Economics of Electronic Commerce

Total Page:16

File Type:pdf, Size:1020Kb

Economics of Electronic Commerce To access the contents, click the chapter and section titles. Economics of Electronic Commerce (Publisher: Macmillan Computer Publishing) Author(s): Soon-yong Choi; Andrew Whinston; Dale Stahl ISBN: 1578700140 Publication Date: 07/22/97 Brief Full Advanced Search Search this book: Search Tips Contents About This Book Trademark Acknowledgments Credits Chapter 1 - Electronic Commerce and the Internet Chapter 2 - Characteristics of Digital Products and Processes Chapter 3 - Internet Infrastructure and Pricing Chapter 4 - Quality Uncertainty and Market Efficiency Chapter 5 - Economic Aspects of Copyright Protection Chapter 6 - Signaling Quality and Product Information Chapter 7 - Consumers' Search for Information Chapter 8 - Product Choices and Discriminatory Pricing Chapter 9 - Financial Intermediaries and Electronic Commerce Chapter 10 - Electronic Payment Systems Chapter 11 - Business and Policy Implications of Electronic Commerce Chapter 12 - Future Directions for Economic Research Products | Contact Us | About Us | Privacy | Ad Info | Home Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc. All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Read EarthWeb's privacy statement. To access the contents, click the chapter and section titles. Economics of Electronic Commerce (Publisher: Macmillan Computer Publishing) Author(s): Soon-yong Choi; Andrew Whinston; Dale Stahl ISBN: 1578700140 Publication Date: 07/22/97 Brief Full Advanced Search Search this book: Search Tips Table of Contents | Next Page 7 Contents Contents at a Glance Chapter One Electronic Commerce and the Internet 1 Chapter Two Characteristics of Digital Products and Processes 59 Chapter Three Internet Infrastructure and Pricing 93 Chapter Four Quality Uncertainty and Market Efficiency 137 Chapter Five Economic Aspects of Copyright Protection 175 Chapter Six Signaling Quality and Product Information 213 Chapter Seven Consumers' Search for Information 263 Chapter Eight Product Choices and Discriminatory Pricing 313 Chapter Nine Financial Intermediaries and Electronic Commerce 373 Chapter Ten Electronic Payment Systems 407 Chapter Eleven Business and Policy Implications of Electronic Commerce 463 Chapter Twelve Future Directions for Economic Research 539 Index 583 Page 8 Page 9 Table of Contents 1 Electronic Commerce and the Internet 1 1.1. Developments in Internetworking 2 Distributed and Networked Computing 3 Open Networks 5 Two-way Communications and the Web 9 1.2. Electronic Commerce 12 Electronic Commerce Examples 13 Electronic Commerce as a Communications Network 15 Electronic Commerce of Digital Products 16 Commercial Potential of the Internet 21 1.3. Market Characteristics of Electronic Commerce 22 Current Commercial Uses of the Internet 23 User Characteristics 25 Competition and Market Organization 27 Business Organization and Virtual Firms 30 Legal Environment 32 1.4. Current Issues in Electronic Commerce 35 Contents and Quality 35 Copyrights versus Users Rights 38 Copyright and the Freedom of Speech 39 Legal and Economic Considerations of Copyrights 40 Interactive Advertising and the Use of Consumer Information 41 Push or Pull Advertising 42 Measuring the Impact of Online Advertising 43 Targeted Advertising and Privacy 44 Internet Intermediaries 45 Security and Privacy of Internet Transactions 46 Page 10 Pricing Strategies for Digital Products 48 Online Taxation, Regulation, and Other Legal Issues 50 1.5. Summary 51 References 53 Suggested Readings and Notes 54 History of the Internet 54 Firms and Markets 54 Electronic Data Interchange (EDI) 55 Internet Resources 55 Implications of Digital Process 55 The Internet Society (ISOC) 56 2 Characteristics of Digital Products and Processes 59 2.1. What Are Digital Products? 