individual and technology

71
THE INDIVIDUAL AND TECHNOLOGY Section 3 - Individual and the State 1 Wednesday, 20 July 2011

Upload: newtown-high-school-of-the-performing-arts

Post on 28-Jan-2015

104 views

Category:

Education


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Individual and Technology

THE INDIVIDUAL AND TECHNOLOGY

Section 3 - Individual and the State

1Wednesday, 20 July 2011

Page 2: Individual and Technology

MAIN AREAS

2Wednesday, 20 July 2011

Page 3: Individual and Technology

MAIN AREAS

misuse of interactive technologies

cyber-bullying

genetic profiling

cyberspace

privacy issues

security and surveillance

mobile phones

2Wednesday, 20 July 2011

Page 4: Individual and Technology

IMPACTS OF TECHNOLOGY ON THE INDIVIDUAL

3Wednesday, 20 July 2011

Page 5: Individual and Technology

IMPACTS OF TECHNOLOGY ON THE INDIVIDUAL

Technology is often at the cutting edge of development which often comes first before decisions are made on making law.

The main force changing law is the creation of the internet – Over 1.5billion users in the world.

3Wednesday, 20 July 2011

Page 6: Individual and Technology

NATIONAL BROADBAND NETWORK

4Wednesday, 20 July 2011

Page 7: Individual and Technology

JURISDICTION OF CYBERSPACE

‘cyberspace’ coined by William Gibson

5Wednesday, 20 July 2011

Page 8: Individual and Technology

JURISDICTION OF CYBERSPACE

Cyberspace is a global interconnection of millions of computers over the internet.

No government or court can claim cyberspace as its exclusive jurisdiction (power) ‘cyberspace’ coined by

William Gibson

5Wednesday, 20 July 2011

Page 9: Individual and Technology

INTERNET FILTERING IN AUSTRALIA

6Wednesday, 20 July 2011

Page 10: Individual and Technology

DEBATE ON CYBERSPACE

7Wednesday, 20 July 2011

Page 11: Individual and Technology

DEBATE ON CYBERSPACE

Positives Negatives

Borderless system allowing freedom of

association

Increased Fraudulent/Corrupt activity

Breaking down barriers throughout the world Difficult to enforce laws

7Wednesday, 20 July 2011

Page 12: Individual and Technology

INTERNET CENSORSHIP

8Wednesday, 20 July 2011

Page 13: Individual and Technology

LEGAL ISSUES IN CYBERSPACE

9Wednesday, 20 July 2011

Page 14: Individual and Technology

LEGAL ISSUES IN CYBERSPACE

Three distinct features of cyberspaces and challenges for legal regulation

1.It facilitates anonymity

easy to hide your real identity, creating pseudonyms (avatars)

IP addresses can be used to identify a computer, software programs can be used to encrypt internet activity.

9Wednesday, 20 July 2011

Page 15: Individual and Technology

INTERNET FILTERING Q & A

10Wednesday, 20 July 2011

Page 16: Individual and Technology

11Wednesday, 20 July 2011

Page 17: Individual and Technology

2. It facilitates creativity

The internet is a means of creating your own work (blogs, websites, social-networking)

3. It is global

cyberspace lacks national boundaries

online communities can be found throughout the whole world

11Wednesday, 20 July 2011

Page 18: Individual and Technology

Hacking

CYBERCRIME

12Wednesday, 20 July 2011

Page 19: Individual and Technology

Hacking is the unauthorised access or changing of data stored on a computer

The Cybercrime Act 2001 (Cth)

Hacking

CYBERCRIME

12Wednesday, 20 July 2011

Page 20: Individual and Technology

Internet Fraud

13Wednesday, 20 July 2011

Page 21: Individual and Technology

Internet fraud is the use of the internet to misrepresent or conceal information to betray, deceive or mislead

Unsolicited Email

Pyramid Selling

Phishing

Nigerian Scam

Internet Fraud

13Wednesday, 20 July 2011

Page 22: Individual and Technology

Internet Spam

14Wednesday, 20 July 2011

Page 23: Individual and Technology

Spam is an unsolicited commercial electronic communication, including junk emails, SMS or instant messaging.

