Research

13 May 2012

The age of Web diplomacy: Exploration of international broadcasting online by Aziz Douai First Monday

Abstract: This paper examines the Web sites of 10 international broadcasters targeting Arabic speaking audiences in the Middle East. Data from 2006 and 2009 are used to compare the formal features of the sites, mainly domain names, hyperlinks and type of news stories presented on the sites.

Read full article

10 May 2012

The value of online friends: Networked resources via social network sites by Michael A. Stefanone, Kyounghee Kwon, Derek Lackaff First Monday

Abstract: This study investigated the instrumental value of resources embedded in online social networks. 49 primary participants solicited a total of 588 secondary participants who were asked to complete a modest task.

Read full article

29 April 2012

Conflicts between Trademarks and Domain Names: A Critical Analysis by Snehlata Singh Social Science Research Network

Abstract: The essay discusses the issue of conflicts between trademarks and domain names. It discusses in detail the causes and kinds of the disputes and what the current legal system has to offer to this situation. Conflicts such as cybersquatting, typosquatting, reverse domain name hijacking are discussed in length with the help of relevant case laws.

Read full article

OECD: Measuring the Broadband Bonus in Thirty OECD Countries OECD

This paper provides estimates of the economic value created by broadband Internet using measures of new gross domestic product and consumer surplus. The study finds that the economic value created in 30 OECD countries correlates roughly with the overall size of their broadband economies.

Read full article

15 April 2012

Measuring the Internet: The Data Challenge OECD

This working paper reviews a number of the challenges and opportunities confronting analysts interested in measuring the Internet and its economic and social impacts. It identifies several additional challenges to the measurement issue, in addition to all of the normal problems one expects when measuring information and communication technologies (ICTs). These challenges are related to: the rapidly changing nature of the Internet, the need for more granular data in order to understand the complex nature of the Internet, and the phenomenon of big data and the resulting ability to measure almost anything.

Read full article

12 April 2012

Wireless Efficiency Versus Net Neutrality by Charles L. Jackson Federal Communications Law Journal

This Article first addresses congestion and congestion control in the Internet. It shows how congestion control has always depended upon altruistic behavior by end users. Equipment failures, malicious acts, or abandonment of altruistic behavior can lead to severe congestion within the Internet. Consumers benefit when network operators are able to control such congestion.

Read full article

01 April 2012

The Right to Be Forgotten? by Conrad Coutinho Columbia Science and Technology Law Review

Have you ever Googled your own name? Statistics say that you probably have. Egotism aside, in a world where potential employers, schools and even romantic partners are likely to Google you, it would be irresponsible not to be aware of what pops up when you search your name. Many experts (and this non-expert) even recommend setting up a Google alert in your name.

Read full article

25 March 2012

Extending Tort Liability To Creators Of Fake Profiles On Social Networking Websites by Bradley Kay Chicago-Kent Journal of Intellectual Property

In today's world, social media has become ubiquitous. While social media provides opportunities for networking, there are also opportunities for exploitation. Courts and legislatures have provided remedies for some wrongs that can occur on social networking websites.

Read full article

18 March 2012

Negotiating a New Governance Hierarchy: An Analysis of the Conflicting Incentives to Secure Internet Routing by Brenden Kuerbis & Milton Mueller [Communications and Strategies] Social Science Research Network

Abstract: New security technologies are never neutral in their impact; it is known that they can alter power relations and economic dependencies among stakeholders. This article examines the attempt to introduce the Resource Public Key Infrastructure (RPKI) to the Internet to help improve routing security, and identifies incentives various actors have towards RPKI implementation.

Read full article

11 March 2012

Sixteen, Sexting, and a Sex Offender: How Advances in Cell Phone Technology Have Led to Teenage Sex Offenders by Megan Sherman Boston University Journal of Science & Technology Law

In 2007, a Florida state court prosecuted a sixteen-year-old girl, A.H., for electronically sending nude pictures of herself to her seventeen-year-old boyfriend. The court charged A.H. and her boyfriend with producing, directing, and promoting child pornography. Under Florida's child pornography laws, A.H. faces a severe prison sentence and may be required to register as a sex offender for the remainder of her life if convicted. "Imagine in the year 2063, a 70-year-old woman having to post a notice that she is a registered sex offender because of a camera-phone picture she snapped of herself in 2009."

