20 research outputs found

    Intermediary Design Duties

    Get PDF
    Online social networking applications and marketplaces enable users to discover ideas, people, places, and products. The companies behind these services purport to be little more than the conduits through which users socialize and transact business. It is on this premise that, pursuant to the Communications Decency Act (CDA), courts are reluctant to impose liability on intermediaries for their users\u27 illegal online conduct. In spite of language in the statute that would limit the safe harbor to intermediaries that voluntarily moderate users\u27 content and behavior, courts today refrain from granting immunity only in cases in which intermediaries materially contribute to illegal online conduct. This has proven to be a very high juridical bar for plaintiffs to clear and a very generous protection for defendant providers. This doctrine rests on an outdated view of how most online intermediaries do business. Today, the largest online companies do not merely host and relay messages, uninterested in what their users say or do. They use behavioral and content data to engineer online experiences in ways that are unrelated to the charming interest in making connections. Some of the most successful companies, moreover, collect, analyze, sort, and repackage user data for publication in ancillary and secondary markets. This is how the CDA immunity doctrine, first developed by the courts two decades ago, is ill-suited to the world today. Online intermediaries are now aggressively exploiting user content in ways that the doctrine does not fully acknowledge, leaving public law priorities and consumer protections under enforced vulnerable people and historically subordinated groups have the most to lose under this approach. This article proposes a reform that is adapted to online intermediaries\u27 outsized influence today. It proposes that courts scrutinize the manner in which providers in each case elicit user content and the extent to which they exploit that data in secondary or ancillary markets. Following this more searching approach, courts will return the doctrine to its roots in the language and purpose of the CDA: to shield intermediaries from liability for third-party online conduct only to the extent they operate as either true conduits of user content

    Regulating Content on Social Media

    Get PDF
    How are users influenced by social media platforms when they generate content, and does this influence affect users’ compliance with copyright laws? These are pressing questions in today’s internet age, and Regulating Content on Social Media answers them by analysing how the behaviours of social media users are regulated from a copyright perspective. Corinne Tan, an internet governance specialist, compares copyright laws on selected social media platforms, namely Facebook, Pinterest, YouTube, Twitter and Wikipedia, with other regulatory factors such as the terms of service and the technological features of each platform. This comparison enables her to explore how each platform affects the role copyright laws play in securing compliance from their users. Through a case study detailing the content generative activities undertaken by a hypothetical user named Jane Doe, as well as drawing from empirical studies, the book argues that – in spite of copyright’s purported regulation of certain behaviours – users are 'nudged' by the social media platforms themselves to behave in ways that may be inconsistent with copyright laws

    Regulating Content on Social Media

    Get PDF
    How are users influenced by social media platforms when they generate content, and does this influence affect users’ compliance with copyright laws? These are pressing questions in today’s internet age, and Regulating Content on Social Media answers them by analysing how the behaviours of social media users are regulated from a copyright perspective. Corinne Tan, an internet governance specialist, compares copyright laws on selected social media platforms, namely Facebook, Pinterest, YouTube, Twitter and Wikipedia, with other regulatory factors such as the terms of service and the technological features of each platform. This comparison enables her to explore how each platform affects the role copyright laws play in securing compliance from their users. Through a case study detailing the content generative activities undertaken by a hypothetical user named Jane Doe, as well as drawing from empirical studies, the book argues that – in spite of copyright’s purported regulation of certain behaviours – users are 'nudged' by the social media platforms themselves to behave in ways that may be inconsistent with copyright laws

    To Bioprint or Not to Bioprint

    Get PDF

    Social Networks as the New Frontier of Terrorism

    Get PDF
    Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses

    Social Networks as the New Frontier of Terrorism

    Get PDF
    Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence. This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate. This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses

    Will Work For Free: Examining the Biopolitics of Unwaged Immaterial Labour

    Get PDF
    According to Maurizio Lazzarato, Michael Hardt, and Antonio Negri, immaterial labour is biopolitical in that it purchases, commands, and comes to progressively control the communicative and affective capacities of immaterial workers. Drawing inspiration from Michel Foucault, the above authors argue that waged immaterial labour reshapes the subjectivities of workers by reorienting their communicative and affective capacities towards the prerogatives and desires of those persons who purchased the right to control them. In this way, it is biopolitical. Extending the concept of immaterial labour into the Web 2.0 era, Tiziana Terranova and Christian Fuchs, for instance, argue that all of the time and effort devoted to generating digital content on the Internet should also be considered a form of immaterial work. Taking into account the valuations of ‘free’ social networks, these authors emphasize the exploitative dimensions of unwaged immaterial work and, by doing so, broaden the concept of immaterial labour to include both its waged and unwaged variants. Neither, however, has attempted to understand the biopolitical dimensions of unwaged immaterial labour with any specificity. Thus, while Hardt and Negri examine the biopolitics of waged immaterial labour and Terranova and Fuchs examine the exploitative dimensions of unwaged immaterial labour, this thesis makes an original contribution to this body of theory by extending both lines of thinking and bridging the chasm between them. Taking Flickr as its primary exemplar, this thesis provides an empirical examination of the ways in which its members regard all of the time and effort they devote to their ‘labours of love.’ Flickr is a massively popular Web 2.0 photo-sharing social network that depends on the unwaged immaterial labour of its ‘users’ to generate all of the content that populates the network. Via reference to open-ended and semi-structured interviews conducted with members of Flickr, the biopolitics that guide and regulate the exploited work of this unwaged labour force are disclosed. The primary research question this thesis provides an answer to, then, is: if waged immaterial labour is biopolitical as numerous scholars have argued, then what are the biopolitics of the unwaged immaterial labour characteristic of Flickr and what kinds of subjectivities are being produced by them

    Media and Education in the Digital Age

    Get PDF
    This book is an invitation to informed and critical participation in the current debate on the role of digital technology in education and a comprehensive introduction to the most relevant issues in this debate. After an early wave of enthusiasm about the emancipative opportunities of the digital «revolution» in education, recent contributions invite caution, if not scepticism. This collection rejects extreme interpretations and establishes a conceptual framework for the critical questioning of this role in terms of concepts, assessments and subversions. This book offers conceptual tools, ideas and insights for further research. It also provides motivation and information to foster active participation in debates and politics and encourages teachers, parents and learners to take part in the making of the future of our societies
    corecore