831 resultados para The Internet
Resumo:
Open Source Communities and content-oriented projects (Creative Commons etc.) have reached a new level of economic and cultural significance in some areas of the Internet ecosystem. These communities have developed their own set of legal rules covering licensing issues, intellectual property management, project governance rules etc. Typical Open Source licenses and project rules are written without any reference to national law. This paper considers the question whether these license contracts and other legal rules are to be qualified as a lex mercatoria (or lex informatica) of these communities.
Resumo:
In January 2012, Poland witnessed massive protests, both in the streets and on the Internet, opposing ratification of the Anti-Counterfeiting Trade Agreement, which triggered a wave of strong anti-ACTA movements across Europe. In Poland, these protests had further far-reaching consequences, as they not only changed the initial position of the government on the controversial treaty but also actually started a public debate on the role of copyright law in the information society. Moreover, as a result of these events the Polish Ministry for Administration and Digitisation launched a round table, gathering various stakeholders to negotiate a potential compromise with regard to copyright law that would satisfy conflicting interests of various actors. This contribution will focus on a description of this massive resentment towards ACTA and a discussion of its potential reasons. Furthermore, the mechanisms that led to the extraordinary influence of the anti-ACTA movement on the governmental decisions in Poland will be analysed through the application of models and theories stemming from the social sciences. The importance of procedural justice in the copyright legislation process, especially its influence on the image of copyright law and obedience of its norms, will also be emphasised.
Resumo:
Internet service providers (ISPs) play a pivotal role in contemporary society because they provide access to the Internet. The primary task of ISPs – to blindly transfer information across the network – has recently come under pressure, as has their status as neutral third parties. Both the public and the private sector have started to require ISPs to interfere with the content placed and transferred on the Internet as well as access to it for a variety of purposes, including the fight against cybercrime, digital piracy, child pornography, etc. This expanding list necessitates a critical assessment of the role of ISPs. This paper analyses the role of the access provider. Particular attention is paid to Dutch case law, in which access providers were forced to block The Pirate Bay. After analysing the position of ISPs, we will define principles that can guide the decisions of ISPs whether to take action after a request to block access based on directness, effectiveness, costs, relevance and time.
Resumo:
On October 10, 2013, the Chamber of the European Court of Human Rights (ECtHR) handed down a judgment (Delfi v. Estonia) condoning Estonia for a law which, as interpreted, held a news portal liable for the defamatory comments of its users. Amongst the considerations that led the Court to find no violation of freedom of expression in this particular case were, above all, the inadequacy of the automatic screening system adopted by the website and the users’ option to post their comments anonymously (i.e. without need for prior registration via email), which in the Court’s view rendered the protection conferred to the injured party via direct legal action against the authors of the comments ineffective. Drawing on the implications of this (not yet final) ruling, this paper discusses a few questions that the tension between the risk of wrongful use of information and the right to anonymity generates for the development of Internet communication, and examines the role that intermediary liability legislation can play to manage this tension.
Resumo:
The purpose of the article is to provide first a doctrinal summary of the concept, rules and policy of exhaustion, first, on the international and EU level, and, later, under the law of the United States. Based upon this introduction, the paper turns to the analysis of the doctrine by the pioneer court decisions handed over in the UsedSoft, ReDigi, the German e-book/audio book cases, and the pending Tom Kabinet case from the Netherlands. Questions related to the licence versus sale dichotomy; the so-called umbrella solution; the “new copy theory”, migration of digital copies via the internet; the forward-and-delete technology; the issue of lex specialis and the theory of functional equivalence are covered later on. The author of the present article stresses that the answers given by the respective judges of the referred cases are not the final stop in the discussion. The UsedSoft preliminary ruling and the subsequent German domestic decisions highlight a special treatment for computer programs. On the other hand, the refusal of digital exhaustion in the ReDigi and the audio book/e-book cases might be in accordance with the present wording of copyright law; however, they do not necessarily reflect the proper trends of our ages. The paper takes the position that the need for digital exhaustion is constantly growing in society and amongst businesses. Indeed, there are reasonable arguments in favour of equalizing the resale of works sold in tangible and intangible format. Consequently, the paper urges the reconsideration of the norms on exhaustion on the international and EU level.
Resumo:
The development of broadband Internet connections has fostered new audiovisual media services and opened new possibilities for accessing broadcasts. The Internet retransmission case of TVCatchup before the CJEU was the first case concerning new technologies in the light of Art. 3.1. of the Information Society Directive. On the other side of the Atlantic the Aereo case reached the U.S. Supreme Court and challenged the interpretation of public performance rights. In both cases the recipients of the services could receive broadcast programs in a way alternative to traditional broadcasting channels including terrestrial broadcasting or cable transmission. The Aereo case raised the debate on the possible impact of the interpretation of copyright law in the context of the development of new technologies, particularly cloud based services. It is interesting to see whether any similar problems occur in the EU. The „umbrella” in the title refers to Art. 8 WCT, which covers digital and Internet transmission and constitutes the backrgound for the EU and the U.S. legal solutions. The article argues that no international standard for qualification of the discussed services exists.
Resumo:
In this article we argue that it is pressing to study the “hybrid media system” at the intersection of online and offl ine communication and its potential for agenda building. The topic is relevant because it is argued that the internet off ers new opportunities of public infl uence for challengers without access to political decision making. Except for single case studies, little is known about the conditions under which these actors succeed. Informed by the research on agenda building we tackle with the mechanisms of online-offline media agenda building and the conditions under which challengers succeed to produce issue spill-over into conventional mass media. We develop a theoretical framework for investigating the linkage between online communication and traditional mass media and discuss how our model translates into empirical research. We conclude that the nature of online networks is critical for spill-over, but also the issue itself and the structure of the political system.
Resumo:
Internet-based interventions hold specific advantages and disadvantages in the treatment of social anxiety disorder (SAD). The present review examines different approaches in the internet-based treatment of SAD and reviews their efficacy and effectiveness. 21 studies investigated the potential of guided and unguided internetbased cognitive-behavioral treatments (ICBT) for SAD, comprising a total of N = 1,801 socially anxious individuals. The large majority of these trials reported substantial reductions of social anxiety symptoms through ICBT programs. Within effect sizes were mostly large and comparisons to waitlist and more active control groups were positive. Treatment gains were stable from 3 months to 5 years after treatment termination. In conclusion, ICBT is effective in the reduction of social anxiety symptoms. At the same time, not all participants benefit from these treatments to a sufficient degree. Future research should focus on what makes these interventions work in which patient populations, and at the same time, examine ways to implement internet-based treatment in the routine care for socially anxious patients
Resumo:
The Internet of Things (IoT) is attracting considerable attention from the universities, industries, citizens and governments for applications, such as healthcare, environmental monitoring and smart buildings. IoT enables network connectivity between smart devices at all times, everywhere, and about everything. In this context, Wireless Sensor Networks (WSNs) play an important role in increasing the ubiquity of networks with smart devices that are low-cost and easy to deploy. However, sensor nodes are restricted in terms of energy, processing and memory. Additionally, low-power radios are very sensitive to noise, interference and multipath distortions. In this context, this article proposes a routing protocol based on Routing by Energy and Link quality (REL) for IoT applications. To increase reliability and energy-efficiency, REL selects routes on the basis of a proposed end-to-end link quality estimator mechanism, residual energy and hop count. Furthermore, REL proposes an event-driven mechanism to provide load balancing and avoid the premature energy depletion of nodes/networks. Performance evaluations were carried out using simulation and testbed experiments to show the impact and benefits of REL in small and large-scale networks. The results show that REL increases the network lifetime and services availability, as well as the quality of service of IoT applications. It also provides an even distribution of scarce network resources and reduces the packet loss rate, compared with the performance of well-known protocols.
Resumo:
Introduction As students become more connected with the internet and other current technologies, the school of nursing has continued to investigate more innovative, meaningful, and effective uses of technology. One particular technology whose use has increased is the portable music/video player. Like the cell phone, mp3 players and iPods have become a standard accessory for students. To capitalize on this popular technology the School has started several pilot projects involving podcasting under graduate and graduate nursing classes and has also been involved in one research project using video iPods. [See PDF for complete abstract]
Resumo:
Dichotomous identification keys are used throughout biology for identification of plants, insects, and parasites. However, correct use of identification keys can be difficult as they are not usually intended for novice users who may not be familiar with the terminology used or with the morphology of the organism being identified. Therefore, we applied cognitive engineering principles to redesign a parasitology identification key for the Internet. We addressed issues of visual clutter and spatial distance by displaying a single question couplet at a time and by switching to the appropriate next couplet after the user made a choice. Our analysis of the original paper-based key versus the Web-based approach found that of 26 applicable cognitive engineering principles, the paper key did not meet 4 (15%) and partially met 11 (42%). In contrast, the redesigned key met 100% of 32 applicable cognitive engineering principles.
