The Law of Electronic Commerce

Total Page:16

File Type:pdf, Size:1020Kb

The Law of Electronic Commerce This page intentionally left blank The Law of Electronic Commerce Written specifically for legal practitioners and students, this book examines the concerns, laws and regulations involved in electronic commerce. In just a few years, commerce via the World Wide Web and other online platforms has boomed, and a new field of legal theory and practice has emerged. Legislation has been enacted to keep pace with commercial realities, cyber- criminals and unforeseen social consequences, but the ever-evolving nature of new technologies has challenged the capacity of the courts to respond effectively. This book addresses the legal issues relating to the introduction and adoption of various forms of electronic commerce. From intellectual property, to issues of security and privacy, Alan Davidson looks at the practical challenges for lawyers and commercial parties while providing a rationale for the underlying legal theory. Alan Davidson is Senior Lecturer in the School of Law, University of Queensland. He is also a solicitor and barrister of the Supreme Court of New South Wales and the High Court of Australia. The Law of Electronic Commerce Alan Davidson CAMBRIDGE UNIVERSITY PRESS Cambridge, New York, Melbourne, Madrid, Cape Town, Singapore, São Paulo, Delhi, Dubai, Tokyo Cambridge University Press The Edinburgh Building, Cambridge CB2 8RU, UK Published in the United States of America by Cambridge University Press, New York www.cambridge.org Information on this title: www.cambridge.org/9780521678650 © Alan Davidson 2009 This publication is in copyright. Subject to statutory exception and to the provision of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University Press. First published in print format 2009 ISBN-13 978-0-511-69088-4 eBook (NetLibrary) ISBN-13 978-0-521-67865-0 Paperback Cambridge University Press has no responsibility for the persistence or accuracy of urls for external or third-party internet websites referred to in this publication, and does not guarantee that any content on such websites is, or will remain, accurate or appropriate. Reproduction and communication for educational purposes The Australian Copyright Act 1968 (the Act) allows a maximum of one chapter or 10% of the pages of this work, whichever is the greater, to be reproduced and/or communicated by any educational institution for its educational purposes provided that the educational institution (or the body that administers it) has given a remuneration notice to Copyright Agency Limited (CAL) under the Act. For details of the CAL licence for educational institutions contact: Copyright Agency Limited Level 15, 233 Castlereagh Street Sydney NSW 2000 Telephone: (02) 9394 7600 Facsimile: (02) 9394 7601 E-mail: [email protected] Information regarding prices, travel timetables and other factual information given in this work are correct at the time of first printing but Cambridge University Press does not guarantee the accuracy of such information thereafter. Contents Acknowledgements page xv Table of cases xvii Table of statutes xxv 1 The law of electronic commerce 1 Electronic commerce law 2 Internet use in Australia 5 Judicial consideration in Australia 6 Further reading 10 2 The rule of cyberspace 11 Cultural and environmental juxtaposition with cyberspace 11 Cyberspace 12 The rule of law and the rule of cyberspace 16 The rule of law 17 The rule of cyberspace 18 Spontaneous (or endogenous) order 18 A code of cyberspace 20 Information wants to be free 22 Conclusion 23 Further reading 24 3 Electronic commerce and the law of contract 25 UNCITRAL Model Law of Electronic Commerce 25 Legislation 27 Australia 27 New Zealand 28 Provisions of the Electronic Transactions Acts 29 Electronic contracts 30 Common law 31 Application of the common law 31 Exemptions 33 Exemption does not equate to a paper requirement 34 New Zealand 34 Validity of electronic transactions 35 v vi CONTENTS Writing 36 Australian provisions 37 New Zealand 39 Signatures 39 Australian provisions 40 New Zealand provisions 45 Production of documents 47 Consent 48 Example 50 Other countries’ provisions 51 Comment 52 Retention of information and documents 52 Retention in paper form 53 Retention in electronic form 53 Time and place of dispatch and receipt of electronic communications 54 Time of dispatch 55 Time of receipt 56 Acceptance by electronic communication and the postal acceptance rule 57 Placeofdispatchandplaceofreceipt 61 Attribution of electronic communication 61 Originals 63 Electronic Case Management System 63 Comment 63 Further reading 64 4 Shrinkwrap, clickwrap and browsewrap contracts 66 Shrinkwrap 67 Clickwrap 68 Browsewrap 70 Electronic agents 72 Further reading 73 5 Electronic signatures 74 Traditional signatures 74 Modern signatures 77 Electronic signing 77 Acceptance at face value and risk 79 Functions of signatures 79 Electronic Transactions Acts 80 ‘Electronic signature’ defined 82 Uses 83 Security of electronic signature 83 Digitised signatures 84 Digital signatures 84 CONTENTS vii Australian Business Number Digital Signature Certificates 86 Secure Socket Layer – Transport Layer Security 87 Applications 88 Further Reading 88 6 Copyright issues in electronic commerce 89 Thenatureofcopyright 89 Exclusive rights 91 Infringement 92 Substantial part 93 Objective similarity and causal connection 95 Software 96 Right of communication 97 Exemptions 98 Libraries and archives 98 Educational statutory licences 99 Temporary reproductions 99 Enforcement measures 99 Time-shifting, format-shifting and space-shifting 101 Piracy and enforcement 102 Peer-to-peer file sharing 102 Authorisation 105 Carrier protection 108 Hyperlinking 108 Further reading 109 7 Electronic commerce – trade marks, patents and circuit layouts 110 The nature of trade marks 110 Infringement 112 Hyperlinking 113 Framing 115 Meta-tags 117 Patents for software and internet processes 119 Developments in the United States 119 Developments in Europe 120 Developments in Australia 120 Patents and hardware 122 Circuit layout rights 123 Further reading 125 8 Domain names 126 Mapping cyberspace 126 Business identifiers 127 The nature of domain names 128 Top Level Domains names (TLDs) 129 viii CONTENTS Generic Top Level Domain Names (gTLDs) 129 Country Code Top Level Domain names (ccTLDs) 131 .au 131 .nz 132 .us 132 .uk 133 .in 133 TLD rationale 134 ICANN 135 InterNIC 136 Whois 137 ICANN Ombudsman 137 Nexus requirements 138 gTLD nexus requirements 138 .au nexus requirements 139 .nz nexus requirements 140 .us nexus requirements 140 .uk nexus requirements 141 .in nexus requirements 141 9 Domain name disputes 142 Cybersquatting 142 Dispute resolution 143 Remedies using the court process 144 Cause of action 144 US experience 146 International approaches 148 Domain name passing off 151 Oggi Advertising Ltd v McKenzie 152 Marks & Spencer v One in a Million 153 Developments 156 Trade Practices Act relief 157 Fraud 160 Conclusion 162 Further reading 162 10 Uniform domain name dispute resolution policies 163 WIPO internet domain name reports 164 UDRP rules 165 Identical or confusingly similar 166 Trademark or service mark 168 Registrant has no rights or legitimate interests 171 Registration and use in bad faith 172 UDRP process 175 ccTLD dispute resolution policies 176 auDRP 176 .nz DRSP 177 CONTENTS ix usTLD Dispute Resolution Policy 178 .uk DRSP 178 INDRP 179 Additional policies 179 Practical ramifications 181 Conclusion 181 Further reading 182 11 Jurisdiction in cyberspace 183 Rules of private international law 183 Forum non conveniens 184 Dow Jones v Gutnick 185 Adventitious and opportunistic 189 Effects test 190 Australian cases 191 Early US experience 194 Universal rights 196 Alternative approaches 198 Single publication rule 200 Substantial publication 201 Uniform defamation legislation – choice of law 201 Conclusion 202 Further reading 203 12 Defamation in cyberspace 