60 2.2. Characteristics of Information Products 64 Dependence on Individual Preference 65 Transitory or Cumulative Utility 65 Externalities of Information Products 66 Intrinsic Values of Digital Products 69 2.3. The Physical Nature of Digital Products 69 Indestructibility 70 Transmutability 72 Reproducibility 73 Physical Nature and Economic Issues 74 Product Selection Strategies Based on the Taxonomy 84 Changing Time Dependence 85 Changing Usage Patterns 85 Transfer Mode and Externalities 86 2.4. Summary 87 References 89 Page 11 Suggested Readings and Notes 89 Value of Information 89 Electronic Markets 90 Network Externalities 90 Internet Resources 91 Java Programming Language 91 Commercial Sites Index 91 Virtual Museums and Florist 91 Medical Sites on the Internet 92 3 Internet Infrastructure and Pricing 93 3.1. Internet Pipelines 93 3.2. Traffic Control on the Internet 96 Packet Switching 96 Internet Protocol Addresses 97 Transmission Control Protocol 100 Unicast, Broadcast, and Multicast 100 3.3. The Infrastructure Convergence 103 The Convergence in the Last Mile 104 Long-Haul Traffic 107 3.4. Congestion and Infrastructure Pricing 109 Ideal Economic Pricing Proposals 112 Dynamic Optimal Pricing 114 Static Priority Pricing 117 The Smart-Market Approach 118 Connection-Only and Flat-Rate Pricing 119 Voluntary User Declarations 122 Synopsis 122 3.5. Public Policy and Infrastructure 123 Public Policy for a Publicly Owned Network 124 Public Policy for a Privately Owned Network 125 3.6. Summary 127 References 130 Page 12 Suggested Readings and Notes 133 Further Readings on Game Theory 133 Internet Resources 133 The Internet Networking Infrastructure 133 Domain Name Registration 134 MBONE (Multicast Backbone) 134 IETF IP Multicasting Proposals 135 Broadband Online Services 135 4 Quality Uncertainty and Market Efficiency 137 4.1. Economics of the Lemons Market 139 Price as a Signal for Quality 141 Remedies for the Lemons Problem 143 4.2. Information Channels in Electronic Commerce 145 Sellers Provide Product Information 145 Freeware, Shareware, and Other Promotions 148 Free Products Online 148 The Economics of Try-Outs 150 Third-Party Information 152 Retailers and Other Brokers 153 4.3. Quality and Intermediaries 155 Transactional Efficiencies 156 Intermediaries as Experts 158 Intermediaries as an Information Source 161 Intermediaries as Producers 162 4.4. Intermediaries and Contracts 163 Subcontracting Systems 164 Incomplete Contracts 166 4.5. Summary 169 References 170 Suggested Readings and Notes 171 Economics of the Lemons Problem 171 Repeat Purchases and Reputation 172 Page 13 Internet Resources 173 Internet Commerce 173 Internet and Economics 173 5 Economic Aspects of Copyright Protection 175 5.1. Economic History of Copyright 176 The Property Aspect of Copyright 178 The Authorship Aspect of Copyright 183 Public Interest 184 5.2. The Nuts and Bolts of Copyrights 186 Objects Covered by Copyright 186 Terms of Copyright 187 Works That Cannot Be Copyrighted 187 Specific Rights of Authors Granted by Copyright 189 Fair Use Doctrine 190 Other Intellectual Property Laws 191 5.3. Copyright Protection and Digital Products 192 Reproduction 192 Reproductions on the Internet 193 Economic Implications of Reproduction 195 Resale and Distribution 195 Resale and the First Sale Doctrine 196 Resale Prevention and Pricing 198 Content Control 200 5.4. Market Protection Through Business Strategies 202 5.5. Policy Implications 204 Copyright and Antitrust Concerns 205 5.6. Summary 207 References 209 Suggested Readings and Notes 210 Historical Development of Copyright Laws 210 Patents and Economics 211 Page 14 Internet Resources 211 Articles 211 Internet Copyright Sites 212 Texts of Copyright Laws 212 World Intellectual Property Organization (WIPO) Conference Resources 212 6 Signaling Quality and Product Information 213 6.1. Advertising on the Internet 214 Growth in Electronic Advertising 215 Types of Internet Advertising 217 Banner Ads 218 Selling Advertising to Consumers 220 Web Storefronts 222 6.2. The Economics of Advertising 223 The Economic Roles of Advertising 224 The Informational Content of Advertising 231 Information about Information Products 231 The Effect of Advertising on Price 234 Advertising and Product Differentiation 237 6.3. Other Strategies to Convey Product Information 239 Repeat Purchases and Reputation 239 Reputation Building in Electronic Commerce 240 Renting a Reputation 241 Shareware and Wasted Investments 242 Quality Guarantees for Digital Products 243 6.4. Marketing Strategies for the Internet 244 Myths and Popular Wisdom about Online Advertising 245 Broadcast versus Targeted Advertising 246 Push versus Pull Advertising 249 Advertisements as Commodities 251 Passive versus Active Marketing 252 Electronic Malls and Intermediaries 253 Page 15 Is Online Advertising Effective? 