• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 6
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 51
  • 51
  • 37
  • 19
  • 19
  • 12
  • 11
  • 11
  • 10
  • 10
  • 9
  • 9
  • 9
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Whether the use of tracking cookies without the user consent interferes with their privacy? / Ar sekimo slapukų naudojimas be vartotojo sutikimo pažeidžia jo privatumą?

Bučiūtė, Raminta 19 June 2014 (has links)
Nowadays most of the information is gathered through the internet, where a vast amount of data is being exchanged every second. However, most of the cyberspace users are not fully aware of the technological side of the Internet. One of the tools used on the Internet to ensure instant and informative service to users, are cookies, a small piece of collected data about user’s preferences. Data collected and combined from different cookies creates a serious danger to users’ privacy. The fact that users are not always aware of their data being collected even sharpens the problem of privacy protection on the Internet. The purpose of this thesis was to examine the consent requirement for the use of tracking cookies in legal framework of European Union, United States of America and Lithuania and to find out if the use of tracking cookies without user consent interferes with users’ right to privacy. In order to achieve the aim of this work, descriptive-interpretive research approach was used in the first part of thesis to analyse various concepts of privacy, defined in different scientific literature, as well as different types of cookies and their purpose. In the second part of thesis, normative-comparative approach was used to analyse various legal systems, their essential laws and principles, theoretical backgrounds and their requirements for the valid user consent intended for the use of cookies. The principal conclusion was that use of tracking cookies without unambiguous... [to full text] / Šiuolaikinėje globalioje žinių visuomenėje, teisė ne visuomet yra pajėgi sureguliuoti pagrindinės valiutos – informacijos, apsaugą. Internetas ir kompiuterinės technologijos suteikia galimybę greitai, pigiai ir nenutrūkstamai keistis dideliais kiekiais informacijos, kaupti ją duomenų bazėse ir apdoroti. Internetu kasdien naudojasi net 40,7% visos pasaulio populiacijos, tai priemonė be kurios daugelis neįsivaizduoja kasdienio savo darbo ir laisvalaikio. Tačiau didžioji interneto vartotojų dalis neturi žinių apie techninę interneto pusę ir grėsmes, kurios gali kilti jiems, jų teisei į privatumą ir duomenų apsaugai internete. Tarptautinė bendruomenė išreiškė susirūpinimą interneto vartotojų privatumo apsauga, Jungtinių Tautų Generalinė Asamblėja priėmė rezoliuciją 68/167 „Teisė į privatumą skaitmeniniame amžiuje“. Šia rezoliucija Jungtinės Tautos ragina valstybes atkreipti dėmesį į pavojus privatumui esančius interntete ir derinti savo įstatymus siekiant suteikti žmogaus teisių ir laisvių aapsaugą interneto vartotojams. Slapukai (angl.-cookies) yra viena iš priemonių, kurią paieškos sistemos, socialiniai tinklai ir kiti interneto aktoriai nuolatos naudoja siekdami suteikti nenutrūkstamas ir kokybiškas paslaugas interneto vartotojams. Dažniausiai slapukai yra naudojami atsiminti vartotojų pirkinių užsakymus, kalbos pasirinkimą, slaptažodžius ir aplankytus puslapius. Vadinamieji sesijos slapukai( angl. -session cookies) yra automatiškai ištrinami iš galinio vartotojo įrenginio... [toliau žr. visą tekstą]
12

Whose community is it anyway? : the CDA and cultural conflicts over speech and pornography

Christian, Mary Ann 06 December 1999 (has links)
The Communication Decency Act became law in 1996 and was immediately challenged on Constitutional grounds. It was subsequently declared unconstitutional based on the First Amendment guarantee of free speech. Using Fantasy Theme Analysis, an analysis of the dramatic elements of the key players was accomplished. The dramatic elements of Overall Theme, Abstract Concept, Hero/Villain interaction and Emotion were the focus of this analysis. The key players have been named the Antiobscenity Crusaders, the Defenders of Liberty and the Homesteaders after the roles they play. The focus of the analysis was an examination of how these groups rhetorically construct the internet as they attempt to persuade the Supreme Court about the Constitutionality of the Communication Decency Act. / Graduation date: 2000
13

Shaping the virtual state: internet content regulation in China (1994-2009)

Hu, Ling, 胡凌 January 2011 (has links)
published_or_final_version / Law / Doctoral / Doctor of Philosophy
14

What is the impact of the Cyber Crime Act on the business community in Mauritius.

