Technology and law
Appelman, N., Ausloos, J., Drunen, M. van, Helberger, N.
2020. @techreport{Drunen2020b,
title = {News Recommenders and Cooperative Explainability: Confronting the contextual complexity in AI explanations}, author = {Drunen, M. van and Ausloos, J. and Appelman, N. and Helberger, N.}, url = {https://www.ivir.nl/publicaties/download/Visiepaper-explainable-AI-final.pdf}, year = {2020}, date = {2020-11-03}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } |
Appelman, N., Fahy, R.
pp. 164-175, 2020, (Chapter in: Report Automating Society 2020, Chiusi, F., Fischer, S., Kayser-Bril, N. & Spielkamp, M. eds., Berlin: AlgorithmWatch, October 2020.). @inbook{Fahy2020b,
title = {Netherlands/Research}, author = {Fahy, R. and Appelman, N.}, url = {https://www.ivir.nl/publicaties/download/Automating-Society-Report-2020.pdf https://automatingsociety.algorithmwatch.org/}, year = {2020}, date = {2020-10-29}, pages = {164-175}, abstract = {How are AI-based systems being used by private companies and public authorities in Europe? The new report by AlgorithmWatch and Bertelsmann Stiftung sheds light on what role automated decision-making (ADM) systems play in our lives. As a result of the most comprehensive research on the issue conducted in Europe so far, the report covers the current use of and policy debates around ADM systems in 16 European countries and at EU level.}, note = {Chapter in: Report Automating Society 2020, Chiusi, F., Fischer, S., Kayser-Bril, N. & Spielkamp, M. eds., Berlin: AlgorithmWatch, October 2020.}, keywords = {}, pubstate = {published}, tppubtype = {inbook} } How are AI-based systems being used by private companies and public authorities in Europe? The new report by AlgorithmWatch and Bertelsmann Stiftung sheds light on what role automated decision-making (ADM) systems play in our lives. As a result of the most comprehensive research on the issue conducted in Europe so far, the report covers the current use of and policy debates around ADM systems in 16 European countries and at EU level.
|
Araujo, T., Helberger, N., Vreese, C.H. de
Computer Law & Security Review, 39 , 2020. @article{Helberger2020f,
title = {Who is the fairest of them all? Public attitudes and expectations regarding automated decision-making}, author = {Helberger, N. and Araujo, T. and Vreese, C.H. de}, url = {https://www.sciencedirect.com/science/article/pii/S0267364920300613?dgcid=author}, doi = {https://doi.org/10.1016/j.clsr.2020.105456}, year = {2020}, date = {2020-09-15}, journal = {Computer Law & Security Review}, volume = {39}, abstract = {The ongoing substitution of human decision makers by automated decision-making (ADM) systems in a whole range of areas raises the question of whether and, if so, under which conditions ADM is acceptable and fair. So far, this debate has been primarily led by academics, civil society, technology developers and members of the expert groups tasked to develop ethical guidelines for ADM. Ultimately, however, ADM affects citizens, who will live with, act upon and ultimately have to accept the authority of ADM systems. The paper aims to contribute to this larger debate by providing deeper insights into the question of whether, and if so, why and under which conditions, citizens are inclined to accept ADM as fair. The results of a survey (N = 958) with a representative sample of the Dutch adult population, show that most respondents assume that AI-driven ADM systems are fairer than human decision-makers. A more nuanced view emerges from an analysis of the responses, with emotions, expectations about AI being data- and calculation-driven, as well as the role of the programmer \textendash among other dimensions \textendash being cited as reasons for (un)fairness by AI or humans. Individual characteristics such as age and education level influenced not only perceptions about AI fairness, but also the reasons provided for such perceptions. The paper concludes with a normative assessment of the findings and suggestions for the future debate and research.}, The ongoing substitution of human decision makers by automated decision-making (ADM) systems in a whole range of areas raises the question of whether and, if so, under which conditions ADM is acceptable and fair. So far, this debate has been primarily led by academics, civil society, technology developers and members of the expert groups tasked to develop ethical guidelines for ADM. Ultimately, however, ADM affects citizens, who will live with, act upon and ultimately have to accept the authority of ADM systems.
The paper aims to contribute to this larger debate by providing deeper insights into the question of whether, and if so, why and under which conditions, citizens are inclined to accept ADM as fair. The results of a survey (N = 958) with a representative sample of the Dutch adult population, show that most respondents assume that AI-driven ADM systems are fairer than human decision-makers. A more nuanced view emerges from an analysis of the responses, with emotions, expectations about AI being data- and calculation-driven, as well as the role of the programmer – among other dimensions – being cited as reasons for (un)fairness by AI or humans. Individual characteristics such as age and education level influenced not only perceptions about AI fairness, but also the reasons provided for such perceptions. The paper concludes with a normative assessment of the findings and suggestions for the future debate and research. |
Eskens, S., Helberger, N.
Opinie: corona-app vraagt om meer toezicht op grote techbedrijven De Volkskrant, 2020. @article{Helberger2020g,
title = {Opinie: corona-app vraagt om meer toezicht op grote techbedrijven}, author = {Helberger, N. and Eskens, S.}, url = {https://www.volkskrant.nl/columns-opinie/opinie-corona-app-vraagt-om-meer-toezicht-op-grote-techbedrijven~b6898138/}, year = {2020}, date = {2020-09-10}, journal = {De Volkskrant}, abstract = {Er is te weinig aandacht voor de rol van Google en Apple bij de invoering van de CoronaMelder, betogen Natali Helberger en Sarah Eskens.}, keywords = {}, pubstate = {published}, tppubtype = {article} } Er is te weinig aandacht voor de rol van Google en Apple bij de invoering van de CoronaMelder, betogen Natali Helberger en Sarah Eskens.
|
Appelman, N., Fahy, R.