204 Defamation principles 205 Defamation reform 206 Defamation in cyberspace – actions and issues 206 Statute of limitations 210 Single publication rule 210 Single controversy principle 213 Single cause rule 213 Adventitious or opportunistic conduct 213 Jurisdiction for defamatory statement 214 Conclusion 214 Further reading 215 13 Privacy and data protection in cyberspace 216 Information wants to be free 217 Privacy and regulation 218 Information privacy 218 Australia 221 National Privacy Principles (NPP) 223 Data protection 225 Victoria 225 New South Wales 226 x CONTENTS Queensland 226 Western Australia 226 South Australia 227 Tasmania 227 Northern Territory 227 Australian Capital Territory 228 Abuses 228 Cookies 228 Web bugs 231 International Covenant on Civil and Political Rights (ICCPR) 232 Data protection 232 Review 233 Personal privacy 235 New Zealand 240 United States 241 Final comment 242 Further reading 242 14 Electronic mail and online presence 243 Email 243 Attachments 244 Authentication 244 Language 245 Viruses 246 Disclaimers 246 Risk assessment 248 Service of documents by email 248 Time and place of dispatch and receipt 249 Web page presence 250 Liability for online material 250 Disclaimers – conditions of use 251 Information to be placed on pages for practical and legal purposes 252 Newsgroups and mailing lists 253 The professional office and email 253 Backup copies 253 Maintain supervisory checks 253 Records and costing 254 Confidentiality 254 Internal trial 254 Confirmation of sending 254 Access to files 255 A new form of expression 255 Conclusion 255 15 National electronic
Recommended publications
  • Maximum Internet Security: a Hackers Guide - Networking - Intrusion Detection
    - Maximum Internet Security: A Hackers Guide - Networking - Intrusion Detection Exact Phrase All Words Search Tips Maximum Internet Security: A Hackers Guide Author: Publishing Sams Web Price: $49.99 US Publisher: Sams Featured Author ISBN: 1575212684 Benoît Marchal Publication Date: 6/25/97 Pages: 928 Benoît Marchal Table of Contents runs Pineapplesoft, a Save to MyInformIT consulting company that specializes in Internet applications — Now more than ever, it is imperative that users be able to protect their system particularly e-commerce, from hackers trashing their Web sites or stealing information. Written by a XML, and Java. In 1997, reformed hacker, this comprehensive resource identifies security holes in Ben co-founded the common computer and network systems, allowing system administrators to XML/EDI Group, a think discover faults inherent within their network- and work toward a solution to tank that promotes the use those problems. of XML in e-commerce applications. Table of Contents I Setting the Stage 1 -Why Did I Write This Book? 2 -How This Book Will Help You Featured Book 3 -Hackers and Crackers Sams Teach 4 -Just Who Can Be Hacked, Anyway? Yourself Shell II Understanding the Terrain Programming in 5 -Is Security a Futile Endeavor? 24 Hours 6 -A Brief Primer on TCP/IP 7 -Birth of a Network: The Internet Take control of your 8 -Internet Warfare systems by harnessing the power of the shell. III Tools 9 -Scanners 10 -Password Crackers 11 -Trojans 12 -Sniffers 13 -Techniques to Hide One's Identity 14 -Destructive Devices IV Platforms
    [Show full text]
  • 2015 Valuation Handbook – Guide to Cost of Capital and Data Published Therein in Connection with Their Internal Business Operations
    Market Results Through #DBDLADQ 2014 201 Valuation Handbook Guide to Cost of Capital Industry Risk Premia Company List Cover image: Duff & Phelps Cover design: Tim Harms Copyright © 2015 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748- 6008, or online at http://www.wiley.com/go/permissions. The forgoing does not preclude End-users from using the 2015 Valuation Handbook – Guide to Cost of Capital and data published therein in connection with their internal business operations. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose.
