Research

29 December 2013

China's Media: The Impact of the Internet by Richard Cullen & D. W. Choy [San Diego international Law Review] Social Science Research Network

Abstract: This article reviews the operation, growth and particularly the (often confused and complex) regulation of the Internet within the People's Republic of China; both the largest and most successful (by many measures) One Party State the world has seen.

Read full article

23 December 2013

The App Economy OECD

Mobile applications, also known as "apps", are a highly innovative and are an expanding sector of the economy, so policy makers are keen to maximise their innovative potential. Mobile platform markets are fiercely competitive, as highlighted by the recent rise and decline of platforms such as Blackberry, and governments are rightfully allowing market mechanisms to play out with minimal government intervention.

Read full article

17 December 2013

Censorship V3.1 by Derek E. Bambauer [Arizona Legal Studies Discussion Paper] Social Science Research Network

Abstract: Internet censorship has evolved. In Version 1.0, censorship was impossible; in Version 2.0, it was a characteristic of repressive regimes; and in Version 3.0, it spread to democracies who desired to use technology to restrain unwanted information. Its latest iteration, Version 3.1, involves near-ubiquitous censorship by democratic and authoritarian countries alike.

Read full article

26 November 2013

Privacy in Cyberworld: Why Lock the Gate After the Horse Has Bolted? by Lisa Collingwood European Journal of Law and Technology

Abstract: In this paper, the author sets out to critique the way in which the principles of off-line privacy protection apply in an on-line environment. The UK approach will be focused upon, the objective being to consider what (non-celebrity) on-line claimants might expect in bringing a privacy violation claim through the domestic courts. The essential characteristics of communicating on-line will be examined so as to explore the nature of an action in misuse of private information and the potential hurdles that require to be overcome before a claim in privacy violation can be remedied at common law.

Read full article

18 November 2013

Thinking Clearly About Multistakeholder Internet Governance by Dr. Laura DeNardis (American University ; Yale Information Society Project) & Mark Raymond (Centre for International Governance Innovation) Social Science Research Network

Abstract: Efforts to study and practice Internet governance start, virtually without exception, from the premise that the Internet is governed by an innovative, unusual (perhaps unique) 'multistakeholder' model. Preserving that model is a primary goal for the broader Internet community as well as for many governments, though not for all. Viewing multistakeholderism as a teleological goal for Internet governance creates several problems. First, multistakeholderism is often elevated as a value in itself rather than as a possible approach to meeting more salient public interest objectives such as preserving Internet interoperability, stability, security, and openness. Second, multistakeholder governance may not be appropriate in every functional area of Internet governance. Internet coordination is not a monolithic practice but rather a multilayered series of tasks of which some are appropriately relegated to the private sector, some the purview of traditional nation-state governance or international treaty negotiations, and some more appropriately multistakeholder. It is a misnomer to speak not only of multistakeholder governance but also of Internet governance as a single thing.

Read full article

28 October 2013

The Three Strikes And You Are Out Challenge by Felipe Romero Moreno European Journal of Law and Technology

Abstract: The UK Digital Economy Act 2010 (DEA), which comprises graduated response measures intended to prevent virtual intellectual property (IP) contravention has generated heated debate. While some research has started to investigate the provisions for dealing with online copyright infringement, little attention has been paid to the fact that technology is fast exceeding the confines of this legislation.

Read full article

14 October 2013

Three songs and you are disconnected from cyberspace? Not in Germany where the industry may 'turn piracy into profit' by Sandra Schmitz & Thorsten Ries European Journal of Law and Technology

Abstract: Musical and cinematographic works are shared on a large scale via the Internet, often disrespecting copyrights. State initiatives seek to curtail online copyright infringements in different ways; the latest being graduated response schemes, where the alleged infringer is initially warned twice before he is sanctioned. In this context questions arise inter alia as regards the identification of the actual infringer, information rights of the rights holder, reliability of tracking methods or judicial review of the allegations. In this context, it is of some interest to see how these questions are dealt with under similar regimes. This paper outlines how these questions and online copyright infringements in general are targeted under German civil law and how this has become a profitable tool of the music and film industry, in particular following the introduction of further information rights by the Enforcement Directive. It critically evaluates the recent developments in Germany and argues for a more restrictive interpretation of the relevant provision of the German Copyright Act.