2020, (Chapter in: F. Chiusi, S. Fischer, & M. Spielkamp (eds.), Automated Decision-Making Systems in the COVID-19 Pandemic: A European Perspective, AlgorithmWatch, 2020). @inbook{Appelman2020b,
title = {Netherlands}, author = {Appelman, N. and Fahy, R.}, url = {https://algorithmwatch.org/wp-content/uploads/2020/08/ADM-systems-in-the-Covid-19-pandemic-Report-by-AW-BSt-Sept-2020.pdf}, year = {2020}, date = {2020-09-01}, abstract = {Contact tracing apps for smartphones, thermal scanners, face recognition technology: high hopes have been placed by both local administrations and national governments in applications and devices like these, aimed at containing the outbreak of the virus. The new publication Automated Decision-Making Systems in the COVID-19 Pandemic: A European Perspective gathers detailed examples of ADM systems in use, compiled by a network of researchers covering 16 countries. It provides an initial mapping and exploration of ADM systems implemented throughout Europe as a consequence of the COVID-19 outbreak.}, note = {Chapter in: F. Chiusi, S. Fischer, & M. Spielkamp (eds.), Automated Decision-Making Systems in the COVID-19 Pandemic: A European Perspective, AlgorithmWatch, 2020}, keywords = {}, pubstate = {published}, tppubtype = {inbook} } Contact tracing apps for smartphones, thermal scanners, face recognition technology: high hopes have been placed by both local administrations and national governments in applications and devices like these, aimed at containing the outbreak of the virus. The new publication Automated Decision-Making Systems in the COVID-19 Pandemic: A European Perspective gathers detailed examples of ADM systems in use, compiled by a network of researchers covering 16 countries. It provides an initial mapping and exploration of ADM systems implemented throughout Europe as a consequence of the COVID-19 outbreak.
|
Appelman, N., Fahy, R., Toh, J., van Hoboken, J.
Techno-optimism and solutionism as a crisis response 2020, (Chapter in L. Taylor, G. Sharma, A. Martin, and S. Jameson (eds.), Data Justice and COVID-19: Global Perspectives, Meatspace Press, 2020)). @inbook{Appelman2020,
title = {Techno-optimism and solutionism as a crisis response}, author = {Appelman, N. and Toh, J. and Fahy, R. and van Hoboken, J.}, url = {https://pure.uva.nl/admin/files/49662485/Data_Justice_and_COVID_19.pdf}, year = {2020}, date = {2020-08-27}, abstract = {The COVID-19 pandemic has reshaped how social, economic, and political power is created, exerted, and extended through technology. Through case studies from around the world, this book analyses the ways in which technologies of monitoring infections, information, and behaviour have been applied and justified during the emergency, what their side-effects have been, and what kinds of resistance they have met.}, note = {Chapter in L. Taylor, G. Sharma, A. Martin, and S. Jameson (eds.), Data Justice and COVID-19: Global Perspectives, Meatspace Press, 2020)}, keywords = {}, pubstate = {published}, tppubtype = {inbook} } The COVID-19 pandemic has reshaped how social, economic, and political power is created, exerted, and extended through technology. Through case studies from around the world, this book analyses the ways in which technologies of monitoring infections, information, and behaviour have been applied and justified during the emergency, what their side-effects have been, and what kinds of resistance they have met.
|
Ferrari, V.
The regulation of crypto-assets in the EU – investment and payment tokens under the radar Maastricht Journal of European and Comparative Law, 2020. @article{Ferrari2020,
title = {The regulation of crypto-assets in the EU \textendash investment and payment tokens under the radar}, author = {Ferrari, V.}, url = {https://journals.sagepub.com/doi/10.1177/1023263X20911538}, doi = {https://doi.org/10.1177/1023263X20911538}, year = {2020}, date = {2020-05-21}, journal = {Maastricht Journal of European and Comparative Law}, abstract = {Based on the guidelines issued by the European Securities and Market Authority and by the European Banking Authority, the article deals with the legal qualification of blockchain-based crypto-assets under EU law. Focusing on crypto-assets that function as a) investment instruments (that is, investment tokens) and as b) electronic money (that is, payment tokens), the work outlines shortages and drawbacks in the applicability and enforcement of existing EU legal frameworks regulating investment activities and payment services. With such analysis, the article seeks to inform the ongoing debate within European institutions on the need of regulatory intervention in this area, and it points out pressing questions to be tackled by further research.}, keywords = {}, pubstate = {published}, tppubtype = {article} } Based on the guidelines issued by the European Securities and Market Authority and by the European Banking Authority, the article deals with the legal qualification of blockchain-based crypto-assets under EU law. Focusing on crypto-assets that function as a) investment instruments (that is, investment tokens) and as b) electronic money (that is, payment tokens), the work outlines shortages and drawbacks in the applicability and enforcement of existing EU legal frameworks regulating investment activities and payment services. With such analysis, the article seeks to inform the ongoing debate within European institutions on the need of regulatory intervention in this area, and it points out pressing questions to be tackled by further research.
|
Giannopoulou, A.
Algorithmic systems: the consent is in the detail? Internet Policy Review, 9 (1), 2020. @article{Giannopoulou2020,
title = {Algorithmic systems: the consent is in the detail?}, author = {Giannopoulou, A.}, url = {https://policyreview.info/node/1452/pdf}, doi = {10.14763/2020.1.1452}, year = {2020}, date = {2020-03-24}, journal = {Internet Policy Review}, volume = {9}, number = {1}, abstract = {Applications of algorithmically informed decisions are becoming entrenched in society, with data processing being their main process and ingredient. While these applications are progressively gaining momentum, established data protection and privacy rules have struggled to incorporate the particularities of data-intensive information societies. It is a truism to point out the resulting misalignment between algorithmic processing of personal data and the data protection regulatory frameworks that strive for meaningful control over personal data. However, the challenges to the (traditional) role and concept of consent are particularly manifest. This article examines the transformation of consent models in order to assess how the concept and the applied models of consent can be reconciled in order to correspond not only to the current regulatory landscapes but also to the exponential growth of algorithmic processing technologies. This particularly pressing area of safeguarding a basic aspect of individual control over personal data in the algorithmic era is interlinked with practical implementations of consent in the technology used and with adopted interpretations of the concept of consent, the scope of application of personal data, as well as the obligations enshrined in them. What makes consent effective as a data protection tool and how can we maintain its previous glory within the current technological challenges?}, keywords = {}, pubstate = {published}, tppubtype = {article} } Applications of algorithmically informed decisions are becoming entrenched in society, with data processing being their main process and ingredient. While these applications are progressively gaining momentum, established data protection and privacy rules have struggled to incorporate the particularities of data-intensive information societies. It is a truism to point out the resulting misalignment between algorithmic processing of personal data and the data protection regulatory frameworks that strive for meaningful control over personal data. However, the challenges to the (traditional) role and concept of consent are particularly manifest. This article examines the transformation of consent models in order to assess how the concept and the applied models of consent can be reconciled in order to correspond not only to the current regulatory landscapes but also to the exponential growth of algorithmic processing technologies. This particularly pressing area of safeguarding a basic aspect of individual control over personal data in the algorithmic era is interlinked with practical implementations of consent in the technology used and with adopted interpretations of the concept of consent, the scope of application of personal data, as well as the obligations enshrined in them. What makes consent effective as a data protection tool and how can we maintain its previous glory within the current technological challenges?
|
van Daalen, O.