    [Show full text]
  • Cohen-Internet-History-2011.Pdf
    International Journal of Technoethics, 2(2), 45-64, April-June 2011 45 Internet History Raphael Cohen-Almagor, University of Hull, UK ABSTRACT This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase (1984-1989). It was facilitated by the upgrading of back- bone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different operating systems joined the universal network. The instant and growing success of social networking-sites that enable Netusers to share information, photos, private journals, hobbies, and personal as well as commercial interests with networks of mutual friends and colleagues is discussed. Keywords: ARPANET, History, ICANN, Innovation, Internet, Open Architecture, Packet Switching, Social Networking INTRODUCTION the biological kingdom. The third was Sigmund Freud (1856–1939), who acknowledged that History consists of a series of accumulated the mind is also unconscious and subject to the imaginative inventions. defence mechanism of repression, thus we are – Voltaire far from being Cartesian minds entirely transpar- ent to ourselves. And now, in the information Floridi (2009, 2010) argues that we are now revolution, we are in the process of dislocation experiencing the fourth scientific revolu- and reassessment of humanity’s fundamental tion.
    [Show full text]
  • List of Section 13F Securities, Third Quarter 2001
    OFFICIAL LIST OF SECTION 13(F) SECURITIES USER INFORMATION SHEET General This list of "Section 13(f) securities" as defined by Rule 13f-I(c) [I7 CFR 240.13f-I (c)] is made available to the public pursuant to Section13 (f) (3) of the Securities Exchange Act of 1934 [I5 USC 78m(f) (3)]. It is made available for use in the preparation of reports filed with the Securities and Exhange Commission pursuant to Rule 13f-1 117 CFR 240.1 3f-I] under Section 13(f) of the Securities Exchange Act of 1934. An updated list is published on a quarterly basis. This list is current as of September, 15, 2001 ,and may be relied on by institutional investment managers filing Form 13F reports for the calendar quarter ending September 30, 2001 . Institutional investment managers should report holdings--number of shares and fair market value--as of the last day of the calendar quarter as required by [ Section 13(f)(l) and Rule 13f-I] thereunder. Features (1 ) Additions and Deletions: Revisions made to the list of Section 13(f) securities are indicated in a column titled "STATUS." The word "ADDED" in the status column opposite the name of a security indicates that the security has become a Section 13(f) security. The word "DELE-TED" in the status colurr~nopposite the name of a security indicates that the security ceases to be a 13(f) security since the date of the last list. (2) List of options: An asterisk is placed next to the name of any security having a listed option and each option is individually listed with its own CUSlP nurr~berimmediately below the name of the security having the option.
    [Show full text]
  • The Economics of the Internet Backbone
    THE ECONOMICS OF THE INTERNET BACKBONE NICHOLAS ECONOMIDES New York University, New York Contents 1. Competition among Internet backbone service providers 1.1. Internet backbone services 1.2. Interconnection 1.3. The transit and peering payment methods for connectivity 1.4. Conduct of Internet backbone service providers 1.4.1. Pricing of transport services in the backbone networks 1.4.2. ISP multihoming; Additional demand responsiveness to price changes 2. Structural conditions for Internet backbone services; Negligible barrier to entry and expansion 2.1. The markets for raw transport capacity and other inputs to Internet transport services 2.2. Ease of expansion and entry 2.3. Public standards and protocols on the Internet 3. Potential for anticompetitive behavior on the Internet backbone 4. Network externalities and the Internet 4.1. Procompetitive consequences of network externalities 4.2. Conditions under which network externalities may inhibit competition ., 5. Network externalities and competition on the Internet I 5.1. Conditions necessary for the creation of bottlenecks fail on the Internet 5.2. Bottlenecks such as the ones of the local exchange telecommunications network do not exist on the Internet 6. Strategies that a large IBP might pursue 6.1. Raising the price of transport 6.2. Discriminatory price increases directed simultaneously against all backbone rivals 6.3. Raising rivals' costs and degrading connectivity 6.3.1. Terminating interconnection simultaneously with all rivals (refusal to deal) Handbook of TelecommunicationsEconomics, Volume 2, Edlted by S. Majumdar et a1 02005 Published by Elsevier B. V. 001: 10 1016/S1569-4054(05)02009-9 N. Economides 6.3.2.
