9,831 research outputs found

    Mitigating the Tragedy of the Digital Commons: the Case of Unsolicited Commercial Email

    Get PDF
    The growth of unsolicited commercial email imposes increasing costs on organizations and causes considerable aggravation on the part of email recipients. A thriving anti-spam industry addresses some of the frustration. Regulation and various economic and technical means are in the works – all aimed at bringing down the flood of unwanted commercial email. This paper contributes to our understanding of the UCE phenomenon by drawing on scholarly work in areas of marketing and resource ownership and use. Adapting the tragedy of the commons to the email context, we identify a causal structure that drives the direct e-marketing industry. Computer simulations indicate that although filtering may be an effective method to curb UCE arriving at individual inboxes, it is likely to increase the aggregate volume, thereby boosting overall costs. We also examine other response mechanisms, including self-regulation, government regulation, and market mechanisms. The analysis advances understanding of the digital commons, the economics of UCE, and has practical implications for the direct e-marketing industrySPAM; Unsolicited Commercial Email (UCE); Tragedy of the Digital Commons; Simulation

    The dominant Law and Economics paradigm regarding “Intellectual Property" – a vehicle or an obstacle for innovation, growth and progress?

    Get PDF
    The term "intellectual property" is a relatively a modern term, first used in its current meaning when the UN established the World Intellectual Property Organization (WIPO) in 1967. Beforehand laws around the world protected various aspects of informational goods - inventions and creations - using separate legal concepts, such as copyright, patents and trademarks, which were not perceived as property rights. This linguistic aspect is by no means anecdotal or marginal as it can be argued that the term "intellectual property" constituted its contemporary meaning including the economic analysis of informational goods and services, as can be demonstrated by the recent call to treat trade secrets not as a contractual agreement but as intellectual property (Epstein, 2005). This paper focuses on the normative analysis of IP rights and criticizes the implicit shift in economic analysis of IP from the incentives paradigm, which is founded upon the public good analysis of neo-classical micro-economic theory, to the new propriety paradigm, which is intellectually founded upon the tragedy of the commons literature. It further criticizes the dominant contemporary Law and Economics writings in this field as pre-assuming information to be an object of property, overlooking its fundamental differences from physical property and thus focusing on its management and maximization of value for its "owners" rather than on its initial justifications and its social value and contribution to innovation, growth and progress.Law; intellectual property; growth; incentives

    Mitigating the Tragedy Of the Digital Commons: The Problem of Unsolicited Commercial E-Mail

    Get PDF
    The growth of unsolicited commercial e-mail (UCE) imposes increasing costs on organizations and causes considerable aggravation on the part of e-mail recipients. A thriving anti-spam industry addresses some of the frustration. Regulation and various economic and technical means are in the works. All anti-spam measures aim at bringing down the flood of unwanted commercial e-mail. This paper draws on scholarly work in marketing, resource ownership, and use. Adapting the tragedy of the commons concept to e-mail, we identify a causal structure that drives the direct e-marketing industry. Computer simulations indicate that although filtering may be an effective method to curb UCE arriving at individual inboxes, it is likely to increase the aggregate volume, thereby boosting overall costs. We also examine other response mechanisms, including self-regulation, government regulation, and market mechanisms. We find that, of the various countermeasures, filtering appears to be the best currently available but that none are a satisfactory solution. The analysis advances understanding of the digital commons, the economics of UCE, and provides practical implications for the direct e-marketing industry