Openingssalvo in nieuwe Nederlandse Crypto Wars? Mediaforum, 2019 (6), pp. 205, 2020, (Opinie). @article{vanDaalen2020,
title = {Openingssalvo in nieuwe Nederlandse Crypto Wars?}, author = {van Daalen, O.}, url = {https://www.ivir.nl/publicaties/download/Mediaforum_2019_6.pdf}, year = {2020}, date = {2020-01-07}, journal = {Mediaforum}, volume = {2019}, number = {6}, pages = {205}, note = {Opinie}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
Ausloos, J., Helberger, N., Leerssen, P., Vreese, C.H. de, Zarouali, B.
Platform ad archives: promises and pitfalls Internet Policy Review, 8 (4), 2019. @article{Leerssen2019b,
title = { Platform ad archives: promises and pitfalls}, author = {Leerssen, P. and Ausloos, J. and Zarouali, B. and Helberger, N. and Vreese, C.H. de}, url = {https://policyreview.info/articles/analysis/platform-ad-archives-promises-and-pitfalls}, doi = {10.14763/2019.4.1421}, year = {2019}, date = {2019-10-10}, journal = {Internet Policy Review}, volume = {8}, number = {4}, abstract = {This paper discusses the new phenomenon of platform ad archives. Over the past year, leading social media platforms have installed publicly accessible databases documenting their political advertisements, and several countries have moved to regulate them. If designed and implemented properly, ad archives can correct for structural informational asymmetries in the online advertising industry, and thereby improve accountability through litigation and through publicity. However, present implementations leave much to be desired. We discuss key criticisms, suggest several improvements and identify areas for future research and debate.}, keywords = {}, pubstate = {published}, tppubtype = {article} } This paper discusses the new phenomenon of platform ad archives. Over the past year, leading social media platforms have installed publicly accessible databases documenting their political advertisements, and several countries have moved to regulate them. If designed and implemented properly, ad archives can correct for structural informational asymmetries in the online advertising industry, and thereby improve accountability through litigation and through publicity. However, present implementations leave much to be desired. We discuss key criticisms, suggest several improvements and identify areas for future research and debate.
|
Bountouridis, D., Harambam, J., Makhortykh, M., van Hoboken, J.
RecSys'19: Proceedings of the 13th ACM Conference on Recommender Systems, pp. 69-77, 2019. @article{Harambam2019b,
title = {Designing for the Better by Taking Users into Account: A Qualitative Evaluation of User Control Mechanisms in (News) Recommender Systems}, author = {Harambam, J. and Bountouridis, D. and Makhortykh, M. and van Hoboken, J.}, url = {https://www.ivir.nl/publicaties/download/paper_recsys_19.pdf https://dl.acm.org/citation.cfm?id=3347014}, year = {2019}, date = {2019-09-19}, journal = {RecSys'19: Proceedings of the 13th ACM Conference on Recommender Systems}, pages = {69-77}, abstract = {Recommender systems (RS) are on the rise in many domains. While they offer great promises, they also raise concerns: lack of transparency, reduction of diversity, little to no user control. In this paper, we align with the normative turn in computer science which scrutinizes the ethical and societal implications of RS. We focus and elaborate on the concept of user control because that mitigates multiple problems at once. Taking the news industry as our domain, we conducted four focus groups, or moderated think-aloud sessions, with Dutch news readers (N=21) to systematically study how people evaluate different control mechanisms (at the input, process, and output phase) in a News Recommender Prototype (NRP). While these mechanisms are sometimes met with distrust about the actual control they offer, we found that an intelligible user profile (including reading history and flexible preferences settings), coupled with possibilities to influence the recommendation algorithms is highly valued, especially when these control mechanisms can be operated in relation to achieving personal goals. By bringing (future) users' perspectives to the fore, this paper contributes to a richer understanding of why and how to design for user control in recommender systems.}, keywords = {}, pubstate = {published}, tppubtype = {article} } Recommender systems (RS) are on the rise in many domains. While they offer great promises, they also raise concerns: lack of transparency, reduction of diversity, little to no user control. In this paper, we align with the normative turn in computer science which scrutinizes the ethical and societal implications of RS. We focus and elaborate on the concept of user control because that mitigates multiple problems at once. Taking the news industry as our domain, we conducted four focus groups, or moderated think-aloud sessions, with Dutch news readers (N=21) to systematically study how people evaluate different control mechanisms (at the input, process, and output phase) in a News Recommender Prototype (NRP). While these mechanisms are sometimes met with distrust about the actual control they offer, we found that an intelligible user profile (including reading history and flexible preferences settings), coupled with possibilities to influence the recommendation algorithms is highly valued, especially when these control mechanisms can be operated in relation to achieving personal goals. By bringing (future) users' perspectives to the fore, this paper contributes to a richer understanding of why and how to design for user control in recommender systems.
|
Fahy, R., Gorp, N. van, Nooren, P., van Eijk, N.
Should We Regulate Digital Platforms? A New Framework for Evaluating Policy Options Policy & Internet, 2018 , pp. 264-301, 2018. @article{Nooren2018,
title = {Should We Regulate Digital Platforms? A New Framework for Evaluating Policy Options}, author = {Nooren, P. and Gorp, N. van and van Eijk, N. and Fahy, R.}, url = {https://www.ivir.nl/publicaties/download/Policy_and_Internet_2018.pdf}, doi = {https://doi.org/10.1002/poi3.177}, year = {2018}, date = {2018-09-11}, journal = {Policy & Internet}, volume = {2018}, pages = {264-301}, abstract = {The economic and societal impact of digital platforms raises a number of questions for policymakers, including whether existing regulatory approaches and instruments are sufficient to promote and safeguard public interests. This article develops a practical framework that provides structure and guidance to policymakers who design policies for the digital economy. The framework differs from other approaches in taking the digital business models of platforms as the starting point for the analysis. The framework consists of three pillars, namely determining a platform's characteristics, relating these to public interests, and formulating policy options. The framework then invokes a return‐path analysis for assessing how the interventions affect the business model, whether it has the desired effect on public interests, and ensuring it has no undesired side‐effects on public interests. The framework puts forward two key messages for current discussions on digital platforms. First, one should look at the underlying characteristics of platforms rather than trying to understand digital platforms as a single category. Second, policymakers should explore existing rules and policy options, as they seem fit to deal with several characteristics of digital platforms in a time frame that matches the rapid development of platform technologies and business models.}, keywords = {}, pubstate = {published}, tppubtype = {article} } The economic and societal impact of digital platforms raises a number of questions for policymakers, including whether existing regulatory approaches and instruments are sufficient to promote and safeguard public interests. This article develops a practical framework that provides structure and guidance to policymakers who design policies for the digital economy. The framework differs from other approaches in taking the digital business models of platforms as the starting point for the analysis. The framework consists of three pillars, namely determining a platform's characteristics, relating these to public interests, and formulating policy options. The framework then invokes a return‐path analysis for assessing how the interventions affect the business model, whether it has the desired effect on public interests, and ensuring it has no undesired side‐effects on public interests. The framework puts forward two key messages for current discussions on digital platforms. First, one should look at the underlying characteristics of platforms rather than trying to understand digital platforms as a single category. Second, policymakers should explore existing rules and policy options, as they seem fit to deal with several characteristics of digital platforms in a time frame that matches the rapid development of platform technologies and business models.
|
McGonagle, T., Möller, C.