Read full article

07 October 2013

The Internet Economy on the Rise: Progress since the Seoul Declaration OECD

This publication reviews progress made since the 2008 OECD Seoul Declaration for the Future of the Internet Economy and identifies areas for future work. Seven themes are addressed in the work as follows:

Read full article

30 September 2013

Response to the consultation by the Body of European Regulators in Electronic Communications BEREC on Net Neutrality Policy by Joseph Savirimuthu European Journal of Law and Technology

... On 22 June 2011, it was reported that the Netherlands became the first country in Europe to legislate for Network Neutrality principles. Information and communication service providers like mobile telephone operators are now banned from blocking or charging consumers extra for using Internet-based communication services. In the United States, the Federal Communications Commission adopted a set of rules for its Net Neutrality policy, which comes into operation on 20 November 2011. The industry has not fully endorsed this policy and has launched a legal challenge. Network Neutrality policymaking provokes a wide range of reactions as evidenced by consultation processes in the US, UK and EU. These reactions are in essence a product of the perspectives the various actors in this debate bring to bear (e.g. policymakers, industry, innovators, consumers and citizens) on questions relating to who can or should define the rules on what we access, how we access and what we consume from providers like ISPs, Google, Apple, Skype, broadcasting and telecommunication companies.

Read full article

13 September 2013

Response to the consultation by the Body of European Regulators in Electronic Communications BEREC on Net Neutrality Policy by Joseph Savirimuthu European Journal of Law and Technology

Abstract: This is a collaborative submission from a group of academics based in the UK with expertise in Information technology law and related areas. The preparation of the response has been funded by the British and Irish Law Education Law and Technology Association. The response has been co-ordinated by the Information Technology Think Tank, which is supported by the Arts & Humanities Research Council and led by the SCRIPT/AHRC Centre for Research and Intellectual Property and Technology, University of Edinburgh. This response has been prepared by Joseph Savirimuthu, a Lecturer in Law at the University of Liverpool.

Read full article

03 September 2013

Jurisdiction for Human Rights Violations on the Internet by Gregor Heissl European Journal of Law and Technology

Abstract: The lack of regional confinement is the Internet's main characteristic feature. Due to that the determination of jurisdiction for probable third party Human Rights violations is challenging. Existing regulations are strongly related to certain territories. This essay discusses a new approach from the US-American legal order including the aiming of the information.

Read full article

25 August 2013

Countering the dangers of online pornography - shrewd regulation of lewd content? by Julia Hornle European Journal of Law and Technology

Abstract: This Article will detail how the UK has responded to the greater risks posed by illegal online content by successively extending the reach of the substantive criminal laws and by taking preventative measures. It will focus on the example of laws on obscene content on the internet and associated online behaviour and in particular on the 'grooming' offences, the law on extreme pornography and virtual child abuse images.

Read full article

19 August 2013

Internet Governance is Our Shared Responsibility by Vinton G. Cerf, Patrick S. Ryan & Max Senges [A Journal of Law and Policy for the Information Society] Social Science Research Network

Abstract: This essay looks at the the different roles that multistakeholder institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the Internet's layered model. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications as an illustration for why it is important for different institutions within the governance system to focus on their respective areas of expertise (e.g., the ITU, ICANN, and IGF).

Read full article

15 August 2013

Response to the Consultation 'Regulating Online Gambling in the EU: Recent Developments and Current Challenges from the Internal Market Standpoint' by Abhilash Nair & Dinusha Mendis European Journal of Law and Technology

Abstract: This is a collaborative submission from a group of academics based in the UK with expertise in information technology law and related areas. The preparation of this response has been funded by the Information Technology Think Tank, which is supported by the Arts and Humanities Research Council and led by the SCRIPT/AHRC Centre for Research in Intellectual Property and Technology, University of Edinburgh.

Read full article

11 August 2013

Copyright enforcement measures: the role of the ISPs and the respect of the principle of proportionality by Alexandra Giannopoulou European Journal of Law and Technology

Abstract: In their effort to enforce a regulation system on the internet, several countries introduced the graduated response system (otherwise known as "three strikes and you're disconnected"). Since then, it started gaining popularity all over the world whether in a legislated form or in a form of private agreements between major copyright holders and internet service providers. On an international level, the final version of the Anti-Counterfeiting Trade Agreement (ACTA) was published on 3 December 2010. Although it does not directly suggest the application of a graduated response system, it establishes a legal ground on which member states can justify the instauration of such a system.

Read full article

01 August 2013

Name Suppression Orders and Web 2.0 Media: the New Zealand Experience by Jonathan Barrett European Journal of Law and Technology

Abstract: This commentary discusses the impact of Web 2.0 media on name suppression orders in New Zealand criminal trials. Specific consideration is given to offenders who are well known as they are most likely to attract the attention of bloggers.

Read full article

19 July 2013

Finding a Common Ground in the Quicksand of Online Defamation Developments by Lawrence Siry & Sandra Schmitz European Journal of Law and Technology

Abstract: Nowhere is the world smaller than on the Internet. With one mouse click, people from across the globe can re-acquaint themselves with old friends, research the unknown, read newspapers from faraway places and times. As the world cyber-shrinks, the ways in which governments and courts attempt to control the information on the web has become diverse and contradictory. Issues of national interest and international jurisdiction have stretched across all aspects of the web. We must find a more cooperative, coherent and consistent international policy, one which fosters the free flow of information, while protecting personality rights.

