Communication & Technology eJournal最新文献

筛选
英文 中文
The e-Commerce Directive and GDPR: Towards Convergence of Legal Regimes in the Algorithmic Society? 电子商务指令和GDPR:算法社会中法律制度的趋同?
Communication & Technology eJournal Pub Date : 2019-05-01 DOI: 10.2139/ssrn.3393557
G. De Gregorio
{"title":"The e-Commerce Directive and GDPR: Towards Convergence of Legal Regimes in the Algorithmic Society?","authors":"G. De Gregorio","doi":"10.2139/ssrn.3393557","DOIUrl":"https://doi.org/10.2139/ssrn.3393557","url":null,"abstract":"The legal regimes of online intermediaries’ liability and data protection have been conceived on parallel tracks. Whereas the Data Protection Directive could not exclude from its scope of application the e-Commerce Directive due to chronological reasons, the latter expressly clarified that its scope does not include data protection matters. The rise of the algorithmic society has blurred this traditional gap. From a merely passive role, new online intermediaries such as search engines and social networks have acquired an increasingly active role in managing online contents. At the same time, their role in deciding how to process personal data has transformed these actors from data processors to controllers. This evolving framework has led to the convergence of the parallel tracks which have started to overlap. In particular, the ECJ decision in Google Spain and the Italian Google Vivi Down saga have shown the intersections between the two regimes. The adoption of the General Data Protection Regulation (GDPR) has contributed to reducing the gap between the regimes of data protection and ISP liability. The GDPR has clarified that the application of the new Regulation should not affect the rules provided for by the e-Commerce Directive, in particular, those regarding ISP’s liability. The result could be a potential overlap of two layers which, until the adoption of the GDPR, were conceived from two different perspectives.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114721373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Trust Model With Defense Scheme in Manets 马奈的带有防御方案的信任模型
Communication & Technology eJournal Pub Date : 2019-04-30 DOI: 10.34218/IJARET.10.2.2019.030
Syeda Kausar Fatima, Syeda Gauhar Fatima, Syed Abdul Sattar, Syed Mohd Ali
{"title":"Trust Model With Defense Scheme in Manets","authors":"Syeda Kausar Fatima, Syeda Gauhar Fatima, Syed Abdul Sattar, Syed Mohd Ali","doi":"10.34218/IJARET.10.2.2019.030","DOIUrl":"https://doi.org/10.34218/IJARET.10.2.2019.030","url":null,"abstract":"The reliability of delivering packets through multi-hop intermediate nodes is a significant issue in the mobile ad hoc networks (MANETs). The distributed mobile nodes establish connections to form the MANET, which may include selfish and misbehaving nodes. Recommendation based trust management has been proposed in the literature as a mechanism to filter out the misbehaving nodes while searching for a packet delivery route. However, building a trust model that relies on the recommendations from other nodes in the network is vulnerable to the possible dishonest behaviour, such as badmouthing, ballot-stuffing, and collusion, of the recommending nodes. This paper investigates the problems of attacks posed by misbehaving nodes while propagating recommendations in the existing trust models. We propose a recommendation-based trust model with a defence scheme that utilises clustering technique to dynamically filter attacks related to dishonest recommendations within certain time based on number of interactions, compatibility of information and node closeness. The model is empirically tested in several mobile and disconnected topologies in which nodes experience changes in their neighbourhoods and consequently face frequent route changes. The empirical analysis demonstrates robustness and accuracy of the trust model in a dynamic MANET environment.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121732111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Social Media Reviews on Cine Enthusiasts with Special Reference to Bollywood Movies 社交媒体评论对电影爱好者的影响,尤其是宝莱坞电影
Communication & Technology eJournal Pub Date : 2019-04-30 DOI: 10.34218/jom.6.2.2019.021
Abdul Rahim Ahmed Munshi
{"title":"Impact of Social Media Reviews on Cine Enthusiasts with Special Reference to Bollywood Movies","authors":"Abdul Rahim Ahmed Munshi","doi":"10.34218/jom.6.2.2019.021","DOIUrl":"https://doi.org/10.34218/jom.6.2.2019.021","url":null,"abstract":"Every now and then you come across a social media post either criticizing a movie or praising a movie. Does it really matter what either experts or a commoner has to say about his or her review of a movie? In an age where the digital word spreads faster than the speed of light, does a FB Post , a twitter tweet, a book my show review, or an IMdb review impact the movie going intentions of people. This research paper aims to answer all such questions and throw light on whether social media word decides the box office fate of bollywood movies. Several tests of associations and mean difference were used in this study to see whether there was an association among demographic factors, movie preferences and factors effecting movie choice. Additionally an effort was made to check whether demographic factors have got any effect on the effectiveness of social media reviews. Results of this paper will help filmmakers understand whether positive word of mouth by common public, media firms and film critics should be monitored and considered seriously or should it be left unnoticed.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121227385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analyzing Task Scheduling Algorithms and Load Balancing Approach to Enhance the Performance of Cloud Computing 分析任务调度算法和负载均衡方法以提高云计算性能
Communication & Technology eJournal Pub Date : 2019-03-15 DOI: 10.2139/ssrn.3429712
Vivek Gehlot, S.P. Singh, Akash Saxena
{"title":"Analyzing Task Scheduling Algorithms and Load Balancing Approach to Enhance the Performance of Cloud Computing","authors":"Vivek Gehlot, S.P. Singh, Akash Saxena","doi":"10.2139/ssrn.3429712","DOIUrl":"https://doi.org/10.2139/ssrn.3429712","url":null,"abstract":"As a key and outskirts field of the present local and global PC innovation, distributed computing is a processing worldview that can give dynamic also adaptable virtual assets concluded Internet administration to clients on interest, and furthermore, it is further improvement of disseminated registering, parallel figuring also matrix figuring. As indicated by new highlights of distributed computing, for example, adaptability, virtualization and so forth, this paper talks about a three levels task Scheduling component dependent on load balancing in distributed computing. Effective task scheduling system may see clients' necessities, and improve the asset usage, along these lines upgrading general execution of the distributed computing condition. This paper defines various scheduling algorithms which use in cloud computing on various parameters, especially on makespan. Also, a layered model for cloud computing and important features of clouds computing is described.Task Scheduling issues are critical in distributed computing, also become particularly testing once considering load balance.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128869514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attention, Desire and Human Subjectivity in the Digital Age 数字时代的注意、欲望与人的主体性
Communication & Technology eJournal Pub Date : 2019-01-20 DOI: 10.2139/ssrn.3509635
Hassan Mustafa
{"title":"Attention, Desire and Human Subjectivity in the Digital Age","authors":"Hassan Mustafa","doi":"10.2139/ssrn.3509635","DOIUrl":"https://doi.org/10.2139/ssrn.3509635","url":null,"abstract":"The paper traces the role of social media specifically Instagram in constructing a regime of self-improvement and its effect on consumption patterns and reproduction of desires. Desire is explored through a post-structuralist lens focusing on various aspects of how it functions. While, the role of social media in our lives and the importance of self-improvement regime are explored historically.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130219749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tweet Sixteen and Pregnant: Missing Links in the Causal Chain from Reality TV to Fertility 推特十六岁和怀孕:从真人秀到生育的因果链中缺失的环节
Communication & Technology eJournal Pub Date : 2019-01-01 DOI: 10.3386/W25446
David A. Jaeger, T. Joyce, R. Kaestner
{"title":"Tweet Sixteen and Pregnant: Missing Links in the Causal Chain from Reality TV to Fertility","authors":"David A. Jaeger, T. Joyce, R. Kaestner","doi":"10.3386/W25446","DOIUrl":"https://doi.org/10.3386/W25446","url":null,"abstract":"We examine the relationship between social media activity, such as Google searches and tweets, related to teen pregnancy and the airing of the MTV program 16 and Pregnant. In contrast to Kearney and Levine's (2015) claim of a positive relationship, we find that the association is statistically insignificant or negative, when the analysis includes periods when new episodes of the program were not being broadcast. The results are also sensitive to using the total number of tweets, which were growing exponentially, as weights. Our results cast substantial doubt on social media as a link in the causal chain between reality television and fertility.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133434168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Value Gap in Music Markets in Canada and the Role of Copyright Law 加拿大音乐市场的价值差距与版权法的作用
Communication & Technology eJournal Pub Date : 2018-12-10 DOI: 10.2139/ssrn.3320026
G. Barker
{"title":"The Value Gap in Music Markets in Canada and the Role of Copyright Law","authors":"G. Barker","doi":"10.2139/ssrn.3320026","DOIUrl":"https://doi.org/10.2139/ssrn.3320026","url":null,"abstract":"This paper examines a number of key questions relating to Canadian copyright law and it’s impact on the music market in Canada including: 1) Whether Canadian Copyright law has adapted well to the digitisation of content and the spread of the internet over the past 20 years? If not, how did we arrive at this outcome, and what offers a better legal approach? and 2) What are the economic consequences of any weaknesses identified in Canadian copyright law relative to the better legal approach? In particular what is the extent of the total “Value Gap�? in recorded music these weakness may have generated, where the “Value Gap�? refers to the disparity between the market value of creative content accessed by consumers, and the revenues received by the artists and businesses who create the content. The Value Gap occurs when third parties commercially exploit artists’ creations online without fully compensating them for their market value, or at all. And finally 3) How does the total value gap in recorded music break down by music market segment, in particular music video streaming (YouTube), audio streaming (Spotify etc.), radio, downloads (iTunes etc.) and physical sales (CD’s etc). In short this paper identifies weaknesses in statutory copyright law in Canada, explores their adverse consequences for artists and other music stakeholders, and measures the consequent size of the value gap in the recorded music industry in Canada. The paper identifies the weaknesses in statutory copyright law in Canada in the extensive limitations, exceptions, and immunities in current statutory copyright law, and isolates a better approach. The many exceptions, limitations and immunities to copyright in Canadian statutory law have together led to the situation where the authorization of rights holders is effectively not required for use of creators’ works. As a consequence this has caused a large Value Gap to emerge that continues to grow. The paper shows that from the outset Canadian statutory copyright law created a very weak liability regime, that was then both very slow to adapt, and