Don't forget to check out http://auda.org.au/domain-news/ for today's edition of the complete domain news, including an RSS feed - already online!
And see my website - http://technewsreview.com.au/ - for daily updates in between postings. *************************************************** The domain name news is supported by auDA *************************************************** The Human Hands Behind the Google Money Machine http://nytimes.com/2008/06/02/technology/02google.html Mobile telecoms: Halfway there - Promoting mobile phones to the world's poorest http://www.economist.com/business/displaystory.cfm?story_id=11465558 Google - defender of the net, or an 'infringement factory'? http://www.independent.co.uk/news/media/google--defender-of-the-net-or-an-infringement-factory-837640.html British newspaper websites liable in France for privacy invasion http://out-law.com/page-9155 A quarter of US PCs infected with malware: OECD [AFP] http://www.smh.com.au/articles/2008/06/02/1212258708582.html Canadian group charges that Facebook violates privacy laws http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9091358 Internet celebrates 2 years of futility battling Pirate Bay http://arstechnica.com/news.ars/post/20080601-internet-celebrates-2-years-of-futility-battling-pirate-bay.html UK ISPs urged to tackle online piracy http://www.independent.co.uk/news/business/news/isps-urged-to-tackle-online-piracy-835875.html Fighting the Web Bullying That Led to a Suicide http://nytimes.com/2008/06/01/us/01internet.html FCC considers offering spectrum for free wireless Internet http://www.infoworld.com/article/08/05/29/FCC-considers-offering-spectrum-for-free-wireless-Internet_1.html ********************** RESEARCH PAPERS ********************** Economics of malware: Security decisions, incentives and externalities While originating in criminal behaviour, the magnitude and impact of the malware phenomenon is also influenced by the decisions and behaviour of legitimate market players. This working paper is based on qualitative empirical research into the incentives of market players when dealing with malware. http://www.oecd.org/dataoecd/53/17/40722462.pdf Consumer empowerment in communication services Improving the ability of consumers to choose between competing suppliers is important for well functioning markets. The report examines how to increase market flexibility for consumers in communication services, and improve access to information. http://www.oecd.org/dataoecd/25/2/40679279.pdf Pornography, Coercion, and Copyright Law 2.0 by Ann Bartow [Vanderbilt Journal of Entertainment and Technology Law] Abstract: The lack of regulation of the production of pornography in the United States leaves pornography performers exposed to substantial risks. Producers of pornography typically respond to attempts to regulate pornography as infringements upon free speech. At the same time, large corporations involved in the production and sale of pornography rely on copyright law's complex regulatory framework to protect their pornographic content from copying and unauthorized distribution. Web 2.0 also facilitates the production and distribution of pornography by individuals. These user-generators produce their own pornography, often looking to monetize their productions themselves via advertising revenues and subscription models. Much like their corporate counterparts, these user-generators may increasingly rely on copyright law to protect their creations in the future. http://ssrn.com/abstract=1137973 Privacy Protection and the Right to Information: In Search of a New Symbiosis in the Information Age by Pieter Kleve & Richard V. De Mulder [Cyberlaw, Security & Privacy] Abstract: The dichotomy between personal privacy and free access to information, which has come increasingly to the fore with the advance of information technology, justifies a reconsideration of these traditional values and interests. In this article, it is contended that privacy, as a constitutional right, is subject to changing norms as a result of the advent of the information society. In today's information society, citizens weigh the importance of protecting privacy against the advantages of free access to information. The criterion they use is a rational one: an evaluation of which option provides the individual with the most benefit. The protection of privacy is no longer an unconditional good. For state organisations to champion privacy at any cost is, therefore, out of step with this development. A new balance has to be established between the citizen's right to privacy and their right to know, taking into account this shift in values. In order to prevent on the one hand overzealous protection and, on the other, the abuse of information, it is necessary to set up the monitoring function in a new way. http://ssrn.com/abstract=1138287 The Amazing Diversity Framework of the Intellectual Property Rights Harmonisation by Pieter Kleve, Richard V. De Mulder & Kees van Noortwijk Abstract: ... In this paper, a number of EU directives in the field of intellectual property will be discussed. It will be argued that, for example, the harmonisation of the intellectual property rights with respect to 'chips', software and databases, as well as the attempt to create a more general harmonisation of copyright, the 'internet directive', have led to more problems than were solved by them. Attempts to produce harmonisation in these fields have led to 'disharmonisation', while the new social problems arising from globalisation have hardly been dealt with. The standard legal interpretation of concepts in one country is often different from that in another country, leading to differences in judicial decisions and legislation between countries. http://ssrn.com/abstract=1138324 Analysis of Internet Policies and Civil Rights In Italy, Serbia and Burma-Myanmar: A Technological and Legal Approach by Marcella Atzori, Francesco Aymerich, Gianni Fenu & Simone Surcis [Second International Conference on the Digital Society] Abstract: This work will be consider the relationship between state authority, Internet policies and civil rights in three countries: Italy (EU), Serbia (Europe) and Burma-Myanmar (Asia). It will provide an overview about the debate existing in these countries, where it is possible to point out a common trend of restrictions of civil rights due to surveillance and control actions of the authorities on the ICTs. If, in the extreme case of Burma-Myanmar, these actions consist in a ban on using the Internet freely for the citizens, in the other countries they create legal contradictions not easily solved, which may prefigure increasing restrictive measures for the future and risks for the e-democracy. http://doi.ieeecomputersociety.org/10.1109/ICDS.2008.26 Love Actually! Older Adults and their Romantic Internet Relationships by Sue Malta [Australian Journal of Emerging Technologies and Society] abstract: This research was inspired by two stereotypes: first, that older adults don’t do computers – and certainly not the Internet and, secondly, that older adults don’t do sex – they are asexual. The results clearly show these stereotypes to be flawed. Semi-structured qualitative interviews were conducted via synchronous computer-mediated-communication (private chat). The sample consisted of older adults (61 – 85 years) who had all used the Internet to meet potential romantic partners, either through their involvement in online discussion groups or via online dating sites. For the most part, the relationships described were meaningful, intimate and long-lasting. The majority were involved in ongoing sexual activity with their partners, and for some, cyber-sex was or had been an integral part of their relationships. Additionally, a proportion enjoyed flirting online with others and some were also involved in extra-dyadic relationships; indicating that sex and intimacy outside of primary, committed relationships was just as compelling an activity for these older adults as for younger Internet users. http://www.swin.edu.au/sbs/ajets/journal/V5N2/V5N2abstract_malta.htm Unanticipated and contingent influences on the evolution of the internet by Glenn Kowack [interactions] Abstract: Some years ago I read an 1880s-era newspaper article about one of the first demonstrations of long-distance telephony. The reporter wrote: “What might this new device be used for? Well, people at a party in Manhattan might call people at a party in New Jersey. Or, a young man might use the telephone to ‘pop the question’ to his true love.” When the telephone was first deployed, many had difficulty seeing its value. Life and work were accommodated to the infrastructures of the time: markets were local, modern cities were densely constructed so that related businesses were near each other. How would the telephone compete with other technologies? http://portal.acm.org/citation.cfm?doid=1330526.1330551 Direct Marketing, Mobile Phones, and Consumer Privacy: Ensuring Adequate Disclosure and Consent Mechanisms for Emerging Mobile Advertising Practices by Nancy J. King [Federal Communications Law Journal] Advertisers are poised to deliver advertising to cell phones in the U.S. This emerging advertising context is called mobile advertising. It will generate a host of privacy and personal data issues for consumers and for mobile advertisers, mobile phone manufacturers, and mobile carriers. This Article focuses on the existing federal regulatory environment applicable to mobile advertising and consumer privacy, the role of federal administrative agencies that enforce consumer privacy regulation, and the potential for industry self-regulation, particularly privacy policies, to enhance consumer privacy. It assesses the adequacy of the existing federal consumer privacy regulation as well as potential consumer remedies under contract theories and privacy tort laws. Concluding that meaningful disclosure of privacy practices and obtaining adequate consumer consent are essential privacy concerns in mobile advertising, the Article identifies weaknesses in the current regulatory system and offers simple suggestions for regulatory improvements to bolster consumers? privacy protections. http://www.law.indiana.edu/fclj/pubs/v60/no2/King.pdf Should Anti-Cyberbullying Laws Be Created? by Matthew C. Ruedy [North Carolina Journal of Law & Technology] In 2006, thirteen-year-old Megan Meier met a teenage boy named Josh Evans on the social networking website MySpace. The two had an amicable relationship until Josh began making derogatory comments to Megan. The correspondence ultimately resulted in her suicide. Months later, “Josh” was revealed to be the collective creation of forty-seven-year-old Lori Drew, her teenage daughter, and her part-time employee, Ashley Grills. Megan’s suicide has pushed forward legislation for the criminalization of cyberbullying, which can be defined as action or behavior on the Internet intended to hurt or harass another person. This Comment discusses the issues and challenges associated with creating cyberbullying laws, from the decision to create such laws in the first place, to the difficult First Amendment restrictions posed by the “true threat” and “imminent incitement” doctrines. http://www.ncjolt.org/content/view/187/62/ ********************** INTERNET USE ********************** The Human Hands Behind the Google Money Machine If Google were the United States government, the data that streams onto Nicholas Fox’s laptop every day would be classified as top secret. Mr. Fox is among a small group of Google employees who keep a watchful eye on the vital signs of one of the most successful and profitable businesses on the Internet. The number of searches and clicks, the rate at which users click on ads, the revenue this generates — everything is tracked hour by hour, compared with the data from a week earlier and charted. http://nytimes.com/2008/06/02/technology/02google.html au: Clerical error exposes Google as anonymous eBay critic The Australian competition watchdog has accidentally revealed Google as the anonymous source of a submission that is highly critical of eBay's proposal to force its users onto the PayPal payments system. http://www.smh.com.au/articles/2008/05/30/1211654272331.html http://www.theage.com.au/articles/2008/05/30/1211654272331.html Google caught “anonymously” bashing eBay If you thought the Google Checkout party last year caused some tension between them and eBay, listen to this. eBay Austrailia is toying with the idea of only accepting Paypal and Cash on Delivery for auction items. After their plans were announced, the Australian Competition and Consumer Commission asked for public comments. http://blogs.zdnet.com/Google/?p=1059 'Bebo and Facebook' party wrecks Brits' £4.4m Spanish home A British family’s £4.4 million Spanish home has been wrecked by 400 teenagers after their 16-year-old daughter used social networking sites to invite people from across the Costa del Sol to drink a “lot of alcohol”. http://www.timesonline.co.uk/tol/news/uk/article4030058.ece ********************** DIGITAL DIVIDE ********************** Mobile telecoms: Halfway there - Promoting mobile phones to the world's poorest Sometime in the next few months, the number of mobile phones in use will exceed 3.3 billion, or half the world's population. No technology has ever spread faster around the globe: the mobile phone took less than two decades to reach this degree of penetration. But the ever-restless wireless industry has already set its sights on getting the other half connected. Two recent reports analyse how to add the “next billion” to the subscriber list. http://www.economist.com/business/displaystory.cfm?story_id=11465558 ************************** ONLINE CRIME, SECURITY & LEGAL ************************** Google - defender of the net, or an 'infringement factory'? YouTube has landed Google in a copyright confrontation with media giant Viacom that may cost it more than the $1.65bn it paid for the site in the first place. http://www.independent.co.uk/news/media/google--defender-of-the-net-or-an-infringement-factory-837640.html British newspaper websites liable in France for privacy invasion Two British newspaper publishers have been fined in French courts because they violated French privacy laws. The publishers were liable because the articles were viewed in France on the internet. http://out-law.com/page-9155 http://www.theregister.co.uk/2008/05/30/british_publishers_fined_in_france/ UK police e-crime unit must make arrests says industry The e-crime police unit promised by the government must result in visible arrests of cybercriminals and look beyond fraud. That is the verdict of members of the IT industry and parliament, who told Computerworld UK they welcomed the fact the e-crime unit that has finally been given the go-ahead. http://thestandard.com/news/2008/05/30/uk-police-e-crime-unit-must-make-arrests-says-industry http://www.cio.co.uk/concern/security/news/index.cfm?articleid=2856 A quarter of US PCs infected with malware: OECD [AFP] An OECD study into online crime says that increased activity by cyber criminals has left an estimated one-in-four US computers infected with malware. The report, entitled Malicious Software (malware): a Security Threat to the Internet Economy, gives an impression of two worlds engaged in an uneven war of virus invasion and belated defence. http://www.theage.com.au/articles/2008/06/02/1212258708582.html http://www.smh.com.au/articles/2008/06/02/1212258708582.html ************************** PRIVACY ************************** Canadian group charges that Facebook violates privacy laws A Canadian public policy group today filed a complaint charging Facebook Inc. with 22 separate violations of a Canadian personal information protection law. http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9091358 Facebook 'violates privacy laws' A Canadian privacy group has filed a complaint against the social networking site Facebook accusing it of violating privacy laws. The Canadian Internet Policy and Public Interest Clinic has listed 22 separate breaches of privacy law in its country. http://news.bbc.co.uk/2/hi/technology/7428833.stm Italian regulator warns of mobile Internet privacy concerns [news release] Searching on the Internet via a mobile phone poses higher privacy-related concerns than traditional computer-based queries, according to the Italian authority for the protection of personal data. http://euractiv.com/en/infosociety/regulator-warns-mobile-internet-privacy-concerns/article-172783 ********************** ONLINE TV & MUSIC ********************** Internet celebrates 2 years of futility battling Pirate Bay Over the weekend, The Pirate Bay "celebrated" its second anniversary of being raided by the Swedish police. On May 31, 2006, law enforcement seized all of the popular torrent tracker's servers and backups, and arrested two of the site's operators. The site didn't stay down for long, though—just a few days later, everything was business as usual for The Pirate Bay. A court date in Sweden has yet to be set, and support for the site appears to be stronger than ever. http://arstechnica.com/news.ars/post/20080601-internet-celebrates-2-years-of-futility-battling-pirate-bay.html UK ISPs urged to tackle online piracy Talks between ISPs and the television and film industries about how to address online piracy have broken down again. http://www.independent.co.uk/news/business/news/isps-urged-to-tackle-online-piracy-835875.html The Real Fight Over Fake News "The Daily Show" is a bellwether for the evolution of Internet video. It is also one of those programs that signify for people why they pay so much money for cable. http://bits.blogs.nytimes.com/2008/05/29/the-real-fight-over-fake-news/ Back Talk: Billy Bragg ... What's the best way to monetize that [downloading online music] contribution? The way that the music industry has done it so far is to go after the users. I prefer a different model. Users don't pay for radio. But that doesn't mean it's not being paid for. The business is paying because it uses the songs to attract advertising, and it pays some of the advertising revenue to the content providers. Rather than trying to criminalize their audiences, we should be looking at the business models that use music to attract advertisers and build community. People have said that websites give people free publicity. But I don't see how that's different than radio. Radio still pays a royalty. It's music and the ability to hear and exchange music that's driving a lot of the technology. Everyone says that music has value--I think they question whether it has a price. The users have found that it's very easy to get music, and unfortunately business has decided that music doesn't have a price anymore. http://www.thenation.com/doc/20080616/backtalk ********************** CENSORSHIP ********************** au: Board clears Henson net images Images declared "absolutely revolting" by the Prime Minister, Kevin Rudd, at the height of the Bill Henson controversy have been cleared for general release. http://www.smh.com.au/articles/2008/06/01/1212258645397.html au: Now Henson net cast over the web Online photographs used by media websites to report on the investigation into Bill Henson have been referred to the Classification Board, the Minister for Home Affairs, Bob Debus, said. http://www.smh.com.au/articles/2008/05/29/1211654185774.html Chinese bloggers slip censors' net to attack smiling party boss Angry Chinese internet users have launched an online campaign against an official in the earthquake zone who is accused of grinning too much in the midst of the disaster. http://www.guardian.co.uk/world/2008/jun/01/china.humanrights Court suspends Ingushetiya.ru Kuntsevsky Court of Moscow has suspended the website Ingushetiya.ru. Thus, the court satisfies the petition of the Prosecutor’s office of the Republic of Ingushetia seeking an injunction against the website operations. http://eng.cnews.ru/news/line/indexEn.shtml?2008/05/26/301758 Independent media threatened in Ingushetia Reporters Without Boders today deplored the “dangerous” hounding of independent media outlets in the southeastern Russian republic of Ingushetia after a Moscow court yesterday ordered the suspension of Ingushetyia.ru (www.ingushetiya.ru), the country’s only news website in the Ingushetian language, which is spoken by most people in some parts of