SlideShare uma empresa Scribd logo
1 de 27
Mobile Mayhem: Designing an E-Commerce Regime to Regulate Dangerous Behavior in Mobile Environments  Joshua Fairfield ,[object Object]
Director, Frances Lewis Law Center
 Professor Robin Fretwell Wilson Washington and Lee University School of Law © 2010
RoadMap Mobile Mayhem: What Can the ‘Net Teach Us About the Future of Mobile Environments? Failures of Real-World Enforcement Regimes in Novel Contexts Incentives: Workable Alternatives to Enforcement
Mobile Mayhem: Mutating Issues “Measured in terms of depravity, insularity and traffic-driven turnover, the culture of /b/ has little precedent. /b/ reads like the inside of a high-school bathroom stall, or an obscene telephone party line, or a blog with no posts and all comments filled with slang that you are too old to understand.” –Matthias Schwartz, “The Trolls Among Us,” inThe New York Times, 2008 Marginal Conduct Appeared on the Internet Immediately
Mobile Mayhem: Mutating Issues ,[object Object]
more graphic
more real, and
more accessible to Children ,[object Object]
and provide parent-free venue for kids to bully/speak explicitly to each other
Mobile Environments offer LESS supervision and GREATER variety,[object Object]
Augmented Reality Objectification
“Jiggletits”:  user takes pics of women & manipulates their bodies
“Bikini Camera”: user takes pics of clothed women and overlays bikini-clad women over them
Pornographic MMS, Websites, Ads, & Apps,[object Object]
Brings Violence Closer to Real Life
Will get more gruesome (realistic) as devices progress,[object Object]
Constant (unlike cookies, which stop logging you when you log off)
Necessary for the Commerce Services,[object Object]
Broadcasting Private  Information
Makes Users Easier to Contact in Real Life,[object Object]
Mobile Commerce is now much more threatening to personal privacy than any world government.
Mobile Mayhem: Holistic Approach Invasions of Privacy Hate Speech,  Cyber-Bullying, Kid-to-Kid Explicit Chat Adult Content Accessible to Children Users Must Be Protected from Social AND Economic Misconduct in Online Environments Deceptive Advertising Fraud/Scamming Technical Attack
Mobile Mayhem: Scams & Fraud USER-Focused ,[object Object]
VOIP phishing
Fraudulent Apps or WebsitesMobile Devices offer more varied means of contact, increasing risk that user will be unaware of threat and trust communication too easily.
Mobile Mayhem: Technical Attack DEVICE-Focused ,[object Object]

Mais conteúdo relacionado

Mais procurados

Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
night seem
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
Areeb Khan
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environment
Jeet Kothadiya
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
Melfi Associates
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
Mbradber
 

Mais procurados (20)

Presentation1 updates 2
Presentation1 updates 2Presentation1 updates 2
Presentation1 updates 2
 
Advantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdfAdvantages and disadvantages of internet.pdf
Advantages and disadvantages of internet.pdf
 
Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2Advantages and disadvantages of internet 2
Advantages and disadvantages of internet 2
 
Special topics
Special topicsSpecial topics
Special topics
 
Crime & technology
Crime & technologyCrime & technology
Crime & technology
 
Misuse of Internet
Misuse of InternetMisuse of Internet
Misuse of Internet
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Advantages and Disadvantages of internet
Advantages and Disadvantages of internetAdvantages and Disadvantages of internet
Advantages and Disadvantages of internet
 
Mao p.cs.102.01
Mao p.cs.102.01Mao p.cs.102.01
Mao p.cs.102.01
 
Legal contexts of digital media & internet governance
Legal contexts of digital media & internet governanceLegal contexts of digital media & internet governance
Legal contexts of digital media & internet governance
 
Uses of ict in our environment
Uses of ict in our environmentUses of ict in our environment
Uses of ict in our environment
 
Digital defamation presentation
Digital defamation presentationDigital defamation presentation
Digital defamation presentation
 
Ethics piracy
Ethics piracyEthics piracy
Ethics piracy
 
Advantages and disantvantages of internet
Advantages and disantvantages of internetAdvantages and disantvantages of internet
Advantages and disantvantages of internet
 
Advantages and disadvantages of internet
Advantages and disadvantages of internetAdvantages and disadvantages of internet
Advantages and disadvantages of internet
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Software Piracy Powerpoint
Software Piracy PowerpointSoftware Piracy Powerpoint
Software Piracy Powerpoint
 
DOPA presentation
DOPA presentationDOPA presentation
DOPA presentation
 

Destaque

Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Haleh Hadaegh
 
M&G and Soul City HPF supplement
M&G and Soul City HPF supplement M&G and Soul City HPF supplement
M&G and Soul City HPF supplement
NCAS1
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
IBM Danmark
 
Adecco Xpert Presentation
Adecco Xpert PresentationAdecco Xpert Presentation
Adecco Xpert Presentation
JoleneBannister
 
The asylum of horrors 002
The asylum of horrors 002The asylum of horrors 002
The asylum of horrors 002
LUIS NARBONA
 

Destaque (16)

Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
Consumption of Synbiotic Bread Decreases Triacylglycerol and VLDL Levels Whil...
 