254 Providing Consumer Information 256 6.5. Summary 257 References 258 Suggested Readings and Notes 260 Advertising and Competition 260 Signaling 260 Internet Resources 261 Web Directory for Advertising 261 Popular Wisdom on Internet Marketing 261 Shareware Resources 262 7 Consumers' Search for Information 263 7.1. Consumer Searches and Economic Efficiency 263 Search Costs 265 Consumer Searches and Electronic Commerce 267 Digital Products and Consumer Searches 269 7.2. The Search Market and Intermediaries 270 Search Market Efficiency 271 Search Efficiency in Intermediaries 276 Search Efficiency in Informational Content 278 7.3. Search Engines on the Internet 280 Search or Surf? 281 Inadequacies of Search Engines 281 7.4. Market Efficiency In Various Information Sources 282 The World Wide Web 283 Web Searches 284 Gopher 285 Gopher Search 285 Anonymous
Recommended publications
  • Technical Report
    Cost-Effective Cloud Edge Traffic Engineering with CASCARA Rachee Singh Sharad Agarwal Matt Calder Victor Bahl Microsoft Abstract Inter-domain bandwidth costs comprise a significant amount of the operating expenditure of cloud providers. Traffic engi- neering systems at the cloud edge must strike a fine balance between minimizing costs and maintaining the latency ex- pected by clients. The nature of this tradeoff is complex due to non-linear pricing schemes prevalent in the market for inter-domain bandwidth. We quantify this tradeoff and un- cover several key insights from the link-utilization between a large cloud provider and Internet service providers. Based Figure 1: Present-day and CASCARA-optimized bandwidth allo- on these insights, we propose CASCARA, a cloud edge traffic cation distributions for one week, across a pair of links between a engineering framework to optimize inter-domain bandwidth large cloud provider and tier-1 North American ISPs. Costs depend allocations with non-linear pricing schemes. CASCARA lever- on the 95th-percentile of the allocation distributions (vertical lines). ages the abundance of latency-equivalent peer links on the CASCARA-optimized allocations reduce total costs by 35% over the cloud edge to minimize costs without impacting latency sig- present-day allocations while satisfying the same demand. nificantly. Extensive evaluation on production traffic demands of a commercial cloud provider shows that CASCARA saves In this work, we show that recent increases in interconnec- 11–50% in bandwidth costs per cloud PoP, while bounding tion and infrastructure scale enable significant potential to re- the increase in client latency by 3 milliseconds1. duce the costs of inter-domain traffic.
    [Show full text]
  • An Overview of the Communication Decency Act's Section
    Legal Sidebari Liability for Content Hosts: An Overview of the Communication Decency Act’s Section 230 Valerie C. Brannon Legislative Attorney June 6, 2019 Section 230 of the Communications Act of 1934, enacted as part of the Communications Decency Act of 1996 (CDA), broadly protects online service providers like social media companies from being held liable for transmitting or taking down user-generated content. In part because of this broad immunity, social media platforms and other online content hosts have largely operated without outside regulation, resulting in a mostly self-policing industry. However, while the immunity created by Section 230 is significant, it is not absolute. For example, courts have said that if a service provider “passively displays content that is created entirely by third parties,” Section 230 immunity will apply; but if the service provider helps to develop the problematic content, it may be subject to liability. Commentators and regulators have questioned in recent years whether Section 230 goes too far in immunizing service providers. In 2018, Congress created a new exception to Section 230 in the Allow States and Victims to Fight Online Sex Trafficking Act of 2017, commonly known as FOSTA. Post-FOSTA, Section 230 immunity will not apply to bar claims alleging violations of certain sex trafficking laws. Some have argued that Congress should further narrow Section 230 immunity—or even repeal it entirely. This Sidebar provides background information on Section 230, reviewing its history, text, and interpretation in the courts. Legislative History Section 230 was enacted in early 1996, in the CDA’s Section 509, titled “Online Family Empowerment.” In part, this provision responded to a 1995 decision issued by a New York state trial court: Stratton- Oakmont, Inc.
