SlideShare une entreprise Scribd logo
1  sur  27
Mobile Mayhem: Designing an E-Commerce Regime to Regulate Dangerous Behavior in Mobile Environments  Joshua Fairfield ,[object Object]
Director, Frances Lewis Law Center
 Professor Robin Fretwell Wilson Washington and Lee University School of Law © 2010
RoadMap Mobile Mayhem: What Can the ‘Net Teach Us About the Future of Mobile Environments? Failures of Real-World Enforcement Regimes in Novel Contexts Incentives: Workable Alternatives to Enforcement
Mobile Mayhem: Mutating Issues “Measured in terms of depravity, insularity and traffic-driven turnover, the culture of /b/ has little precedent. /b/ reads like the inside of a high-school bathroom stall, or an obscene telephone party line, or a blog with no posts and all comments filled with slang that you are too old to understand.” –Matthias Schwartz, “The Trolls Among Us,” inThe New York Times, 2008 Marginal Conduct Appeared on the Internet Immediately
Mobile Mayhem: Mutating Issues ,[object Object]
more graphic
more real, and
more accessible to Children ,[object Object]
and provide parent-free venue for kids to bully/speak explicitly to each other
Mobile Environments offer LESS supervision and GREATER variety,[object Object]
Augmented Reality Objectification
“Jiggletits”:  user takes pics of women & manipulates their bodies
“Bikini Camera”: user takes pics of clothed women and overlays bikini-clad women over them
Pornographic MMS, Websites, Ads, & Apps,[object Object]
Brings Violence Closer to Real Life
Will get more gruesome (realistic) as devices progress,[object Object]
Constant (unlike cookies, which stop logging you when you log off)
Necessary for the Commerce Services,[object Object]
Broadcasting Private  Information
Makes Users Easier to Contact in Real Life,[object Object]
Mobile Commerce is now much more threatening to personal privacy than any world government.
Mobile Mayhem: Holistic Approach Invasions of Privacy Hate Speech,  Cyber-Bullying, Kid-to-Kid Explicit Chat Adult Content Accessible to Children Users Must Be Protected from Social AND Economic Misconduct in Online Environments Deceptive Advertising Fraud/Scamming Technical Attack
Mobile Mayhem: Scams & Fraud USER-Focused ,[object Object]
VOIP phishing
Fraudulent Apps or WebsitesMobile Devices offer more varied means of contact, increasing risk that user will be unaware of threat and trust communication too easily.
Mobile Mayhem: Technical Attack DEVICE-Focused ,[object Object]

Contenu connexe

Tendances

Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
night seem
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
Areeb Khan
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environment
Jeet Kothadiya
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
Melfi Associates
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
Mbradber
 

Tendances (20)

Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2
 
Special topics
Special topicsSpecial topics
Special topics
 
Crime & technology
Crime & technologyCrime & technology
Crime & technology
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
 
Mao p.cs.102.01
Mao p.cs.102.01Mao p.cs.102.01
Mao p.cs.102.01
 
Legal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceLegal contexts of digital media & internet governance
Legal contexts of digital media & internet governance
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environment
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
 
Ethics piracy
Ethics piracyEthics piracy
Ethics piracy
 
Advantages and disantvantages of internet
Advantages and disantvantages of internetAdvantages and disantvantages of internet
Advantages and disantvantages of internet
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
DOPA presentation
DOPA presentationDOPA presentation
DOPA presentation
 

En vedette

Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Haleh Hadaegh
 
M&G and Soul City HPF supplement
M&G and Soul City HPF supplement M&G and Soul City HPF supplement
M&G and Soul City HPF supplement
NCAS1
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
IBM Danmark
 
Adecco Xpert Presentation
Adecco Xpert PresentationAdecco Xpert Presentation
Adecco Xpert Presentation
JoleneBannister
 
The asylum of horrors 002
The asylum of horrors 002The asylum of horrors 002
The asylum of horrors 002
LUIS NARBONA
 

En vedette (16)

Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
 
M&G and Soul City HPF supplement
M&G and Soul City HPF supplement M&G and Soul City HPF supplement
M&G and Soul City HPF supplement
 
Compressor
CompressorCompressor
Compressor
 
Planungs- und Bewertungskriterien fuer Bibliotheksbauten
Planungs- und Bewertungskriterien fuer BibliotheksbautenPlanungs- und Bewertungskriterien fuer Bibliotheksbauten
Planungs- und Bewertungskriterien fuer Bibliotheksbauten
 
Gayrimenkul Değerleme ve Otel Fizibilite
Gayrimenkul Değerleme ve Otel FizibiliteGayrimenkul Değerleme ve Otel Fizibilite
Gayrimenkul Değerleme ve Otel Fizibilite
 
Уповноважена особа
Уповноважена особаУповноважена особа
Уповноважена особа
 
Droidcon 2011: Strategies for Android, Henning Boeger, Capgemini
Droidcon 2011: Strategies for Android, Henning Boeger, CapgeminiDroidcon 2011: Strategies for Android, Henning Boeger, Capgemini
Droidcon 2011: Strategies for Android, Henning Boeger, Capgemini
 
BEST PRICE
BEST PRICEBEST PRICE
BEST PRICE
 
Elitecore Maravedis Webinar Final Slide Deck
Elitecore Maravedis Webinar  Final Slide DeckElitecore Maravedis Webinar  Final Slide Deck
Elitecore Maravedis Webinar Final Slide Deck
 
Sag doch JA!
Sag doch JA!Sag doch JA!
Sag doch JA!
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Adecco Xpert Presentation
Adecco Xpert PresentationAdecco Xpert Presentation
Adecco Xpert Presentation
 
GENASSIST™ CRISPR & rAAV Genome Editing Tools
GENASSIST™ CRISPR & rAAV Genome Editing ToolsGENASSIST™ CRISPR & rAAV Genome Editing Tools
GENASSIST™ CRISPR & rAAV Genome Editing Tools
 
Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...
Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...
Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...
 
The asylum of horrors 002
The asylum of horrors 002The asylum of horrors 002
The asylum of horrors 002
 
Les 7 clés pour bien vendre
Les 7 clés pour bien vendreLes 7 clés pour bien vendre
Les 7 clés pour bien vendre
 

Similaire à Mmcp merged

Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
Content Rules, Inc.
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
It's your future
It's your futureIt's your future
It's your future
radhingga
 

Similaire à Mmcp merged (20)

Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
It's your future
It's your futureIt's your future
It's your future
 

Dernier

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Dernier (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Mmcp merged

Notes de l'éditeur

  1. You can be tracked via GPS, RFID, Cell tower, or Wifi access point.
  2. 15.  Commerce, not the government, has proven the greatest invader of personal dignity and privacy. 
  3. Buying products for the phone from carrier-approved markets (the App store, the Android market)Buying products from WITHIN apps- whether online shopping for real products like this shopsavvy screenshot, or buying virtual objects in exchanges like Pocket Empire’s stock exchange (screenshot available on the regulating private money slide).“Upsell” products- premium texts, multimedia plans, etc.
  4. 16. This will become significantly more important as our computers -- in the form of smartphones -- follow us everywhere we go and monitor everything we do.  Thus, the final recommendation that I make is that personal information collected by a provider be used only for the purposes for which it was collected; it cannot be resold, or traded, or used by other party without express opt-in permission on a per-operation basis.