    [Show full text]
  • Company Name Ticker Symbol Industry Name Adstar Inc ADST
    Company Name Ticker Symbol Industry Name SIC Code AdStar Inc ADST Advertising 7310 ActionView Int'l Inc AVEW Advertising 7310 Betawave Corporation BWAV Advertising 7310 V Media Corporation CMDI Advertising 7310 ChinaNet Online Holdings Inc CNET Advertising 7310 Dynamic Response Group Inc DRGZ Advertising 7310 Interep National Radio Sales I IREP Advertising 7310 MaxWorldwide Inc MAXW Advertising 7310 Vertical Branding Inc. VBDG Advertising 7310 Digital Generation Inc DGIT Advertising 7310 Clicker Inc CLKZ Advertising 7310 Int'l Commercial Television ICTL Advertising 7310 MSGI Security Solutions Inc MSGI Advertising 7310 mktg inc. CMKG Advertising 7310 Coupon Express Inc CPXP Advertising 7310 Klever Marketing Inc KLMK Advertising 7310 Tiger Media Inc. IDI Advertising 7310 VisionChina Media Inc VISN Advertising 7310 Onstream Media Corporation ONSM Advertising 7310 Monster Worldwide MWW Advertising 7310 Wilhelmina International Corp WHLM Advertising 7310 Marchex Inc. MCHX Advertising 7310 Clear Channel Outdoor Holding CCO Advertising 7310 Lamar Advertising LAMR Advertising 7310 Global Sources GSOL Advertising 7310 Interpublic Group IPG Advertising 7310 Valassis Communic. VCI Advertising 7310 Harte-Hanks HHS Advertising 7310 ValueClick Inc. VCLK Advertising 7310 National CineMedia NCMI Advertising 7310 WPP PLC ADR WPPGY Advertising 7310 Omnicom Group OMC Advertising 7310 American Ammunition Inc. AAMUQ Aerospace/Defense 3720 Air Lease Corp AL Aerospace/Defense 3720 Applied Science Products Inc APLD Aerospace/Defense 3720 Bulova Technologies Group Inc BLVT Aerospace/Defense 3720 Erickson Air-Crane Inc. EAC Aerospace/Defense 3720 E'Prime Aerospace Corporation EPEO Aerospace/Defense 3720 Environmental Tectonics Corp. ETCC Aerospace/Defense 3720 Huntington Ingalls HII Aerospace/Defense 3720 Oakridge Holdings Inc OKRG Aerospace/Defense 3720 OPT Sciences Corp OPST Aerospace/Defense 3720 Passur Aerospace Inc PSSR Aerospace/Defense 3720 American Defense Systems Inc.
    [Show full text]
  • 3Rd Quarter, 2000
    RUN DATE:10/06/00 ** LIST OF SECTION 13F SECURITIES ** PAGE 1 RUN TIME:14:34 IVMOOl CUSIP NO. ISSUER NAME ISSUER DESCRIPTION STATUS B49233 10 7 ICOS VISION SYS CORP N V ORD B5628B 10 4 * LERNOUT & HAUSPIE SPEECH PRODS COM B5628B 90 4 LERNOUT & HAUSPIE SPEECH PRODS CALL B5628B 95 4 LERNOUT & HAUSPIE SPEECH PRODS PUT D1497A 10 1 CELANESE AG ORD D1668R 12 3 * DAIMLERCHRYSLER AG ORD D1668R 90 3 DAIMLERCHRYSLER AG CALL D1668R 95 3 DAIMLERCHRYSLER AG PUT F9212D 14 2 TOTAL FINA ELF S A WT EXP 080503 G0070K 10 3 * ACE LTD ORD G0070K 90 3 ACE LTD CALL G0070K 95 3 ACE LTD PUT GO2602 10 3 * AMDOCS LTD ORD GO2602 90 3 AMDOCS LTD CALL GO2602 95 3 AMDOCS LTD PUT GO2995 10 1 AMERICAN SAFETY INS GROUP LTD ORD GO3910 10 9 * ANNUITY AND LIFE RE HLDGS ORD GO3910 90 9 ANNUITY AND LIFE RE HLDGS CALL GO3910 95 9 ANNUITY AND LIFE RE HLDGS PUT GO4074 10 3 APEX SILVER MINES LTD ORD GO4074 11 1 APEX SILVER MINES LTD WT EXP 110402 GO4397 10 