northern Caucasus (including Ingushetia, Chechnya and Kazakhstan). http://www.rsf.org/article.php3?id_article=27196 ************************************************ CHILD PROTECTION, FILTERING & CONTENT REGULATION ************************************************ Fighting the Web Bullying That Led to a Suicide When Tina Meier’s 13-year-old daughter, Megan, committed suicide in October 2006 after being bullied on the Internet, her grief was so encompassing that she said she felt at times she could not breathe. Ms. Meier said she had trouble being around loved ones who reminded her of her child. Even today, recollections of those first holidays after Megan’s death are foggy at best. http://nytimes.com/2008/06/01/us/01internet.html http://www.semissourian.com/apps/pbcs.dll/article?AID=/20080529/NEWS03/695255483 http://www.fresnobee.com/384/story/634624.html http://www.newstribune.com/articles/2008/05/30/news_state/215state21bully.txt au: Better broadband may boost bullying THE Rudd Government has admitted its high-speed broadband network could lead to an increase in cyber-bullying and other online crimes against children. http://www.news.com.au/adelaidenow/story/0,22606,23787118-911,00.html Cyprus, Latvia and Lithuania join INHOPE [news release] Cyprus, Latvia and Lithuania join INHOPE in the global fight against online child sexual abuse content and INHOPE AGM 2008 appoints new Board members. http://iwf.org.uk/media/news.233.htm ************************** GOVERNMENT & PUBLIC POLICY ************************** InternetNZ gives thumbs up to Digital Development Council [news release] InternetNZ (the Internet Society of New Zealand Inc) welcomes the launch today of the Digital Development Council by Minister of Communications and IT David Cunliffe. http://www.internetnz.net.nz/media/2008/digdevcouncil ********************** TELECOMMUNICATIONS ********************** uk: Cost of broadband looks set to rise The cost of broadband looks set to rise after Ofcom announced that it plans to review the prices that BT charges its rivals to gain access to its lines in order to provide internet access and fixed line telephony. http://www.guardian.co.uk/business/2008/may/30/btgroupbusiness.bt Broadband prices could rise after Ofcom review of BT charges Broadband bills are likely to rise after Ofcom, the telecoms regulator, said it was reviewing the amount that BT can charge operators for access to its telecoms services. http://business.timesonline.co.uk/tol/business/industry_sectors/telecoms/article4036318.ece nz: National would give BIF the biff National and Labour have traded blows over broadband after opposition communications spokesman Maurice Williamson said National would scrap the Government's $325 million Broadband Investment Fund before any grants were distributed. http://stuff.co.nz/stuff/4568528a28.html ********************** MOBILE/WIRELESS ********************** FCC considers offering spectrum for free wireless Internet The winner of the 25Mhz piece of spectrum in the 2155MHz band would be required to use a specified amount of the spectrum to deliver free wireless Internet access. The operator could choose to use any technology, but in that range, WiMax or many of the mobile technologies would make sense. http://www.infoworld.com/article/08/05/29/FCC-considers-offering-spectrum-for-free-wireless-Internet_1.html http://computerworld.com/action/article.do?command=viewArticleBasic&articleId=9090958 http://www.pcworld.com/article/id,146445-c,businesscenter/article.html The Dawn of Free Internet Access? http://blog.wired.com/business/2008/05/the-dawn-of-fre.html ********************** VoIP ********************** Secret messages could be hidden in net phone calls [sub req'd] The next time your internet (VoIP) phone call sounds a bit fuzzy, it might not be your ISP that's to blame. Someone could be trying to squeeze a secret message between the packets of data carrying the caller's voice. http://technology.newscientist.com/channel/tech/mg19826586.000-secret-messages-could-be-hidden-in-net-phone-calls.html +++++++++++++++++++++++++++++++ Check out http://auda.org.au/domain-news/ for the most recent edition of the domain news, including an RSS feed - already online! The domain name news is supported by auDA For information on subscriptions to the domain name and/or general internet news please contact me. For archives of postings to the list, see http://lists.technewsreview.com.au/pipermail/technewsreview/. Also see http://technewsreview.com.au/ for recent updates. +++++++++++++++++++++++++++++++ (c) David Goldstein 2008 --------- David Goldstein address: 4/3 Abbott Street COOGEE NSW 2034 AUSTRALIA email: Goldstein_David @yahoo.com.au phone: +61 418 228 605 (mobile); +61 2 9665 5773 (home) "Every time you use fossil fuels, you're adding to the problem. Every time you forgo fossil fuels, you're being part of the solution" - Dr Tim Flannery Get the name you always wanted with the new y7mail email address. www.yahoo7.com.au/mail _______________________________________________ APPLe mailing list [email protected] http://mailman.apnic.net/mailman/listinfo/apple
