SlideShare une entreprise Scribd logo
1  sur  16
New Media Technology – The DOs & DON’Ts DIGITAL media MMD2063 New Media Technology Lecture 7
[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],[object Object],[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
Economic Regulation Promotion of competition, prohibition of anti-competitive conduct, enforcement of license conditions for network & application provider Technical Regulation Development & enforcement of technical codes & standards, administration of electronic addressing Consumer Regulation ensure adequate protection measures in dispute resolution, affordability of services & service availability Social Regulation Content development & content regulation DIGITAL media MMD2063 New Media Technology
The regulatory paradigm Cryptography = encryption Form of communication and computing security that refers to the translation of data & communications into a secret code (complex mathematical algorithms) Needing key/ password to decrypt the code DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],[object Object],[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
[object Object],[object Object],[object Object],[object Object],DIGITAL media MMD2063 New Media Technology
Reference: Pavlik, J V 1998,  New Media Technology: Cultural and Commercial Perspectives , 2nd edn, Allyn & Bacon, US. Suruhanjaya Komunikasi Dan Multimedia Malaysia 2006 . Retrieved December 14, 2006, from http://www.mcmc.gov.my DIGITAL media MMD2063 New Media Technology

Contenu connexe

Tendances

The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsParviz Iskhakov, PhD
 
The Role of 4G in Mobile Data Monetisation
The Role of 4G in Mobile Data MonetisationThe Role of 4G in Mobile Data Monetisation
The Role of 4G in Mobile Data Monetisationmy_ron2
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy lawsesther_sonu
 
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson TuttleOverview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson TuttleSilicon Labs
 
Hempchain july meetup v1
Hempchain july meetup v1Hempchain july meetup v1
Hempchain july meetup v1Mark Morris
 
Smartphone kill switch now required in California
Smartphone kill switch now required in CaliforniaSmartphone kill switch now required in California
Smartphone kill switch now required in Californiajazzybaby4843
 
Whitepaper - Module 5 Final
Whitepaper - Module 5 FinalWhitepaper - Module 5 Final
Whitepaper - Module 5 Finalasmullen
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesMartyn Taylor
 
Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Dr. Mazlan Abbas
 
MWC 18 Barcelona Final Report
MWC 18 Barcelona Final ReportMWC 18 Barcelona Final Report
MWC 18 Barcelona Final ReportSadiq Malik
 

Tendances (20)

Iti
ItiIti
Iti
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
The Role of 4G in Mobile Data Monetisation
The Role of 4G in Mobile Data MonetisationThe Role of 4G in Mobile Data Monetisation
The Role of 4G in Mobile Data Monetisation
 
Cyberpolicy laws
Cyberpolicy lawsCyberpolicy laws
Cyberpolicy laws
 
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson TuttleOverview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
Overview of the Internet of Things from Silicon Labs CEO Tyson Tuttle
 
Iti
ItiIti
Iti
 
Iti
ItiIti
Iti
 
Hempchain july meetup v1
Hempchain july meetup v1Hempchain july meetup v1
Hempchain july meetup v1
 
Smartphone kill switch now required in California
Smartphone kill switch now required in CaliforniaSmartphone kill switch now required in California
Smartphone kill switch now required in California
 
Iti
ItiIti
Iti
 
Iti
ItiIti
Iti
 
Whitepaper - Module 5 Final
Whitepaper - Module 5 FinalWhitepaper - Module 5 Final
Whitepaper - Module 5 Final
 
Developments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issuesDevelopments in the TMT Sector - Current trends & emerging legal issues
Developments in the TMT Sector - Current trends & emerging legal issues
 
Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022Internet of Things (IoT) Applications and Trends Malaysia 2022
Internet of Things (IoT) Applications and Trends Malaysia 2022
 
Iti
ItiIti
Iti
 
Cyber law
Cyber lawCyber law
Cyber law
 
Iti
ItiIti
Iti
 
MWC 18 Barcelona Final Report
MWC 18 Barcelona Final ReportMWC 18 Barcelona Final Report
MWC 18 Barcelona Final Report
 
Iti
ItiIti
Iti
 

En vedette

BEACHSIDE 2010 INTRO
BEACHSIDE 2010 INTROBEACHSIDE 2010 INTRO
BEACHSIDE 2010 INTRObwelch23
 
SIME - Survey 2009
SIME - Survey 2009SIME - Survey 2009
SIME - Survey 2009Sime
 
Pasig RIver Pollution
Pasig RIver PollutionPasig RIver Pollution
Pasig RIver Pollutionkevincarl27
 
Pasig river Pollution
Pasig river PollutionPasig river Pollution
Pasig river PollutionFelix Bunagan
 
Pasig River Presentation
Pasig River PresentationPasig River Presentation
Pasig River PresentationRomel Cirineo
 
