SlideShare une entreprise Scribd logo
1  sur  27
Mobile Mayhem: Designing an E-Commerce Regime to Regulate Dangerous Behavior in Mobile Environments  Professor Joshua Fairfield ,[object Object]
Director, Frances Lewis Law Center © 2010
 Professor Robin Fretwell Wilson Washington and Lee University School of Law © 2010
RoadMap Mobile Mayhem: What Can the ‘Net Teach Us About the Future of Mobile Environments? Failures of Real-World Enforcement Regimes in Novel Contexts 3. 	Incentives: Workable Alternatives to Enforcement
Mobile Mayhem: Mutating Issues “Measured in terms of depravity, insularity and traffic-driven turnover, the culture of /b/ has little precedent. /b/ reads like the inside of a high-school bathroom stall, or an obscene telephone party line, or a blog with no posts and all comments filled with slang that you are too old to understand.” –Matthias Schwartz, “The Trolls Among Us,” inThe New York Times, 2008 Marginal Conduct Appeared on the Internet Immediately
Mobile Mayhem: Mutating Issues ,[object Object]
more graphic
more real, and
more accessible to Children ,[object Object]
and provide parent-free venue for kids to bully/speak explicitly to each other
Mobile Environments offer LESS supervision and GREATER variety,[object Object]
Augmented Reality Objectification
“Jiggletits”:  user takes pics of women & manipulates their bodies
“Bikini Camera”: user takes pics of clothed women and overlays bikini-clad women over them
Pornographic MMS, Websites, Ads, & Apps,[object Object]
Brings Violence Closer to Real Life
Will get more gruesome (realistic) as devices progress,[object Object]
Constant (unlike cookies, which stop logging you when you log off)
Necessary for the Commerce Services,[object Object]
Broadcasting Private  Information
Makes Users Easier to Contact in Real Life,[object Object]
Mobile Commerce is now much more threatening to personal privacy than any world government.
Mobile Mayhem: Holistic Approach Invasions of Privacy Hate Speech,  Cyber-Bullying, Kid-to-Kid Explicit Chat Adult Content Accessible to Children Users Must Be Protected from Social AND Economic Misconduct in Online Environments Deceptive Advertising Fraud/Scamming Technical Attack
Mobile Mayhem: Scams & Fraud USER-Focused ,[object Object]
VOIP phishing
Fraudulent Apps or WebsitesMobile Devices offer more varied means of contact, increasing risk that user will be unaware of threat and trust communication too easily.
Mobile Mayhem: Technical Attack DEVICE-Focused ,[object Object]

Contenu connexe

Tendances

Special topics
Special topicsSpecial topics
Special topicsaivarose
 
Children and the Media
Children and the MediaChildren and the Media
Children and the MediaEllieWeedon
 
Internet safety
Internet safetyInternet safety
Internet safetyshoconnor
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of InternetAreeb Khan
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfnight seem
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2BAS ADITYA SRINIVAS
 
Advantages and Disadvantages of Internet
Advantages and Disadvantages of InternetAdvantages and Disadvantages of Internet
Advantages and Disadvantages of InternetBAS ADITYA SRINIVAS
 
Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)Alyanna Marie
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525chadolivard
 
Mao p.cs.102.01
Mao p.cs.102.01Mao p.cs.102.01
Mao p.cs.102.01L14MaoP
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internetLeomar Bondoc
 

Tendances (20)

advantages and disadvantages of internet
advantages and disadvantages of internet advantages and disadvantages of internet
advantages and disadvantages of internet
 
Ethical issues
Ethical issuesEthical issues
Ethical issues
 
Special topics
Special topicsSpecial topics
Special topics
 
Mitigating circumstances in cyber crime
Mitigating circumstances in cyber  crimeMitigating circumstances in cyber  crime
Mitigating circumstances in cyber crime
 
Children and the Media
Children and the MediaChildren and the Media
Children and the Media
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2
 
Advantages and Disadvantages of Internet
Advantages and Disadvantages of InternetAdvantages and Disadvantages of Internet
Advantages and Disadvantages of Internet
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Riza 9 a
Riza   9 aRiza   9 a
Riza 9 a
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)Technology ( The Advantage and Disadvantage)
Technology ( The Advantage and Disadvantage)
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Mao p.cs.102.01
Mao p.cs.102.01Mao p.cs.102.01
Mao p.cs.102.01
 
Crime & technology
Crime & technologyCrime & technology
Crime & technology
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 

En vedette

The Botanic Book
The Botanic BookThe Botanic Book
The Botanic Bookmojcafo
 
Secrets Of Life (In English)
Secrets Of Life (In English)Secrets Of Life (In English)
Secrets Of Life (In English)guest0ce273
 
