109 resultados para internet service provider liability

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper considers the ongoing litigation against the peer to peer network Kazaa. Record companies and Hollywood studios have faced jurisdictional and legal problems in suing this network for copyright infringement. As Wired Magazine observes: ’The servers are in Denmark. The software is in Estonia. The domain is registered Down Under, the corporation on a tiny island in the South Pacific. The users - 60 million of them - are everywhere around the world.' In frustration, copyright owners have launched copyright actions against intermediaries - like Internet Service Providers such as Verizon. They have also embarked on filing suits of individual users of file-sharing programs. In addition, copyright owners have called for domestic and international law reform in respect of digital copyright. The Senate Committee on Government Affairs in the United States Congress has reviewed the controversial use of subpoenas in suits against users of file-sharing peer to peer networks. The United States has encouraged other countries to adopt provisions of the Digital Millennium Copyright Act 1998 (US) in bilateral and regional free trade agreements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

TThis article considers the radical, sweeping changes to Australian copyright law wrought by the Australia–United States Free Trade Agreement 2004 (AUSFTA). It contends that the agreement will result in a “piracy of the public domain”. Under this new regime, copyright owners will be able to obtain greater monopoly profits at the expense of Australian consumers, libraries and research institutions, as well as intermediaries, such as Internet service providers. Part One observes that the copyright term extension in Australia to life of the author plus 70 years for works will have a negative economic and cultural impact — with Australia’s net royalty payments estimated to be up to $88 million higher per year. Part Two argues that the adoption of stronger protection of technological protection measures modelled upon the Digital Millennium Copyright Act 1998 (U.S.) will override domestic policy–making processes, such as the Phillips Fox Digital Agenda Review, and judicial pronouncements such as the Stevens v Sony litigation. Part Three questions whether the new safe harbours protection for Internet service providers will adversely affect the sale of Telstra. This article concludes that there is a need for judicial restraint in interpreting the AUSFTA. There is an urgent call for the Federal Government to pass ameliorating reforms — such as an open–ended defence of fair use and a mechanism for orphan works. There is a need for caution in negotiating future bilateral trade agreements — lest the multinational system for the protection of copyright law be undermined.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

There has been an extended engagement with how young people experience policing, with a focus on the intersection between policing and indigeneity, ethnicity, gender, and social class. Interestingly, sexuality and/or gender diversity has been almost completely overlooked, both nationally and internationally. This paper reports on LGBT youth service providers’ accounts about police and LGBT young people interactions. It overviews the outcomes of semi-structured interviews with key LGBT youth service providers in different regions of Brisbane, Queensland. As the first qualitative engagement with these issues from the perspective of service providers, it highlights not only how LGBT young people experience policing, but also how service providers need to ‘work the system’ of policing to produce the best outcomes for LGBT young people.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The critical impact of innovation on national and the global economies has been discussed at length in the literature. Economic development requires the diffusion of innovations into markets. It has long been recognised that economic growth and development depends upon a constant stream of innovations. Governments have been keenly aware of the need to ensure this flow does not dry to a trickle and have introduced many and varied industry policies and interventions to assist in seeding, supporting and diffusing innovations. In Australia, as in many countries, Government support for the transfer of knowledge especially from publicly funded research has resulted in the creation of knowledge exchange intermediaries. These intermediaries are themselves service organisations, seeking innovative service offerings for their markets. The choice for most intermediaries is generally a dichotomous one, between market-pull and technology-push knowledge exchange programmes. In this article, we undertake a case analysis of one such innovative intermediary and its flagship programme. We then compare this case with other successful intermediaries in Europe. We put forward a research proposition that the design of intermediary programmes must match the service type they offer. That is, market-pull programmes require market-pull design, in close collaboration with industry, whereas technology programmes can be problem-solving innovations where demand is latent. The discussion reflects the need for an evolution in knowledge transfer policies and programmes beyond the first generation ushered in with the US Bayh-Dole Act (1980) and Stevenson-Wydler Act (1984). The data analysed is a case study comparison of market-pull and technology-push programmes, focusing on primary and secondary socio-economic benefits (using both Australian and international comparisons).