Europe's Internet Policies: The Challenge of Maintaining an Open Internet pp. 153-183, 2018, ISBN: 9781783208869, (Chapter in: Comparative Media Policy, Regulation and Governance in Europe: Unpacking the Policy Cycle, ed. L. d' Haenens, H. Sousa & J. Trappel, Bristol: Intellect, 2018.). @inbook{M\"{o}ller2018c,
title = {Europe's Internet Policies: The Challenge of Maintaining an Open Internet}, author = {M\"{o}ller, C. and McGonagle, T.}, isbn = {9781783208869}, year = {2018}, date = {2018-08-23}, pages = {153-183}, note = {Chapter in: Comparative Media Policy, Regulation and Governance in Europe: Unpacking the Policy Cycle, ed. L. d' Haenens, H. Sousa & J. Trappel, Bristol: Intellect, 2018.}, keywords = {}, pubstate = {published}, tppubtype = {inbook} } |
Poort, J., van Eijk, N.
Digital fixation: the law and economics of a fixed e-book price International Journal of Cultural Policy, 23 (4), pp. 464-481, 2017. @article{Poort2017,
title = {Digital fixation: the law and economics of a fixed e-book price}, author = {Poort, J. and van Eijk, N.}, url = {http://www.ivir.nl/publicaties/download/1586.pdf}, year = {2017}, date = {2017-04-28}, journal = {International Journal of Cultural Policy}, volume = {23}, number = {4}, pages = {464-481}, abstract = { Fifteen OECD countries, ten of which EU members, have regulation for fixing the price of printed books. At least eight of these have extended such regulation to e-books. This article investigates the cultural and economic arguments as well as the legal context concerning a fixed price for e-books and deals with the question of how the arguments for and against retail price maintenance for e-books should be weighted in the light of the evidence. It concludes that while the evidence in defence of a fixed price for printed books is slim at best, the case for a fixed price for e-books is weaker still while the legal acceptability within EU law is disputable. Against this background, introducing a fixed price for e-books is ill-advised. }, keywords = {}, pubstate = {published}, tppubtype = {article} }
Fifteen OECD countries, ten of which EU members, have regulation for fixing the price of printed books. At least eight of these have extended such regulation to e-books. This article investigates the cultural and economic arguments as well as the legal context concerning a fixed price for e-books and deals with the question of how the arguments for and against retail price maintenance for e-books should be weighted in the light of the evidence. It concludes that while the evidence in defence of a fixed price for printed books is slim at best, the case for a fixed price for e-books is weaker still while the legal acceptability within EU law is disputable. Against this background, introducing a fixed price for e-books is ill-advised.
|
Caspers, M.
The Commission’s proposed TDM exception: Who’s to benefit? 2016, visited: 15.09.2016, (Post on Kluwer Copyright Blog). @online{Caspers2016,
title = {The Commission’s proposed TDM exception: Who’s to benefit?}, author = {Caspers, M.}, url = {http://kluwercopyrightblog.com/2016/09/15/commissions-proposed-tdm-exception-whos-benefit/}, year = {2016}, date = {2016-09-15}, urldate = {2016-09-15}, note = {Post on Kluwer Copyright Blog}, keywords = {}, pubstate = {published}, tppubtype = {online} } |
van Eijk, N.
Bijdrage Rondetafelgesprek 11 februari 2016: Computercriminaliteit III 18.02.2016. @misc{,
title = {Bijdrage Rondetafelgesprek 11 februari 2016: Computercriminaliteit III}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/1726.pdf}, year = {2016}, date = {2016-02-18}, note = { Bijdrage aan Rondetafelgesprek 11 februari 2016, Computercriminaliteit III, Vaste commissie voor Veiligheid en Justitie. }, keywords = {}, pubstate = {published}, tppubtype = {presentation} } |
Caspers, M.
The role of Anne Frank’s diary and academic freedom for text & data mining 2016, visited: 20.01.2016, (Post on Kluwer Copyright Blog). @online{Caspers2016b,
title = {The role of Anne Frank’s diary and academic freedom for text & data mining}, author = {Caspers, M.}, url = {http://kluwercopyrightblog.com/2016/01/20/the-role-of-anne-franks-diary-and-academic-freedom-for-text-data-mining/}, year = {2016}, date = {2016-01-20}, urldate = {2016-01-20}, note = {Post on Kluwer Copyright Blog}, keywords = {}, pubstate = {published}, tppubtype = {online} } |
Fahy, R., Gelevert, H., Nooren, P., Stokking, H., Til, H. van, van Eijk, N.
Digital platforms: an analytical framework for identifying and evaluating policy options 2016, ( TNO-rapport 2015, R11271. Bijlage bij Kamerbrief over toekomstbestendige wetgeving. @techreport{Til2016,
title = {Digital platforms: an analytical framework for identifying and evaluating policy options}, author = {Til, H. van and Nooren, P. and Stokking, H. and Gelevert, H. and van Eijk, N. and Fahy, R.}, url = {http://www.ivir.nl/publicaties/download/1703.pdf}, year = {2016}, date = {2016-01-07}, abstract = { Kader om beleidsopties ten aanzien van 'digitale platforms' te analyseren.}, note = { TNO-rapport 2015, R11271. Bijlage bij Kamerbrief over toekomstbestendige wetgeving. }, keywords = {}, pubstate = {published}, tppubtype = {techreport} } Kader om beleidsopties ten aanzien van 'digitale platforms' te analyseren.
|
Fahy, R., Gelevert, H., Nooren, P., Stokking, H., Til, H. van, van Eijk, N.
Digitale Platforms: een analytisch kader voor het identificeren en evalueren van beleidsopties 2016. @techreport{Til2016b,
title = {Digitale Platforms: een analytisch kader voor het identificeren en evalueren van beleidsopties}, author = {Til, H. van and Nooren, P. and Stokking, H. and Gelevert, H. and van Eijk, N. and Fahy, R.}, url = {https://www.ivir.nl/publicaties/download/digitale-platforms_tno-1.pdf}, year = {2016}, date = {2016-01-07}, abstract = {Nederlandse samenvatting van rapport "Digital platforms: an analytical framework for identifying and evaluating policy options". }, keywords = {}, pubstate = {published}, tppubtype = {techreport} } Nederlandse samenvatting van rapport "Digital platforms: an analytical framework for identifying and evaluating policy options".
|
Fahy, R., van Eechoud, M.
