نتایج جستجو برای: internet law

تعداد نتایج: 336363  

2013
Esma Aïmeur Gilles Brassard Jonathan Rioux

Online privacy has become a raising concern for digital citizens within the past few years. As users of the Internet, we are in an uncomfortable situation regarding the protection of our online data. We share, tweet, like and follow at an ever-increasing rate, while at the same time getting more aware of the possible dangers of privacy breach or identity theft. Is it possible to navigate on the...

2012
Jill Slay Matthew Simon David Irwin

The popularity of Voice over the Internet Protocol (VoIP) for providing voice communication over IP networks such as the Internet has resulted in VoIP becoming a global telephony service. VoIP applications convert analogue voice signals into a digital format, which is then encapsulated into IP packets for transmission over the Internet. Our research has examined both the security and privacy im...

2001
Ian Taylor

Cyber-Rights & Cyber-Liberties (UK) (http://www.cyber-rights.org), is a non profit organisation established to protect the interests of all honest, law abiding Internet users with the aim of promoting free speech and privacy on the Internet. It was founded in 1997 and has been actively involved with the Internet policy making process of the UK government, the European Union, Council of Europe, ...

Journal: :I. J. Law and Information Technology 2010
Daithí Mac Síthigh

The Internet Corporation for Assigned Names and Numbers (ICANN) is assessed in this paper as having a special role in the development of the law of new media, recognising both the importance of its management of the global domain name system and how questions of institutional legitimacy have highlighted the lack of agreement on the role of law in the governance of the global Internet. In order ...

2013
Mohammad Atwah Al-ma'aitah

Recently communications and information technology became widely used in various aspects of life. The internet becomes the main network for information support. Using of internet enabled public and private organizations to develop its business and expand its activities. Private organizations applied the principles of e-commerce to improve the quality of services which provided to customers. Whi...

Journal: :JDFSL 2011
Matthew Phillip Simon

Communication technologies are commonplace in modern society. For many years there were only a handful of communication technologies provided by large companies, namely the Public Switched Telephone Network (PSTN) and mobile telephony; these can be referred to as traditional communication technologies. Over the lifetime of traditional communication technologies has been little technological evo...

Journal: :J. Cybersecurity 2015
Harold Abelson Ross J. Anderson Steven M. Bellovin Josh Benaloh Matt Blaze Whitfield Diffie John Gilmore Matthew Green Susan Landau Peter G. Neumann Ronald L. Rivest Jeffrey I. Schiller Bruce Schneier Michael A. Specter Daniel J. Weitzner

Twenty years ago, law enforcement organizations lobbied to require data and communication services to engineer their products to guarantee law enforcement access to all data. After lengthy debate and vigorous predictions of enforcement channels “going dark,” these attempts to regulate the emerging Internet were abandoned. In the intervening years, innovation on the Internet flourished, and law ...

2001
Janice C. Sipior Burke T. Ward

The primary responsibility of the Chief Privacy Officer (CPO) is to protect online consumer privacy by developing an organization’s privacy policy and ensuring compliance with privacy laws and regulations. However, the explosive growth of internet use for business has brought about an escalation of concerns including reduced consumer confidence in internet-related business activities, risk of f...

2003
P. Branch

When compared with access network interception, Lawful Interception of the Internet is both more difficult and much less mature. However, Internet interception is becoming increasingly more important as Law Enforcement Agencies find that access network interception is becoming less effective. Unfortunately, the most common approach to Internet interception has some fundamental weaknesses, which...

2013
Christopher S. Yoo

Follow this and additional works at: http://scholarship.law.upenn.edu/faculty_scholarship Part of the Communication Technology and New Media Commons, Computer and Systems Architecture Commons, Computer Law Commons, Digital Communications and Networking Commons, Internet Law Commons, Mass Communication Commons, Science and Technology Commons, Science and Technology Policy Commons, and the Scienc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید