Domain name parking of gTLDs
Introduction Over the past ten years, there has been a steady increase in the number of generic top-level domain names (gTLD). As a result, people can currently register various gTLDs such as .asia,...
View ArticleDifferences between the privacy laws in the EU and the US
Introduction Everything we do in the Internet leaves digital fingerprints. Therefore, it is only logical that many web users are worried about the issue of privacy. Their worry is not without reason....
View ArticleIdentity Theft: The Means, Methods and Recourse
Introduction Identity theft occurs when a person uses the identity of another person with the intent to obtain benefits illegally. The victim of the identity theft may not only suffer financial loses...
View ArticleRestricting social media at work
Introduction Employees using social networks such as Facebook and Google+ may not only waste a lot of their working time, but also spread viruses on their work computers. Due to this, some employers...
View ArticleUsing Crowdsourcing for Collecting Information about Security Vulnerabilities
Introduction The concept of crowdsourcing was coined by Jeff Howe in 2006. Crowdsourcing is an act of outsourcing a job, previously done by workers, to a large group of people in the form of an open...
View ArticleMobile Phone Spying Software: Legality, Symptoms, and Removal
Introduction At present, there are many websites offering mobile phone spying software. Typical examples of such websites are SpyBubble (http://www.spybubble.com/), Mobile-Spy...
View ArticleLegal Aspects of Online Gambling
1. Introduction Since the website of the first online casino appeared in 1995, that time, the online gambling business has grown tremendously. H2 Gambling Capital, one of the most widely known...
View ArticleSoftware Patent Law: EU, New Zealand, and the US compared
1. Introduction A patent is defined as an exclusive right or rights provided by a government to an inventor for a certain period of time in exchange for the public disclosure of an invention. A...
View ArticleE -Money Fraud
1. Introduction Electronic money (e-money) is the digital equivalent of cash that is stored on an electronic device or remotely at a server. It is a relatively new payment instrument that has been...
View ArticlePayPal: Chargebacks and Dispute Resolution
Introduction PayPal Inc. is a global provider of online payment services established in 1998 in Palo Alto, California. In 2012, PayPal Inc. generated a total revenue of $5.6 billion USD. . One of its...
View ArticlePrivacy Implications of Google Glass
Introduction Google Glass is a wearable computer worn like a standard pair of glasses. The device displays information on a glass screen in front of the eyes of the user. It accepts voice commands that...
View ArticleThe new Google Maps: a perfect place for review fraud
1. Introduction In 2006, Jeff Howe coined the concept of crowdsourcing. Crowdsourcing is an act of outsourcing a job, previously done by workers, to a large group of people in the form of an open call....
View ArticlePrivacy Implications of the Internet of Things
Introduction The term “Internet of Things” refers to the use of the Internet for monitoring, tracking, controlling, and interconnecting everyday objects. For example, home appliances can be connected...
View ArticleThe Debate Over Network Neutrality in the EU and the USA
1. Introduction Network neutrality (also known as net neutrality or Internet neutrality) refers to a general principle that Internet service providers (ISPs) should not control how their customers...
View ArticleTen Important Privacy Threats
1. Introduction As the Internet becomes more and more important to our lives, the challenge is to enjoy the conveniences of online activities while reducing the risks of privacy violations. A good...
View ArticleHuman-implanted RFID chips
1. Introduction In 1945, Léon Theremin, a Russian inventor, invented one of the first covert listening devices, also known as “bugs.” The device was a predecessor of the Radio-frequency identification...
View ArticleCrowdsensing: State of the Art and Privacy Aspects
1. Introduction It is estimated that today approximately three-quarters of the human population has a mobile phone. Crowdsensing, a new business model, allows this large number of mobile phones to be...
View ArticlePrivacy Risks of Sleep-Tracking Devices
1. Introduction According to the technology market intelligence company “ABI Research”, there are currently more than 10 billion wirelessly connected devices. In 2030, the number of these devices will...
View ArticleInformation Security of Nanorobots
1. Introduction The year is 2045. A 31-year-old woman is brought to the hospital complainingof headaches and fever. The doctors identify a species of equine encephalitis, a mosquito-borne virus, in her...
View ArticleChinese Social Media Censorship
1. Introduction In the 3rd century BC, the Chinese Emperor Qin Shihuang attempted to destroy original Confucian texts and killed scholars who had knowledge in those texts. This event is known as...
View Article