    [Show full text]
  • Player, Pirate Or Conducer? a Consideration of the Rights of Online Gamers
    ARTICLE PLAYER,PIRATE OR CONDUCER? A CONSIDERATION OF THE RIGHTS OF ONLINE GAMERS MIA GARLICK I. INTRODUCTION.................................................................. 423 II. BACKGROUND ................................................................. 426 A. KEY FEATURES OF ONLINE GAMES ............................ 427 B. AGAMER’S RIGHT OF OUT-OF-GAME TRADING?......... 428 C. AGAMER’S RIGHT OF IN-GAME TECHNICAL ADVANCEMENT?......................................................... 431 D. A GAMER’S RIGHTS OF CREATIVE GAME-RELATED EXPRESSION? ............................................................ 434 III. AN INITIAL REVIEW OF LIKELY LEGAL RIGHTS IN ONLINE GAMES............................................................................ 435 A. WHO OWNS THE GAME? .............................................. 436 B. DO GAMERS HAVE RIGHTS TO IN-GAME ELEMENTS? .... 442 C. DO GAMERS CREATE DERIVATIVE WORKS?................ 444 1. SALE OF IN-GAME ITEMS - TOO COMMERCIAL? ...... 449 2. USE OF ‘CHEATS’MAY NOT INFRINGE. .................. 450 3. CREATIVE FAN EXPRESSION –ASPECTRUM OF INFRINGEMENT LIKELIHOOD?.............................. 452 IV. THE CHALLENGES GAMER RIGHTS POSE. ....................... 454 A. THE PROBLEM OF THE ORIGINAL AUTHOR. ................ 455 B. THE DERIVATIVE WORKS PARADOX............................ 458 C. THE PROBLEM OF CULTURAL SIGNIFICATION OF COPYRIGHTED MATERIALS. ....................................... 461 V. CONCLUSION .................................................................. 462 © 2005 YALE
    [Show full text]
  • Reevaluating Internet Service Providers' Liability for Third Party Content and Copyright Infringement Lucy H
    Roger Williams University Law Review Volume 7 Issue 1 Symposium: Information and Electronic Article 6 Commerce Law: Comparative Perspectives Fall 2001 Making Waves in Statutory Safe Harbors: Reevaluating Internet Service Providers' Liability for Third Party Content and Copyright Infringement Lucy H. Holmes Roger Williams University School of Law Follow this and additional works at: http://docs.rwu.edu/rwu_LR Recommended Citation Holmes, Lucy H. (2001) "Making Waves in Statutory Safe Harbors: Reevaluating Internet Service Providers' Liability for Third Party Content and Copyright Infringement," Roger Williams University Law Review: Vol. 7: Iss. 1, Article 6. Available at: http://docs.rwu.edu/rwu_LR/vol7/iss1/6 This Notes and Comments is brought to you for free and open access by the Journals at DOCS@RWU. It has been accepted for inclusion in Roger Williams University Law Review by an authorized administrator of DOCS@RWU. For more information, please contact [email protected]. Notes and Comments Making Waves In Statutory Safe Harbors: Reevaluating Internet Service Providers' Liability for Third-Party Content and Copyright Infringement With the growth of the Internet" as a medium of communica- tion, the appropriate standard of liability for access providers has emerged as an international legal debate. 2 Internet Service Prov- iders (ISPs) 3 have faced, and continue to face, potential liability for the acts of individuals using their services to access, post, or download information.4 Two areas of law where this potential lia- bility has been discussed extensively are defamation and copyright 5 law. In the United States, ISP liability for the content of third- party postings has been dramatically limited by the Communica- tions Decency Act of 1996 (CDA).