Jamalkhan, Nasserkhan. January 2004 (has links)
At this early age of the internet, the e-business environment is almost like a lawless territory. Fast movers are making fortunes whereas rebels can act with impunity and move on before the legal process can catch up. The fast expansion of cyber crimes in the world has been the motivation to perform this research on its impact on the business community in Mauritius after the devastating effects in developing countries. Organisations that are not keeping pace with these realities are becoming vulnerable to cyber criminals or hackers. An analysis of the situation in the world from the literature review has provided a better understanding of the most common crimes that are causing trouble to the businesses and obstacles to the advancement of e-commerce. Compared to earlier technological changes, the internet has shown a rapid proliferation. Organisations have to be ready to face this challenge or they may face the dangers of being attacked or even prosecuted for not having secured their system properly. While securing the internet remains a major challenge for every country, businesses have to cope with limited protection until an international law become in force to control this wild territory. The reports available on the Crime trend show that there has been a steady increase in Computer related crimes in the world. The research is conducted on a sample of IT literate participants. Interviews and focus group discussion have also contributed in the accuracy of the findings. The results and findings demonstrate that there is room for improvement but there is a lack of awareness on the Cyber crime act. Hopefully, this research will help to shed light on the major concerns of the business community. VI / Thesis (MBA)-University of KwaZulu-Natal, Durban, 2004.
15

Copyright law and the Internet : in modern South African law

Ital, Eric Guy 09 1900 (has links)
Thesis (LLM)--University of Stellenbosch, 2000. / ENGLISH ABSTRACT: The Internet is coming more and more into focus of national and international legislation. Especially with regard to copyright law, the rapid growth of the Internet, its global character, its novel technical applications and its private and commercial use by millions of people makes the control over a work complicated and raises copyright problems all over the world. Present legislation is therefore challenged to avoid gaps in the law. Considering the rapid growth of online providers and users in South Africa, it is likely that copyright disputes with regard to the Internet will evolve here soon. In this dissertation, the "world" of the Internet and its lawfulness with regard to existing South African copyright law will be examined. The examination tries to establish whether South African copyright law is able to cope with the present Internet problems and whether it leads to reasonable results. The first chapter of this dissertation will give an overview of the basic principles of the Internet, including the history, development and function of the Internet. Furthermore the changing aspects by means of diqital technology will be discussed. Because the global character of the Internet lead to "international" infringements, governments are considering the prospect of reaching international accord on the protection of intellectual property in the digital era. In chapter two, the present international harmonisation of copyright law will be introduced. Especially the quick adoption of the World Intellectual Property Organisation Treaties in December 1996 demonstrated that an international realisation for a call for action is existing. In chapter three, the application of South African copyright law with regard to the Internet will be discussed. First, it will be examined if a digital work on the Internet is protected in the same way as a "traditional" work. Second, the various rights of the copyright holder are discussed in connection with the use of a work on the Internet. Third, the potential application of the exclusive rights of the copyright holder to various actions on the Internet, such as caching, Web linking and operating an online service will be discussed. The Internet is a worldwide entity, and, as such, copyright infringement on this system is an international problem. The scenario of global, simultaneous exploitation of works on the Internet conflicts sharply with the current system of international copyright protection, which is firmly based on national copyright laws with territorial effects. Section four provides therefore an overview of the applicable law on an international net and analyses the necessity and borders of protection. / AFRIKAANSE OPSOMMING: Nasionale en internasionale wetgewing fokus in In toenemende mate op die Internet. Die versnelde groei van die Internet, sy wêreldkarakter, sy nuwe tegnologiese aanwendings en sy private en kommersiële gebruik deur miljoene mense maak beheer oor In werk baie gekompliseerd en skep veral outeursregprobleme regoor die wêreld. Wetgewing soos dit tans is, word dus uitgedaag om die leemtes in die reg te ondervang. Gegewe die vinnige groei van gekoppelde verskaffers en gebruikers in Suid-Afrika, is dit waarskynlik dat - outeursreggeskille met betrekking tot die Internet binnekort ook hier gaan ontwikkel. In hierdie verhandeling gaan die "wêreld" van die Internet en sy wettigheid onder bestaande Suid-Afrikaanse outeursregwetgewing ondersoek word. In die ondersoek word gepoog om vas te stelof Suid-Afrikaanse outeursregwetgewing geskik is om die Internetprobieme wat tans bestaan te hanteer en of dit lei tot aanvaarbare resultate. Die eerste hoofstuk van die verhandeling sal In oorsig gee van die basiese beginsels van die Internet, insluitende die geskiedenis, ontwikkeling en funksie van die Internet. Verder sal die veranderende aspekte as gevolg van digitale tegnologie bespreek word. Die wêreldkarakter van die Internet gee aanleiding tot "internasionale" inbreukmakings en om hierdie rede oorweeg regerings die moontlikheid van internasionale ooreenkomste oor die beskerming van intellektuele eiendom in die digitale era. In hoofstuk twee word die bestaande internasionale harmonisering van outeursreg bespreek. Veral die vinnige aanname van die World Intellectual Property Organisation se verdrae in Desember 1996, illustreer dat daar In internasionale bewustheid is dat iets in die verband gedoen moet word. In die derde hoofstuk word die aanwending van die Suid-Afrikaanse outeursreg met betrekking tot die Internet bespreek. Eerstens word ondersoek of a digitale werk op die Internet op dieselfde wyse as 'n "tradisionele" werk beskerm kan word. Tweedens word die verskillende regte van die outeursreghebbende in verband met die gebruik van 'n werk op die Internet, bespreek. Derdens word die potensiële aanwending van die eksklusiewe regte van die outeursreghebbende op verskillende aksies op die Internet, soos byvoorbeeld kasberging, web koppeling en die werking van 'n gekoppelde diens, bespreek. Die Internet is 'n wêreldwye verskynsel en sodanig is outeursreginbreukmaking op hierdie stelsel 'n internasionale probleem. Die scenario van 'n wêreldwye, gelyktydige uitbuiting van werke op die Internet is in skerp konflik met die huidige stelsel van internasionale outeursregbeskerming wat stewig gegrond is op nasionale wetgewing met territoriale werking. Hoofstuk vier bied daarom 'n oorsig oor die toepaslike reg op 'n internasionale netwerk en analiseer die nodigheid en ook grense van beskerming.
16