Clinical Legal Education: A Review of the Literature 2015. @techreport{,
title = {Clinical Legal Education: A Review of the Literature}, author = {R.F. Fahy and M.M.M. van Eechoud}, url = {http://www.ivir.nl/publicaties/download/1630.pdf}, year = {2015}, date = {2015-09-29}, note = { iLINC (ICT Law Incubators Network), September 2015. }, keywords = {}, pubstate = {published}, tppubtype = {techreport} } |
Fahy, R., van Eechoud, M.
Establishing Links to Learning 2015. @techreport{,
title = {Establishing Links to Learning}, author = {R.F. Fahy and M.M.M. van Eechoud}, url = {http://www.ivir.nl/publicaties/download/1631.pdf}, year = {2015}, date = {2015-09-29}, note = { iLINC (ICT Law Incubators Network), Work Package 3, September 2015. }, keywords = {}, pubstate = {published}, tppubtype = {techreport} } |
van Eechoud, M.
Students going cross-border for start-ups 2015. @misc{,
title = {Students going cross-border for start-ups}, author = {M.M.M. van Eechoud}, url = {http://www.ivir.nl/publicaties/download/1632.pdf}, year = {2015}, date = {2015-09-29}, note = { iLINC Law Incubator Brief, 2015. }, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
Fahy, R., van Eechoud, M.
Establishing a Start-up Law Clinic in a Law School - 10 Practical Tips 2015. @misc{,
title = {Establishing a Start-up Law Clinic in a Law School - 10 Practical Tips}, author = {R.F. Fahy and M.M.M. van Eechoud}, url = {http://www.ivir.nl/publicaties/download/1684.pdf}, year = {2015}, date = {2015-09-29}, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
How to Start-Up A Legal Clinic: Key Considerations 2015. @article{,
title = {How to Start-Up A Legal Clinic: Key Considerations}, url = {https://www.ilincnetwork.eu/wp-content/uploads/2015/08/6-PB-How-to-Start-Up-a-Legal-Clinic-Key-Considerations.pdf}, year = {2015}, date = {2015-09-29}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
Fahy, R., van Eechoud, M.
Establishing a Start-up Law Clinic in Law School: A Practical Guide 2015. @techreport{,
title = {Establishing a Start-up Law Clinic in Law School: A Practical Guide}, author = {R.F. Fahy and M.M.M. van Eechoud}, url = {http://www.ivir.nl/publicaties/download/1686.pdf}, year = {2015}, date = {2015-09-29}, keywords = {}, pubstate = {published}, tppubtype = {techreport} } |
Arnbak, A.
Software is ook bij bitcoin altijd politiek 2015. @misc{,
title = {Software is ook bij bitcoin altijd politiek}, author = {A.M. Arnbak}, url = {https://www.axelarnbak.nl/2015/05/20/10e-column-financieele-dagblad-machtsstrijd-software-is-ook-bij-bitcoin-altijd-politiek/}, year = {2015}, date = {2015-06-05}, note = { Column in Het Financieele Dagblad van 20 mei 2015. }, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
Arnbak, A.
Any Colour You Like: the History (and Future?) of E.U. Communications Security Policy 14.10.2014, ( @misc{,
title = {Any Colour You Like: the History (and Future?) of E.U. Communications Security Policy}, author = {Arnbak, A.}, url = {http://www.ivir.nl/publicaties/download/1421.pdf}, year = {2014}, date = {2014-10-14}, abstract = { This descriptive legal analysis maps and evaluates a four decade legacy of communications security conceptualizations in E.U. law and policy, including four legislative proposals launched in 2013. As the first comprehensive historical analysis of its kind, the paper forwards a range of new scientific contributions in a time secure electronic communications are of historically unparalleled societal, economic and political relevance. Five communications security policy cycles are identified, and their ‘security’ definitions and scope are described. These cycles are: network and information security, data protection, telecommunications, encryption and cybercrime. An evaluation of the current E.U. ‘security’ conceptualizations illuminates the underlying values at stake, the protection offered in current regulations, the formulation of six research themes and an agenda for computer science, political theory and legal research. Despite constitutional values at stake such as privacy and communications freedom and a robust computer science literature, the paper observes a deep lack of conceptual clarity and coherence in E.U. security policymaking. It then concludes that the observed conceptual ambiguity has allowed powerful stakeholders to capture, or paint E.U. network and information security policies in any colour they like. }, note = { Draft paper prepared for IViR/Berkman Roundtable - 18 April 2014 - Last update July 28, 2014. }, keywords = {}, pubstate = {published}, tppubtype = {presentation} }
This descriptive legal analysis maps and evaluates a four decade legacy of communications security conceptualizations in E.U. law and policy, including four legislative proposals launched in 2013. As the first comprehensive historical analysis of its kind, the paper forwards a range of new scientific contributions in a time secure electronic communications are of historically unparalleled societal, economic and political relevance. Five communications security policy cycles are identified, and their ‘security’ definitions and scope are described. These cycles are: network and information security, data protection, telecommunications, encryption and cybercrime. An evaluation of the current E.U. ‘security’ conceptualizations illuminates the underlying values at stake, the protection offered in current regulations, the formulation of six research themes and an agenda for computer science, political theory and legal research. Despite constitutional values at stake such as privacy and communications freedom and a robust computer science literature, the paper observes a deep lack of conceptual clarity and coherence in E.U. security policymaking. It then concludes that the observed conceptual ambiguity has allowed powerful stakeholders to capture, or paint E.U. network and information security policies in any colour they like.
|
Arnbak, A.
Twijfels over cyberdiefstal Russische bende 2014. @misc{,
title = {Twijfels over cyberdiefstal Russische bende}, author = {A.M. Arnbak}, url = {http://www.ivir.nl/publicaties/download/FD_12082014.pdf}, year = {2014}, date = {2014-10-10}, journal = {Het Financieele Dagblad}, note = { Interview, 11 augustus 2014. }, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
Arnbak, A.
Cybersecurity dekmantel voor digitale boterberg 2014. @misc{,
title = {Cybersecurity dekmantel voor digitale boterberg}, author = {A.M. Arnbak}, url = {http://www.ivir.nl/publicaties/download/FD_29082014.pdf}, year = {2014}, date = {2014-10-10}, journal = {Het Financieele Dagblad}, note = { Column, 29 augustus 2014. }, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
Arnbak, A., Asghari, H., Eeten, M.J.G. van, van Eijk, N.
