Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 3 SI
Page No. 6498 - 6509

Establishing Cyberspace Norms using Bright Internet Principles: In the Case of the Korean Legal System

Authors : Sang Pil Yoon and HunYeong Kwon

References

Aldesco, A.I., 2002. The demise of anonymity: A constitutional challenge to the convention on cybercrime. Loy. L.A. Ent. L. Rev., 23: 81-86.
Direct Link  |  

Balkin, J.M., 2004. Digital speech and democratic culture: A theory of freedom of expression for the information society. NYUL. Rev., 79: 1-4.
Direct Link  |  

Benedek, W. and M.C. Kettemann, 2014. Freedom of expression and the internet. Council of Europe, Strasbourg, France, Pages: 173.

Berners-Lee, T., 1996. WWW: Past, present and future. Comput., 29: 10-70.

Bernes-Lee, T., 2017. Three challenges for the web, according to its inventor. WWW Foundation, Francisco.

Bierstedt, R., 1970. The Social Order. McGraw-Hill Kogakusha, Tokyo, Pages: 208.

Brook, P., 2017. AIS bright internet ties with UN ITU. AIS, Tokyo.

Clarke, T. and D. Volz, 2017. Trump acknowledges Russia role in U.S. election hacking: Aide. Reuters, Canary Wharf, London, UK.

Cone, A., 2017. Website of Korea retail giant Lotte hacked in China. Unified Payments Interface, Maguindanao.

Crump, C., 2003. Data retention: Privacy, anonymity and accountability online. Stanford Law Rev., 56: 191-229.
Direct Link  |  

Cukier, K.N., 2005. Who will control the Internet-Washington battles the world. Foreign Aff., 84: 7-10.
Direct Link  |  

Dutton, W.H., A. Dopatka, M. Hills, G. Law and V. Nash, 2010. Freedom of connection freedom of expression. UNESCOs, Paris, France.

Emerson, T.I., 1970. The system of freedom of expression. Random House Trade, New York, USA.

Farrell, J. and P.J. Weiser, 2003. Modularity, vertical integration and open access policies: Towards a convergence of antitrust and regulation in the internt age. Harv. J.L. Tech., 17: 85-134.
Direct Link  |  

Ferdinand, P., 2000. The internet, democracy and democratization. Democratization, 7: 1-17.
Direct Link  |  

FireEye, 2016. Domestic cyber attacks and ransomware trends. FireEye, Milpitas, California, USA. https://www.fireeye.kr/company/press-releases/2016/fireeye-announces-trend-of-cyber-threats-to-south-korea.html.

Habermas, J., S. Lennox and F. Lennox, 1974. The public sphere: An encyclopedia article (1964). N. Ger. Critique, 3: 49-55.
CrossRef  |  Direct Link  |  

Hathaway, O.A., R. Crootof, P. Levitz, H. Nix and A. Nowlan et al., 2012. The law of cyber-attack. California Law Rev., 100: 817-885.
Direct Link  |  

Hun-Yeong, K., 2009. Conditions for legitimacy of internet regulation in Korea. Public Land Law Rev., 46: 207-207.

Jones, S.G., 1997. The internet and its social landscape. Virtual Culture Identity Commun. Cybersociety, 7: 22-35.

Kelion, L., 2017. Facebook artificial intelligence spots suicidal users. BBC News, London, UK.

Ku, R.S.R., 2000. Open Internet access and freedom of speech: A first amendment catch-22. Tul. L. Rev., 75: 88-127.
Direct Link  |  

Kurzweil, R., 2004. The Law of Accelerating Returns. In: Alan Turing: Life and Legacy of a Great Thinker, Christof, T. (Ed.), Springer, Berlin, Germany, ISBN: 978-3-642-05744-1, pp: 381-416.

Lee, J.K., 2015. Research framework for AIS grand vision of the bright ICT initiative. MIS. Q., 39: 3-12.
Direct Link  |  

Lee, J.K., 2016. Invited commentary: Reflections on ICT-enabled bright society research. Inf. Syst. Res., 27: 1-5.
Direct Link  |  

Leiner, B.M., V.G. Cerf, D.D. Clark, R.E. Kahn and L. Kleinrock et al., 1997. The past and future history of the internet. Commun. ACM., 40: 102-108.
CrossRef  |  Direct Link  |  

Lessig, L., 1996. The zones of cyberspace. Stan. L. Rev., 48: 1403-1403.
Direct Link  |  

Lessig, L., 1999. The limits in open code: Regulatory standards and the future of the net. Berkeley Tech. L. J., 14: 759-760.
Direct Link  |  

Mill, J.S., 1869. On liberty. Longmans, Green, Reader and Dyer, London, UK.

Moore, G.E., 1965. Cramming more components onto integrated circuits. Electronics, 38: 114-117.
Direct Link  |  

Nak-In, S., 2009. Internet and freedom of expression. J. Media Law Ethics Policy Res., 8: 104-104.

OECD., 2015. Data-Driven Innovation: Big Data for Growth and Well-Being. OECD Publishing, Tokyo, ISBN:9789264229358, Pages: 456.

Pagliery, J., 2017. Wikileaks claims to reveal how CIA hacks TVs and phones all over the world. CNN, Atlanta, Georgia, USA.

Raiyn, J., 2014. A survey of cyber attack detection strategies. Intl. J. Secur. Appl., 8: 247-247.

Schwartz, P.M., 1999. Privacy and democracy in cyberspace. Vand. L. Rev., 52: 1607-1653.
Direct Link  |  

Shapiro, A.L., 1999. The control revolution: How the Internet is putting individuals in charge and changing the world we know. Public Affairs, New York, USA.

Spinello, R.A., 2001. Code and moral values in cyberspace. Ethics Inf. Technol., 3: 137-150.
Direct Link  |  

Tae-Yeong, C. and L.J. Kyu, 2015. Bright Internet campaign spread to the world. Information Technology University, Lahore, Pakistan.

Tene, O. and J. Polonetsky, 2013. A theory of creepy: Technology, privacy and shifting social norms. Yale J.L. Tech., 16: 59-100.
Direct Link  |  

UN., 2017. E-government survey. United Nations, New York, USA.

WEF., 2016. Global risk report. World Economic Forum, Cologny, Switzerland.

Young, B., 2006. A study on the public sphere and promotion of public interest in cyberspace. J. Cybercommunication Acad. Soc., 17: 1-48.

Zeng, D., 2015. AI ethics: Science fiction meets technological reality. IEEE. Intell. Syst., 30: 1-5.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved