Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/28740
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBerntzen, Lasseen
dc.contributor.authorDini, Petreen
dc.contributor.authorKierkegaard, Sylviaen
dc.contributor.authorPerry, Marken
local.source.editorEditor(s): Lasse Berntzen, Petre Dini, Sylvia Kierkegaard, Mark Perryen
dc.date.accessioned2020-05-20T05:04:49Z-
dc.date.available2020-05-20T05:04:49Z-
dc.date.issued2010-
dc.identifier.citationProceedings of CYBERLAWS 2010: The First International Conference on Technical and Legal Aspects of the e-Society, p. 1-28en
dc.identifier.urihttps://hdl.handle.net/1959.11/28740-
dc.description.abstractCYBERLAWS 2010, The First International Conference on Technical and Legal Aspects of the e-Society, is a natural output of the discussions during the Digital World 2009, following the multiplications of the cybercrime acts concerning privacy and anonymity in the information society. In accordance with the principle of freedom of expression and the right to privacy, the use of anonymity is legal. Users can access data and browse anonymously so that their personal details cannot be recorded and used without their knowledge by any other entity, including another user. As there are situations were content/information providers might wish to remain anonymous for legitimate purposes, they should not be required to justify anonymous use. The dangerous side of the legal anonymity is the shadow for illegal, damaging, and not easily to sue individuals and actions. Corporate and individual hassle, corporate and individual frauds, threats, and impersonations are only a few of these actions. While privacy, anonymity and freedom of speech are achieved rights, there is a vacuum on education, punishments, and laws that can be easily applied at the same velocity with which a cybercrime propagates. Applying the Civil Court legislation is tedious and naturally, too late to timely repair the damage and prevent its quick propagation. There is a need for special laws to either prevent or quickly reprimand. In this case, the identity must be legally and undoubtedly validated. In this case, the identity must be legally and undoubtedly validated. There is a need of internationally adopted guidelines to be applied by victims. There is a need for harmonization between national laws for a new era of eDemocracy.en
dc.languageenen
dc.publisherInternational Academy, Research and Industry Association (IARIA)en
dc.relation.ispartofProceedings of CYBERLAWS 2010: The First International Conference on Technical and Legal Aspects of the e-Societyen
dc.titleCYBERLAWS 2010: The First International Conference on Technical and Legal Aspects of the e-Societyen
dc.typeConference Publicationen
dc.relation.conferenceCYBERLAWS 2010: First International Conference on Technical and Legal Aspects of the e-Societyen
local.contributor.firstnameLasseen
local.contributor.firstnamePetreen
local.contributor.firstnameSylviaen
local.contributor.firstnameMarken
local.subject.for2008180122 Legal Theory, Jurisprudence and Legal Interpretationen
local.subject.for2008080603 Conceptual Modellingen
local.subject.seo2008890202 Application Tools and System Utilitiesen
local.subject.seo2008949999 Law, Politics and Community Services not elsewhere classifieden
local.profile.schoolSchool of Lawen
local.profile.emailmperry21@une.edu.auen
local.output.categoryE4en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.date.conference5th - 7th December, 2012en
local.conference.placeSt Maarten, Netherlandsen
local.publisher.placeWilmington, United States of Americaen
local.format.startpage1en
local.format.endpage28en
local.peerreviewedYesen
local.title.subtitleThe First International Conference on Technical and Legal Aspects of the e-Societyen
local.contributor.lastnameBerntzenen
local.contributor.lastnameDinien
local.contributor.lastnameKierkegaarden
local.contributor.lastnamePerryen
dc.identifier.staffune-id:mperry21en
local.profile.orcid0000-0003-4251-3405en
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/28740en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitleCYBERLAWS 2010en
local.output.categorydescriptionE4 Editorship of Scholarly Conference Proceedingsen
local.relation.urlhttps://www.iaria.org/conferences2010/ComCYBERLAWS10.htmlen
local.relation.urlhttps://www.iaria.org/conferences2010/ProgramCYBERLAWS10.htmlen
local.conference.detailsCYBERLAWS 2010: First International Conference on Technical and Legal Aspects of the e-Society, St Maarten, Netherlands, 5th - 7th December, 2012en
local.search.authorBerntzen, Lasseen
local.search.authorDini, Petreen
local.search.authorKierkegaard, Sylviaen
local.search.authorPerry, Marken
local.istranslatedNoen
local.uneassociationUnknownen
local.atsiresearchNoen
local.sensitive.culturalNoen
local.year.published2010en
local.fileurl.closedpublishedhttps://rune.une.edu.au/web/retrieve/b5ef90bf-136a-4ae7-9d23-69eeee5e5db7en
local.date.start2012-12-05-
local.date.end2012-12-07-
Appears in Collections:Conference Publication
School of Law
Files in This Item:
3 files
File Description SizeFormat 
Show simple item record

Page view(s)

1,976
checked on Aug 4, 2024

Download(s)

6
checked on Aug 4, 2024
Google Media

Google ScholarTM

Check


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.