Security Collapse in the HTTPS Market Communications of the ACM, 57 (10), pp. 47-55., 2014, ( @article{,
title = {Security Collapse in the HTTPS Market}, author = {Asghari, H. and Eeten, M.J.G. van and Arnbak, A. and van Eijk, N.}, url = {http://www.ivir.nl/publicaties/download/CACM_2014_10.pdf}, year = {2014}, date = {2014-10-10}, journal = {Communications of the ACM}, volume = {57}, number = {10}, pages = {47-55.}, abstract = { HTTPS (Hypertext Transfer Protocol Secure) has evolved into the de facto standard for secure Web browsing. However, widely reported security incidents\textemdashsuch as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed\textemdashhave exposed systemic security vulnerabilities of HTTPS to a global audience. The Edward Snowden revelations\textemdashnotably around operation BULLRUN, MUSCULAR, and the lesser-known FLYING PIG program to query certificate metadata on a dragnet scale\textemdashhave driven the point home that HTTPS is both a major target of government hacking and eavesdropping, as well as an effective measure against dragnet content surveillance when Internet traffic traverses global networks. HTTPS, in short, is an absolutely critical but fundamentally flawed cybersecurity technology. To evaluate both legal and technological solutions to augment the security of HTTPS, our article argues that an understanding of the economic incentives of the stakeholders in the HTTPS ecosystem, most notably the CAs, is essential. We outlines the systemic vulnerabilities of HTTPS, maps the thriving market for certificates, and analyzes the suggested regulatory and technological solutions on both sides of the Atlantic. The findings show existing yet surprising market patterns and perverse incentives: not unlike the financial sector, the HTTPS market is full of information asymmetries and negative externalities, as a handful of CAs dominate the market and have become "too big to fail." Unfortunately, proposed E.U. legislation will reinforce systemic vulnerabilities, and the proposed technological solutions that mostly originate in the U.S. are far from being adopted at scale. The systemic vulnerabilities in this crucial technology are likely to persist for years to come.
HTTPS (Hypertext Transfer Protocol Secure) has evolved into the de facto standard for secure Web browsing. However, widely reported security incidents—such as DigiNotar's breach, Apple's #gotofail, and OpenSSL's Heartbleed—have exposed systemic security vulnerabilities of HTTPS to a global audience. The Edward Snowden revelations—notably around operation BULLRUN, MUSCULAR, and the lesser-known FLYING PIG program to query certificate metadata on a dragnet scale—have driven the point home that HTTPS is both a major target of government hacking and eavesdropping, as well as an effective measure against dragnet content surveillance when Internet traffic traverses global networks. HTTPS, in short, is an absolutely critical but fundamentally flawed cybersecurity technology.
To evaluate both legal and technological solutions to augment the security of HTTPS, our article argues that an understanding of the economic incentives of the stakeholders in the HTTPS ecosystem, most notably the CAs, is essential. We outlines the systemic vulnerabilities of HTTPS, maps the thriving market for certificates, and analyzes the suggested regulatory and technological solutions on both sides of the Atlantic. The findings show existing yet surprising market patterns and perverse incentives: not unlike the financial sector, the HTTPS market is full of information asymmetries and negative externalities, as a handful of CAs dominate the market and have become "too big to fail." Unfortunately, proposed E.U. legislation will reinforce systemic vulnerabilities, and the proposed technological solutions that mostly originate in the U.S. are far from being adopted at scale. The systemic vulnerabilities in this crucial technology are likely to persist for years to come. |
Arnbak, A.
Stortvloed regels moet beveiliging internet verbeteren 2014. @misc{,
title = {Stortvloed regels moet beveiliging internet verbeteren}, author = {A.M. Arnbak}, url = {http://www.ivir.nl/publicaties/download/FD_30092014.pdf}, year = {2014}, date = {2014-10-10}, journal = {Het Financieele Dagblad}, note = { Column, 30 september 2014. }, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
van Eijk, N.
The Internet and the State: A Survey of Key Developments Den Haag, 2014. @techreport{,
title = {The Internet and the State: A Survey of Key Developments}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/internet_state.pdf}, year = {2014}, date = {2014-08-19}, pages = {42.}, publisher = {Raad voor Maatschappelijke Ontwikkeling}, address = {Den Haag}, abstract = { This paper sets out to provide a concise overview of key developments in relation to Internet-based services that may have an impact on public policies and ultimately on the state itself. It is intended to support the Netherlands Council for Societal Development (\textit{Raad voor Maatschappelijke Ontwikkeling}, RMO) in preparing its advisory report to the Dutch government on how to deal with the impact of the Internet on society and the state. }, keywords = {}, pubstate = {published}, tppubtype = {techreport} }
This paper sets out to provide a concise overview of key developments in relation to Internet-based services that may have an impact on public policies and ultimately on the state itself. It is intended to support the Netherlands Council for Societal Development (Raad voor Maatschappelijke Ontwikkeling, RMO) in preparing its advisory report to the Dutch government on how to deal with the impact of the Internet on society and the state.
|
Irion, K.
2014. @misc{,
title = {The Governance of Network and Information Security in the European Union: The European Public-Private Partnership for Resilience (EP3R)}, author = {K. Irion}, url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2075916}, year = {2014}, date = {2014-01-02}, booktitle = {The Secure Information Society, Gaycken, Krueger, Nickolay (eds.)}, pages = {83-116}, publisher = {Springer}, address = {Berlin}, note = { prepublication }, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
Hugenholtz, P.
2013. @misc{,
title = {Doellijntechnologie}, author = {P.B. Hugenholtz}, url = {http://uitgeverijdewereld.nl/article/doellijntechnologie}, year = {2013}, date = {2013-12-06}, note = { In: Het Beste Idee van 2013, J. Baijens (red.), Tilburg: Uitgeverij De Wereld, 2013. }, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
Oostveen, M.
World Wide Web of Your Wide Web?: Juridische aspecten van zoekmachine-personalisatie Tijdschrift voor Internetrecht, (6), pp. 173-179, 2013. @article{,
title = {World Wide Web of Your Wide Web?: Juridische aspecten van zoekmachine-personalisatie}, author = {M.A.A. Oostveen}, url = {http://www.ivir.nl/publicaties/download/TvIR_2012.pdf}, year = {2013}, date = {2013-07-11}, journal = {Tijdschrift voor Internetrecht}, number = {6}, pages = {173-179}, abstract = {Het world wide web is een enorme bron van informatie. Iedere internetgebruiker maakt gebruik van zoekmachines om die informatie te kunnen vinden. Veel gebruikers weten echter niet dat zoekresultaten behorende bij een bepaalde zoekterm niet voor iedereen hetzelfde zijn. Dit personaliseren van zoekresultaten heeft aanzienlijke maatschappelijke en juridische gevolgen.}, keywords = {}, pubstate = {published}, tppubtype = {article} } Het world wide web is een enorme bron van informatie. Iedere internetgebruiker maakt gebruik van zoekmachines om die informatie te kunnen vinden. Veel gebruikers weten echter niet dat zoekresultaten behorende bij een bepaalde zoekterm niet voor iedereen hetzelfde zijn. Dit personaliseren van zoekresultaten heeft aanzienlijke maatschappelijke en juridische gevolgen.
|
Dommering, E.
NJB, (19), pp. 1266-1272, 2013. @article{,
title = {De door het recht bestuurde wereld is altijd virtueel geweest: Daar heeft de computer niets aan veranderd}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/NJB_2013_19.pdf}, year = {2013}, date = {2013-05-30}, journal = {NJB}, number = {19}, pages = {1266-1272}, abstract = { In dit artikel wordt de uitspraak van de Hoge Raad in de zaak \textit{RuneScape } beschouwd vanuit de invalshoek van het begrip informatie en de betekenis daarvan in maatschappelijke en juridische processen, die naar hun aard altijd virtuele elementen hebben bevat. De stelling van de auteur is dat informatietechnologie scherper zichtbaar heeft gemaakt dat dit zo is, zodat we met nieuwe ogen naar een oude wereld kijken. De scheidslijn die computercriminaliteit met begrippen als materieel en immaterieel goed en ‘gegevens’ en ‘goederen’ heeft getrokken, heeft tot een toenemende verwarring geleid die de rechtszekerheid schaadt. }, keywords = {}, pubstate = {published}, tppubtype = {article} }
In dit artikel wordt de uitspraak van de Hoge Raad in de zaak RuneScape beschouwd vanuit de invalshoek van het begrip informatie en de betekenis daarvan in maatschappelijke en juridische processen, die naar hun aard altijd virtuele elementen hebben bevat. De stelling van de auteur is dat informatietechnologie scherper zichtbaar heeft gemaakt dat dit zo is, zodat we met nieuwe ogen naar een oude wereld kijken. De scheidslijn die computercriminaliteit met begrippen als materieel en immaterieel goed en ‘gegevens’ en ‘goederen’ heeft getrokken, heeft tot een toenemende verwarring geleid die de rechtszekerheid schaadt.
|
Jasserand, C.A.
Hosting providers’ liability: Cour de Cassation puts an end to the notice and stay down rule Journal of Intellectual Property Law & Practice, (3), pp. 192-193, 2013. @article{,
title = {Hosting providers’ liability: Cour de Cassation puts an end to the notice and stay down rule}, author = {Jasserand, C.A.}, url = {http://jiplp.oxfordjournals.org/content/8/3/192.full?keytype=ref&ijkey=RYEiqCDHLNoOVhF}, year = {2013}, date = {2013-03-26}, journal = {Journal of Intellectual Property Law & Practice}, number = {3}, pages = {192-193}, abstract = { In applying the rules on hosting providers' liability, French lower courts have shifted from a notice and take down rule (provided by Article 14 of the E-Commerce Directive and Article 6 of the French implementing law) to a notice and stay down rule (created by the judges). This interpretation was confirmed in 2011 by the Paris Court of Appeal but overruled by the Cour de cassation on 12 July 2012. }, keywords = {}, pubstate = {published}, tppubtype = {article} }
In applying the rules on hosting providers' liability, French lower courts have shifted from a notice and take down rule (provided by Article 14 of the E-Commerce Directive and Article 6 of the French implementing law) to a notice and stay down rule (created by the judges). This interpretation was confirmed in 2011 by the Paris Court of Appeal but overruled by the Cour de cassation on 12 July 2012.
|
Dommering, E.
Het bestuur als de tovenaarsleerling van ICT NJB, (2), pp. 109-115, 2012. @article{,
title = {Het bestuur als de tovenaarsleerling van ICT}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/NJB_2012_2.pdf}, year = {2012}, date = {2012-01-17}, journal = {NJB}, number = {2}, pages = {109-115}, abstract = { De WRR heeft in het rapport i-Overheid een belangrijk onderwerp op de agenda gezet. Het Rathenau Instituut ging hem daarin in 2010 al voor. ICT is een instrument waarmee de nationale en Europese bestuurlijke bureaucratieën en organisaties in het middenveld steeds meer macht over de burgers krijgen, maar ook steeds meer privacyrisico's creëren. ICT blijkt geen 'neutraal' instrument, maar één dat een voortgaande verschuiving van de macht richting bestuur binnen de trias politica versterkt. De reactie van de regering is wat lauw gezien de urgentie van het probleem. }, keywords = {}, pubstate = {published}, tppubtype = {article} }
De WRR heeft in het rapport i-Overheid een belangrijk onderwerp op de agenda gezet. Het Rathenau Instituut ging hem daarin in 2010 al voor. ICT is een instrument waarmee de nationale en Europese bestuurlijke bureaucratieën en organisaties in het middenveld steeds meer macht over de burgers krijgen, maar ook steeds meer privacyrisico's creëren. ICT blijkt geen 'neutraal' instrument, maar één dat een voortgaande verschuiving van de macht richting bestuur binnen de trias politica versterkt. De reactie van de regering is wat lauw gezien de urgentie van het probleem.
|
Poort, J.
Assessing the value of flexibility in the Dutch office sector using real option analysis Rotterdam, 26.07.2011. @misc{,
title = {Assessing the value of flexibility in the Dutch office sector using real option analysis}, author = {J.P. Poort}, url = {http://www.ivir.nl/publicaties/download/13%20-%20Poort%20&%20Hoo%20-%20Assessing%20the%20Value%20of%20Flexibility%20in%20the%20Dutch%20Office%20Sector%20using%20Real%20Option%20Analysis.pdf}, year = {2011}, date = {2011-07-26}, publisher = {TU Delft}, address = {Rotterdam}, note = { Proceedings of conference "Building networks for a brighter future" }, keywords = {}, pubstate = {published}, tppubtype = {presentation} } |
Abel, W., Engers, T.M. van, Jasserand, C.A., van Eijk, N., Wiersma, C.