    [Show full text]
  • Women9sgroupdistributesbirth Control Information US
    Distribution Weather Today CaoaUanH* ctaadtaM* nd mBd today, Ugh fat 7H. OMdy tonight i«w .round N. Tomorrow 26,875 cloudy and cool with chance «f (JtedBank Area J raia developing. Outlook Wednes- "V". Copyright—Tine Red Bank Register, Inc. 1968. day, cloudy cool, rain continuing. DIAL 741-0010 MONMOUTH COUNTY'S HOME NEWSPAPER FOR 88 YEARS Isnud dmllr. Monday tbroutb rrlio. Second dm i YOU 89, NO. 59 PiU »t JMd But tad it AMtttonfl KtlUni Ottlcii. MONDAY, SEPTEMBER 19, 1966 7c PER COPY PAGE ONE May Be Violating State Law Women 9sGroupDistributesBirth Control Information By DORIS KULMAN The response has been overwhelming, according to Mrs. a 17-year-old unwed mother, and a 48-year-old grandmother who her, if necessary. At least one subcommittee member—Mrs. (See related itory and photo, Page S) Harold Dean, wife of the church's minister and a subcommittee had just given birth to another child. Mrs. Dean said. Gerald Marquess, Idaho La., Matawan—also brings one of the LINCROFT — What does a housewife do when a stranger member. The last clinic sponsored by the subcommittee was held small, plastic IUDs along. knock* at her door and asks, "Would you like to know about Approximately 120 women have received the intra-uterine in May. Members will meet this week to plan another drive. "It's much easier to show an IUD than to describe it," birth control?" devices at the four clinics co-sponsored by the Planned Par- Their door-to<Ioor campaigns probably violate New Jersey's Mrs. Marquess said. enthood of Monmouth County or in visits to the four doctors If she's a housewife in a low income area of Monmouth birth control law, a spokesman for the state attorney general's "If we were given the opportunity to prosecute, we prob- who have agreed to provide two women a week with an IUD County she /lings the door open, invites the visitor in, listens office told The Register.
    [Show full text]
  • Bulletin of the State Normal School for Women, Catalogue 1916-1917, Vol
    Longwood University Digital Commons @ Longwood University Catalogues Library, Special Collections, and Archives 6-1916 Bulletin of the State Normal School For Women, Catalogue 1916-1917, Vol. ll, No. 4, June 1916 Longwood University Follow this and additional works at: http://digitalcommons.longwood.edu/catalogs Recommended Citation Longwood University, "Bulletin of the State Normal School For Women, Catalogue 1916-1917, Vol. ll, No. 4, June 1916" (1916). Catalogues. 19. http://digitalcommons.longwood.edu/catalogs/19 This Book is brought to you for free and open access by the Library, Special Collections, and Archives at Digital Commons @ Longwood University. It has been accepted for inclusion in Catalogues by an authorized administrator of Digital Commons @ Longwood University. For more information, please contact [email protected]. BULLETIN OF THE STATE NORMAL SCHOOL FOR WOMEN FARMVILLE, VIRGINIA Vol. II :: No. 4 June, 1916 Catalogue 1916-1917 Digitized by the Internet Archive in 2011 with funding from LYRASIS Members and Sloan Foundation http://www.archive.org/details/statenormalsch191617stat > BULLETIN OF THE STATE NORMAL SCHOOL FOR WOMEN FARMVILLE, VIRGINIA Vol. II, No. 4. PUBLISHED QUARTERLY June, 1916 CATALOGUE 1916 - 1917 published by The State Normal School For Women Farmville, Virginia 1916 Entered as second-class matter November 12, 1914, at the post-office at Farmville, Virginia, under the Act of August 24, 1912. TABLE OF CONTENTS Page Calendar 5 Schedule Appointments _ 6 Virginia Normal School Board 7 Committees 7 Faculty
    [Show full text]
  • Lake Service Provider Training Manual for Preventing the Spread of Aquatic Invasive Species Version 3.3
    Lake Service Provider Training Manual for Preventing the Spread of Aquatic Invasive Species Version 3.3 Lake Service Provider Training Manual developed by: Minnesota Department of Natural Resources 500 Lafayette Road St. Paul, MN 55155-4025 1-888-646-6367 www.mndnr.gov Contributing authors: Minnesota Department of Natural Resources Darrin Hoverson, Nathan Olson, Jay Rendall, April Rust, Dan Swanson Minnesota Waters Carrie Maurer-Ackerman All photographs and illustrations in this manual are owned by the Minnesota DNR unless otherwise credited. Thank you to the many contributors who edited copy and provided comments during the development of this manual, and other training materials. Some portions of this training manual were adapted with permission from a publication originally produced by the Colorado Division of Wildlife and State Parks with input from many other partners in Colorado and other states. Table of Contents Section 1 : Lake Service Provider Basics. 1 What is a Lake “Service Provider”?. 2 What are Aquatic Invasive Species (AIS)?. .2 Why a training and permit?. 3 How do you know if you are a service provider and need a permit?. .3 How to get your service provider permit. .3 Service Provider Vehicle Stickers. 4 Online AIS Training for Your Employees. 4 Follow-up After Training. .5 Contact. .6 Section 2: Aquatic Invasive Species (AIS). .7 Aquatic Invasive Species (AIS) . 8 Zebra mussels and Quagga mussels . 9 Spiny waterflea and Fishhook waterflea . 11 Faucet snail . 12 Eurasian watermilfoil . 13 Curly-leaf pondweed. .14 Flowering rush . .15 Invasive Fish Diseases. 16 Other Aquatic Invasive Species . 16 Section 3: Minnesota Aquatic Invasive Species Laws .
