9 resultados para Privatization of the Internet
em Digital Peer Publishing
Resumo:
This paper examines the adaptations of the writing system in Internet language in mainland China from a sociolinguistic perspective. A comparison is also made of the adaptations in mainland China with those that Su (2003) found in Taiwan. In Computer-Mediated Communication (CMC), writing systems are often adapted to compensate for their inherent inadequacies (such as difficulty in input). Su (2003) investigates the creative uses of the writing system on the electronic bulletin boards (BBS) of two college student organizations in Taipei, Taiwan, and identifies four popular and creative uses of the Chinese writing system: stylized English, stylized Taiwanese-accented Mandarin, stylized Taiwanese, and the recycling of a transliteration alphabet used in elementary education. According to Coupland (2001; cited in Su 2003), stylization is “the knowing deployment of culturally familiar styles and identities that are marked as deviating from those predictably associated with the current speaking context”. Within this framework and drawing on the data in previous publications on Internet language and online sources, this study identifies five types of adaptations in mainland China’s Internet language: stylized Mandarin (e.g., 漂漂 piāopiāo for 漂亮 ‘beautiful’), stylized dialect-accented Mandarin (e.g., 灰常 huīcháng for 非常 ‘very much’), stylized English (e.g., 伊妹儿 yīmèier for ‘email’), stylized initials (e.g., bt 变态 biàntài for ‘abnormal’; pk, short form for ‘player kill’), and stylized numbers (e.g., 9494 jiùshi jiùshi 就是就是 ‘that is it’). The Internet community is composed of highly mobile individuals and thus forms a weak-tie social network. According to Milroy and Milroy (1992), a social network with weak ties is often where language innovation takes place. Adaptations of the Chinese writing system in Internet language provide interesting evidence for the innovations within a weak-tie social network. Our comparison of adaptations in mainland China and Taiwan shows that, in maximizing the effectiveness and functionality of their communication, participants of Internet communication are confronted with different language resources and situations, including differences in Romanization systems, English proficiency level, and attitudes towards English usage. As argued by Milroy and Milroy (1992), a weak-tie social network model can bridge the social class and social network. In the Internet community, the degree of diversity of the stylized linguistic varieties indexes the virtual and/or social status of its participants: the more diversified one’s Internet language is, the higher is his/her virtual and/or social status.
Resumo:
The emergence of the diary as a digital form has generated the kinds of introduction and explanation that typically accumulate around emerging genres, even though online diarists in many ways strive to reproduce the stereotypical print diary. However, as diarists and readers explore the nature of blogs, both in diary entries and comments pages, a tension is apparent between users’ accounts or explanations of the genre and their actual practices, and this tension provides a rich site for studying the evolution of the diary genre. Readers’ and writers’ comments illustrate the blogging community’s ideas about genre as a concept and how these ideas transfer to the “new” world of online media. In this paper, I look at the diary’s transition from page to screen, and consider how readers and writers build on and diverge from print culture practices in establishing expectations and “rules” for Weblogs. Examining how diarists and their communities establish and police the digital diary, and how generic knowledge is circulated and codified, helps understand the particular social actions the diary can perform only on the Internet.
Resumo:
This Judgment by the Presidium of the Supreme Arbitration Court of the Russian Federation can be considered as a landmark ruling for Internet Service Provider’s (ISP) liability. The Court stipulates for the first time concise principles under which circumstances an ISP shall be exempt from liability for transmitting copyright infringing content. But due to the legislation on ISP liability in the Russian Federation it depends on the type of information which rules of liability apply to ISP. As far as a violation of intellectual property rights is claimed, the principles given now by the Supreme Arbitration Court are applicable, which basically follow the liability limitations of the so called EU E-Commerce Directive. But, furthermore, preventive measures that are provided in service provider contracts to suppress a violation through the use of services should be taken into account as well. On the other hand, as far as other information is concerned the limitations of the respective Information Law might be applicable which stipulates different liability requirements. This article gives a translation of the Supreme Arbitration Court’s decision as well as a comment on its key rulings with respect to the legal framework and on possible consequences for practice.