Read full article

08 July 2013

From Archie to Google:Search engine providers and emergent challenges in relation to EU competition law by Aysem Diker Vanberg European Journal of Law and Technology

Abstract: Search engines are crucial for locating and accessing the vast amount of digital content. Hence they are subject to close scrutiny by the media, governments and scholars. On November 30, 2010, the European Commission opened an antitrust investigation into allegations that Google Inc. has abused a dominant position in online search in violation of Article 102 of the Treaty on the Functioning of the European Union (Article 102 TFEU). The investigation sparked an ongoing debate in relation to the potential for anti-competitive conduct by search engines, in particular the potential for abuse of dominance.

Read full article

03 July 2013

Finding Jurisdiction to Regulate Google and the Internet by Conall O'Reilly European Journal of Law and Technology

Abstract: In the recent case of Football Dataco v Sportradar, the High Court determined that questions of online jurisdiction hinge on the location of the web-server at hand.This paper aims first to highlight the flaws of this approach and, using Google's privacy policy as an example, to draw attention to the online dangers that it facilitates.

Read full article

23 June 2013

Global Internet Law in a Nutshell by Michael L. Rustad & Michael L. Rustad [Suffolk University Law School Research Paper] Social Science Research Network

Abstract: Global Internet law distills the main contours of settled Internet law, as well as areas that are still evolving. The goal is to provide the reader a succinct exposition of basic concepts and methods in diverse Internet law topics, as well as multiple perspectives on what shape the law should take. This second edition of the Nutshell expands the scope to include global developments, as well as U.S. Internet law because, since the previous edition, Internet law is less U.S. centric.

Read full article

23 May 2013

Virtual Crimes, Real Damages Part II: What Businesses Can Do Today to Protect Themselves from Cybercrime, and What Public-Private Partnerships are Attempting to Achieve for the Nation of Tomorrow by Fernando M. Pinguelo, Wayne Lee & Bradford W. Muller Virginia Journal of Law and Technology

In their first piece, Virtual Crimes, Real Damages: A Primer on Cybercrime In the United States and Efforts to Combat Cybercriminals, Pinguelo and Muller offered a straight-forward discussion of the major forms of cybercrimes affecting the government and business community today, along with a review of federal efforts to combat cybercrime and a compilation of federal and state cyber-related statutes and pending legislation.

Read full article

15 May 2013

Social Media Privacy - A Dozen Myths and Facts by Lothar Determann Stanford Technology Law Review

Social networks and media are one of the latest frontiers for lawyers, lawmakers, politicians, entrepreneurs and academics. No one seems to claim that social media is the final frontier or even a particularly revolutionary frontier. After all, media and social networks have been around for thousands of years in one form or another. But, most are genuinely fascinated with the new opportunities, risks, and questions presented by the recent rapid rise of novel technology platforms that allow people all over the world to connect and communicate in new ways.

Read full article

05 May 2013

Privacy in Cyberworld: Why Lock the Gate After the Horse Has Bolted? by Lisa Hannah Collingwood European Journal of Law and Technology

Abstract: In this paper, the author sets out to critique the way in which the principles of off-line privacy protection apply in an on-line environment. The UK approach will be focused upon, the objective being to consider what (non-celebrity) on-line claimants might expect in bringing a privacy violation claim through the domestic courts. The essential characteristics of communicating on-line will be examined so as to explore the nature of an action in misuse of private information and the potential hurdles that require to be overcome before a claim in privacy violation can be remedied at common law.

Read full article

30 April 2013

The Three Strikes And You Are Out Challenge by Felipe Romero Moreno European Journal of Law and Technology

Abstract: The UK Digital Economy Act 2010 (DEA), which comprises graduated response measures intended to prevent virtual intellectual property (IP) contravention has generated heated debate. While some research has started to investigate the provisions for dealing with online copyright infringement, little attention has been paid to the fact that technology is fast exceeding the confines of this legislation. Drawing on, inter alia, the provisions of the DEA, a number of online copyright infringement cases and some European Court on Human Rights (ECtHR) jurisprudence, this paper evaluates the suitability of the graduated response approach to copyright enforcement where internet subscribers alleged to be unlawfully file-sharing will be disconnected from the internet following increasingly strong warnings.

Read full article

18 April 2013

Three songs and you are disconnected from cyberspace??? Not in Germany where the industry may 'turn piracy into profit' by Sandra Schmitz & Thorsten Ries European Journal of Law and Technology

Abstract: Musical and cinematographic works are shared on a large scale via the Internet, often disrespecting copyrights. State initiatives seek to curtail online copyright infringements in different ways; the latest being graduated response schemes, where the alleged infringer is initially warned twice before he is sanctioned. In this context questions arise inter alia as regards the identification of the actual infringer, information rights of the rightsholder, reliability of tracking methods or judicial review of the allegations.

Read full article

Registrar Solutions