    [Show full text]
  • ACTA's Abandoned Third-Party Liability Provisions and What They Mean for the Future
    American University Washington College of Law Digital Commons @ American University Washington College of Law Joint PIJIP/TLS Research Paper Series 9-2010 ACTA's Abandoned Third-Party Liability Provisions and What They Mean for the Future Michael R. Morris University of Edinburgh, [email protected] Follow this and additional works at: https://digitalcommons.wcl.american.edu/research Part of the Intellectual Property Law Commons, and the International Trade Law Commons Recommended Citation Morris, Michael. 2010. ACTA's Abandoned Third-Party Liability Provisions and What They Mean for the Future. PIJIP Research Paper no. 10. American University Washington College of Law, Washington, DC. This Article is brought to you for free and open access by the Program on Information Justice and Intellectual Property and Technology, Law, & Security Program at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Joint PIJIP/TLS Research Paper Series by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. NAVIGATING THE ACTA SHOALS TO A FUTURE SAFE HARBOR: LIBRARY AND HOTSPOT INTERNET ACCESS 1 LIABILITY IN A POST-ACTA UNIVERSE 2 Michael R. Morris ABSTRACT This white paper examines issues potentially created both by the expansion of third-party liability mandated by ACTA and the safe harbor provisions designed to provide some protection against that third-party liability. 1 At the time this paper was researched and written, the July 1, 2010 draft of ACTA was the most recent draft of the text. Any references to ―the most recent text‖ and related analysis refer to the July 1, 2010 draft.
    [Show full text]
  • Playing Fair: Youtube, Nintendo, and the Lost Balance of Online Fair Use Natalie Marfo
    Brooklyn Journal of Corporate, Financial & Commercial Law Volume 13 | Issue 2 Article 6 5-1-2019 Playing Fair: Youtube, Nintendo, and the Lost Balance of Online Fair Use Natalie Marfo Follow this and additional works at: https://brooklynworks.brooklaw.edu/bjcfcl Part of the Computer Law Commons, Entertainment, Arts, and Sports Law Commons, Gaming Law Commons, Intellectual Property Law Commons, Internet Law Commons, and the Other Law Commons Recommended Citation Natalie Marfo, Playing Fair: Youtube, Nintendo, and the Lost Balance of Online Fair Use, 13 Brook. J. Corp. Fin. & Com. L. 465 (2019). Available at: https://brooklynworks.brooklaw.edu/bjcfcl/vol13/iss2/6 This Note is brought to you for free and open access by the Law Journals at BrooklynWorks. It has been accepted for inclusion in Brooklyn Journal of Corporate, Financial & Commercial Law by an authorized editor of BrooklynWorks. PLAYING FAIR: YOUTUBE, NINTENDO, AND THE LOST BALANCE OF ONLINE FAIR USE ABSTRACT Over the past decade, YouTube saw an upsurge in the popularity of “Let’s Play” videos. While positive for YouTube, this uptick was not without controversy. Let’s Play videos use unlicensed copyrighted materials, frustrating copyright holders. YouTube attempted to curb such usages by demonetizing and removing thousands of Let’s Play videos. Let’s Play creators struck back, arguing that the fair use doctrine protects their works. An increasing number of powerful companies, like Nintendo, began exploiting the ambiguity of the fair use doctrine against the genre; forcing potentially legal works to request permission and payment for Let’s Play videos, without a determination of fair use.
