Pokayokefinalppt 1334856991612-phpapp01-120419123833-phpapp01
Mmcpmerged 100628150159-phpapp01
-
Upload
fairfieldj -
Category
Documents
-
view
294 -
download
0
description
Transcript of Mmcpmerged 100628150159-phpapp01
![Page 1: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/1.jpg)
Mobile Mayhem:Designing an E-Commerce Regime to Regulate Dangerous Behavior in
Mobile Environments
Professor Joshua Fairfield Associate Professor of Law, Washington and Lee University School of Law Director, Frances Lewis Law Center © 2010
Professor Robin Fretwell WilsonWashington and Lee University School of Law
© 2010
![Page 2: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/2.jpg)
RoadMap
1. Mobile Mayhem: What Can the ‘Net Teach Us About the Future of Mobile Environments?
2. Failures of Real-World Enforcement Regimes in Novel Contexts
3. Incentives: Workable Alternatives to Enforcement
![Page 3: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/3.jpg)
Mobile Mayhem: Mutating Issues
Marginal Conduct Appeared on the Internet Immediately
“Measured in terms of depravity, insularity and traffic-driven turnover, the culture of /b/ has little precedent. /b/ reads like the inside of a high-school bathroom stall, or an obscene telephone party line, or a blog with no posts and all comments filled with slang that you are too old to understand.” –Matthias Schwartz, “The Trolls Among Us,” in The New York Times, 2008
![Page 4: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/4.jpg)
Mobile Mayhem: Mutating Issues• Virtual Worlds made
this Marginal Conduct • more graphic • more real, and • more accessible to Children
• Virtual Worlds Accept/Target Children via Gaming Model
• and provide parent-free venue for kids to bully/speak explicitly to each other
• Mobile Environments offer LESS supervision and GREATER variety
![Page 5: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/5.jpg)
Mobile Mayhem: Sex• Sexting: Early Indicator of
Marginal Conduct Moving from Desktop to Mobile
• Augmented Reality Objectification• “Jiggletits”: user takes pics
of women & manipulates their bodies
• “Bikini Camera”: user takes pics of clothed women and overlays bikini-clad women over them
• Pornographic MMS, Websites, Ads, & Apps
![Page 6: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/6.jpg)
Mobile Mayhem: Violence
• Augmented Reality
• Brings Violence Closer to Real Life
• Will get more gruesome (realistic) as devices progress
![Page 7: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/7.jpg)
Mobile Mayhem: Privacy & Anonymity
Geolocation Services
• Passive (unlike Desktop “cookies,” which operate on click)
• Constant (unlike cookies, which stop logging you when you log off)
• Necessary for the Commerce Services
![Page 8: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/8.jpg)
Mobile Mayhem: Privacy & Anonymity
Social Network Integration
• Real Life ID Connection
• Broadcasting Private Information
• Makes Users Easier to Contact in Real Life
![Page 9: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/9.jpg)
Imagine that instead of “Capt. Tim’s Galley,” this showed your presence at the local jail, or the
free clinic, or your child’s daycare facility.
![Page 10: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/10.jpg)
Mobile Commerce is now much more threatening to personal privacy than any
world government.
![Page 11: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/11.jpg)
Mobile Mayhem: Holistic Approach
Users Must Be Protected from Social AND
Economic Misconduct in Online Environments
Deceptive Advertising
Adult Content Accessible to
Children
Fraud/Scamming
Hate Speech, Cyber-Bullying,
Kid-to-Kid Explicit Chat
Invasions of Privacy
Technical Attack
![Page 12: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/12.jpg)
Mobile Mayhem: Scams & Fraud
USER-Focused
• SMShing
• VOIP phishing
• Fraudulent Apps or Websites
Mobile Devices offer more
varied means of contact,
increasing risk that user will be
unaware of threat and trust communication
too easily.
![Page 13: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/13.jpg)
Mobile Mayhem: Technical Attack
DEVICE-Focused
• Signal-borne• Wifi• Bluetooth• Email• Download• SMS/MMS
• Containment Problems• Mobility = Infection
Opportunity
• Hardware Theft• More Common than
Stationary Desktop Devices
![Page 14: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/14.jpg)
Mobile Microtransactions
![Page 15: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/15.jpg)
The U.S. system of
COLLECTIONSALE, and
RESALE
of personal information cannot be allowed to migrate to mobile
markets.
![Page 16: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/16.jpg)
Traditional Enforcement Regimes have been
Forced into Novel Environments
(the internet, virtual worlds, and now the mobile marketplace)
![Page 17: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/17.jpg)
Enforcement is Ineffective
Low Equipment
Cost +$1000s Profit
Through Comm. Fraud
Strong Incentive to
Defraud=
Strong Incentive to
Defraud+
Many Wrongdoers Engaging in
Fraud
Ineffectiveness of Even Harsh
Penalties=
![Page 18: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/18.jpg)
Failures of Enforcement Regimes
• costs nothing to send• incentives strongly in favor of
abuse• CAN-SPAM act limits recovery
to ISPs, and has been nonexistent
Fax
• costs more to receive than to send
• TCPA enforcement destroyed legitimate business models
Text Messaging
• can cost to send or receive• abuse low where sending costly• enforcement has led mostly to
prosecuting children: punishing children for things they do offline anyway
Telephone
• do-not-call list: arguably best abuse prevention of all
• businesses know who they may/may not contact
• enforcement serves as backstop
![Page 19: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/19.jpg)
The Myth of the Tech-Savvy Third Grader:
She may know which buttons do what, but she does NOT know
how to keep herself [or her (parents’) money] safe.
![Page 20: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/20.jpg)
Make Abuses Less Profitable!
Fewer Users Falling For
Scams+
Fewer Devices Vulnerable to
Attack
Lower Profit Margins, and
Lower Incentive for
Abuse
=
Fewer Users Allowing Privacy
Invasions
+Competitive
Marketplace for Non-Invasive
Products
Lower Profit Margins, and
Lower Incentive for
Invasion
=
![Page 21: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/21.jpg)
Multi-Part User Authentication"Double Opt-In" Procedures Cross-Account & Cross-Device
Authentication
Cross-Device Password Protection
• DO NOT store multiple passwords on mobile phones
• Use DIFFERENT passwords for each device and account
Technological Authentication
• Apple’s new iPhone heart monitor patent• Pantech’s ten-digit speed dial
fingerprint reader
![Page 22: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/22.jpg)
Regulation of Private Money
• Real-world-backed currencies are problematic
• Online fiat currencies do well
![Page 23: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/23.jpg)
Educating Users about Dangers to Children
![Page 24: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/24.jpg)
Carrier and Industry Provided Programs
![Page 25: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/25.jpg)
Public (Gov’t) Provided Programs
![Page 26: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/26.jpg)
Other Accessible Info
![Page 27: Mmcpmerged 100628150159-phpapp01](https://reader038.fdocuments.us/reader038/viewer/2022110302/546270d9af7959e2278b5bb3/html5/thumbnails/27.jpg)
Mobile Mayhem:Designing an E-Commerce Regime to Regulate Dangerous Behavior in
Mobile Environments
Joshua Fairfield Associate Professor of Law, Washington and Lee University School of Law Director, Frances Lewis Law Center
Professor Robin Fretwell WilsonWashington and Lee University School of Law
© 2010