    Subversive Legal Education:Reformist Steps TowardAbolitionist Visions

    Get PDF
    Exclusivity in legal education divides traditional scholars, students, and impacted communities most disproportionately harmed by the legal education system. While traditional legal scholars tend to embrace traditional legal education, organic jurists—those who are historically excluded from legal education and those who educate themselves and their communities about their legal rights and realities—often reject the inaccessibility of legal education and its power. This Essay joins a team of community legal writers to imagine a set of principles for subversive legal education. Together, we—formerly incarcerated pro se litigants, paralegals for intergenerational movement lawyering initiatives, first-generation law students and lawyers, persons with years of formal legal expertise, and people who have gained expertise outside of law schools—bring together critical insight about the impact of legal education’s exclusivity and the means by which we have worked to expand access necessary for our survival. The Essay explores the frameworks of movement law, Black feminism, and abolition as impacted people look to reclaim experiences and create tools for subversive legal education that teaches that the law belongs to the people and how they themselves can make and change the law. In Part I, we explore reformist strategies that address the pervasive racism in legal education and the bar admission system while leaving the institutional framework intact. In Part II, we share four case studies of transformative legal tools; these tools work to subvert legal education from a machine that excludes, extracts, and exploits our communities into a mechanism that educates and liberates our communities. In Part III, these case studies illuminate principles that prioritizes access, transparency, and collective design with impacted scholars and communities. This is a first step toward abolition—a radical reimagination of legal education that makes legal knowledge a right, that democratizes legal power, and that recognizes that the production of legal knowledge, teaching, and scholarship must include those whom the law impacts, consistent with the disability rights activism mantra “Nothing About Us Without Us.” For us, abolishing the existing structures perpetuating exclusive enclaves in legal education can assist in other abolitionist struggles, such as abolition of the prison industrial complex; these struggles are tied, not siloed from one another

    The Parthenon, April 16, 2013

    Get PDF
    The Parthenon, Marshall University’s student newspaper, is published by students Monday through Friday during the regular semester and weekly Thursday during the summer. The editorial staff is responsible for the news and the editorial content

    Always in control? Sovereign states in cyberspace

    Get PDF
    For well over twenty years, we have witnessed an intriguing debate about the nature of cyberspace. Used for everything from communication to commerce, it has transformed the way individuals and societies live. But how has it impacted the sovereignty of states? An initial wave of scholars argued that it had dramatically diminished centralised control by states, helped by a tidal wave of globalisation and freedom. These libertarian claims were considerable. More recently, a new wave of writing has argued that states have begun to recover control in cyberspace, focusing on either the police work of authoritarian regimes or the revelations of Edward Snowden. Both claims were wide of the mark. By contrast, this article argues that we have often misunderstood the materiality of cyberspace and its consequences for control. It not only challenges the libertarian narrative of freedom, it suggests that the anarchic imaginary of the Internet as a ‘Wild West’ was deliberately promoted by states in order to distract from the reality. The Internet, like previous forms of electronic connectivity, consists mostly of a physical infrastructure located in specific geographies and jurisdictions. Rather than circumscribing sovereignty, it has offered centralised authority new ways of conducting statecraft. Indeed, the Internet, high-speed computing, and voice recognition were all the result of security research by a single information hegemon and therefore it has always been in control

    Network Neutrality: A Research Guide

    Get PDF
    The conclusion in a research handbook should emphasise the complexity of the problem than trying to claim a one-size-fits-all solution. I have categorised net neutrality into positive and negative (content discrimination) net neutrality indicating the latter as potentially harmful. Blocking content without informing customers appropriately is wrong: if it says ‘Internet service’, it should offer an open Internet (alongside walled gardens if that is expressly advertised as such). The issue of uncontrolled Internet flows versus engineered solutions is central to the question of a ‘free’ versus regulated Internet. A consumer- and citizen-orientated intervention depends on passing regulations to prevent unregulated nontransparent controls exerted over traffic via DPI equipment, whether imposed by ISPs for financial advantage or by governments eager to use this new technology to filter, censor and enforce copyright against their citizens. Unraveling the previous ISP limited liability regime risks removing the efficiency of that approach in permitting the free flow of information for economic and social advantage. These conclusions support a light-touch regulatory regime involving reporting requirements and co-regulation with, as far as is possible, market-based solutions. Solutions may be international as well as local, and international coordination of best practice and knowledge will enable national regulators to keep up with the technology ‘arms race’

    Protecting the infrastructure: 3rd Australian information warfare & security conference 2002

    Get PDF
    The conference is hosted by the We-B Centre (working with a-business) in the School of Management Information System, the School of Computer & Information Sciences at Edith Cowan University. This year\u27s conference is being held at the Sheraton Perth Hotel in Adelaide Terrace, Perth. Papers for this conference have been written by a wide range of academics and industry specialists. We have attracted participation from both national and international authors and organisations. The papers cover many topics, all within the field of information warfare and its applications, now and into the future. The papers have been grouped into six streams: • Networks • IWAR Strategy • Security • Risk Management • Social/Education • Infrastructur
    • …
    corecore