    [Show full text]
  • Regulatory Challenges and Opportunities in the New ICT Ecosystem
    REGULATORY AND MARKET ENVIRONMENT International Telecommunication Union Telecommunication Development Bureau Place des Nations REGULATORY CHALLENGES AND CH-1211 Geneva 20 OPPORTUNITIES IN THE Switzerland www.itu.int NEW ICT ECOSYSTEM ISBN: 978-92-61-26171-9 9 7 8 9 2 6 1 2 6 1 7 1 9 Printed in Switzerland Geneva, 2017 THE NEW ICT ECOSYSTEM IN AND OPPORTUNITIES CHALLENGES REGULATORY Telecommunication Development Sector Regulatory challenges and opportunities in the new ICT ecosystem Acknowledgements The International Telecommunication Union (ITU) and the ITU Telecommunication Development Bureau (BDT) would like to thank ITU expert Mr Scott W. Minehane of Windsor Place Consulting for the prepa- ration of this report. ISBN 978-92-61-26161-0 (paper version) 978-92-61-26171-9 (electronic version) 978-92-61-26181-8 (EPUB version) 978-92-61-26191-7 (Mobi version) Please consider the environment before printing this report. © ITU 2018 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Foreword The new ICT ecosystem has unleashed a virtuous cycle, transforming multiple economic and social activities on its way, opening up new channels of innovation, productivity and communication. The rise of the app economy and the ubiquity of smart mobile devices create great opportuni- ties for users and for companies that can leverage global scale solutions and systems. Technology design deployed by online service providers in particular often reduces transaction costs while allowing for increasing econo- mies of scale. The outlook for both network operators and online service providers is bright as they benefit from the virtuous cycle − as the ICT sector outgrows all others, innovation continues to power ahead creating more op- portunities for growth.
    [Show full text]
  • DATA RETENTION MANDATES: ANALYZING a DRAFT LAW I. Introduction II. Hypothetical Law Proposed in Imaginary Country Y
    DATA RETENTION MANDATES: ANALYZING A DRAFT LAW APRIL 2012 This document introduces the concept of a “data retention” law and offers a hypothetical data retention law of the type that might be introduced in any country around the world. The reader is asked to imagine that this law is being proposed by “Country Y,” a country with a robust Internet economy that is the home to many successful online service providers. A set of questions is then used to guide the reader through an evaluation of the law. I. Introduction The telephone network (both fixed and wireless) and Internet services generate huge amounts of transactional data that reveals the activities and associations of users. Increasingly, law enforcement officers around the world seek such information from service providers for use in criminal and national security investigations. In order to ensure the ready availability of such data, some governments have imposed or have considered imposing mandates requiring communications companies to retain certain data – data that these companies would not otherwise keep – about all of their users. Under these mandates (imposed by law or regulation or through licensing conditions), data must be collected and stored in such a manner that it is linked to users’ names or other identification information. Government officials may then demand access to this data, pursuant to the laws of their respective countries, for use in investigations. Data retention laws can require telephone companies to retain the originating and destination numbers of all phones calls. They may require wireless companies to maintain data showing the location of users based on what cell tower they are near.
    [Show full text]
  • Your DMCA Safe Harbor Questions Answered Don’T Have Time to Catch an Entire Program Or Read an Article? Here Are the Answers You Wanted to Find Anyway
    Your DMCA Safe Harbor Questions Answered Don’t have time to catch an entire program or read an article? Here are the answers you wanted to find anyway. By Mitchell Zimmerman Your DMCA Safe Harbor Questions Answered By Mitchell Zimmerman Do you need the answer right now to one particular question about the DMCA and its (so-called) “Safe Harbors”? Here you go! But be warned: we’re painting with a broad brush, so you will have to go further – including seeking legal advice – for more precise and nuanced answers for your actual situation. This guide is not legal advice. INTRODUCTION The Digital Millennium Copyright Act of 1998 (the “DMCA”) sought to balance the interests of copyright holders who were afraid of the large scale copyright infringement that they anticipated with the onset of user-submitted content and the interests of owners and operators of Internet websites who wanted to allow their users to post content and communications without the operators being held liable for possible infringing acts of some of their users. The DMCA’s solution: copyright law would treat online service providers (“OSPs”) as innocent middle-men in the underlying disputes between copyright holders and users who posted infringing content – provided the OSPs met cer- tain conditions. The DMCA’s “safe harbor” regime offers immunity to claims of copyright infringement if (among other requirements) online service providers promptly remove or block access to infringing materials after copyright holders give appropriate notice. But the devil is in the details. To flag one key point: cribbing a DMCA policy from another website and posting it on yours is not enough; if that is all you do, you will not avail yourself of the safe harbor.
    [Show full text]