Moving Towards Balance: A study into duties of care on the Internet 2010. @techreport{,
title = {Moving Towards Balance: A study into duties of care on the Internet}, author = {Engers, T.M. van and Abel, W. and van Eijk, N. and Jasserand, C.A. and Wiersma, C.}, url = {http://www.ivir.nl/publicaties/download/Moving_Towards_Balance.pdf}, year = {2010}, date = {2010-11-09}, pages = {125}, publisher = {WODC / University of Amsterdam}, abstract = { Commissioned by the WODC (Research and Documentation Centre of the Ministry of Security and Justice), research has been conducted on duties of care on the Internet, more specifically from the perspective of Internet service providers. The situation in four countries - the Netherlands, the UK, Germany and France - was researched. The (self-)regulation with respect to five separate themes (Internet security and safety, child pornography, copyright, identity fraud and the trade in stolen goods through Internet platforms) was identified. In addition to this, a significant number of interviews with stakeholders were conducted. }, keywords = {}, pubstate = {published}, tppubtype = {techreport} }
Commissioned by the WODC (Research and Documentation Centre of the Ministry of Security and Justice), research has been conducted on duties of care on the Internet, more specifically from the perspective of Internet service providers. The situation in four countries - the Netherlands, the UK, Germany and France - was researched. The (self-)regulation with respect to five separate themes (Internet security and safety, child pornography, copyright, identity fraud and the trade in stolen goods through Internet platforms) was identified. In addition to this, a significant number of interviews with stakeholders were conducted.
|
Dommering, E.
Ik surf, dus ik ben (er geweest) 2010. @misc{,
title = {Ik surf, dus ik ben (er geweest)}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/Wie_is_u_Dommering_2010.pdf}, year = {2010}, date = {2010-06-10}, booktitle = {Wie is U? Identiteit, privacy en politiek, The Next Ten Years}, publisher = {XS4ALL}, keywords = {}, pubstate = {published}, tppubtype = {misc} } |
van Eijk, N.
De mythe van onbelemmerde toegang tot internet BTG Magazine, 2010 (70), pp. 28, 2010. @article{,
title = {De mythe van onbelemmerde toegang tot internet}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/BTG_magazine_70.pdf}, year = {2010}, date = {2010-05-20}, journal = {BTG Magazine}, volume = {2010}, number = {70}, pages = {28}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
van Eijk, N.
Zelfregulering: denken in alternatieven Computerrecht, (2), pp. 52, 2010. @article{,
title = {Zelfregulering: denken in alternatieven}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/computerrecht_2010_2.pdf}, year = {2010}, date = {2010-04-29}, journal = {Computerrecht}, number = {2}, pages = {52}, note = {Editorial.}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
Poort, J., van Eijk, N.
Legal, Economic and Cultural Aspects of File Sharing Communications & Strategies, (77), pp. 35-54, 2010. @article{,
title = {Legal, Economic and Cultural Aspects of File Sharing}, author = {N.A.N.M. van Eijk and J.P. Poort}, url = {http://www.ivir.nl/publicaties/download/Communications&Strategies_2010.pdf}, year = {2010}, date = {2010-04-16}, journal = {Communications & Strategies}, number = {77}, pages = {35-54}, abstract = {This contribution seeks to identify the short and long-term economic and cultural effects of file sharing on music, films and games, while taking into account the legal context and policy developments. The short-term implications examined concern direct costs and benefits to society, whereas the long-term impact concerns changes in the industry's business models as well as in cultural diversity and the accessibility of content. It observes that the proliferation of digital distribution networks combined with the availability of digital technology among consumers has broken the entertainment industries' control over the access to their products. Only part of the decline in music sales can be attributed to file sharing. Despite the losses for the music industry, the increased accessibility of culture renders the overall welfare effects of file sharing robustly positive. As a consequence the entertainment industries, particularly the music industry, have to explore new models to sustain their business.}, keywords = {}, pubstate = {published}, tppubtype = {article} } This contribution seeks to identify the short and long-term economic and cultural effects of file sharing on music, films and games, while taking into account the legal context and policy developments. The short-term implications examined concern direct costs and benefits to society, whereas the long-term impact concerns changes in the industry's business models as well as in cultural diversity and the accessibility of content. It observes that the proliferation of digital distribution networks combined with the availability of digital technology among consumers has broken the entertainment industries' control over the access to their products. Only part of the decline in music sales can be attributed to file sharing. Despite the losses for the music industry, the increased accessibility of culture renders the overall welfare effects of file sharing robustly positive. As a consequence the entertainment industries, particularly the music industry, have to explore new models to sustain their business.
|
van Eijk, N.
Technologieneutraliteit: 'Dit is geen frequentie' BTG Magazine, (68), pp. 14, 2010. @article{,
title = {Technologieneutraliteit: 'Dit is geen frequentie'}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/BTG_magazine_68.pdf}, year = {2010}, date = {2010-03-03}, journal = {BTG Magazine}, number = {68}, pages = { 14}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
Dommering, E.
De vorige en de volgende vijfentwintig jaar Computerrecht, (3), pp. 99, 2009. @article{,
title = {De vorige en de volgende vijfentwintig jaar}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/Computerrecht_2009_3.pdf}, year = {2009}, date = {2009-11-25}, journal = {Computerrecht}, number = {3}, pages = {99}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
Dommering, E.
'Internetheffing is voorstel uit vorig tijdperk' 2009. @periodical{,
title = {'Internetheffing is voorstel uit vorig tijdperk'}, author = {E.J. Dommering}, url = {http://www.ivir.nl/publicaties/download/Brinkman_commissie_NRC_Handelsblad.pdf}, year = {2009}, date = {2009-06-26}, journal = {NRC Handelsblad}, pages = {7}, note = { 23 juni 2009 }, keywords = {}, pubstate = {published}, tppubtype = {periodical} } |
van Hoboken, J.
International Journal of Communications Law & Policy, (13), pp. 2-21, 2009. @article{,
title = {Legal Space for Innovative Ordering. On the Need to Update Selection Intermediary Liability in the EU}, author = {J.V.J. van Hoboken}, url = {http://www.ivir.nl/publicaties/download/legal_space_for_innovative_ordering.pdf}, year = {2009}, date = {2009-03-30}, journal = {International Journal of Communications Law & Policy}, number = {13}, pages = {2-21}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
van Eijk, N.
File sharing, dat doen we toch allemaal? BTG Magazine, (65), pp. 14, 2009. @article{,
title = {File sharing, dat doen we toch allemaal?}, author = {N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/BTG_magazine_2009.pdf}, year = {2009}, date = {2009-03-18}, journal = {BTG Magazine}, number = {65}, pages = {14}, keywords = {}, pubstate = {published}, tppubtype = {article} } |
Helberger, N., van Eijk, N.
2009. @techreport{,
title = {Ups and downs. Economic and cultural effects of file sharing on music, film and games (authorised translation)}, author = {N. Helberger and N.A.N.M. van Eijk}, url = {http://www.ivir.nl/publicaties/download/Ups_And_Downs_authorised_translation.pdf}, year = {2009}, date = {2009-02-27}, note = { Onderzoek door een consortium van TNO Informatie- en Communicatietechnologie, SEO Economisch Onderzoek en het Instituut Voor Informatierecht, in opdracht van de ministeries van OCW, EZ en Justitie, februari 2009. }, keywords = {}, pubstate = {published}, tppubtype = {techreport} } |