Read full article

08 March 2012

Persistent Enemies and Cyberwar: Rivalry Relations in an Age of Information Warfare by Brandon G Valeriano & Ryan Maness [Western Political Science Association 2011 Annual Meeting Paper] Social Science Research Network

Abstract: As society moves into the digital age, international interactions are increasing hinge on cyber technologies for the realms of diplomacy, military, business, social interactions, and commerce. Technology has become a necessary aspect of daily life and interstate relations. When goods and activities are critical and valuable to society, these activities also become predatory targets.

Read full article

08 February 2012

Why Is Facebook So Successful? Psychophysiological Measures Describe a Core Flow State While Using Facebook by Maurizio Mauri, Pietro Cipresso, Anna Balgera, Marco Villamira, and Giuseppe Riva Cyberpsychology, Behavior, and Social Networking

Abstract: People are more and more using social networking sites (SNSs) like Facebook and MySpace to engage with others. The use of SNSs can have both positive and negative effect on the individual; however, the increasing use of SNSs might reveal that people look for SNSs because they have a positive experience when they use them. Few studies have tried to identify which particular aspects of the social networking experience make SNSs so successful. In this study we focus on the affective experience evoked by SNSs.

Read full article

05 February 2012

An Economic Map of Cybercrime by Jens Grossklags, John Chuang, Chris Jay Hoofnagle, Alfredo Alvarez Cardenas & Svetlana Radosavac [TPRC 2009] Social Science Research Network

Abstract: The rise of cybercrime in the last decade is an economic case of individuals responding to monetary and psychological incentives. Two main drivers for cybercrime can be identified: the potential gains from cyberattacks are increasing with the growth of importance of the Internet, and malefactors' expected costs (e.g., the penalties and the likelihood of being apprehended and prosecuted) are frequently lower compared with traditional crimes. In short, computer-mediated crimes are more convenient, and protable, and less expensive and risky than crimes not mediated by the Internet. The increase in cybercriminal activities, coupled with ineffective legislation and ineffective law enforcement pose critical challenges for maintaining the trust and security of our computer infrastructures.

Read full article

29 January 2012

Www.Aussiefirewall.Com.Au/Blocked by Mitchell Landrigan [Communications Law Bulletin] Social Science Research Network

Abstract: The article reviews the Australian government's mandatory ISP filtering regime. It commends the Australian government for its action in seeking to regulate the distribution of sexually explicit content involving children. The effectiveness of the mandatory ISP filtering regime is, however, another matter.

Read full article

26 January 2012

The Internet and its Opportunities for Cybercrime by Bert-Jaap Koops [Transnational Criminology Manual] Social Science Research Network

Abstract: The Internet deserves special attention in criminology as well as criminal law and policy, because of several characteristics: it is global, instantaneous, intrinsically transborder, digital, and enables automated information processing. Because of these characteristics, the Internet provides special opportunities to commit cybercrimes: crimes in which computer networks are the target or a substantial tool.

Read full article

22 January 2012

Net Neutrality as Diplomacy by Jonathan Zittrain http://yalelawandpolicy.org/29/net-neutrality-as-diplomacy

Abstract: Popular imagination holds that the turf of a state's foreign embassy is a little patch of its homeland. Enter the American Embassy in Beijing and you are in the United States. Indeed, in many contexts - such as resistance to search and seizure by a host country's authorities - there is an inviolability to diplomatic outposts. These arrangements have been central to diplomacy for decades so that diplomats can perform their work without fear of harassment and coercion.

