Journal of Information, Law and Technology

Articles

Vol. 2009, No. 3, December

Making Law Teaching Accessible and Inclusive
Contents Abstract 1. Introduction 2. Learner Characteristics 3. Practical Advice for Specific Needs 3.1 Users who have difficulty seeing things 3.2 Users who have difficulty hearing things 3.3 Users who have difficulty accessing text 3.4 Users...
Read preview Overview
Using E-Portfolios to Support PDP and Reflective Learning within the Law Curriculum: A Case Study
Contents Abstract 1. Introduction 2. HE Policy Context 3. Research Literature 4. Implementation 4.1 The software--Pebblepad 4.2 Academic Context 4.3 Workload 4.4 Recording Achievement--Progress Files 4.5 Employability 4.6 Reflection 4.7...
Read preview Overview
Virtual Seminars: Problem-Based Learning in Healthcare Law and Ethics
Contents Abstract 1. Introduction 2. Methodology 3. Results and Analysis 3.1 Greater flexibility of learning will be evident 3.2 Students will become more articulate and self-reflective, independent learners 3.3 A greater level of knowledge...
Read preview Overview
From Financial Exclusion to Online Financial Inclusion
Contents Abstract 1. Financial Exclusion 2. Empirical Findings of Financial exclusion 3. Financial Education 4. Conclusion References Endnotes 1. Financial exclusion Financial exclusion is a key term of this paper yet it is a nebulous and often...
Read preview Overview
An Examination of Clicker Technology Use in Legal Education
Contents Abstract 1. Introduction 1.1 What is a clicker? 1.2 Background: Lectures and Interaction 1.3 The Remit of the MMU LLB Study 2. Discussion 2.1 Potential Reasons for Clicker Use 2.2 Key General Themes 2.3 Factors Inhibiting Clicker...
Read preview Overview
The Role of New Technology in Improving Engagement among Law Students in Higher Education
Contents Abstract 1. Introduction 2. Developments in Educational Theory 3. The Student Community 4. Enhancing Learning through Technology 5. Leicester De Montfort Law School Research--The Student Experience 6. Conclusions and Recommendations 7. Unresolved...
Read preview Overview

Vol. 2009, No. 2, September

Licensing and Retained Funds Regulation of Internet Third Party Payment Providers in China
1. Introduction In years past, cash, paper-based negotiable instruments, and electronic funds transfers within a closed intranet of commercial banks as well as traditional payment, clearance and settlement systems, were the dominant methods of making...
Read preview Overview
The Networked Electorate: The Internet and the Quiet Democratic Revolution in Malaysia and Singapore
1. Introduction The flow of information to the electorate has traditionally depended mainly on newspapers, television and radio. Obviously, this state of affairs precludes the average man or woman on the street from reaching to the masses because...
Read preview Overview
Credit Card Fraud and the Law: A Critical Study of Malaysian Perspective
1. Introduction The most dramatic revolution in payment methods in the past few decades has, undoubtedly, been the plastic card. The credit card is a payment vehicle of convenience, which provides its holders with multifarious benefits. A credit...
Read preview Overview
Protecting Open Source Hardware?
Protection for software produced under the GPL is well known and shown to be successful, based upon copyright protection and licensing. It is not so obvious that the same model can be moved over to hardware, since historically engineers have been allowed...
Read preview Overview
Regulatory Compliance and Web Accessibility of UK Parliament Sites
1. Introduction After decades of discrimination and a digital divide between individuals with and without disabilities, several initiatives have been implemented in the past decade to allow these people greater access to web content. First, international...
Read preview Overview
Talking with Copyright Holders and Pirates: Grass Roots Voices concerning Chinese Copyright Piracy of U.S. IP Products
1. Introduction Since the end of World War II, as Tailor (1997) noted, the United States has been practicing trade liberalisation by shifting alternatively between multilateralism and unilateralism to promote strong protection of its intellectual...
Read preview Overview
DRM Roll Please: Is Digital Rights Management Legislation Unconstitutional in Canada?
1. Introduction Copyright law has become increasingly meaningful to the lives of ordinary citizens. It has also become an intensely heated political affair as Canada implements the WIPO Copyright Treat (1) ('WCT') and the WIPO Performances and Phonograms...
Read preview Overview
Information Sharing in E-Government Initiatives: Freedom of Information and Data Protection Issues concerning Local Government
1. Introduction The advent of new information and communication technologies (ICT) has opened the way for organisations around the world to establish new forms of communication with stakeholders. These new forms of communication are based upon electronic...
Read preview Overview

