51 resultados para Intermediaries


Relevância:

10.00% 10.00%

Publicador:

Resumo:

This research explored how small and medium enterprises can achieve success with software as a service (SaaS) applications from cloud. Based upon an empirical investigation of six growth oriented and early technology adopting small and medium enterprises, this study proposes a SaaS for small and medium enterprise success model with two approaches: one for basic and one for advanced benefits. The basic model explains the effective use of SaaS for achieving informational and transactional benefits. The advanced model explains the enhanced use of software as a service for achieving strategic and transformational benefits. Both models explicate the information systems capabilities and organizational complementarities needed for achieving success with SaaS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This chapter provides an overview of a recent shift in regulatory strategies to address copyright infringement toward enlisting the assistance of general purpose Internet Service Providers. In Australia, the High Court held in 2012 that iiNet, a general purpose ISP, had no legal duty to police what its subscribers did with their internet connections. We provide an overview of three recent developments in Australian copyright law since that decision that demonstrate an emerging shift in the way that obligations are imposed on ISPs to govern the actions of their users without relying on secondary liability. The first is a new privately negotiated industry code that introduces a 'graduated response' system that requires ISPs to pass on warnings to subscribers who receive allegations of infringement. The second involves a recent series of Federal Court cases where rightsholders made a partially successful application to require ISPs to hand over the identifying details of subscribers whose households are alleged to have infringed copyright. The third is a new legislative scheme that will require ISPs to block access to foreign websites that 'facilitate' infringement. We argue that these shifts represent a greater sophistication in approaches to enrolling general purpose intermediaries in the regulatory project. We also suggest that these shifts represent a potentially disturbing trend towards enforcement of copyright law in a way that does not provide strong safeguards for the legitimate constitutional due process interests of users. We conclude with a call for greater attention and research to better understand how intermediaries make decisions when governing the conduct of users, how those decisions may be influenced by both state and non-state actors, and how the rights of individuals to due process can be adequately protected.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the internet age, copyright owners are increasingly looking to online intermediaries to take steps to prevent copyright infringement. Sometimes these intermediaries are closely tied to the acts of infringement; sometimes – as in the case of ISPs – they are not. In 2012, the Australian High Court decided the Roadshow Films v iiNet case, in which it held that an Australian ISP was not liable under copyright’s authorization doctrine, which asks whether the intermediary has sanctioned, approved or countenanced the infringement. The Australian Copyright Act 1968 directs a court to consider, in these situations, whether the intermediary had the power to prevent the infringement and whether it took any reasonable steps to prevent or avoid the infringement. It is generally not difficult for a court to find the power to prevent infringement – power to prevent can include an unrefined technical ability to disconnect users from the copyright source, such as an ISP terminating users’ internet accounts. In the iiNet case, the High Court eschewed this broad approach in favor of focusing on a notion of control that was influenced by principles of tort law. In tort, when a plaintiff asserts that a defendant should be liable for failing to act to prevent harm caused to the plaintiff by a third party, there is a heavy burden on the plaintiff to show that the defendant had a duty to act. The duty must be clear and specific, and will often hinge on the degree of control that the defendant was able to exercise over the third party. Control in these circumstances relates directly to control over the third party’s actions in inflicting the harm. Thus, in iiNet’s case, the control would need to be directed to the third party’s infringing use of BitTorrent; control over a person’s ability to access the internet is too imprecise. Further, when considering omissions to act, tort law differentiates between the ability to control and the ability to hinder. The ability to control may establish a duty to act, and the court will then look to small measures taken to prevent the harm to determine whether these satisfy the duty. But the ability to hinder will not suffice to establish liability in the absence of control. This chapter argues that an inquiry grounded in control as defined in tort law would provide a more principled framework for assessing the liability of passive intermediaries in copyright. In particular, it would set a higher, more stable benchmark for determining the copyright liability of passive intermediaries, based on the degree of actual, direct control that the intermediary can exercise over the infringing actions of its users. This approach would provide greater clarity and consistency than has existed to date in this area of copyright law in Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is an increase in the uptake of cloud computing services (CCS). CCS is adopted in the form of a utility, and it incorporates business risks of the service providers and intermediaries. Thus, the adoption of CCS will change the risk profile of an organization. In this situation, organisations need to develop competencies by reconsidering their IT governance structures to achieve a desired level of IT-business alignment and maintain their risk appetite to source business value from CCS. We use the resource-based theories to suggest that collaborative board oversight of CCS, competencies relating to CCS information and financial management, and a CCS-related continuous audit program can contribute to business process performance improvements and overall firm performance. Using survey data, we find evidence of a positive association between these IT governance considerations and business process performance. We also find evidence of positive association between business process performance improvements and overall firm performance. The results suggest that the suggested considerations on IT governance structures can contribute to CCS-related IT-business alignment and lead to anticipated business value from CCS. This study provides guidance to organizations on competencies required to secure business value from CCS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There is an increase in the uptake of cloud computing services (CCS). CCS is adopted in the form of a utility, and it incorporates business risks of the service providers and intermediaries. Thus, the adoption of CCS will change the risk profile of an organization. In this situation, organizations need to develop competencies by reconsidering their IT governance structures to achieve a desired level of IT-business alignment and maintain their risk appetite to source business value from CCS. We use the resource-based theories to suggest that collaborative board oversight of CCS, competencies relating to CCS information and financial management, and a CCS-related continuous audit program can contribute to business process performance improvements and overall firm performance. Using survey data, we find evidence of a positive association between these IT governance considerations and business process performance. We also find evidence of positive association between business process performance improvements and overall firm performance. The results suggest that the suggested considerations on IT governance structures can contribute to CCS-related IT-business alignment and lead to anticipated business value from CCS. This study provides guidance to organizations on competencies required to secure business value from CCS.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This article examines the merger between AOL and the Huffington Post. The broader issues around the merger will be investigated, especially the implication for rights, in particular free expression, and their conditions for exercise and actual exercise online. One major issue is that of the status of user-generated content and how the existing legal regime reflects the ethical concerns of users over how their content, data and information is used and commodified by the for-profit Internet intermediaries and platforms, especially when they start to merge and form concentrations. The extent to which the current legal regimes, especially human rights, deal with these problems in an adequate fashion will be assessed, along with the presentation of some suggestions of alternative approaches which may be more effective in practice.