262 research outputs found

    Punitive Damages in Cyberspace: Where in the World is the Consumer?

    Get PDF

    Creating a “Circle of Trust” to Further Digital Privacy and Cybersecurity Goals

    Get PDF
    Article published in the Michigan State Law Review

    Digital copyright law: exploring the changing interface between copyright and regulation in the digital environment

    Get PDF
    This thesis seeks to address and clarify the changing interface between copyright law and other forms of regulation in the digital environment, in the context of recorded music. This is in order to explain the problems that rightsholders have had in tackling the issue of unauthorised copyright infringement facilitated by digital technologies. Copyright law is inextricably bound-up with technological developments, but the ‘convergence’ of content into a single digital form was perceived as problematic by rightsholders and was deemed to warrant increased regulation through law. However, the problem is that the reliance on copyright law in the digital environment ignores the other regulatory influences in operation. The use of copyright law in a ‘preventative’ sense also ignores the fact that other regulatory factors may positively encourage users to behave, and consume in ways that may not be directly governed by copyright. The issues digital technologies have posed for rightsholders in the music industry are not addressed, or even potentially addressable directly through law, because the regulatory picture is complex. The work of Lawrence Lessig, in relation to his regulatory ‘modalities’ can be applied in this context in order to identify and understand the other forms of regulation that exist in the digital environment, and which govern user behaviour and consumption. By combining his work with that of other scholars in the field, a bespoke ‘Lessigan’ framework is formulated to address and analyse those other regulatory factors in conjunction with actions undertaken by rightsholders to secure their copyrights in the digital age. The thesis will analyse the effect such reliance on copyright law may have on these regulatory influences, and the creative potential of the digital environment

    National Cybersecurity Innovation

    Get PDF
    National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature on various innovation policy options (including patents, prizes, grants, and research and development tax credits). It requires determining whether national cybersecurity is a public good and an examination of market failure and government failure. Along the way, it draws on a property-liability rules theoretical framework to argue that the patent system’s invention secrecy restrictions and government patent use are ineffective for national cybersecurity innovation. On a normative level, the interface between government intervention and markets presents innovation mechanisms for national cybersecurity. Turning to prescriptions, expansion of prizes should rapidly promote national cybersecurity innovation, and reciprocal public–private research and development interactions should gradually multiply knowledge spillovers

    Internet Monitor 2014: Reflections on the Digital World: Platforms, Policy, Privacy, and Public Discourse

    Get PDF
    This publication is the second annual report of the Internet Monitor project at the Berkman Center for Internet & Society at Harvard University. As with the inaugural report, this year's edition is a collaborative effort of the extended Berkman community. Internet Monitor 2014: Reflections on the Digital World includes nearly three dozen contributions from friends and colleagues around the world that highlight and discuss some of the most compelling events and trends in the digitally networked environment over the past year.The result, intended for a general interest audience, brings together reflection and analysis on a broad range of issues and regions—from an examination of Europe's "right to be forgotten" to a review of the current state of mobile security to an exploration of a new wave of movements attempting to counter hate speech online—and offers it up for debate and discussion. Our goal remains not to provide a definitive assessment of the "state of the Internet" but rather to provide a rich compendium of commentary on the year's developments with respect to the online space.Last year's report examined the dynamics of Internet controls and online activity through the actions of government, corporations, and civil society. We focus this year on the interplay between technological platforms and policy; growing tensions between protecting personal privacy and using big data for social good; the implications of digital communications tools for public discourse and collective action; and current debates around the future of Internet governance.The report reflects the diversity of ideas and input the Internet Monitor project seeks to invite. Some of the contributions are descriptive; others prescriptive. Some contain purely factual observations; others offer personal opinion. In addition to those in traditional essay format, contributions this year include a speculative fiction story exploring what our increasingly data-driven world might bring, a selection of "visual thinking" illustrations that accompany a number of essays, a "Year in Review" timeline that highlights many of the year's most fascinating Internet-related news stories (and an interactive version of which is available at thenetmonitor.org), and a slightly tongue-in-cheek "By the Numbers" section that offers a look at the year's important digital statistics. We believe that each contribution offers insights, and hope they provoke further reflection, conversation, and debate in both offline and online settings around the globe

    The Cord Weekly (January 14, 2009)

    Get PDF

    Best Practices for Critical Information Infrastructure Protection (CIIP): Experiences from Latin America and the Caribbean and Selected Countries

    Get PDF
    Over the past few decades, Latin America and the Caribbean (LAC) has witnessed numerous changes in its development, with most being beneficial. Positive changes relate to sizable growth and expansion of the region’s network infrastructure sectors, such as transport, energy, and information and communications technologies (ICT), among others. In many cases, ICT interconnects these critical infrastructures, creating substructures referred to as critical information infrastructures (CIIs). This publication is written to provide insights to the strategic thinking behind the creation of the national critical information infrastructure protection (CIIP) frameworks. It also builds its recommendations on in-depth analysis of the best CIIP practices around the world, with consideration of the region-specific landscape to originate a base line from which further development can be delineated

    ACUTA Journal of Telecommunications in Higher Education

    Get PDF
    In This Issue Roundtable Discussion: Convergence: Dealing with Change Convergence: A Framework for Change Planning for Competition and Convergence Voice and Telephony over IP: Risk Dimensions and Solutions Cybervandals: Fending Off Attacks Why Vendors See Colleges as a Key Market Segment Campus Profile: Clarion University of Pennsylvania Called to Serve: The Conscripted Consultant Column
    • 

    corecore