Hype oder Horror

2019 ◽  
Vol 10 (2) ◽  
pp. 137-154
Author(s):  
Cathrin Hein ◽  
Wanja Wellbrock ◽  
Christoph Hein

"Dieser Beitrag fasst den aktuellen Stand der rechtlichen Herausforderungen der Blockchain-Technologie kurz und prägnant zusammen. Blockchain stellt, ähnlich dem World Wide Web, eine Art Grundlagentechnologie dar, auf deren Basis neue Plattformen und Geschäftsmodelle geschaffen werden können. Es stellt sich jedoch die Frage, ob das deutsche Rechtssystem grundsätzlich in der Lage ist, die Herausforderungen, die eine solch dezentrale Technologie mit sich bringt, zu bewältigen. Insbesondere hinsichtlich strafbarer Handlungen oder der neuen Datenschutzgrundverordnung. Fraglich ist dabei, wie sich die derzeitigen Negativschlagzeilen (beispielsweise Silk Road) langfristig auf Kryptowährungen und infolgedessen wo- möglich auch auf die Blockchain-Technologie, nicht nur im Hinblick auf die rechtswidrigen Inhalte wie Kinderpornographie, auswirken. This article summarizes the current status of the legal challenges of blockchain technology. Similar to the World Wide Web, Blockchain represents a kind of basic technology on the basis of which new platforms and business models can be created. However, the question arises as to whether the German legal system is fundamentally capable of mastering the challenges posed by such a decentralized technology. In particular with regard to criminal offences or the new Basic Data Protection Ordinance. The question is how the current negative headlines (e. g. Silk Road) will affect crypto currencies in the long term and, as a result, blockchain technology, not only with regard to illegal content such as child pornography. "

2010 ◽  
Vol 143-144 ◽  
pp. 67-71 ◽  
Author(s):  
Dong Ping Li ◽  
Zhi Ming Qu

The networking approach to the World Wide Web is defined not only by the exploration of architecture, but also by the confirmed need for interrupts. Given the current status of authenticated archetypes, steganographers dubiously desire the analysis of scatter/gather I/O. the focus in this position paper is not on whether Moore's Law can be made concurrent, distributed, and pervasive, but rather on proposing an analysis of 32 bit architectures (Grange). It is concluded that, using probabilistic and interactive information and based on relational modality, the machine system and kernels are verified, which is widely used in the future.


Author(s):  
Wendy Smith

The Internet, particularly through the application of World Wide Web (WWW) technology, has proved to be a very attractive medium for publishing. However, the difficulties of finding appropriate information online and then of ensuring its long term accessibility have created problems for libraries. Practices that work for books and other printed materials do not always translate directly to online materials. The National Library of Australia's PANDORA project has been set up to develop policies and procedures for ensuring long term access to significant Australian publications which are accessible only in an online environment, and to establish and maintain a permanent archive ofthat material.


Author(s):  
Gianluigi Me

Internet child pornography (CP) is one of the most rapidly growing problems on the Net. In particular, pedophilia has been largely facilitated by the Internet, because it has enabled like-minded people to meet and fuel their sexual interests in children. In addition, the diffusion of pedophile material mainly occurs in almost-public fields like the World Wide Web, mailing lists, newsgroups, and bulletin boards, where anonymity and confidentiality obscure most of the communication parties and content causing difficulties for investigative analysis.


1999 ◽  
Vol 840 (1-2) ◽  
pp. 184-193 ◽  
Author(s):  
Chiara Cirelli ◽  
Paul J Shaw ◽  
Allan Rechtschaffen ◽  
Giulio Tononi

Logistics ◽  
2021 ◽  
Vol 5 (3) ◽  
pp. 55
Author(s):  
Bernard Aritua ◽  
Clemens Wagener ◽  
Norbert Wagener ◽  
Michał Adamczak

The primary research that underpins this paper seeks to explore the applications of blockchain technology on a specific international corridor and to draw policy implications for decision makers. To analyze the bottlenecks of operating on the New Silk Road and to identify opportunities for applying the blockchain technology on this corridor, a survey was conducted among main train operators and experts working on this route. These responses provide insight into the issues related to the adoption of blockchain technology from front-line actors. The top three challenges are lack of capacities, congestion at transshipment terminals, and slow border crossing. Through the application of blockchain technology, the operators are presented with opportunities for improved accuracy in the processing of data and information, higher reliability of information flows through failure-free transfer of information, and improved traceability of supply chains through irrevocable input of status information. Currently, 50% of the respondents have started to implement blockchain applications or have an actual interest to apply blockchain solutions. For a wider implementation of blockchain solutions, business models need to be developed allowing private and permissioned access that is accepted and open for parties involved. Policy makers should facilitate these digital innovations through flexible and harmonized legal regulations on an international level.


2009 ◽  
Vol 1 (4) ◽  
pp. 58-69 ◽  
Author(s):  
Chad M.S. Steel

While the supply of child pornography through the World Wide Web has been frequently speculated upon, the demand has not adequately been explored. Quantification and qualification of the demand provides forensic examiners a behavioral basis for determining the sophistication of individual seeking child pornography. Additionally, the research assists an examiner in searching for and presenting the evidence of child pornography browsing. The overall search engine demand for child pornography is bounded as being between .19 and .49%, depending on the inclusion of ambiguous phrases, with the top search for child pornography being “lolita bbs”. Unlike peer-to-peer networks, however, the top child pornography related query ranks only as the 198th most popular query overall. The queries on search engines appear to be decreasing as well, and the techniques employed are becoming less reliant direct links to content.


Sign in / Sign up

Export Citation Format

Share Document