Vol. 2009, No. 1, June

Nigeria Tackles Advance Fee Fraud
'Why do some very clever people do this instead of a legitimate job, which may pay just as much but without the risk of prison? It's because I enjoy the power. The power of the burglar or the car thief or mugger in physical. The power of the con artist...
Read preview Overview
Online Child Safety from Sexual Abuse in India
1. Introduction The World Health Organization defines child sexual abuse as the involvement of a child in sexual activity that he or she does not fully comprehend, is unable to give informed consent to, or that violates the laws or social taboos...
Read preview Overview
Cyberforensics: Bridging the Law/technology Divide
1. Introduction It has been said that the ostrich that buries its head in the sand has a bigger problem than limited vision: its rear end becomes an enormous target. By analogy to contemporary computing contexts, this sentiment clamours for, at...
Read preview Overview
Cyber-Crimes and the Boundaries of Domestic Legal Responses: Case for an Inclusionary Framework for Africa
1. Introduction In the world of the twenty-first century, economic and political barriers are being lowered and technological advancements in communications and commerce are on the increase, affirming that ours is indeed a globalised world. The...
Read preview Overview
Cyber Crime in South Africa - Hacking, Cracking, and Other Unlawful Online Activities
1. Introduction Computer crime or commonly referred to as Cyber Crime or ICT Crime (van der Merwe, 2008, p.61) is a new type of criminal activity which started showing its ugly head in the early 90's as the Internet became a common place for online...
Read preview Overview
Admissibility of Electronic Evidence in Criminal Proceedings: An Outline of the South African Legal Position
1. Introduction to electronic evidence A few years ago the Internet, cyberspace, information and communication technology and criminal conduct in cyberspace were regarded as science fiction, but today these are the realities that face countries...
Read preview Overview
The 'Credit Scoring Pandemic' and the European Vaccine: Making Sense of EU Data Protection Legislation
1. Introduction This work is concerned with the practice shared by the credit industry of scoring consumers to underwrite lending decisions. Lenders, in fact, access credit reference databases managed by third party providers (the so-called 'Credit...
Read preview Overview
The European Liability and Responsibility of Providers of Online-Platforms Such as 'Second Life'
1. The problem at hand Online platforms such as 'Second Life' are quite a new phenomenon in the virtual world. Although a first version was made publicly available in 2003 and competitors such as 'Active World' released their platforms as early...
Read preview Overview
Animating Evidence: Computer Game Technology in the Courtroom
1. Introduction Inevitably the future will be increasingly digital. The continuing digital revolution has had an enormous impact on the way forensic evidence is collected, analysed and interpreted and has even led to the defining of new types of...
Read preview Overview
Privacy, Technology Law and Religions across Cultures
'Information law, including the law of privacy and of intellectual property, is especially likely to benefit from a coherent and comprehensive theory of information ethics ...' Dan L. Burk 'We are at the beginning of what I call intercultural...
Read preview Overview

