Consumer Protection in an Age of Technological Transformation.


Eric S. Marlin
Bok Engelsk 2009 · Electronic books.
Omfang
1 online resource (130 pages)
Utgave
1st ed.
Opplysninger
Intro -- CONSUMER PROTECTION IN AN AGE OF TECHNOLOGICAL TRANSFORMATION -- CONSUMER PROTECTION IN AN AGE OF TECHNOLOGICAL TRANSFORMATION -- CONTENTS -- PREFACE -- Chapter 1 PROTECTING CONSUMERS IN THE NEXT TECH-ADE -- INTRODUCTION1 -- I. Empowered Consumers and the Changing Role of Consumer Protection -- Consumers as Content Producers -- The Landscape -- Challenges -- Consumers' Desire for Control -- The Landscape -- Challenges -- Consumers and Self-Protection -- The Landscape -- Challenges -- II. Products are Morphing -- Data Intensive Digital Products -- The Landscape -- Challenges -- Seller Restrictions on Use -- The Landscape -- Challenges -- Obsolescence and Convergence -- The Landscape -- Challenges -- III. Marketing and Advertising are Shifting -- The Landscape -- Challenges -- IV. New Payment Methods are Emerging -- The Landscape -- The Challenges -- V. Looking Forward - Responses to Consumer Protection Challenges -- Law Enforcement -- Scope of the FTC Act -- Combating Fraud -- Challenging Unfair Practices -- Consumer and Business Education -- Industry Self-Regulation -- Research and Policy Development -- VI. Conclusions -- End Notes -- Chapter 2 PROTECTING CHILDREN FROM ADULT CONTENT ON WIRELESS DEVICES -- BACKGROUND -- CONTROLLING ACCESS TO ADULT MATERIAL -- WHAT TO KNOW -- WHAT YOU CAN DO -- WIRELESS INDUSTRY GUIDELINES -- Chapter 3 ―SPAM‖: AN OVERVIEW OF ISSUES CONCERNING COMMERCIAL ELECTRONIC MAIL -- SUMMARY -- INTRODUCTION -- DEFINING SPAM -- AVOIDING AND REPORTING SPAM -- Foreign Spam -- THE FEDERAL CAN-SPAM ACT: SUMMARY OF MAJOR PROVISIONS -- Opt-In, Opt-Out, and a ―Do Not Email‖ Registry -- CAN-SPAM Act Provision -- FTC Implementation -- Labels -- CAN-SPAM Act Provision -- FTC Implementation -- Other Implementation Actions -- Wireless Spam -- "Bounty Hunter" Provision -- Definition of "Primary Purpose" -- Related Legislation.. - IV. Authentication and Other Technologies Can Help Counter Phishing and Other Forms of Malicious Spam -- A. Authentication Addresses a Key Flaw in Email's Protocol -- B. Industry Data Demonstrate the Promise of Domain-level Authentication -- C. Domain-level Authentication Improves the Effectiveness of Other Anti-spam Technologies -- V. Next Steps -- A. Stakeholders Should Heighten Collaboration Among Criminal Law Enforcement, Industry, and Other Stakeholders -- B. Stakeholders Should Intensify Efforts to Deploy Technological Tools -- C. Stakeholders Should Continue to Develop and Disseminate Effective Educational Materials for Consumers and Businesses -- APPENDIX A EMAIL ADDRESS HARVESTING AND THE EFFECTIVENESS OF ANTI-SPAM FILTERS: A REPORT BY THE FEDERAL TRADE COMMISSION'S DIVISION OF MARKETING PRACTICES FALL 2007 -- I. OVERVIEW -- II. Methodology -- III. Key Findings -- IV. Conclusion -- APPENDIX B AGENDA -- DAY 1-Wednesday, uly 11, 2007 -- DAY 2-Thursday, July 12, 2007 -- End Notes -- CHAPTER SOURCES -- INDEX -- Blank Page.. - Legal Actions Based on the CAN-SPAM Act -- FEDERAL TRADE COMMISSION ACTIVITY -- May 2008 Rules on CAN-SPAM Compliance -- December 2007 Staff Report on Malicious Spam and Phishing -- July 2007 Spam Summit -- December 2005 Assessment of the CAN-SPAM Act -- STATE LAWS REGULATING SPAM -- End Notes -- Chapter 4 TEXT AND MULTIMEDIA MESSAGING: EMERGING ISSUES FOR CONGRESS -- SUMMARY -- INTRODUCTION -- DEFINITIONS -- Short Message Service -- Enhanced and Multimedia Message Service -- E-mail-to-SMS Messaging -- Common Short Codes (CSCs) -- ISSUES FOR CONGRESS -- Applicability of CAN-SPAM Act to Unwanted Wireless Messages -- Inability of Consumers to Disable Text Messaging -- Carrier Blocking of Common Short Code Messages -- Deceptive and Misleading Common Short Code Programs -- Protecting Children from Inappropriate Content on Wireless Devices -- Mobile Cyberbullying -- Balancing User Privacy with ―Sunshine,‖ Open Government, and Freedom of Information Laws -- Using SMS to Support Law Enforcement and Emergency Response -- CONGRESSIONAL AND INDUSTRY RESPONSE TO SMS-RELATED ISSUES -- APPENDIX A. TEXT BLOCKING WITH SELECTED MAJOR CARRIERS - INFORMATION FOR CONSUMERS -- AT&amp -- T -- Verizon Wireless -- Sprint -- T-Mobile -- End Notes -- Chapter 5 SPAM SUMMIT: THE NEXT GENERATION OF THREATS AND SOLUTIONS -- EXECUTIVE SUMMARY -- I. The FTC's Role in the Fight against Fraudulent Spam and Phishing -- II. Spam Summit Overview -- III. Spam Increasingly is a Vector for Criminal Activity -- A. The Majority of Malicious Spam is Sent Using Computers Infected with Malware -- B. Spam Often is Used to Propagate Financial Cybercrime -- C. Cybercrime Causes Significant Harm -- D. Criminal Law Enforcement Can Play a Major Role -- E. Partnerships between the Public and Private Sectors Can Make Criminal Law Enforcement More Effective.
Emner
Sjanger
Dewey
ISBN
9781613242742
ISBN(galt)

Bibliotek som har denne