Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Selected Professional Activities (3)
- Cyberspace (2)
- Emerging Technologies (2)
- Information Systems (2)
- Social Implications of ICT (2)
-
- Advancements (1)
- Attorney client privilege (1)
- Book review (1)
- Challenges (1)
- Chip implants (1)
- Cloud security (1)
- Conflict of Law (1)
- Convergence (1)
- Critical thinking (1)
- Customary law (1)
- Cyberstalking (1)
- Discussion (1)
- Email (1)
- Emergency Management (1)
- Emergency management (1)
- Emerging technologies (1)
- Employees (1)
- Employers (1)
- Engineer (1)
- Evidence (1)
- Forum (1)
- Friends (1)
- Future (1)
- Global Positioning Systems (1)
- Government (1)
Articles 1 - 20 of 20
Full-Text Articles in Law
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Professor Katina Michael
This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Professor Katina Michael
Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices
The Evolving Internet: Patterns In Usage And Pricing, Daniel Lyons
The Evolving Internet: Patterns In Usage And Pricing, Daniel Lyons
Daniel Lyons
No abstract provided.
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Professor Katina Michael
Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael
Professor Katina Michael
Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael
Professor Katina Michael
Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.
Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …
Editorial: The Idio-Technopolis, Katina Michael
Editorial: The Idio-Technopolis, Katina Michael
Professor Katina Michael
The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.
Personal Use Of Workplace Computers: A Threat To Otherwise Privileged Communications, Louise Hill
Personal Use Of Workplace Computers: A Threat To Otherwise Privileged Communications, Louise Hill
Louise L Hill
This article is an adaptation of "Gone but Not Forgotten: When Privacy, Policy and Privilege Collide" originally published in the Northwestern Journal of Technology and Intellectual Property, Volume 9, Issue 8, 2011
Editorial: "You Talkin' To Me?", Katina Michael
Editorial: "You Talkin' To Me?", Katina Michael
Professor Katina Michael
Advancing knowledge through robust research is an honourable aim- being scientific, finding the right methodology, executing project phases meticulously, and reporting on the outcomes as objectively and accurately as possible. But may I begin my inaugural editorial by saying that an even higher ideal to advancing knowledge is critiquing it as it happens. Reflective practice is not just something to be done by academics in their teaching- reflective practice is what we should all be doing as we go about undertaking our various day-to-day work tasks. For the engineer engaged in research and development, whether in industry or government, reflective …
Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik
Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik
Warren Bartholomew Chik
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …
Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik
Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik
Warren Bartholomew Chik
There is a need for Singapore bloggers to be aware of legal issues arising from their online diaries, particularly in the light of the recent cases involving seditious remarks made online by bloggers that resulted in jail terms and fines; and earlier in the year, a dispute arose over allegedly defamatory speeches made by a blogger about A*STAR’s Chairman, Philip Yeo, which was resolved amicably, but not without an apology. The threats of legal repercussions in the form of civil lawsuits and criminal charges serve as reminders of the potential legal problems that can arise from blogging, and indeed from …
The Lion, The Dragon And The Wardrobe Guarding The Doorway To Information And Communications Privacy On The Internet: A Comparative Case Study Of Hong Kong And Singapore: Two Differing Asian Approaches, Warren B. Chik
Warren Bartholomew Chik
Almost a decade ago, the electronic commerce revolution began, led by such companies as Amazon.com and Ebay.com. These companies have grown into the internet business giants they are today, diversifying in the products they sell, the services they provide and the jurisdictions they conduct business in. However, aside from these rare examples, most medium and small internet-based business enterprises have grown with the dot.com bubble and dissolved when it burst mid-way through the decade. Now, at the 10th Anniversary of Electronic Commerce, after we have seen the dot.com way of doing business launch like a rocket and plunge like a …
Lord Of Your Domain, But Master Of None: The Need To Harmonize And Recalibrate The Domain Name Regime Of Ownership And Control, Kam Wai, Warren Bartholomew Chik
Lord Of Your Domain, But Master Of None: The Need To Harmonize And Recalibrate The Domain Name Regime Of Ownership And Control, Kam Wai, Warren Bartholomew Chik
Warren Bartholomew Chik
The world has seen three waves of property. The first hark back centuries and relate to 'real and personal property' such as land and chattel, also known as immovable and movable property. The second gained recognition around the nineteenth century and relates to propertization of the 'labours of the mind' or 'intellectual property'. The third wave came within a much shorter period and starting to gain recognition and it is what is known as 'virtual property'. The law and policy-makers have had to surmount not only a steep learning curve but also in some cases a foundation that is wrought …
Harassment Through Digital Media: A Cross-Jurisdictional Comparative Analysis On The Law On Cyberstalking, Warren B. Chik
Harassment Through Digital Media: A Cross-Jurisdictional Comparative Analysis On The Law On Cyberstalking, Warren B. Chik
Warren Bartholomew Chik
The cyber world is an extension of the real world. It is another dimension where we can work, study and play. But people also tend to lose their inhibitions on the Internet, often while keeping their anonymity. Because of the perceived and real freedoms in the digital environment, people are emboldened to act in ways that they may not normally do in the real world. One recent phenomenon that is steadily becoming a problem in every country with a high level of electronic connectivity is the act of cyberstalking. The electronic medium is an important factor due to its very …
‘Customary Internet-Ional Law’: Creating A Body Of Customary Law For Cyberspace. Part 2: Applying Custom As Law To The Internet Infrastructure, Warren B. Chik
‘Customary Internet-Ional Law’: Creating A Body Of Customary Law For Cyberspace. Part 2: Applying Custom As Law To The Internet Infrastructure, Warren B. Chik
Warren Bartholomew Chik
The shift in socio-economic transactions from real space to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 2 of this article, I will construct the customary rules to Internet law-making that are applicable …
Us Jurisdictional Rules Of Adjudication Over Business Conducted Via The Internet: Guidelines And A Checklist For The E-Commerce Merchant, Warren B. Chik
Us Jurisdictional Rules Of Adjudication Over Business Conducted Via The Internet: Guidelines And A Checklist For The E-Commerce Merchant, Warren B. Chik
Warren Bartholomew Chik
No abstract provided.
Interview, Candidate Speech And Broadcaster Responsibilities Beat The Press, Daniel Lyons
Interview, Candidate Speech And Broadcaster Responsibilities Beat The Press, Daniel Lyons
Daniel Lyons
No abstract provided.
Presentation, Dodd-Frank And The Administrative Law Of Cooperative Federalism, Daniel Lyons
Presentation, Dodd-Frank And The Administrative Law Of Cooperative Federalism, Daniel Lyons
Daniel Lyons
No abstract provided.
Reforming The Universal Service Fund For The Digital Age, Daniel Lyons
Reforming The Universal Service Fund For The Digital Age, Daniel Lyons
Daniel Lyons
The marketplace and technological changes that have occurred since the last major revision of the Communications Act in 1996 have rendered existing law and policy woefully outdated, if not obsolete. In the past fifteen years there has been a switch from analog to digital services, from narrowband to broadband networks, and, most importantly, from a mostly monopolistic to a generally competitive environment. In Communications Law and Policy in the Digital Age: The Next Five Years, some of the nation's most eminent scholars explain why communications law and policy should be changed in response to these profound marketplace transitions. And, as …
Intellectual Property And Private International Law – Swedish Perspectives, Ulf Maunsbach
Intellectual Property And Private International Law – Swedish Perspectives, Ulf Maunsbach
Ulf Maunsbach
No abstract provided.