778 research outputs found

    The problem of unwanted online publication and use of images of children and young people : A legal challenge

    Get PDF
    The online publication of images of children and their subsequent use has the potential to cause harm to a child who is a subject of such an image. Indeed, the publication and distribution of photographs or video clips has been found to be one of the most impactful forms of bullying.1 Even outside a cyberbullying context, however, this thesis argues that two important aspects of a child’s social and emotional development — namely their selfesteem and the development of relationships — can be harmed by the unwanted online publication or subsequent use of an image of that child. In particular, this thesis argues that an image subject can be harmed by the online publication of an image or its use even where the publication or use is not ill‐intentioned and regardless of whether or not the image can be described, objectively, as harmful. In view of this, the thesis examines the extent to which the current Australian legal framework, as well as existing social norms, the architecture of the internet and the market, are sufficient to address the problem of the unwanted online posting of an image of a child or its subsequent use. After concluding that the current status quo does not sufficiently address the problem, and having argued that Australia’s commitments to children’s rights under the Convention on the Rights of the Child obliges it to do more, the thesis argues that Australian law should be reformed to give children greater control over their image in the online environment than they currently enjoy. Possible legal responses that would give children greater control over their image are then considered and evaluated, and one particular response is recommended. The need for further research and for a multi‐faceted approach to the problem highlighted in this thesis is identified

    Review of existing Australian and international cyber-safety research

    Get PDF
    Information and communication technologies have permeated almost all areas of society and become an important component of daily functioning for most Australians. This is particularly true for Internet and mobile phone technology. The majority of Australian households (67% in 2007 – 2008) have access to the Internet and over 11 million Australians use the Internet as an integral part of their personal, social and occupational activities. By mid-2008, there were over 22 million active mobile phones being used in Australia, which equates to more than one phone for every citizen. There are many benefits associated with Internet and mobile phone use; however, there are also risks, particularly with the Internet. In fact, there is almost daily media discussion of these risks and dangers. However, to ensure that the information contained in this review was as accurate as possible, we primarily sourced quality research literature published in scientific journals both in Australia and overseas. In addition, quality material not published in scientific journals was consulted and included where appropriate, thus ensuring that this review was based on reliable research studies containing the most current and accurate research evidence available. From the outset, it is important to note that there are several methodological and ethical issues in relation associated with the measurement and examination of many cyber-safety risks. The nature of this type of research makes it very difficult to address certain risk areas, in particular those that relate to children (e.g., online grooming)

    Measuring Infringement of Intellectual Property Rights

    Get PDF
    © Crown Copyright 2014. You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit http://www.nationalarchives.gov. uk/doc/open-government-licence/ Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concernedThe review is wide-ranging in scope and overall our findings evidence a lack of appreciation among those producing research for the high-level principles of measurement and assessment of scale. To date, the approaches adopted by industry seem more designed for internal consumption and are usually contingent on particular technologies and/or sector perspectives. Typically, there is a lack of transparency in the methodologies and data used to form the basis of claims, making much of this an unreliable basis for policy formulation. The research approaches we found are characterised by a number of features that can be summarised as a preference for reactive approaches that look to establish snapshots of an important issue at the time of investigation. Most studies are ad hoc in nature and on the whole we found a lack of sustained longitudinal approaches that would develop the appreciation of change. Typically the studies are designed to address specific hypotheses that might serve to support the position of the particular commissioning body. To help bring some structure to this area, we propose a framework for the assessment of the volume of infringement in each different area. The underlying aim is to draw out a common approach wherever possible in each area, rather than being drawn initially to the differences in each field. We advocate on-going survey tracking of the attitudes, perceptions and, where practical, behaviours of both perpetrators and claimants in IP infringement. Clearly, the nature of perpetrators, claimants and enforcement differs within each IPR but in our view the assessment for each IPR should include all of these elements. It is important to clarify that the key element of the survey structure is the adoption of a survey sampling methodology and smaller volumes of representative participation. Once selection is given the appropriate priority, a traditional offline survey will have a part to play, but as the opportunity arises, new technological methodologies, particularly for the voluntary monitoring of online behaviour, can add additional detail to the overall assessment of the scale of activity. This framework can be applied within each of the IP right sectors: copyright, trademarks,patents, and design rights. It may well be that the costs involved with this common approach could be mitigated by a syndicated approach to the survey elements. Indeed, a syndicated approach has a number of advantages in addition to cost. It could be designed to reduce any tendency either to hide inappropriate/illegal activity or alternatively exaggerate its volume to fit with the theme of the survey. It also has the scope to allow for monthly assessments of attitudes rather than being vulnerable to unmeasured seasonal impacts

    Rethinking Social Media and Extremism

    Get PDF
    Terrorism, global pandemics, climate change, wars and all the major threats of our age have been targets of online extremism. The same social media occupying the heartland of our social world leaves us vulnerable to cybercrime, electoral fraud and the 'fake news' fuelling the rise of far-right violence and hate speech. In the face of widespread calls for action, governments struggle to reform legal and regulatory frameworks designed for an analogue age. And what of our rights as citizens? As politicians and lawyers run to catch up to the future as it disappears over the horizon, who guarantees our right to free speech, to free and fair elections, to play video games, to surf the Net, to believe ‘fake news’? Rethinking Social Media and Extremism offers a broad range of perspectives on violent extremism online and how to stop it. As one major crisis follows another and a global pandemic accelerates our turn to digital technologies, attending to the issues raised in this book becomes ever more urgent

