson

This Article addresses 'spamdexing,' namely, the practice of stuffing invisible keywords into webpages in order to try to get more favorable listings with search engines. For instance, some website owners will stuff the trademarks of competitors into a webpage’s code, particularly by using 'meta tags,' indexing keywords that can be hidden in a webpage’s source code. Although meta tags are not typically viewed by users, the code can be read by search engines, with the result that webpages may be improperly boosted in search engine rankings. Such practices can confuse the public and have also spurred trademark lawsuits. But the …


Encryption/Decryption Dickwads Of Cipherspace, Raleigh Muns Dec 1994

Encryption/Decryption Dickwads Of Cipherspace, Raleigh Muns

Raleigh Muns

Discussion of PGP encryption software and possibility it is compromised.