further badly adapted to new technological developments associated with the Information and Communications Technology (ICT) industry revolution. Canadian Copyright law is shown to have consistently failed to adapt well to technological developments in ICT since the first use of the electromagnetic spectrum to support Radio from the 1920’s, through to the use of the internet to support the distribution music from the 1990’s.This has led to the weakening of the rights of copyright holders over time. The analysis in the paper confirms not only that the Value Gap due to poor copyright law exists, but also that it is considerably greater than many observers have previously concluded. Furthermore, the paper confirms the Value Gap continues to increase, even with the growing popularity of music streaming services. The evidence reviewed suggests the value gap will continue to grow unless federal ","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134646605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Competition in Network Industries: Evidence from the Rwandan Mobile Phone Network 网络行业的竞争:来自卢旺达移动电话网络的证据
Communication & Technology eJournal Pub Date : 2018-11-13 DOI: 10.2139/ssrn.3527028
Bravo Center Working Paper Series, Daniel Björkegren
{"title":"Competition in Network Industries: Evidence from the Rwandan Mobile Phone Network","authors":"Bravo Center Working Paper Series, Daniel Björkegren","doi":"10.2139/ssrn.3527028","DOIUrl":"https://doi.org/10.2139/ssrn.3527028","url":null,"abstract":"This article analyzes the potential for competition policy to affect welfare and investment in a network industry. When a network is split between competitors, each internalizes less network effects, but may still invest to steal customers. I structurally estimate consumers' utility from adopting and using mobile phones, with transaction data from nearly the entire Rwandan network. I simulate the equilibrium choices of consumers and network operators. Adding a competitor earlier could have reduced prices and increased incentives to invest in rural towers, increasing welfare by the equivalent of 1% of GDP. However, forcing free interconnection can lower incentives to invest.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
What's in a Name - Facebook's Real Name Policy and User Privacy 什么是在一个名字- Facebook的实名政策和用户隐私
Communication & Technology eJournal Pub Date : 2018-08-11 DOI: 10.2139/SSRN.3332188
Shun-Ling Chen
{"title":"What's in a Name - Facebook's Real Name Policy and User Privacy","authors":"Shun-Ling Chen","doi":"10.2139/SSRN.3332188","DOIUrl":"https://doi.org/10.2139/SSRN.3332188","url":null,"abstract":"There have been growing concerns about the danger of a surveillance society that is facilitated by social media, in which individuals voluntarily surrender their data to service providers. Amongst the major social media services, Facebook stands out not only because of its market share but also because of its insistence on a strong real name policy. Subscribers must sign up with their real name as their username on the platform. Due to this policy, Facebook users have more reasons to worry about government and corporate surveillance. Facebook’s subscribers have protested against its real name policy. Yet Facebook’s position on demanding real names remains firm. The track record of Facebook’s privacy practice is problematic, although they repeatedly assert that users have control of their data, including how much Facebook uses the users’ data they collected for targeted advertising. This paper argues that users lose much of their control so long as Facebook continues to insist on its real name policy, because there is already so much information about us in our names. This paper addresses why Facebook should reconsider their position and allow pseudonymous usernames, and discusses the potential legal grounds to challenge Facebook’s real name policy under EU GDPR’s new regulatory regime.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127097592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Innovación: Gobernanza Reflexiva Y Tecnologías De La Información Y Las Comunicaciones (Tic) En La Gerencia Pública Argentina (Innovation: Reflexive Governance and Information and Communications Technology (ICT) in Public Management in Argentina) 创新:阿根廷公共管理中的反思性治理和信息和通信技术(ICT)
Communication & Technology eJournal Pub Date : 2015-05-27 DOI: 10.22430/21457778.424
N. Gorrochategui
{"title":"Innovación: Gobernanza Reflexiva Y Tecnologías De La Información Y Las Comunicaciones (Tic) En La Gerencia Pública Argentina (Innovation: Reflexive Governance and Information and Communications Technology (ICT) in Public Management in Argentina)","authors":"N. Gorrochategui","doi":"10.22430/21457778.424","DOIUrl":"https://doi.org/10.22430/21457778.424","url":null,"abstract":"The paper sets out that from the transformation of modern society, the public management paradigm shifts and asks whether the available tools are adequate to solve governance problems that require attention, being matters not resolved in organizational administration or be the result of increasing social demands.“Reflexive governance” is conceptually analyzed as appropriate approach to address the problems of sustainability.Then the “electronic government” is examined, from the use of Information Technology and Communication (ICT) and the “open government”, comprising the electronic and multi-use, which is based on participation, transparency and accountability. Subsequently, the development of e-government in Argentina is described revealing the multiple roles adopted by the state as, generating favorable conditions for the introduction of ICT regulator, promoter and innovative. Finally, the potential of ICT is analyzed to contribute to the solution of problems of governance.","PeriodicalId":361748,"journal":{"name":"Communication & Technology eJournal","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116163628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信