Internet Spam

14Wednesday, 20 July 2011

Page 24: Individual and Technology

WHERE DID SPAM COME FROM?

15Wednesday, 20 July 2011

Page 25: Individual and Technology

INTELLECTUAL PROPERTY

16Wednesday, 20 July 2011

Page 26: Individual and Technology

INTELLECTUAL PROPERTY

Intellectual property refers to the creations of the mind that have commercial value.

e.g inventions, literary works, artistic works, software programs

Intellectual property is protected under many international treaties

In order for it to be protected the idea has to be developed into something tangible – software program, essay or cd.

16Wednesday, 20 July 2011

Page 27: Individual and Technology

Copyright

17Wednesday, 20 July 2011

Page 28: Individual and Technology

An exclusive right to publish, copy, publicly perform, broadcast, or make an adaption of certain forms of expression, namely sounds, words or visual expression

Copyright Act 1968 (Cth)

Copyright

17Wednesday, 20 July 2011

Page 29: Individual and Technology

18Wednesday, 20 July 2011

Page 30: Individual and Technology

COPYRIGHT AROUND THE WORLD

19Wednesday, 20 July 2011

Page 31: Individual and Technology

20Wednesday, 20 July 2011

Page 32: Individual and Technology

Many new challenges are faced by Copyright laws due to further digital technology developments

File Sharing

Software Copyright infringement

20Wednesday, 20 July 2011

Page 33: Individual and Technology

METALLICA AND NAPSTER

21Wednesday, 20 July 2011

Page 34: Individual and Technology

Trademarks

22Wednesday, 20 July 2011

Page 35: Individual and Technology

signs or symbols that give a person or corporation the legal right to use, license or sell the product or service for which it is registered

Trademarks

22Wednesday, 20 July 2011

Page 36: Individual and Technology

Axis of Awesome

FOUR CHORD SONG

23Wednesday, 20 July 2011

Page 37: Individual and Technology

Patents

24Wednesday, 20 July 2011

Page 38: Individual and Technology

rights granted for any device, substance, method or process which is new, inventive or useful

Patents

24Wednesday, 20 July 2011

Page 39: Individual and Technology

Should file sharing be legal in Australia?

Discussion Point

25Wednesday, 20 July 2011

Page 40: Individual and Technology

Federal Court February 2010

IINET V AFACT

26Wednesday, 20 July 2011

Page 41: Individual and Technology

PRIVACY, SAFETY AND CENSORSHIP

27Wednesday, 20 July 2011

Page 42: Individual and Technology

There are a number of ways individuals are vulnerable in cyberspace:

cyberbullying

cyberstalking

racial hatred

exposure to violent, disturbing and/or illegal material

exposure to adult material

intrusions into privacy

PRIVACY, SAFETY AND CENSORSHIP

27Wednesday, 20 July 2011

Page 43: Individual and Technology

CYBERBULLYING

28Wednesday, 20 July 2011

Page 44: Individual and Technology

Disinhibition Effect

29Wednesday, 20 July 2011

Page 45: Individual and Technology

the tendency to say and do things in cyberspace that the person wouldn’t ordinarily say or do in the face-to-face world

rude language, harsh personal criticism, or violent online games, threats, cyberbullying or cyberstalking, racial hatred

The Racial Hatred Act 1995 (Cth) protects any forms of racial online vilification

Disinhibition Effect

29Wednesday, 20 July 2011

Page 46: Individual and Technology

PRIVACY CONCERNSDigital Dossier

30Wednesday, 20 July 2011

Page 47: Individual and Technology

PRIVACY CONCERNS

all the types of information about a person that he or she has put onto the internet, held in multiple locations

Individuals have little control over how the most powerful search engines use their information

Digital Dossier

30Wednesday, 20 July 2011

Page 48: Individual and Technology

The Privacy Act 1988 (Cth)

31Wednesday, 20 July 2011

Page 49: Individual and Technology

Relates to how businesses should collect, store, use and disclose personal information

The Privacy Act needs to align itself with modern issues in protecting individuals

The Privacy Act 1988 (Cth)

31Wednesday, 20 July 2011

Page 50: Individual and Technology

PRIVACY ON THE INTERNET

32Wednesday, 20 July 2011

Page 51: Individual and Technology

PROTECTING CHILDREN

33Wednesday, 20 July 2011

Page 52: Individual and Technology

Traditional bullying was mainly physical and occurred in the playground, classroom and walking home from school. Now it occurs at home using the internet.