8 * APW LTD COM ADDED GO4397 90 8 APW LTD CALL ADDED GO4397 95 8 APW LTD PUT ADDED GO4450 10 5 ARAMEX INTL LTD ORD GO5345 10 6 ASIA PACIFIC RES INTL HLDG LTD CL A G0535E 10 6 ASIA PACIFIC WIRE & CABLE CORP ORD GO5354 10 8 ASIACONTENT COM LTD CL A 620045 20 2 CENTRAL EUROPEAN MEDIA ENTRPRS CL A NEW G2107X 10 8 CHINA TIRE HLDGS LTD COM G2108N 10 9 * CHINADOTCOM CORP CL A G2108N 90 9 CHINADOTCOM CORP CALL G2108N 95 9 CHINADOTCOM CORP PUT 621082 10 5 CHINA YUCHAI INTL LTD COM 623257 10 1 COMMODORE HLDGS LTD ORD 623257 11 9 COMMODORE HLDGS LTD WT EXP 071501 623773 10 7 CONSOLIDATED WATER CO INC ORD G2422R 10 9 * CORECOMM LTD ORD G2422R 90 9 CORECOMM LTD CALL G2422R 95 9 CORECOMM LTD PUT G2519Y 10 8 CREDICORP LTD COM G2706W 10 5 DELPHI INTERNATIONAL LTD ORD 627545 10 5 DF CHINA TECHNOLOGY INC ORD G2759W 10 1 DIGITAL UNITED HOLDINGS LTD ORD ADDED 628471 10 3 DSG INTL LTD ORD 629526 10 3 EK CHOR CHINA MOTORCYCLE CO COM 629539 14 8 ELAN PLC R T 630177 10 2 * EL SIT10 INC ORD 630177 90 2 EL SIT10 INC CALL RUN DATE:10/06/00 ** LIST OF SECTION 13F SECURITIES ** PAGE 2 RUN TIME:14:34 IVMOOl CUSIP NO.
    [Show full text]
  • Software Equity Group Flash Report
    Software Equity Group Flash Report Select M&A Transactions and Valuations and Financial and Valuation Performance of 250+ Publicly Traded Software, SaaS and Internet Companies by Product Category LEADERS IN SOFTWARE M&A • Industry leading boutique investment bank, founded in 1992, representing public and private software and We Do Deals. internet companies seeking: • Strategic exit • Growth capital • Buyout • Inorganic growth via acquisition • Buy and sell-side mentoring • Fairness opinions and valuations • Sell-side client revenue range: $5 - 75 million • Buy-side clients include private equity firms and NASDAQ, NYSE and foreign exchange listed companies • Clients span virtually every software technology, product category, delivery model and vertical market • Global presence providing advice and guidance to more than 2,000 private and public companies throughout US, Canada, Europe, Asia-Pacific, Africa and Israel • Strong cross-functional team leveraging transaction, operating, legal and engineering experience • Unparalleled software industry reputation and track record. • Highly referenceable base of past clients Copyright © 2015 by Software Equity Group, L.L.C., All Rights Reserved EXTENSIVE GLOBAL REACH Current Sell‐side Representation • SEG currently represents software companies in the United States, Canada, France, Germany, Australia & Saudi Arabia Recent Sell‐side Representation • In addition to the countries listed above, SEG has recently represented software companies in the United Kingdom, France, Netherlands, Israel, and South Africa SEG Research Distribution • SEG’s Quarterly and Annual Software Industry Equity Reports and Monthly Flash Reports are distributed to an opt‐in list of 50,000 public software company CEOs, software entrepreneurs, private equity managing directors, VCs, high tech corporate lawyers, public accountants, etc.
