






Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
An overview of e-commerce and its governance, focusing on the concepts of e-person, e-action, and e-signature. It also discusses the multilevel governance of cyberspace, including applicable laws and international and european e-commerce rules. The liability of providers and concludes with important insights.
Typology: Slides
1 / 10
This page cannot be seen from the preview
Don't miss anything!
Compliance regimes with hard & soft rules Multilevel governance
The Report of the Commission on Global Governance (1995) chapter 1
Gibson (1991): metaphor for a new space in which through communication and data transfer certain actions are set
New space for human activities where distance does not matter, e.g. communications, leisure (games, pornography), trading (e-commerce), participation (e-democracy), administration (e-government), working (?) US Supreme Court, United States et al v American Civil Liberties Union et al (1997) “ […] a unique and wholly new medium of worldwide communication. […] Taken together, these tools [email, mailing list servers, newsgroups, chat rooms, World Wide Web] constitute a unique new medium - known to its users as "cyberspace" - located in no particular geographical location but available to anyone, anywhere in the world, with access to the Internet.” Council of Europe, Cybercrime Convention (2001) […] By connecting to communication and information services users create a kind of COMMON SPACE, called "cyber-space", which is used for legitimate purposes but may also be the subject of misuse […]”.
Same person as in real life but without the real life context and
acting in an artificial ICT world called cyberspace (e.g. very limited wits level, in input as well as in output)
Problem: identity link, “biometric touch”
Cartoon by Peter Steiner (1993). Reproduced from page 61 of July 5, 1993 issue of The New Yorker, (Vol.69 (LXIX) no. 20.
Human person has a physical identity
Electronic identity: register + personal link
Telephone number, Skype identity, E.NUM
IP number
Domain name
Electronic signatures Secure electronic signatures Possession Cards, chips, mobile phone, dongles, etc. In discussion/projects: Finger prints
RFID chip IRIS scan Genetic data
Fulfilling certain access requirements to the proper interface (e.g. user identity/password, special cards, place of PC) + providing additional secrete information + ICT activity (e.g. mouse click) Full substitute for paper signature if certain requirements are met