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Submission to the Australian Government Attorney General’s Department consultation paper on Revising the Scope of the Copyright ‘Safe Harbour Scheme’

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Rove n Rave ™ is a website designed and created for, and with, people with an intellectual disability. Its aim is to provide them with a user-friendly online platform where they can share opinions and experiences, and where they can find reviews which will help them to choose a place to visit themselves. During the development process, input on design requirements was gathered from a group of people with an intellectual disability and the disability service provider. This group then tested the product and provided further feedback on improving the website. It was found that the choice of wording, icons, pictures, colours and some functions significantly affected the users' ability to understand the content of the website. This demonstrated that a partnership between the developer and the user is essential when designing and delivering products or services for people with an intellectual disability.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The Internet presents a constantly evolving frontier for criminology and policing, especially in relation to online predators – paedophiles operating within the Internet for safer access to children, child pornography and networking opportunities with other online predators. The goals of this qualitative study are to undertake behavioural research – identify personality types and archetypes of online predators and compare and contrast them with behavioural profiles and other psychological research on offline paedophiles and sex offenders. It is also an endeavour to gather intelligence on the technological utilisation of online predators and conduct observational research on the social structures of online predator communities. These goals were achieved through the covert monitoring and logging of public activity within four Internet Relay Chat(rooms) (IRC) themed around child sexual abuse and which were located on the Undernet network. Five days of monitoring was conducted on these four chatrooms between Wednesday 1 to Sunday 5 April 2009; this raw data was collated and analysed. The analysis identified four personality types – the gentleman predator, the sadist, the businessman and the pretender – and eight archetypes consisting of the groomers, dealers, negotiators, roleplayers, networkers, chat requestors, posters and travellers. The characteristics and traits of these personality types and archetypes, which were extracted from the literature dealing with offline paedophiles and sex offenders, are detailed and contrasted against the online sexual predators identified within the chatrooms, revealing many similarities and interesting differences particularly with the businessman and pretender personality types. These personality types and archetypes were illustrated by selecting users who displayed the appropriate characteristics and tracking them through the four chatrooms, revealing intelligence data on the use of proxies servers – especially via the Tor software – and other security strategies such as Undernet’s host masking service. Name and age changes, which is used as a potential sexual grooming tactic was also revealed through the use of Analyst’s Notebook software and information on ISP information revealed the likelihood that many online predators were not using any safety mechanism and relying on the anonymity of the Internet. The activities of these online predators were analysed, especially in regards to child sexual grooming and the ‘posting’ of child pornography, which revealed a few of the methods in which online predators utilised new Internet technologies to sexually groom and abuse children – using technologies such as instant messengers, webcams and microphones – as well as store and disseminate illegal materials on image sharing websites and peer-to-peer software such as Gigatribe. Analysis of the social structures of the chatrooms was also carried out and the community functions and characteristics of each chatroom explored. The findings of this research have indicated several opportunities for further research. As a result of this research, recommendations are given on policy, prevention and response strategies with regards to online predators.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In what is being billed as iiNet versus Hollywood, the Australian internet service provider has come out an apparent winner after the High Court dismissed a copyright infringement case brought by industry movie studios. The case was a final appeal by the industry in its attempts to crack down on internet users infringing copyright by using BitTorrent to download movies.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In November 2010, tension between Internet infrastructure companies boiled over in a dispute between content distribution network (CDN) Level 3 and Internet service provider (ISP) Comcast. Level 3, a distribution partner of Netflix, accused Comcast of violating the principles of net neutrality when the ISP increased distribution fees for carrying high bandwidth services. Comcast justified its actions by stating that the price increase was standard practice and argued Level 3 was trying to avoid paying its fair share. The dispute exemplifies the growing concern over the rising costs of streaming media services. The companies facing these inflated infrastructure costs are CDNs (Level 3, Equinix, Limelight, Akamai, and Voxel), companies that host streaming media content on server farms and distribute the content to a variety of carriers, and ISPs (Comcast, Time Warner, Cox, and AT&T), the cable and phone companies that provide “last mile” service to paying customers. Both CDNs and ISPs are lobbying government regulators to keep their costs at a minimum. The outcome of these disputes will influence the cost, quality, and legal status of streaming media.