    [Show full text]
  • Detecting and Measuring Financial Market Bubbles
    Detecting and Measuring Financial Market Bubbles By Fariba Rad A Thesis submitted to the Faculty of Graduate Studies of The University of Manitoba In partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Department of Agribusiness and Agricultural Economics University of Manitoba Winnipeg, Manitoba August 2018 ABSTRACT Reviewing the history of financial bubbles indicates that there is no unique definition of the financial bubbles. Given the importance of understanding financial bubbles, the focus of this research is to define and detect bubbles in financial markets. The identification of bubbles is conducted by using stock prices from the internet bubble in the late 1990‘s. This study defines a bubble based on if the current stock price increases by more than 100% and then decreases by at least 50%. Bubbles were found in 30 of the 40 internet companies studied. The first approach using mostly 10 and 40 day moving averages indicated that most bubbles occurred in less than 150 days from beginning to end. The second approach was to measure the size of the bubble and results showed that most of the bubbles were smaller in size. For the third approach, measuring asymmetry of bubbles, results showed that stocks fall faster than they rise. These insights may be valuable to assist investors and policymakers with their decision making. Keywords: financial bubbles, bubble size, asymmetry, bubble definition, internet bubble I ACKNOWLEDGEMENTS I would like to express my sincere gratitude and appreciation to my advisor, Dr. Milton Boyd ‎for his encouragement and support throughout my studies. ‎The advice and inspiration you provided for successful completion of my research was invaluable.
    [Show full text]
  • The Library of Congress Information Bulletin, 2001. INSTITUTION Library of Congress, Washington, DC
    DOCUMENT RESUME ED 464 636 IR 058 442 AUTHOR Lamolinara, Guy, Ed. TITLE The Library of Congress Information Bulletin, 2001. INSTITUTION Library of Congress, Washington, DC. ISSN ISSN-0041-7904 PUB DATE 2001-00-00 NOTE 423p. AVAILABLE FROM For full text: http://www.loc.gov/loc/lcib/. r)Tro w^-k. JOURNAL CIT Library of Congress Information Bulletin; v60 n1-12 2001 EDRS PRICE MF01/PC17 Plus Postage. DESCRIPTORS Electronic Libraries; *Exhibits; *Library Collections; *Library Services; *National Libraries; World Wide Web IDENTIFIERS *Library of Congress ABSTRACT These 12 issues, representing one calendar year (2001) of "The Library of Congress Information Bulletin," contain information on Library of Congress new collections and program developments, lectures and readings, financial support and materials donations, budget, honors and awards, World Wide Web sites and digital collections, new publications, exhibits, and preservation. Cover stories include:(1) "5 Million Items Online: National Digital Library Program Reaches Goal";(2) "Celebration and Growth: The Year in Review"; (3) "The World of Hannah Arendt: Selection of Papers of Political Philosopher Now Online"; (4) "'Born in Slavery': An Introduction to the WPA Slave Narratives"; (5) "Photographer to the Czar: The Startling Work of Sergei Prokudin-Gorskii"; (6) "World Treasures: Library Opens New Gallery of Global Collections"; (7) "National Book Festival: First Lady, Library To Host First-Ever Event"; (8) "Shadows, Dreams, Substance: 'The Floating World of Ukiyo-e' Exhibition Opens"; (9) "'The Joy of the Written Work': Library and First Lady Host First National Book Festival"; (10) "'Human Nature and the Power of Culture': Margaret Mead Exhibition Opens"; and (11)"Photos from the Clarence H.
