SlideShare une entreprise Scribd logo
1  sur  27
Mobile Mayhem: Designing an E-Commerce Regime to Regulate Dangerous Behavior in Mobile Environments  Joshua Fairfield ,[object Object]
Director, Frances Lewis Law Center
 Professor Robin Fretwell Wilson Washington and Lee University School of Law © 2010
RoadMap Mobile Mayhem: What Can the ‘Net Teach Us About the Future of Mobile Environments? Failures of Real-World Enforcement Regimes in Novel Contexts Incentives: Workable Alternatives to Enforcement
Mobile Mayhem: Mutating Issues “Measured in terms of depravity, insularity and traffic-driven turnover, the culture of /b/ has little precedent. /b/ reads like the inside of a high-school bathroom stall, or an obscene telephone party line, or a blog with no posts and all comments filled with slang that you are too old to understand.” –Matthias Schwartz, “The Trolls Among Us,” inThe New York Times, 2008 Marginal Conduct Appeared on the Internet Immediately
Mobile Mayhem: Mutating Issues ,[object Object]
more graphic
more real, and
more accessible to Children ,[object Object]
and provide parent-free venue for kids to bully/speak explicitly to each other
Mobile Environments offer LESS supervision and GREATER variety,[object Object]
Augmented Reality Objectification
“Jiggletits”:  user takes pics of women & manipulates their bodies
“Bikini Camera”: user takes pics of clothed women and overlays bikini-clad women over them
Pornographic MMS, Websites, Ads, & Apps,[object Object]
Brings Violence Closer to Real Life
Will get more gruesome (realistic) as devices progress,[object Object]
Constant (unlike cookies, which stop logging you when you log off)
Necessary for the Commerce Services,[object Object]
Broadcasting Private  Information
Makes Users Easier to Contact in Real Life,[object Object]
Mobile Commerce is now much more threatening to personal privacy than any world government.
Mobile Mayhem: Holistic Approach Invasions of Privacy Hate Speech,  Cyber-Bullying, Kid-to-Kid Explicit Chat Adult Content Accessible to Children Users Must Be Protected from Social AND Economic Misconduct in Online Environments Deceptive Advertising Fraud/Scamming Technical Attack
Mobile Mayhem: Scams & Fraud USER-Focused ,[object Object]
VOIP phishing
Fraudulent Apps or WebsitesMobile Devices offer more varied means of contact, increasing risk that user will be unaware of threat and trust communication too easily.
Mobile Mayhem: Technical Attack DEVICE-Focused ,[object Object]

Contenu connexe

Tendances

Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
night seem
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
Areeb Khan
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environment
Jeet Kothadiya
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
Melfi Associates
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
Mbradber
 

Tendances (20)

Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2
 
Special topics
Special topicsSpecial topics
Special topics
 
Crime & technology
Crime & technologyCrime & technology
Crime & technology
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
 
Mao p.cs.102.01
Mao p.cs.102.01Mao p.cs.102.01
Mao p.cs.102.01
 
Legal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceLegal contexts of digital media & internet governance
Legal contexts of digital media & internet governance
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environment
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
 
Ethics piracy
Ethics piracyEthics piracy
Ethics piracy
 
Advantages and disantvantages of internet
Advantages and disantvantages of internetAdvantages and disantvantages of internet
Advantages and disantvantages of internet
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
DOPA presentation
DOPA presentationDOPA presentation
DOPA presentation
 

En vedette

Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Haleh Hadaegh
 
M&G and Soul City HPF supplement
M&G and Soul City HPF supplement M&G and Soul City HPF supplement
M&G and Soul City HPF supplement
NCAS1
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
IBM Danmark
 
Adecco Xpert Presentation
Adecco Xpert PresentationAdecco Xpert Presentation
Adecco Xpert Presentation
JoleneBannister
 
The asylum of horrors 002
The asylum of horrors 002The asylum of horrors 002
The asylum of horrors 002
LUIS NARBONA
 

En vedette (16)

Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
 
M&G and Soul City HPF supplement
M&G and Soul City HPF supplement M&G and Soul City HPF supplement
M&G and Soul City HPF supplement
 
Compressor
CompressorCompressor
Compressor
 
Planungs- und Bewertungskriterien fuer Bibliotheksbauten
Planungs- und Bewertungskriterien fuer BibliotheksbautenPlanungs- und Bewertungskriterien fuer Bibliotheksbauten
Planungs- und Bewertungskriterien fuer Bibliotheksbauten
 
Gayrimenkul Değerleme ve Otel Fizibilite
Gayrimenkul Değerleme ve Otel FizibiliteGayrimenkul Değerleme ve Otel Fizibilite
Gayrimenkul Değerleme ve Otel Fizibilite
 
Уповноважена особа
Уповноважена особаУповноважена особа
Уповноважена особа
 
Droidcon 2011: Strategies for Android, Henning Boeger, Capgemini
Droidcon 2011: Strategies for Android, Henning Boeger, CapgeminiDroidcon 2011: Strategies for Android, Henning Boeger, Capgemini
Droidcon 2011: Strategies for Android, Henning Boeger, Capgemini
 
BEST PRICE
BEST PRICEBEST PRICE
BEST PRICE
 
Elitecore Maravedis Webinar Final Slide Deck
Elitecore Maravedis Webinar  Final Slide DeckElitecore Maravedis Webinar  Final Slide Deck
Elitecore Maravedis Webinar Final Slide Deck
 
Sag doch JA!
Sag doch JA!Sag doch JA!
Sag doch JA!
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Adecco Xpert Presentation
Adecco Xpert PresentationAdecco Xpert Presentation
Adecco Xpert Presentation
 
GENASSIST™ CRISPR & rAAV Genome Editing Tools
GENASSIST™ CRISPR & rAAV Genome Editing ToolsGENASSIST™ CRISPR & rAAV Genome Editing Tools
GENASSIST™ CRISPR & rAAV Genome Editing Tools
 
Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...
Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...
Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...
 
The asylum of horrors 002
The asylum of horrors 002The asylum of horrors 002
The asylum of horrors 002
 
Les 7 clés pour bien vendre
Les 7 clés pour bien vendreLes 7 clés pour bien vendre
Les 7 clés pour bien vendre
 

Similaire à Mmcp merged

Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
Content Rules, Inc.
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
It's your future
It's your futureIt's your future
It's your future
radhingga
 

Similaire à Mmcp merged (20)

Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
It's your future
It's your futureIt's your future
It's your future
 

Dernier

Dernier (20)

COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 

Mmcp merged

Notes de l'éditeur

  1. You can be tracked via GPS, RFID, Cell tower, or Wifi access point.
  2. 15.  Commerce, not the government, has proven the greatest invader of personal dignity and privacy. 
  3. Buying products for the phone from carrier-approved markets (the App store, the Android market)Buying products from WITHIN apps- whether online shopping for real products like this shopsavvy screenshot, or buying virtual objects in exchanges like Pocket Empire’s stock exchange (screenshot available on the regulating private money slide).“Upsell” products- premium texts, multimedia plans, etc.
  4. 16. This will become significantly more important as our computers -- in the form of smartphones -- follow us everywhere we go and monitor everything we do.  Thus, the final recommendation that I make is that personal information collected by a provider be used only for the purposes for which it was collected; it cannot be resold, or traded, or used by other party without express opt-in permission on a per-operation basis.