Online predators enticing young people into harmful encounters

PROTECTING CHILDREN

33Wednesday, 20 July 2011

Page 53: Individual and Technology

RIGHTS IN CYBERSPACE

Laissez-faire – no regulation by governments

Interventionist – Government control

•  Individuals are capable of determining quality internet content

•  Governments should not intervene in the marketplace of ideas

•  Organisation: Electronic Frontier Foundation http://www.eff.org/

•  Developing reasonable quality of websites

•  Enacting legislation to impose obligation on ISPs

•  Main areas of controlling: race hatred, child pornography

34Wednesday, 20 July 2011

Page 54: Individual and Technology

Founded in 1990

defending free speech, privacy, innovation, and consumer rights

EFF is a donor-funded nonprofit organisation

Electronic Frontier Foundation

35Wednesday, 20 July 2011

Page 55: Individual and Technology

CYBERCRIME

36Wednesday, 20 July 2011

Page 56: Individual and Technology

CURRENT LEGISLATION

Currently the law can only set minimum standards

Protected under major international legislation

Right to privacy

Right to freedom of expression

Certain limits are placed on domestic enforcement of these rights

37Wednesday, 20 July 2011

Page 57: Individual and Technology

CYBER CRIMINALS

38Wednesday, 20 July 2011

Page 58: Individual and Technology

Crimes Act 1900 (NSW) –crimes amendment (computer offences) Act 2001 (NSW)

Section 308 – computer offences – hacking

Spam Act 2003 (Cth)

Domestic Level

39Wednesday, 20 July 2011

Page 59: Individual and Technology

International Level

40Wednesday, 20 July 2011

Page 60: Individual and Technology

Very few international treaties established

The United Nations – Controls issues of Intellectual Property through the agency World Intellectual Property Organisation (WIPO)

World Trade Organisation – Deals with issues of intellectual property

European Union – Convention on Cybercrime (2001) – prevention of specific cybercrimes

International Level

40Wednesday, 20 July 2011

Page 61: Individual and Technology

FUTURE DIRECTIONS

41Wednesday, 20 July 2011

Page 62: Individual and Technology

FUTURE DIRECTIONSGovernments are needed, to create an environment where the rule of law prevails and where law enforcement mechanisms will deter those who break the law

Governments who do not have regulated laws are discouraging big business from operating in their country

41Wednesday, 20 July 2011

Page 63: Individual and Technology

EBAY SCAMS

42Wednesday, 20 July 2011

Page 64: Individual and Technology

Strategies for Governments and Prosecution of Individuals

43Wednesday, 20 July 2011

Page 65: Individual and Technology

Achieving perfect legal control is quite often just too expensive

Controlling content from internet service providers

Initiating financial intermediaries such as Paypal

Making arrests of individuals suspected of cybercrime

Extraditing suspects from other countries

Strategies for Governments and Prosecution of Individuals

43Wednesday, 20 July 2011

Page 66: Individual and Technology

INTERNET CENSORSHIP

44Wednesday, 20 July 2011

Page 67: Individual and Technology

INTERNET REVOLUTION

45Wednesday, 20 July 2011

Page 68: Individual and Technology

Government Challenges with Cybercrime

46Wednesday, 20 July 2011

Page 69: Individual and Technology

New technologies allow cybercrime to continue and encourage illegal activity

Only developed nations have the resources and finances to counter act upon cybercrime

The balance of freedoms vs censorship

Cybercrime laws are different from country to country

Government Challenges with Cybercrime

46Wednesday, 20 July 2011

Page 70: Individual and Technology

Global Laws

47Wednesday, 20 July 2011

Page 71: Individual and Technology

Transnational cybercrime is big business. Companies often will not report on the impact it has to their business e.g a bank’s internet theft problems

threats of cyberterrorism still loom. Attacks on electronically controlled infrastructure.

Council of Europe’s Convention on Cybercrime (2001) is one of the only legally binding pieces of legislation

Global Laws

47Wednesday, 20 July 2011