11 Powodow Zeby Nie Pic Z Przyjaciolmi
11 Powodow Zeby Nie Pic Z Przyjaciolmi11 Powodow Zeby Nie Pic Z Przyjaciolmi
11 Powodow Zeby Nie Pic Z Przyjaciolmiguestb9b45a
 
Listening Exercise Black Or White
Listening Exercise Black Or WhiteListening Exercise Black Or White
Listening Exercise Black Or Whiteguestc5ff34
 
What’s Really Good 2009
What’s Really Good 2009What’s Really Good 2009
What’s Really Good 2009Alana Garcia
 
Aberdeen Overview
Aberdeen OverviewAberdeen Overview
Aberdeen Overviewhjongert
 
accULL (HAC Leganés)
accULL (HAC Leganés)accULL (HAC Leganés)
accULL (HAC Leganés)Ruymán Reyes
 
Mh Architectuur - Portfoliobladen
Mh Architectuur - PortfoliobladenMh Architectuur - Portfoliobladen
Mh Architectuur - Portfoliobladenmatthijshesta
 
Directive-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous ComputingDirective-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous ComputingRuymán Reyes
 
sankt peterburgi
sankt peterburgisankt peterburgi
sankt peterburginino
 

En vedette (15)

The Botanic Book
The Botanic BookThe Botanic Book
The Botanic Book
 
نظرية الانتاج
نظرية الانتاجنظرية الانتاج
نظرية الانتاج
 
Pro Manku
Pro MankuPro Manku
Pro Manku
 
Secrets Of Life (In English)
Secrets Of Life (In English)Secrets Of Life (In English)
Secrets Of Life (In English)
 
My Slideshow
My SlideshowMy Slideshow
My Slideshow
 
11 Powodow Zeby Nie Pic Z Przyjaciolmi
11 Powodow Zeby Nie Pic Z Przyjaciolmi11 Powodow Zeby Nie Pic Z Przyjaciolmi
11 Powodow Zeby Nie Pic Z Przyjaciolmi
 
Listening Exercise Black Or White
Listening Exercise Black Or WhiteListening Exercise Black Or White
Listening Exercise Black Or White
 
What’s Really Good 2009
What’s Really Good 2009What’s Really Good 2009
What’s Really Good 2009
 
Aberdeen Overview
Aberdeen OverviewAberdeen Overview
Aberdeen Overview
 
accULL (HAC Leganés)
accULL (HAC Leganés)accULL (HAC Leganés)
accULL (HAC Leganés)
 
Mh Architectuur - Portfoliobladen
Mh Architectuur - PortfoliobladenMh Architectuur - Portfoliobladen
Mh Architectuur - Portfoliobladen
 
Directive-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous ComputingDirective-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous Computing
 
sankt peterburgi
sankt peterburgisankt peterburgi
sankt peterburgi
 
Jeopardy!
Jeopardy!Jeopardy!
Jeopardy!
 
cost of production and revenue
cost of production and revenuecost of production and revenue
cost of production and revenue
 

Similaire à Mmcpmerged 100628150159-phpapp01

Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threatsejhilbert
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareNurizcka
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology- Mark - Fullbright
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their preventionTejasvi Bhatia
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things The Center for Identity
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingmckinleychas
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Mobile Strategy and Denial: Avoiding a House of Cards
Mobile Strategy and Denial: Avoiding a House of CardsMobile Strategy and Denial: Avoiding a House of Cards
Mobile Strategy and Denial: Avoiding a House of CardsThe Mechanism
 

Similaire à Mmcpmerged 100628150159-phpapp01 (20)

Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
McKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullyingMcKinley eist 5100 cyberbullying
McKinley eist 5100 cyberbullying
 
Facebook
FacebookFacebook
Facebook
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Mobile Strategy and Denial: Avoiding a House of Cards
Mobile Strategy and Denial: Avoiding a House of CardsMobile Strategy and Denial: Avoiding a House of Cards
Mobile Strategy and Denial: Avoiding a House of Cards
 

Mmcpmerged 100628150159-phpapp01

Notes de l'éditeur

  1. You can be tracked via GPS, RFID, Cell tower, or Wifi access point.
  2. 15.  Commerce, not the government, has proven the greatest invader of personal dignity and privacy. 
  3. Buying products for the phone from carrier-approved markets (the App store, the Android market)Buying products from WITHIN apps- whether online shopping for real products like this shopsavvy screenshot, or buying virtual objects in exchanges like Pocket Empire’s stock exchange (screenshot available on the regulating private money slide).“Upsell” products- premium texts, multimedia plans, etc.
  4. 16. This will become significantly more important as our computers -- in the form of smartphones -- follow us everywhere we go and monitor everything we do.  Thus, the final recommendation that I make is that personal information collected by a provider be used only for the purposes for which it was collected; it cannot be resold, or traded, or used by other party without express opt-in permission on a per-operation basis.