    [Show full text]
  • Valor De Mercado Vs. Valor De Libros En Empresas De Internet
    VALOR DE MERCADO VS. VALOR DE LIBROS EN EMPRESAS DE INTERNET JUEVES 30 DE MARZO DE 2000 UNIVERSIDAD DEL CEMA JOSE PABLO DAPENA FERNANDEZ DATOS AL 03/23/00 (Muestra de 163 empresas) Earnings Revenues Current Mkt Cap ($MM) ($MM) ($MM) TOTAL (11,675.60) 31,410.97 964,291.35 Fuente: Yahoo Finance FULL VALUE DE LA EMPRESA = VALOR CORRIENTE DEL NEGOCIO + VALOR DE LAS OPCIONES DE CRECIMIENTO (Stewart Myers, Journal of Financial Economics, 1977) ➨OPCIONES REALES ESTAS OPCIONES SON DEFINIDAS COMO REALES (EN CONTRAPARTIDA CON LAS FINANCIERAS) LOS ACTIVOS QUE GENERAN ESTE TIPO DE OPCIONES PUEDEN SER CATEGORIZADOS COMO ESTRATÉGICOS (LA INVERSION SE REALIZA SI LAS CIRCUNSTANCIAS LO HACEN ÓPTIMO) ➨OPCIONES REALES ESTE COMPONENTE PUEDE APROXIMARSE (CON SALVEDADES) A TRAVES DE LA DIFERENCIA ENTRE EL VALOR DE MERCADO DE LOS ACTIVOS Y SU VALOR EN LIBROS. UTILIZAMOS COMO PROXY LA DIFERENCIA ENTRE VALOR DE MERCADO DEL EQUITY Y VALOR EN LIBROS. Company Company Company Company America Online Allaire Onemain Net2Phone Yahoo! Prodigy Talk City Open Market CMG Nextcard ftd.com Viant Amazon.com Intraware Autoweb ZDNet VeriSign barnesandnoble.com Value America Ask Jeeves eBay Verity Rocky Mountain Internet Concentric Network Exodus Stamps.com iTurf Interliant Ariba 24/7 Media Alloy Online eToys InfoSpace.com El Sitio Autobytel MP3.com BroadVision WebTrends Peapod TheStreet.com RealNetworks MyPoints.com Cyberian Outpost Voyager.net Excite@Home About.com*** CyberCash EarthWeb Check Point Software Net Perceptions theglobe.com uBid Inktomi DLJdirect Beyond.com Rowecom Vignette High Speed Acces Online Resources & Communications Secure Computing EarthLink Network Wit Capital Primix *** Launch Media Portal Software drugstore.com JFAX.COM NetSpeak Intuit SportsLine musicmaker.com CDNow Commerce One Juno Online Streamline.com Charles Schwab Co.
    [Show full text]
  • The Information Highway
    THE INFORMATION HIGHWAY David L. Bender, Publisher Bruno Leone, Executive Editor Scott Barbour, Managing Editor Brenda Stalcup, Senior Editor Charles P. Cozic, Book Editor Other Books in the Current Controversies Series: The Abortion Controversy The AIDS Crisis Alcoholism Drug Trafficking Energy Alternatives Ethics Europe Family Violence Free Speech Gambling Gun Control Hate Crimes Hunger Illegal Immigration Interventionism Iraq Nationalism and Ethnic Conflict Police Brutality Pollution Reproductive Technologies Sexual Harassment Violence Against Women Violence in the Media Women in the Military Youth Violence No part of this book may be reproduced or used in any form or by any means, electrical, mechanical, or otherwise, including, but not limited to, photocopy, recording, or any information storage and retrieval system, without prior written permission from the publisher. Cover Photo: © Charly Franklin/FPG International Library of Congress Cataloging-in-Publication Data The information highway / Charles P. Cozic, book editor. p. cm. — (Current controversies) Includes bibliographical references and index. ISBN 1-56510-374-2 (pbk. : alk. paper) — ISBN 1-56510-375-0 (lib. bdg. : alk. paper) 1. Information superhighway—United States. 2. Telecommunication policy—United States. 3. Telecommunication—United States. I. Cozic, Charles P., 1957– . II. Series. HE7572.U6I537 1996 384.3—dc20 95-35486 CIPP © 1996 by Greenhaven Press, Inc., PO Box 289009, San Diego, CA 92198-9009 Printed in the U.S.A. Every effort has been made to trace the owners of copyrighted material. Contents Foreword 10 Introduction 12 Chapter 1: What Is the Information Highway? The Information Highway: An Overview by Philip Elmer-DeWitt 16 Cyberspace is the computer-generated landscape where computer communications are conveyed via wires, cables, and microwaves— the foundations of the information highway.
    [Show full text]