30,842 research outputs found

    Personal rights management (PRM) : enabling privacy rights in digital online media content

    Get PDF
    With ubiquitous use of digital camera devices, especially in mobile phones, privacy is no longer threatened by governments and companies only. The new technology creates a new threat by ordinary people, who now have the means to take and distribute pictures of one’s face at no risk and little cost in any situation in public and private spaces. Fast distribution via web based photo albums, online communities and web pages expose an individual’s private life to the public in unpreceeded ways. Social and legal measures are increasingly taken to deal with this problem. In practice however, they lack efficiency, as they are hard to enforce in practice. In this paper, we discuss a supportive infrastructure aiming for the distribution channel; as soon as the picture is publicly available, the exposed individual has a chance to find it and take proper action.Wir stellen ein System zur Wahrnehmung des Rechts am eigenen Bild bei der Veröffentlichung digitaler Fotos, zum Beispiel von Handykameras, im Internet vor. Zur Entdeckung der Veröffentlichung schlagen wir ein Watermarking-Verfahren vor, welches das Auffinden der Bilder durch die potentiell abgebildeten Personen ermöglicht, ohne die Rechte des Fotografen einzuschrĂ€nken

    Best Effort and Practice Activation Codes

    Get PDF
    Activation Codes are used in many different digital services and known by many different names including voucher, e-coupon and discount code. In this paper we focus on a specific class of ACs that are short, human-readable, fixed-length and represent value. Even though this class of codes is extensively used there are no general guidelines for the design of Activation Code schemes. We discuss different methods that are used in practice and propose BEPAC, a new Activation Code scheme that provides both authenticity and confidentiality. The small message space of activation codes introduces some problems that are illustrated by an adaptive chosen-plaintext attack (CPA-2) on a general 3-round Feis- tel network of size 2^(2n) . This attack recovers the complete permutation from at most 2^(n+2) plaintext-ciphertext pairs. For this reason, BEPAC is designed in such a way that authenticity and confidentiality are in- dependent properties, i.e. loss of confidentiality does not imply loss of authenticity.Comment: 15 pages, 3 figures, TrustBus 201

    Adam Smith goes mobile : managing services beyond 3G with the digital marketplace

    Get PDF
    The next generation of mobile communications systems is expected to offer new business opportunities to existing and new market players. A market-based middleware framework has been recently proposed whereby service providers, independent of network operators, are able to tender online service contracts to network operators in a dynamic and competitive manner. This facilitates a seamless service provision over disparate networks in a consumer-centric manner. Service providers select network bearers according to the network operators' ability to meet the QoS target, which in turn is influenced, among other things, by user's price and quality requirements. The benefits of this proposal are the complementarity of numerous network resources, the decoupling of services and networks in a self-organising distributed environment, and increased competition to consumers’ advantag

    Broadband : towards a national plan for Scotland

    Get PDF
    The development of national broadband plans has been used by many countries to join up different areas of governmental and regulatory activities and to set ambitious targets for ubiquitous access to and use of the latest fixed and wireless networks and services. For Scotland this requires working within EU and UK legislative frameworks, which have also provided the bulk of the finance for interventions. It also requires an understanding of the significant weaknesses of urban broadband adoption compared to other UK and EU nations and of its e-commerce supply and demand. While resources are being targeted at rural and remote areas, more are needed to close the social digital divide, which is unavoidable if the stated ambition of being world class is to be achieved

    The regulation of telecommunication in the United Kingdom of Great Britain & Northern Ireland

    Get PDF
    This paper reviews the application of national antitrust law and the implementation of the European Union's telecommunications directives to the markets in the United Kingdom, against the declared policy objective of raising national competitiveness. It illustrates the complexity of the systems that have been created over three decades, with complex and interlocking regulatory, self-regulatory, judicial and appellate bodies, interacting with the parliamentary systems to form a regulatory state. Where markets have failed, or thought likely to fail, the state at different levels (UK, national and municipal) has supported studies and subsidized the provision of broadband Internet access. The regulator, using its sectoral antitrust powers, agreed with British Telecom to functional separation, transferring the enduring bottleneck of local access to a separate subsidiary. While the UK describes itself as a regulatory leader this is difficult to evaluate, given the number and the frequencies of changes, nonetheless the claim seems very difficult to substantiate. --Governance,Competitiveness,Regulatory state,Great Britain,United Kingdom

    Mapping and analysis of the current self- and co- regulatory framework of commercial communication aimed at minors

    Get PDF
    As the advertising sector has been very active in self-regulating commercial communication aimed at children, a patchwork of different rules and instruments exist, drafted by different self-regulatory organisations at international, European and national level. In order to determine the scope and contents of these rules, and hence, the actual level of protection of children, a structured mapping of these rules is needed. As such, this report aims to provide an overview of different categories of Alternative Regulatory Instruments(ARIs,such as self- and co-regulation regarding (new) advertising formats aimed at children. This report complements the first legal AdLit research report, which provided an overview of the legislative provisions in this domain.status: publishe
    • 

    corecore