Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: E-Commerce

Internet Domain Names: Background and Policy Issues

CRS – Internet Domain Names: Background and Policy Issues. Lennard G. Kruger, Specialist in Science and Technology Policy. January 3, 2013 “Navigating the Internet requires using addresses and corresponding names that identify the location of individual computers. The Domain Name System (DNS) is the distributed set of databases residing in computers around the world that… Continue Reading

The Contribution of EU Directives to the Objective of Consumer Protection

The Contribution of EU Directives to the Objective of Consumer Protection. Annalies Azzopardi, University of Malta, October 2012. ELSA Malta Law Review, Vol. 2, 2012, Via SSRN. “This paper examines the techniques used by European Union directives in order to protect the consumer. After a brief introduction to consumer legislation within the European Union, these… Continue Reading

Interoperability Case Study: Electronic Data Interchange (EDI)

“Electronic data interchange (EDI) provides an excellent context for examining how interoperability at the technological and data level can also produce profound effects at a higher, institutional level. Originally conceived as a means for speeding up the delivery of invoices and purchase orders by sending them electronically, EDI resulted in significant shifts with regard to… Continue Reading

Local Insights Digital Report – Local Search and Advertising Review

“The YPSM Local Insights Digital Report focuses on uncovering trends across the rapidly evolving local advertising ecosystem. This Insights Report is based on internal data from more than 2.2 billion searches and 39 billion impressions from a full year across the YPSM Local Ad Network’s 300+ online and mobile publishers…Across the YPSM apps, our marquee… Continue Reading

WSJ – They Know What You're Shopping For

WSJ.com: “The widening ability to associate people’s real-life identities with their browsing habits marks a privacy milestone, further blurring the already unclear border between our public and private lives. In pursuit of ever more precise and valuable information about potential customers, tracking companies are redefining what it means to be anonymous…the sheer ease with which… Continue Reading

Lawmakers Release Information About How Data Brokers Handle Consumers’ Personal Information

News release: “A bipartisan group of lawmakers, including Reps. Edward J. Markey (D-Mass.) and Joe Barton (R-Texas), co-Chairmen of the Congressional Bi-Partisan Privacy Caucus, today released responses to letters sent to nine major data brokerage companies querying each about how it collects, assembles and sells consumer information to third parties. The companies – Acxiom, Epsilon… Continue Reading

McKinsey – Altering the approach: Mobile operators and online consumers

Altering the approach: Mobile operators and online consumers, by Eric Hazan, Florent Illat, and Piero Trivellato “What are Europe’s iConsumers thinking? To find out, McKinsey & Company studied the digitally-based purchasing behavior of 40,000 Europeans in eight countries for the second year in a row. This study sheds light on future threats and opportunities by… Continue Reading

Hacker Intelligence Initiative, Monthly Trend Report #13

Monitoring Hacker Forums ADC Monthly Web Attacks Analysis, October 2012: “Imperva analyzed one of the largest-known hacker forums with roughly 250,000 members, as well as other smaller forums. Using search capabilities, we analyzed conversations by topic using specific keywords. We found: SQL injection is now tied with DDoS as the most discussed topic. Both topics… Continue Reading

nCircle Security Tips eBook

“As part of nCircle’s commitment to improving Internet security, we asked some of the brightest minds in security to help us compile a list of security tips and tricks for a wide range of readers. The resulting eBook includes a wide range of topics — from passwords and public Wi-Fi to Java configuration and sandboxing… Continue Reading