Read full article

16 January 2012

Keywords Advertising: Issues of Trademark Infringement by Althaf Marsoof Journal of International Commercial Law and Technology

Abstract: The Internet has become a crucial advertising tool for modern-day businesses. Increasingly, business enterprises are opting for online presence, and this phenomenon has significantly transformed advertising techniques. Consumers wish to spend less time and gain optimal results whilst searching for products and services on the Internet. In this setting, enterprising entities, such as Google, have sought to make maximum use of the need for online presence which has given rise to Internet advertising schemes such as Google's 'AdWords.

Read full article

03 January 2012

Governments, Privatization, and "Privatization": ICANN and the GAC by Jonathan Weinberg Michigan Telecommunications and Technology Law Review

What kind of organization, then, is ICANN? It is in form a private body, a California-based ยง 501(c)(3) nonprofit corporation.5 Yet when it comes to ICANN, the usual lines between what is private and what is public have always been blurred. In this Essay, I will address the relationship between ICANN and national governments, and how that relationship has changed over time. I'll discuss the changing nature of ICANN's relationship with the U.S. government, as well as the evolution of other national governments' policy-making role within ICANN.

Read full article

01 January 2012

Vertical Separation of Telecommunications Networks: Evidence from Five Countries by Robert W. Crandall, Jeffrey A. Eisenach, and Robert E. Litan Federal Communications Law Journal

The widespread adoption of mandatory unbundling in telecommunications markets has led to growing interest in mandatory "functional separation," i.e., separation of upstream network operations from downstream retail operations. Since 2002, vertical separation has been implemented in five OECD countries: Australia, Italy, New Zealand, Sweden, and the United Kingdom.

Read full article

18 December 2011

Applying Copyright Abandonment in the Digital Age by Matthew W. Turetzky Duke Law & Technology Review

Abstract: Copyright law protects orphan and parented works equally--but it shouldn't. Consequently, current law unnecessarily restrains public access to works that authors have not exercised dominion over for decades.This problem has come to the fore in the Google Books settlement, which critics argue will give Google a de facto monopoly over orphan works.

Read full article

11 December 2011

Telecommunications (interception and access) and its Regulation in Arab Countries by Nazzal Kiswani Journal of International Commercial Law and Technology

Abstract: Telecommunication has been a necessity in all countries this century. Communication has always been an essential part of our lives, education, family relations, business, government and other organizational activities. As telecommunication technology has advanced, so has the need for the interception of telecommunications and access by law enforcement authorities.

Read full article

15 November 2011

Pricing and Efficiency in the Market for IP Addresses Harvard Business School Working Knowledge

This paper by Benjamin Edelman and Michael Schwarz model the market for IPv4 addresses, including evaluating novel rules intended to avoid possible harms from the purchase and sale of IP addresses, as well as predicting price trends.

Read full article

14 November 2011

The Law and Politics of Net Neutrality: Part 2 by Jeff Kao Columbia Science and Technology Law Review

In the previous post, I wrote about the recent history of net neutrality, the Open Internet Rules in the works, and the ensuing backroom dealings and legislative battles. But now that the mid-term elections are over, has the future of net neutrality rules changed, and is net neutrality dead?

Read full article

06 November 2011

The Law and Politics of Net Neutrality: Part 1 by Jeff Kao Columbia Science and Technology Law Review

The current political climate portends significant political changes following today's midterm elections. The balance of power will likely shift back toward the right, greatly reducing the governing mandate of the Democratic Party. The current administration's ability to push policies through will be tempered by a shift of power in Congress, possibly preventing the Obama administration from achieving its stated policy goals after two years in power.

Read full article

30 October 2011

Knowledge and Misfeasance: Tiffany v. eBay and the Knowledge Requirement of Contributory Trademark Infringement by Matthew C. Berntsen Boston University Journal of Science & Technology Law

Introduction: eBay created a new business model, made possible by the internet. The popular legend is that eBay was originally intended as a site at which consumers could offer for sale and sell still useable items sitting in garages and basements. But it blossomed into the world's largest marketplace where anonymous sellers offer unseen and unexamined merchandise to distant buyers. Given such circumstances, it was not long before the counterfeiters and grifters of the world realized that the site could be exploited by them without risk.

Read full article

Registrar Solutions