Vol. 2008, No. 2, January

Electronic Litigation and the Strategic Value of Metadata during Legal Proceedings: Lex Informatica Conference, 21st-23rd May 2008 Pretoria, South Africa
Introduction It is estimated that in excess of 90% of all new documents are created, communicated and stored electronically (1), however a recent survey of South African litigation practitioners revealed that less than 25% of documents produced...
Read preview Overview
A Brief Excursus on the South African Online Alternative Dispute Resolution: Lex Informatica Conference, 21st-23rd May 2008 Pretoria, South Africa
1. Introduction to Alternative Dispute Resolution (ADR) Domain names have come to be recognised as property, an important part of the general body of intellectual property belonging to a company or individual, and conveying the brand by which that...
Read preview Overview
.Za Alternative Dispute Resolution Regulations: The First Few SAIIPL Decisions: Lex Informatica Conference, 21st-23rd May 2008 Pretoria, South Africa
1 South African Domain Name Administration & Zadna (1) South Africa's domain name system has grown very informally since the Internet made its first appearance in the country in 1980s when the .za domain-name space was administered by UNINET...
Read preview Overview
Editorial
Welcome to Special Second Issue of JILT. This edition is dedicated to Information Technology Law in South Africa. The papers published in this Issue is the conference proceedings of the Convention on Lex Informatica The Law on Electronic Communications,...
Read preview Overview
Considering the Innovative Application of Copyright in the Digital World: Lex Informatica Conference, 21st-23rd May 2008 Pretoria, South Africa
What is Digitisation? According to online information technology encyclopedia and learning centre WhatIs.com <http://whatis.techtarget.com/definition/0..did9_gci896692.00.html>: "Digitization is the process of converting information into...
Read preview Overview
Software and Business Method Patents: Lex Informatica Conference May 2008 Pretoria, South Africa
1. Introduction Before we talk about the possibility of patenting software, we need to know what we mean by 'software'. The word 'software' is often used to mean music, video or other content which is made available for purchase or use, as opposed...
Read preview Overview
The Challenges of IP Protection and Competition Enforcement: An Analysis of the Microsoft Decisions (US and EU) and Their Implications for South African IP and Competition Law: Lex Informatica Conference, 21st-23rd May 2008 Pretoria, South Africa
1. Introduction Microsoft Corporation's (Microsoft) pervasive influence in contemporary life, especially in the software industry, is beyond question. (1) A great majority of the papers presented at this conference were produced through various...
Read preview Overview
The Legal Effect of Input Errors in Automated Transactions: The South African Matrix: Lex Informatica Conference, 21st-23rd May 2008 Pretoria, South Africa
1. Introduction The overall objective of the ECT Act is to facilitate electronic commerce and to provide legal certainty to online traders and consumers alike. However, several contradictory and inconsistent legislative provisions have marred this...
Read preview Overview
Anti-Spam: A Comparative Appraisal of Canadian, European Union, and South African Regulatory Regimes: Lex Informatica Conference, 21st-23rd May 2008 Pretoria, South Africa
1. Introduction The use of electronic technology including e-mails, cellular phones, the Internet and cyberspace as contracting media in the modern commercial world is forever gaining momentum (Tang, 2007, p 42). The huge opportunities created by...
Read preview Overview
Electronic Contracts in South Africa - a Comparative Analysis: Lex Informatica Conference, 21st-23rd May 2008 Pretoria, South Africa
1. Introduction 1.1. South African Lex Informatica The Lex Informatica or as otherwise referred to as Cyber law is not a traditional source of law but rather a new hybrid-law encompassing various pieces of old and new telecommunications legislation...
Read preview Overview

Vol. 2008, No. 1, February

JILT 2008(1)-Editorial
We welcome readers to this issue of JILT published by a new editorial and publication team. Our next planned issue is on Information Technology Law in South Africa. Mizanur Rahaman has shouldered the greater part of the burden of preparation of...
Read preview Overview
The Development of E-Governance and the Issue of Digital Inclusion in Greece with Particular Regard to the Constitutional Right of E-Participation
1. General Introduction E-Government in the information age shows the way towards the transformation of public administration to an efficient and citizen-friendly service provider. In more specifically, if implemented properly, it can improve government...
Read preview Overview
RFID: Radio Frequency Identification or Real Frailty in Data Protection?
1. Introduction Privacy is a quintessential cornerstone of most democratic legal systems (Eschet, 2004). (1) Its importance as a theoretical, social, and philosophical value, have seen it come to be protected and upheld by some of the highest legal...
Read preview Overview
International Taxation of E-Commerce: Persistent Problems and Possible Developments
1. Introduction The relationships between taxation and technological developments have always been interactive, dynamic and complex. The current debate over taxation of e-commerce has, to some extent, been little more than a rehash of a similarly...
Read preview Overview
Intellectual Property and the Digital Divide
1. Introduction The literature in social sciences relating to the information and communication technologies (ICT) addresses aspects of the problem of digital divide. Unfortunately, very little has been written on the legal dimension of the same...
Read preview Overview
Converging Regulation for Convergent Media: An Overview of the Audiovisual Media Services Directive
1. The Impact of Convergence on the Broadcasting Industry Arguably the epicentre of today's converged environment is the broadband internet network. This has led to broadband delivered broadcasting, or IPTV as it is more commonly known, as well...
Read preview Overview
Directgov: The Right Direction for E-Government or a Missed Opportunity?
1. Introduction The development, availability and convergence of new information and communication technologies are continually enhancing the functionalities of tools such as the internet, email and mobile phones. The speed of access to and interaction...
Read preview Overview