Resumo:
Copyright infringements on the Internet affect all types of media which can be used online: films, computer games, audio books, music, software, etc. For example, according to German studies, 90% of all copyright violations affecting film works take place on the Internet. This storage space is made available to such infringers, as well as to others whose intentions are legal, by hosting providers. To what extent do hosting providers have a duty of care for their contribution to the copyright infringements of third parties, i.e. their users? What duties of care can be reasonably expected of hosting providers to prevent such infringements? These questions have been heavily debated in Germany, and German courts have developed extensive case law. This article seeks to examine these questions by assessing German jurisprudence against its EU law background.
Resumo:
The development of the Internet has made it possible to transfer data ‘around the globe at the click of a mouse’. Especially fresh business models such as cloud computing, the newest driver to illustrate the speed and breadth of the online environment, allow this data to be processed across national borders on a routine basis. A number of factors cause the Internet to blur the lines between public and private space: Firstly, globalization and the outsourcing of economic actors entrain an ever-growing exchange of personal data. Secondly, the security pressure in the name of the legitimate fight against terrorism opens the access to a significant amount of data for an increasing number of public authorities.And finally,the tools of the digital society accompany everyone at each stage of life by leaving permanent individual and borderless traces in both space and time. Therefore, calls from both the public and private sectors for an international legal framework for privacy and data protection have become louder. Companies such as Google and Facebook have also come under continuous pressure from governments and citizens to reform the use of data. Thus, Google was not alone in calling for the creation of ‘global privacystandards’. Efforts are underway to review established privacy foundation documents. There are similar efforts to look at standards in global approaches to privacy and data protection. The last remarkable steps were the Montreux Declaration, in which the privacycommissioners appealed to the United Nations ‘to prepare a binding legal instrument which clearly sets out in detail the rights to data protection and privacy as enforceable human rights’. This appeal was repeated in 2008 at the 30thinternational conference held in Strasbourg, at the 31stconference 2009 in Madrid and in 2010 at the 32ndconference in Jerusalem. In a globalized world, free data flow has become an everyday need. Thus, the aim of global harmonization should be that it doesn’t make any difference for data users or data subjects whether data processing takes place in one or in several countries. Concern has been expressed that data users might seek to avoid privacy controls by moving their operations to countries which have lower standards in their privacy laws or no such laws at all. To control that risk, some countries have implemented special controls into their domestic law. Again, such controls may interfere with the need for free international data flow. A formula has to be found to make sure that privacy at the international level does not prejudice this principle.
Resumo:
Open Source Communities and content-oriented projects (Creative Commons etc.) have reached a new level of economic and cultural significance in some areas of the Internet ecosystem. These communities have developed their own set of legal rules covering licensing issues, intellectual property management, project governance rules etc. Typical Open Source licenses and project rules are written without any reference to national law. This paper considers the question whether these license contracts and other legal rules are to be qualified as a lex mercatoria (or lex informatica) of these communities.
Resumo:
Internet service providers (ISPs) play a pivotal role in contemporary society because they provide access to the Internet. The primary task of ISPs – to blindly transfer information across the network – has recently come under pressure, as has their status as neutral third parties. Both the public and the private sector have started to require ISPs to interfere with the content placed and transferred on the Internet as well as access to it for a variety of purposes, including the fight against cybercrime, digital piracy, child pornography, etc. This expanding list necessitates a critical assessment of the role of ISPs. This paper analyses the role of the access provider. Particular attention is paid to Dutch case law, in which access providers were forced to block The Pirate Bay. After analysing the position of ISPs, we will define principles that can guide the decisions of ISPs whether to take action after a request to block access based on directness, effectiveness, costs, relevance and time.
Resumo:
This article first discusses a recent Lithuanian BitTorrent case, Linkomanija, with its shortcomings and perspectives. It then compares the outcomes of the Lithuanian case with recent court practice in Scandinavian countries (the Swedish Pirate Bay and Finnish Finreactor cases). Finally, it poses some questions as to whether BitTorrent sites should be qualified as hosting services under Article 14 of the EU E-commerce Directive (2000/31/EC) and whether the application of the limited liability standard, as developed by the Court of Justice of the European Union, would be reasonable for BitTorrent file-sharing services in general.