M&G and Soul City HPF supplement
M&G and Soul City HPF supplement M&G and Soul City HPF supplement
M&G and Soul City HPF supplement
 
Compressor
CompressorCompressor
Compressor
 
Planungs- und Bewertungskriterien fuer Bibliotheksbauten
Planungs- und Bewertungskriterien fuer BibliotheksbautenPlanungs- und Bewertungskriterien fuer Bibliotheksbauten
Planungs- und Bewertungskriterien fuer Bibliotheksbauten
 
Gayrimenkul Değerleme ve Otel Fizibilite
Gayrimenkul Değerleme ve Otel FizibiliteGayrimenkul Değerleme ve Otel Fizibilite
Gayrimenkul Değerleme ve Otel Fizibilite
 
Уповноважена особа
Уповноважена особаУповноважена особа
Уповноважена особа
 
Droidcon 2011: Strategies for Android, Henning Boeger, Capgemini
Droidcon 2011: Strategies for Android, Henning Boeger, CapgeminiDroidcon 2011: Strategies for Android, Henning Boeger, Capgemini
Droidcon 2011: Strategies for Android, Henning Boeger, Capgemini
 
BEST PRICE
BEST PRICEBEST PRICE
BEST PRICE
 
Elitecore Maravedis Webinar Final Slide Deck
Elitecore Maravedis Webinar  Final Slide DeckElitecore Maravedis Webinar  Final Slide Deck
Elitecore Maravedis Webinar Final Slide Deck
 
Sag doch JA!
Sag doch JA!Sag doch JA!
Sag doch JA!
 
Big Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter JönssonBig Data & Analytics, Peter Jönsson
Big Data & Analytics, Peter Jönsson
 
Adecco Xpert Presentation
Adecco Xpert PresentationAdecco Xpert Presentation
Adecco Xpert Presentation
 
GENASSIST™ CRISPR & rAAV Genome Editing Tools
GENASSIST™ CRISPR & rAAV Genome Editing ToolsGENASSIST™ CRISPR & rAAV Genome Editing Tools
GENASSIST™ CRISPR & rAAV Genome Editing Tools
 
Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...
Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...
Ecologically Sensitive Urban Design : Ullas Rane: Building Livable Cities 201...
 
The asylum of horrors 002
The asylum of horrors 002The asylum of horrors 002
The asylum of horrors 002
 
Les 7 clés pour bien vendre
Les 7 clés pour bien vendreLes 7 clés pour bien vendre
Les 7 clés pour bien vendre
 

Semelhante a Mmcp merged

Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
Content Rules, Inc.
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
It's your future
It's your futureIt's your future
It's your future
radhingga
 

Semelhante a Mmcp merged (20)

Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Dangers Of Internet - Parents Beware
Dangers Of Internet - Parents BewareDangers Of Internet - Parents Beware
Dangers Of Internet - Parents Beware
 
Identity Theft: Evolving with Technology
Identity Theft: Evolving with TechnologyIdentity Theft: Evolving with Technology
Identity Theft: Evolving with Technology
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
cot-2022.pptx
cot-2022.pptxcot-2022.pptx
cot-2022.pptx
 
Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things Center for Identity Webcast: The Internet of Things
Center for Identity Webcast: The Internet of Things
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
It's your future
It's your futureIt's your future
It's your future
 

Último

Último (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

Mmcp merged

Notas do Editor

  1. You can be tracked via GPS, RFID, Cell tower, or Wifi access point.
  2. 15.  Commerce, not the government, has proven the greatest invader of personal dignity and privacy. 
  3. Buying products for the phone from carrier-approved markets (the App store, the Android market)Buying products from WITHIN apps- whether online shopping for real products like this shopsavvy screenshot, or buying virtual objects in exchanges like Pocket Empire’s stock exchange (screenshot available on the regulating private money slide).“Upsell” products- premium texts, multimedia plans, etc.
  4. 16. This will become significantly more important as our computers -- in the form of smartphones -- follow us everywhere we go and monitor everything we do.  Thus, the final recommendation that I make is that personal information collected by a provider be used only for the purposes for which it was collected; it cannot be resold, or traded, or used by other party without express opt-in permission on a per-operation basis.