India, the ‘Swing State’

2021 ◽  
pp. 183-199
Author(s):  
Kieron O’Hara

If India’s population and Internet penetration grow at current rates, it will make a large contribution to the growth of the Internet. It has a world-class technology establishment. The chapter considers several possible policy directions. Openness is looked at through experiments in Andhra Pradesh to provide digital government. The attempt by Jio Platforms to provide integrated services for mobile users exemplifies the Commercial Internet. The influence of the Modi government’s Hindutva ideology is considered in a discussion of paternalism, together with the Aadhaar ID platform, and the Indian Data Protection Bill. There is a lot of misinformation and conspiracy theory in India, but it has not created a spoiler model to export misinformation to other countries. Finally, the export of ID technology using open source software and open standards is considered as a potential future Indian influence on the global Internet.

Author(s):  
Julia Hörnle

Jurisdiction is the foundational concept for both national laws and international law as it provides the link between the sovereign government and its territory, and ultimately its people. The internet challenges this concept at its root: data travels across the internet without respecting political borders or territory. This book is about this Jurisdictional Challenge created by internet technologies. The Jurisdictional Challenge arises as civil disputes, criminal cases, and regulatory action span different countries, rising questions as to the international competence of courts, law enforcement, and regulators. From a technological standpoint, geography is largely irrelevant for online data flows and this raises the question of who governs “YouTubistan.” Services, communication, and interaction occur online between persons who may be located in different countries. Data is stored and processed online in data centres remote from the actual user, with cloud computing provided as a utility. Illegal acts such as hacking, identity theft and fraud, cyberespionage, propagation of terrorist propaganda, hate speech, defamation, revenge porn, and illegal marketplaces (such as Silkroad) may all be remotely targeted at a country, or simply create effects in many countries. Software applications (“apps”) developed by a software developer in one country are seamlessly downloaded by users on their mobile devices worldwide, without regard to applicable consumer protection, data protection, intellectual property, or media law. Therefore, the internet has created multi-facetted and complex challenges for the concept of jurisdiction and conflicts of law. Traditionally, jurisdiction in private law and jurisdiction in public law have belonged to different areas of law, namely private international law and (public) international law. The unique feature of this book is that it explores the notion of jurisdiction in different branches of “the” law. It analyses legislation and jurisprudence to extract how the concept of jurisdiction is applied in internet cases, taking a comparative law approach, focusing on EU, English, German, and US law. This synthesis and comparison of approaches across the board has produced new insights on how we should tackle the Jurisdictional Challenge. The first three chapters explain the Jurisdictional Challenge created by the internet and place this in the context of technology, sovereignty, territory, and media regulation. The following four chapters focus on public law aspects, namely criminal law and data protection jurisdiction. The next five chapters are about private law disputes, including cross-border B2C e-commerce, online privacy and defamation disputes, and internet intellectual property disputes. The final chapter harnesses the insights from the different areas of law examined.


2009 ◽  
pp. 347-369
Author(s):  
Karin Mika

This chapter provides an overview of law relating to online and Internet medical practice, data protection, and consumer information privacy. It provides a comprehensive overview of federal (HIPAA) and state privacy laws, concluding that both those legal resources leave gaps in consumer protection and provide no real penalties for violating the laws. The authors educate the readers to the legal and data protection problems consumers will encounter in purchasing medical and health services on the Internet. Furthermore, the authors recount some actual case studies and follow those with expert advice for those Internet consumers who wish to be not merely informed, but also safe. The authors not only educate the readers to the lack of protection afforded to them but also advocate throughout the chapter that the United States must enact more federal protection for the consumer in order to deter privacy violations and punish criminal, negligent, and wilful violations of personal consumer privacy.


2011 ◽  
pp. 1393-1399
Author(s):  
Huayin Si ◽  
Chang-Tsun Li

Traditional government structures are sometimes regarded as overly bulky. However, with the rapid expansion of interconnected computer networks and the progressive development of information technology (IT), it is now possible to exchange massive amounts of data at light speed over great distances. These infrastructures and technologies provide the opportunity for governments to transform themselves from huge monsters to compact and efficient organizations. Realizing the potential benefits of IT, as of summer 2004, 198 governments had started their e-government plans to construct digital government based on the Internet (West, 2004). One of the essential features of e-government is the transmission of confidential information via computer networks. Depending on the sensitivity of the information, the security of some information should be treated at the same level as national security. Although each e-government has its own networks, no government can say no to the Internet, because it would be a waste of resource. However, the Internet is an open environment; therefore, protecting data flowing on the Internet from attacks is a pressing e-government issue. All governments with such strategies have sought help from cryptographers and devoted huge amounts of both money and time to the development of specially designed information systems and advanced cryptosystems to strengthen information security. Unfortunately, cryptography is not adequate in some applications. As computing power keeps increasing and the techniques of cryptanalysis keep advancing, contemporary cryptosystems cannot and will not work forever. At the 24th Annual International Cryptology Conference (CRYPTO’04), MD5 and a series of related cryptosystems, which are currently in widespread use, were proved unreliable (Wang, Feng, Lai, & Yu, 2004). From the last decade, steganology—the technique for digitally hiding and detecting information – is attracting more attention. It is already regarded as a powerful complement to cryptology and a promising technique for ensuring e-national security. Unlike cryptology, which renders the encrypted information completely meaningless, steganology keeps the host media perceptually unchanged after hiding the secret information. This article will provide an in-depth explanation of the two components of steganology, namely steganography and steganalysis, and discuss their potential applications in the realm of e-national security.


Sign in / Sign up

Export Citation Format

Share Document