RSS

Internet

  • Faking it to the Next Level: Are Deep Fakes Threatening Our Democratic Society?

    August 3, 2018

    On 31st July 2018, Facebook has posted an article in its Newsroom explaining how the platform is being used to manipulate the Facebook-community. 32 pages have been removed by Facebook and Instagram because they were found to be “involved in coordinated inauthentic behavior.” The manipulation of digital video and audio files, has become increasingly sophisticated and accessible. While the world is more or less accustomed to the idea of image manipulation through ‘photoshopping’, video or audio files that present people saying of doing things they never did nor said, pose a new kind of challenge to democracies and national security. Audio and video manipulation then enter a realm that is generally described as ‘deep fake’.

    Read more
  • ‘The Cyber Warfare Manual: A Detailed Assessment’

    ‘The Cyber Warfare Manual: A Detailed Assessment’

    December 4, 2014

    In the last 10 years cyber attacks on states, non-state actors and civilians have shown to be a powerful weapon to create serious havoc and disruption. Cyberwarfare could be considered as a serious threat to peace and security, leaving states, non-state actors and individuals in a vulnerable position due to a lacking legal framework to regulate this type of warfare. In order to tackle the problem of the missing framework applicable to cyberwarfare, in 2009 the CCDCOE, a NATO-accredited research and training facility in the field of cyber security, asked legal experts, practitioners and technical specialists to create a non-binding manual that would apply existing international law norms to cyberwarfare: the Cyberwarfare Manual.

    Read more
  • Protecting Children from Cybercrime: Online Child Grooming

    Protecting Children from Cybercrime: Online Child Grooming

    October 11, 2013

    In the Netherlands a massive case of internet child abuse has been reveiled this week. A 48 year old man has been arrested and is suspected of online child grooming and sexually abusing hundreds of girls. At least 11 girls stated they have had a meeting with the man and were sexually abused by him. The Dutch police has found 26.000 videos and 144.000 photographs during a raid on his house. The man has been active for eight years. What is online child grooming and what is the International and European policy on combating this form of cyber crime and internet abuse?

    Read more
  • Google Glasses and Privacy Rights in the Age of Wearable Computing

    Google Glasses and Privacy Rights in the Age of Wearable Computing

    August 1, 2013

    The Google glass, reality enhancing, wearable computing that allows you to be connected to the net hands free while on the move, is not yet available for consumers. But already privacy right watchdogs ask themselves whether the Google Glass infringes the privacy rights of citizens. Will this gadget entail the end of privacy? Should we be afraid of the lurking abuse and the possibility of a surveillance state?

    Read more
  • You’ve been Framed: Hyperlinking and European Copyright Law

    You’ve been Framed: Hyperlinking and European Copyright Law

    July 12, 2013

    One of the central features of the internet is the ability for each webpage to offer connections to other webpages in a click of a button. However in the copyright world there has been much discussion about website operators infringing copyright in a work by providing a link to another website containing that work. Can hyperlinking be a copyright infringement? What kind of linking is a communication to the public and the making of an authorized copy? In this blog I will discuss this issue in a European perspective with references to some recent cases of the European Court of Justice but first let me explain to you in short the relevant forms of hyperlinking.

    Read more
  • Education at a Distance : Massive Open Online Course (MOOC)

    Education at a Distance : Massive Open Online Course (MOOC)

    June 14, 2013

    Dutch universities have discovered the opportunities of Massive Open Online Course too. Recently, Leiden University prof. dr. Stefaan van den Bogaert has launched a MOOC about The Law of the European Union – an Introduction. Where the capacity of the largest courseroom in Leiden gets close to 1000 students, prof. Van den Bogaert has been able to reach and teach about 50.000 students all over the world!!

    Read more
  • Internet governance 2012: Who should control the Internet?

    June 1, 2012

    In the last twenty years, the Internet has had a tremendous impact on society and the term “Internet governance” was introduced. At first it was mainly used to describe the technical management of the Internet such as domain names and internet protocols. Nowadays governance refers to questions like “Do we all accept our responsibilities to safeguard the continued development of the Internet as a global, open and safe virtual environment? and Who sets the rules? In this blog I will give a few highlights of the current developments of internet governance on an International and (as well as on) an European level.

    Read more
  • George Clooney

    George Clooney, the Nuba, and SSP

    May 21, 2012

    Searching for the political situation in Sudan and the plight of the Nuba people in particular, Mr Clooney’s name popped up together with SSP. SSP, “a game-changing collaboration, combining commercial satellite imagery, academic analysis, and advocacy to promote human rights in Sudan and South Sudan and serve as an early warning system for impending crisis’ was founded in 2010 on the initiative of George Clooney and John Prendergast.

    Read more
  • Facebook and the individual in the global village

    December 16, 2010

    According to the Dutch Queen, there is a real danger that the Dutch are slowly alienating themselves from the local community and instead turn into isolated individuals. And the social networks on the internet, Facebook included, only accelerate this process.

    Read more
  • Privacy in the Clouds

    June 8, 2010

    In the last few years cloud computing technology has growing in popularity. From communications network to computing network it is the next step in the development of the function of the internet. Cloud computing technology uses the internet and central remote servers (the ’cloud’) to maintain data and applications.

    Read more