Resumo:
BACKGROUND: Adults use the Internet for weight loss information, sometimes by participating in discussion forums. Our purpose was to analyze the quality of advice exchanged on these forums. METHODS: This was a retrospective analysis of messages posted to 18 Internet weight loss forums during 1 month in 2006. Advice was evaluated for congruence with clinical guidelines; potential for causing harm; and subsequent correction when it was contradictory to guidelines (erroneous) or potentially harmful. Message- and forum-specific characteristics were evaluated as predictors of advice quality and self-correction. RESULTS: Of 3368 initial messages, 266 (7.9%) were requests for advice. Of 654 provisions of advice, 56 (8.6%) were erroneous and 19 of these 56 (34%) were subsequently corrected. Forty-three (6.6%) provisions of advice were harmful, and 12 of these 43 (28%) were subsequently corrected. Messages from low-activity forums (fewer messages) were more likely than those from high-activity forums to be erroneous (10.6% vs 2.4%, P < .001) or harmful (8.4% vs 1.2%, P < .001). In high-activity forums, 2 of 4 (50%) erroneous provisions of advice and 2 of 2 (100%) potentially harmful provisions of advice were corrected by subsequent postings. Compared with general weight loss advice, medication-related advice was more likely to be erroneous (P = .02) or harmful (P = .01). CONCLUSIONS: Most advice posted on highly active Internet weight loss forums is not erroneous or harmful. However, clinical and research strategies are needed to address the quality of medication-related advice.
Resumo:
BACKGROUND: Adults use the Internet for weight loss information, sometimes by participating in discussion forums. Our purpose was to analyze the quality of advice exchanged on these forums. METHODS: This was a retrospective analysis of messages posted to 18 Internet weight loss forums during 1 month in 2006. Advice was evaluated for congruence with clinical guidelines; potential for causing harm; and subsequent correction when it was contradictory to guidelines (erroneous) or potentially harmful. Message- and forum-specific characteristics were evaluated as predictors of advice quality and self-correction. RESULTS: Of 3368 initial messages, 266 (7.9%) were requests for advice. Of 654 provisions of advice, 56 (8.6%) were erroneous and 19 of these 56 (34%) were subsequently corrected. Forty-three (6.6%) provisions of advice were harmful, and 12 of these 43 (28%) were subsequently corrected. Messages from low-activity forums (fewer messages) were more likely than those from high-activity forums to be erroneous (10.6% vs 2.4%, P < .001) or harmful (8.4% vs 1.2%, P < .001). In high-activity forums, 2 of 4 (50%) erroneous provisions of advice and 2 of 2 (100%) potentially harmful provisions of advice were corrected by subsequent postings. Compared with general weight loss advice, medication-related advice was more likely to be erroneous (P = .02) or harmful (P = .01). CONCLUSIONS: Most advice posted on highly active Internet weight loss forums is not erroneous or harmful. However, clinical and research strategies are needed to address the quality of medication-related advice.
Resumo:
The purpose of the internet-based teachware mySCM is that students of economics, informatics and industrial engineering get familiar with quantitative methods for supply chain management. Input-output-relationships of various optimization methods can be detected by sampling input values, parameters, and alternative methods for the same problem. Students can gain extra benefits by passing so-called mini-exams that motivate active learning. mySCM can be used for free, round-the-clock, and any place where access to the Internet is available.
Resumo:
The paper seeks a re-conceptualization of the global digital divide debate. It critically explores the predominant notion, its evolution and measurement, as well as the policies that have been advanced to bridge the digital divide. Acknowledging the complexity of this inequality, the paper aims at analyzing the disparities beyond the connectivity and the skills barriers. Without understating the first two digital divides, it is argued that as the Internet becomes more sophisticated and more integrated into economic, social and cultural processes, a ‘third’ generation of divides becomes critical. These divides are drawn not at the entry to the net but within the net itself, and limit access to content. The increasing barriers to content, although of diverse nature, all relate to some governance characteristics inherent in cyberspace, such as global spillover of local decisions, regulation through code or proliferation of self- and co-regulatory models. It is maintained that as the practice of intervention intensifies in cyberspace, multiple and far-reaching points of control outside formal legal institutions are created, which threaten the availability of public goods and make the pursuit of public objectives difficult. This is an aspect that is rarely addressed in the global digital divide discussions, even in comprehensive analysis and political initiatives such as the World Summit on the Information Society. Yet, the conceptualization of the digital divide as impeded access to content may be key in terms of ensuring real participation and catering for the long-term implications of digital technologies.