Names, pseudonyms and anonymity in online interactions: a study of name policy on news24, the daily Maverick, and 4chan.

Donald, Katherine Faye January 2017 (has links)
A research report submitted to the Faculty of Arts, University of the Witwatersrand, Johannesburg, in partial fulfilment of the requirements for the degree of Master of Arts, Johannesburg, 2017 / This research investigates real names, pseudonyms, and anonymity online. From its small beginning as a research tool, the internet has grown radically and been increasingly incorporated into people’s daily lives. Simultaneously, as the internet has grown and changed, so have its uses, and perceptions of the naming practices used on it. Attitudes towards acceptable name use online have changed over time. Social networking sites have had a strong influence on name usage policies. This research examines how these attitudes have changed, and the implications of real names, pseudonyms and anonymity for behaviour on the internet and privacy. The radically disembodied nature of online communication lends itself to disinhibition, which in turn has resulted in online communications’ reputation for trolls and abusers. Contrary to the common assumption that the use of real names offline indicates the legitimacy of using real names online, online and offline communications are radically different. Online communications have very different considerations regarding privacy, identity theft, the digital footprint, and collapsed context, many of which are not present in offline communications. This paper examines naming policies and site structure through two case studies. The first case focuses on News24 and the Daily Maverick, both of which are South African news sites. Due to the need for rational and polite discourse, these implemented real name policies in order to enforce good behaviour amongst their users. In both cases, the real name policies failed. The second case study is that of 4chan, the American image board site. 4chan does not require any login process, and its users are typically anonymous. Despite being notorious for trolls, illegal content, and its image board /b/, the site’s architecture, along with the way that posts are created and then kept alive, mean that the site can be effective at moderating the kinds of content that it deems appropriate for each of its boards. Despite the contrasting nature and purposes of the news sites and 4chan, there are lessons to be learnt from the failure of real name policies, and the architecture and set up of sites which can be used to enforce particular behaviours. Furthermore, despite the ephemeral and shifting nature of 4chan, identity and a sense of belonging remain important to its users, hinting at the importance of a sense of identity to site members and the role of this identity in ensuring that users adhere to the norms. / XL2018
17

暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime / Research on criminal law of dark network crime

孫陸陽 January 2018 (has links)
University of Macau / Faculty of Law
18

Das Internet zwischen Regulierung und Selbstregulierung

Kern, Bernhard Georg 23 November 2009 (has links)
Das Internet hat nicht nur eine kaum vorhersehbare Revolution in der Kommunikation hervorgerufen, sondern stellt auch vielfältige Herausforderungen an das Recht. Die besondere Problematik ist dabei, dass die handelnden Personen dies praktisch anonym tun können und dass das Internet auf Grund seiner Struktur inhaltsneutral ist. Daraus wurde in der öffentlichen Diskussion abgeleitet, dass das Internet ein rechtsfreier Raum sei, was aber nicht sein dürfe. Darauf reagiert in einigen Fällen der Gesetzgeber, weitaus häufiger wird die Entwicklung aber von der Rechtsprechung vorangetrieben. Ziel der Arbeit ist es, die spezifisch auf das Internet bezogenen rechtlichen Entwicklungen des Rechts darzustellen und ihre spezifische Problematik aufzuzeigen. Im Kontrast dazu werden die Mechanismen der Rechtsetzung der Organisationen beschrieben, die für die Entwicklung des Internets verantwortlich sind und deren Verfahren auch Vorbild für staatliche Rechtsetzung sein könnten. / The Internet has not only caused a non foreseeable revolution in human communication, it also defies legislation and jurisprudence in many ways. Acting over the internet causes unknown problems as communication on the internet is due to its structure non discriminating regarding the content. Discussion in the public has therefore concluded, that the internet were a anarchic space, a state which could not persist. In many cases this has caused reactions by legislation, although most of the development is carried by jurisprudence. The target of this publication is to show the internet-specific legal developments in Germany and to show their specific problems. In contrast to the state law the mechanisms of standardization by the institutions developing the internet and its standards are described.
19

Using Machine Learning to improve Internet Privacy

Zimmeck, Sebastian January 2017 (has links)
Internet privacy lacks transparency, choice, quantifiability, and accountability, especially, as the deployment of machine learning technologies becomes mainstream. However, these technologies can be both privacy-invasive as well as privacy-protective. This dissertation advances the thesis that machine learning can be used for purposes of improving Internet privacy. Starting with a case study that shows how the potential of a social network to learn ethnicity and gender of its users from geotags can be estimated, various strands of machine learning technologies to further privacy are explored. While the quantification of privacy is the subject of well-known privacy metrics, such as k-anonymity or differential privacy, I discuss how some of those metrics can be leveraged in tandem with machine learning algorithms for purposes of quantifying the privacy-invasiveness of data collection practices. Further, I demonstrate how the current notice-and-choice paradigm can be realized by automatic machine learning privacy policy analysis. The implemented system notifies users efficiently and accurately on applicable data practices. Further, by analyzing software data flows users are enabled to compare actual to described data practices and regulators can enforce those at scale. The emerging cross-device tracking practices of ad networks, analytics companies, and others can be supplemented by machine learning technologies as well to notify users of privacy practices across devices and give them the choice they are entitled to by law. Ultimately, cross-device tracking is a harbinger of the emerging Internet of Things, for which I envision intelligent personal assistants that help users navigating through the increasing complexity of privacy notices and choices.
20

Custom as a source of supranational internet commerce law

Polanski, Paul Przemyslaw January 2003 (has links) (PDF)
The Internet has changed the world. Its impact on the global society has been enormous, redefining almost every aspect of our life. It has also added a new quality to traditional commerce that in many instances has drastically transformed the way companies and individuals trade. However, electronic commerce is not a legally safe environment, as there exists a regulatory gap that introduces uncertainty surrounding rights and obligations in cyberspace. This may result in unexpected outcomes for e-commerce participants involved in litigation.

Page generated in 0.0758 seconds