    Cyber Infrastructure Protection: Vol. II

    Get PDF
    View the Executive SummaryIncreased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation’s cyber infrastructure. The cyber infrastructure encompasses a number of sectors including: the nation’s mass transit and other transportation systems; banking and financial systems; factories; energy systems and the electric power grid; and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause damage or disrupt cyber infrastructure operations. Threats to cyber infrastructure safety and security come from hackers, terrorists, criminal groups, and sophisticated organized crime groups; even nation-states and foreign intelligence services conduct cyber warfare. Cyber attackers can introduce new viruses, worms, and bots capable of defeating many of our efforts. Costs to the economy from these threats are huge and increasing. Government, business, and academia must therefore work together to understand the threat and develop various modes of fighting cyber attacks, and to establish and enhance a framework to assess the vulnerability of our cyber infrastructure and provide strategic policy directions for the protection of such an infrastructure. This book addresses such questions as: How serious is the cyber threat? What technical and policy-based approaches are best suited to securing telecommunications networks and information systems infrastructure security? What role will government and the private sector play in homeland defense against cyber attacks on critical civilian infrastructure, financial, and logistical systems? What legal impediments exist concerning efforts to defend the nation against cyber attacks, especially in preventive, preemptive, and retaliatory actions?https://press.armywarcollege.edu/monographs/1527/thumbnail.jp

    Information Security Risk Management (ISRM) Model for Saudi Arabian Organisations

    Get PDF
    This research aimed to investigate the factors influencing information security risk management (ISRM) and develop an ISRM model for large Saudi Arabian organisations. The study employed an exploratory research method following a top-down design approach. The research was conducted in two sequential phases: an interview and a focus group discussion. The research identified 14 factors grouped into the people, process, and technology that influence ISRM in large Saudi Arabian organisations. The proposed model can successfully guide large Saudi Arabian organisations to implement ISRM standards more effectively

    Stakeholders’ forum general report

    Get PDF

    The effect of online journalism on the freedom of the press: the case of Kuwait

    Get PDF
    Online journalism has brought new features of journalism practices for local journalists and forced the expansion of their freedom. The Internet as a whole became the tool for freedom of expression for many suppressed countries, and online journalism became an alternative for press freedom in cyberspace. The diffusion of information enabled more opportunities for freedom of expression and speech prosperity, leading to a higher level of freedom in local press. This research project aims to examine the effect of online journalism on the freedom of the local press in the state of Kuwait. Since mid 1990s, when the Internet was introduced in Kuwait, a new phenomenon of press freedom started to rise. After many decades of relying heavily on local newspapers and controlled radio and TV, many Kuwaitis switched to the Internet to obtain information, news and political analysis. The political dispute of power after the death of Kuwaiti Emir Sheikh Jabber Al-Ahmad Al-Sabah on 15 of January 2006, followed by the public demand to change the electoral constituencies voting system of the National Assembly, and the dissolving of the National Assembly in May 2006 forced many Kuwaitis to go online to get the latest news and analysis regarding the two issues. Kuwaiti online journalism became the source for instant updated information during the disputes. Many local writers praised their work on local press. Mohammad Abdul Qader Al-Jasim, a columnist and former editor in chief for Alwatan local newspaper, in his online Web site ‘Meezan’, provided non-censored detailed analysis of these situations without any restrictions or fear of government interference which was considered as a taboo “red line” no one was permitted to cross. The researcher used three different tools (survey, online content analysis, and interviews) to determine the effect of online journalism on journalist’s practices and the freedom of the press in Kuwait, focusing on the most popular Kuwaiti personal writers’ sites, weblogs and forums. The results show that online journalism affected journalist’s practices but did not replace the traditional practices. The Internet became a source and communication platform for many local journalists. At the same time, online journalism became one of the tools that helped increase the level of freedom in the local press. The language of online journalism took a different direction from the local press with more freedom to write, discuss, and share ideas online with less fear of government retribution. What was considered a taboo “red line” in the local press became an acceptable “green line” online. Local press officials recognized this effect on the local freedom, but disagree on the factors that really caused the freedom of the local press to increase

    Telecommunication Economics

    Get PDF
    This book constitutes a collaborative and selected documentation of the scientific outcome of the European COST Action IS0605 Econ@Tel "A Telecommunications Economics COST Network" which run from October 2007 to October 2011. Involving experts from around 20 European countries, the goal of Econ@Tel was to develop a strategic research and training network among key people and organizations in order to enhance Europe's competence in the field of telecommunications economics. Reflecting the organization of the COST Action IS0605 Econ@Tel in working groups the following four major research areas are addressed: - evolution and regulation of communication ecosystems; - social and policy implications of communication technologies; - economics and governance of future networks; - future networks management architectures and mechanisms
    • 

    corecore