Water Quality in the Philippines (2008-2015)
Water Quality in the Philippines (2008-2015)Water Quality in the Philippines (2008-2015)
Water Quality in the Philippines (2008-2015)EnP Ragene Andrea Palma
 

En vedette (7)

BEACHSIDE 2010 INTRO
BEACHSIDE 2010 INTROBEACHSIDE 2010 INTRO
BEACHSIDE 2010 INTRO
 
SIME - Survey 2009
SIME - Survey 2009SIME - Survey 2009
SIME - Survey 2009
 
Pasig RIver Pollution
Pasig RIver PollutionPasig RIver Pollution
Pasig RIver Pollution
 
Pasig river Pollution
Pasig river PollutionPasig river Pollution
Pasig river Pollution
 
THE PASIG RIVER
THE PASIG RIVERTHE PASIG RIVER
THE PASIG RIVER
 
Pasig River Presentation
Pasig River PresentationPasig River Presentation
Pasig River Presentation
 
Water Quality in the Philippines (2008-2015)
Water Quality in the Philippines (2008-2015)Water Quality in the Philippines (2008-2015)
Water Quality in the Philippines (2008-2015)
 

Similaire à Lecture7

IOT Market Overview 2018
IOT Market Overview 2018 IOT Market Overview 2018
IOT Market Overview 2018 Kris Venturini
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1ikmalsham
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111Yogendra Wagh
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAIRJET Journal
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Kangai Maukazuva, CGEIT
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesSidraAfreen
 
Case study.pptx
Case study.pptxCase study.pptx
Case study.pptxictctti
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...ijtsrd
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistanSajeel Bhatti
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Dr Rachel O'Connell
 
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...South Tyrol Free Software Conference
 

Similaire à Lecture7 (20)

IOT Market Overview 2018
IOT Market Overview 2018 IOT Market Overview 2018
IOT Market Overview 2018
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Jawapan bab 1
Jawapan bab 1Jawapan bab 1
Jawapan bab 1
 
E commerce
E commerceE commerce
E commerce
 
It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111It act 2000 & cyber crime 111111
It act 2000 & cyber crime 111111
 
Legal Issues in Online Environment
Legal Issues in Online EnvironmentLegal Issues in Online Environment
Legal Issues in Online Environment
 
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIAHISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
HISTORICAL GENESIS AND EVOLUTION OF CYBER CRIME AND CYBER SECURITY LAWS IN INDIA
 
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
ITCamp 2018 - Cristiana Fernbach - GDPR compliance in the industry 4.0
 
Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE Cyber Crime & Cyber Security Workshop, ZIE
Cyber Crime & Cyber Security Workshop, ZIE
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Emerging trends in computer science and related technologies
Emerging trends in computer science and related technologiesEmerging trends in computer science and related technologies
Emerging trends in computer science and related technologies
 
Presentation ict3992
Presentation ict3992Presentation ict3992
Presentation ict3992
 
Case study.pptx
Case study.pptxCase study.pptx
Case study.pptx
 
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
An Analytical Study on Attacks and Threats in Cyber Security and its Evolving...
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cyber laws in pakistan
Cyber laws in pakistanCyber laws in pakistan
Cyber laws in pakistan
 
Business presentation
Business presentationBusiness presentation
Business presentation
 
Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...Citizen centric digital and mobile-identity, personal data ecosystems and the...
Citizen centric digital and mobile-identity, personal data ecosystems and the...
 
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
SFScon19 - Eugenio Bettella Marco Reguzzoni - Internet of Things & cybersecur...
 

Dernier

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Dernier (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Lecture7

  • 1. New Media Technology – The DOs & DON’Ts DIGITAL media MMD2063 New Media Technology Lecture 7
  • 2.
  • 3.
  • 4.
  • 5. Economic Regulation Promotion of competition, prohibition of anti-competitive conduct, enforcement of license conditions for network & application provider Technical Regulation Development & enforcement of technical codes & standards, administration of electronic addressing Consumer Regulation ensure adequate protection measures in dispute resolution, affordability of services & service availability Social Regulation Content development & content regulation DIGITAL media MMD2063 New Media Technology
  • 6. The regulatory paradigm Cryptography = encryption Form of communication and computing security that refers to the translation of data & communications into a secret code (complex mathematical algorithms) Needing key/ password to decrypt the code DIGITAL media MMD2063 New Media Technology
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. Reference: Pavlik, J V 1998, New Media Technology: Cultural and Commercial Perspectives , 2nd edn, Allyn & Bacon, US. Suruhanjaya Komunikasi Dan Multimedia Malaysia 2006 . Retrieved December 14, 2006, from http://www.mcmc.gov.my DIGITAL media MMD2063 New Media Technology