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The makers of Dallas Buyers Club have been dealt a blow in their attempt to extract payment from people alleged to have downloaded illegal copies of the movie. Voltage Pictures, which owns Dallas Buyers Club, has been trying to identify over 4,700 iiNet subscribers who it alleges downloaded illicit copies of the movie. Earlier this year, the Federal Court agreed that iiNet should hand over subscriber details, but warned that any letter sent to account holders must first be approved by the court to protect consumers from abuse of the legal system. In a win for consumer protection, the Federal Court has now rejected Voltage’s draft letters, criticising Voltage’s attempts to avoid explaining what fee it would demand.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis investigates and develops techniques for accurately detecting Internet-based Distributed Denial-of-Service (DDoS) Attacks where an adversary harnesses the power of thousands of compromised machines to disrupt the normal operations of a Web-service provider, resulting in significant down-time and financial losses. This thesis also develops methods to differentiate these attacks from similar-looking benign surges in web-traffic known as Flash Events (FEs). This thesis also addresses an intrinsic challenge in research associated with DDoS attacks, namely, the extreme scarcity of public domain datasets (due to legal and privacy issues) by developing techniques to realistically emulate DDoS attack and FE traffic.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This chapter provides an overview of a recent shift in regulatory strategies to address copyright infringement toward enlisting the assistance of general purpose Internet Service Providers. In Australia, the High Court held in 2012 that iiNet, a general purpose ISP, had no legal duty to police what its subscribers did with their internet connections. We provide an overview of three recent developments in Australian copyright law since that decision that demonstrate an emerging shift in the way that obligations are imposed on ISPs to govern the actions of their users without relying on secondary liability. The first is a new privately negotiated industry code that introduces a 'graduated response' system that requires ISPs to pass on warnings to subscribers who receive allegations of infringement. The second involves a recent series of Federal Court cases where rightsholders made a partially successful application to require ISPs to hand over the identifying details of subscribers whose households are alleged to have infringed copyright. The third is a new legislative scheme that will require ISPs to block access to foreign websites that 'facilitate' infringement. We argue that these shifts represent a greater sophistication in approaches to enrolling general purpose intermediaries in the regulatory project. We also suggest that these shifts represent a potentially disturbing trend towards enforcement of copyright law in a way that does not provide strong safeguards for the legitimate constitutional due process interests of users. We conclude with a call for greater attention and research to better understand how intermediaries make decisions when governing the conduct of users, how those decisions may be influenced by both state and non-state actors, and how the rights of individuals to due process can be adequately protected.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Through media such as newspapers, letterbox flyers, corporate brochures and television we are regularly confronted with descriptions for conventional (bricks 'n' mortar style) services. These representations vary in the terminology utilised, the depth of the description, the aspects of the service that are characterised and their applicability to candidate service requestors. Existing service catalogues (such as the Yellow Pages) provide little relief for service requestors from the burdensome task of discovering, comparing and substituting services. Add to this environment the rapidly evolving area of web services with its associated surfeit of standards, and the result is a considerably fragmented approach to the description of services. It leaves the reality of the Semantic Web somewhat clouded. --------- Let's consider service description briefly, before discussing our concerns with existing approaches to description. The act of describing is performed prior to advertising. This simple fact provides an interesting paradox as services cannot be described exactly before advertisement. This doesn't mean they can't be described comprehensively. By "exactly", we are referring to the fact that context provided by a service requestor (and their service needs) will alter the description of the service that is presented to the discoverer. For example, a service provider who operates a cinema wants to describe the price of their service. Let's say the advertised price is $15. They also want to state that a pensioner discount and a student discount is available which provides a 50% discount. A customer (i.e. service requestor) uses the cinema web site to purchase tickets online. They find the movie of their choice at a time that suits. However, its not until some context is provided by the requestor that the exact price is determined. The requestor might state that they are a pensioner. The same is applicable for a service requestor who purchases multiple tickets perhaps on behalf of other people. The disconnect between when the service is described and when a requestor provides context introduces challenges to the description process. A service provider would be ill-advised to offer independent descriptions that represent all the permutations possible for a single service. The descriptive effort would be prohibitive.