November

The Law of Unintended Consequences-Embedded Business Models in IT Regulation
1 Introduction During the last quarter of a century, information technology (IT) has permeated most aspects of our daily lives. At the beginning of that period possession of a computer was still a rarity (1); today almost all businesses and the...
Read preview Overview
Improving Stability and Performance of an International Network of Free Access Legal Information Systems
Abstract High quality legal research must increasingly be global and comparative. This is hindered by the limited range of countries' laws covered by the centralized systems of the multinational commercial legal publishers and by the costs of accessing...
Read preview Overview
Web 2.0 and User-Generated Content: Legal Challenges in the New Frontier
Abstract The advent of Web 2.0 has enabled a host of new services and possibilities on the Internet. Among many new possibilities, users can easily upload online content that can be accessed, viewed and downloaded by other users around the globe....
Read preview Overview
Regulating Cyberstalking
Abstract Through the use of examples of cyber stalking the paper will consider the nature of regulation required in relation to this behaviour in cyberspace. The paper will consider the differences between off line and cyber stalking, and review...
Read preview Overview

January

Transactional Learning: Ardcalloch Sheriff Court Is Open for Business
Abstract This paper describes a work in progress within the evolving transactional learning environment at Glasgow Graduate School of Law and places this development within the wider context of our philosophy of professional legal education. The...
Read preview Overview
Reflective Learning, Skills Development and Careers Management Online-An Evaluation of a First Year Law Module
Abstract This paper describes the development and implementation of a first year undergraduate law module which has been re-designed to enable the embedding of Personal Development Planning (PDP) within the curriculum. The module has been delivered...
Read preview Overview
Critical Assessment of Using Wikis in Legal Education
Contents Abstract Introduction Tasks and learning outcomes for the use of a closed wiki in a pratical situation: a class on Cybercrime Reflection on the first experiences Working towards a multi-local and eventually open collaboration A case for collaboration Broader...
Read preview Overview
Simulations, Learning and the Metaverse: Changing Cultures in Legal Education
Contents Abstract 1. Introduction 2. Approaches to Simulations 3. Simulations in the GGSL, 2000-2006 4. Transactional Learning Environment (TLE) 2.0SIMPLE: SIMulated Professional LEarning. 5. Issues arising from TLE 2.0SIMPLE workshop 1 6. Project...
Read preview Overview
Legal E-Learning in Network Society
Abstract By now the idea that we live in a changed universe of information and changed relations of production as a consequence of the information technology revolution is part of the discourse of the sociology of information. There are a variety...
Read preview Overview
Delivering Blended Legal Learning by Open Source Methods
Abstract E-learning in legal education has increased substantially in recent years, leading to concerns that traditional teaching is being phased out. This paper proposes a blended approach, combining appropriate e-learning with traditional methods...
Read preview Overview
Legal LEGO: Model Based Computer Assisted Teaching in Evidence Courses
Contents Abstract 1. Introduction 1.1 On the role of evidence scholarship in legal education 1.2 Developing user requirements 2. Judex non calculat--naive physics in the law curriculum 3. Dead bodies in locked rooms 3.1 Model-based diagnois 3.2...
Read preview Overview
Summary Report on the UKCLE/BILETA VLE Project
Contents 1. Introduction 2. Background 3. Aims, methodology and dissemination Aims Methodology Dissemination 4. Project Themes Blended learning Collaborative learning Assessment 5. Conclusions 6. References 1. INTRODUCTION In February 2005...
Read preview Overview