© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Virtual Worlds, Real Regulation – Richard Allan 22nd July 2008.

Slides:



Advertisements
Similar presentations
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 The Power of Public Information – Richard Allan Southampton, 16 th October.
Advertisements

THEORIES OF CONTEMPORARY PERFORMANCE AND MEDIA Speech Act Theory: Austin, Saltz, and Butler, Philosophy, Performance, and Politics.
4.01 Foundational knowledge of promotion
INTERNATIONAL RESEARCH What are the ethical challenges? Richard Jenkins University of Sheffield.
Copyright © 2014, 2010, 2007 Pearson Education, Inc. 1 Section 6.7 Dot Product.
Cyber Ethics Moral Values in Cyber Space The Good, the Bad, and the Electronic.
Moral Realism & the Challenge of Skepticism
By Evan James, Bric Harvey, and Bobby Cubba..  The first amendment of the Bill of Rights is very much like the rule 7 of the digital Bill of Rights.
Properties of Real Numbers. Closure Property Commutative Property.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 IP Subnetting: Part One Internetworking Fundamentals Instructor: Abdirahman I. Abdi.
Public Opinion Magruder Chapter Eight. The Formation of Public Opinion.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 FY09: Partner Development Funds Partner Incentive for SMB Market - APAC.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 ANNOUNCING Command Lookup Tool 2.0 Something new is happening!
Properties A property is something that is true for all situations.
Identity A legal perspective FIDIS WP2 workshop 2/3 december 2003
Ethics Lesson #3 Challenges to Ethics Much of this presentation comes from Questions that Matter, by Miller (Chapter 16)
© 2009 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Consumer Strategy Rick Huijbregts VP, Vertical Sales and Industry Solutions.
Mark a greenfield Join the Conversation Social Media in Higher Education.
Brocade Communities Subject Matter Expert Internet Business Solutions Team July 2011 © 2011 Brocade Communications Systems, Inc. CONFIDENTIAL—For Internal.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 OFED 1.x Process and Beyond Jeff Squyres.
Page 4 – 6 #7, 8, 10, 12, page 6 Challenge yourself.
Safe Use of Social Media Cadets – Air Force’s Future.
Internet Expertise for Researchers 101: Becoming a Critical Thinker Library Research Tool Kit Workshop May 6, 2013 Suzanne van den Hoogen, MLIS.
METAPHORS? The Seven (1) The Seven (1) Metaphors (2)(2) TV or (1) Telephone (2) POTENTIAL TV MEETS WEB (1) (2)(1) (2) METAPHORS? The Seven (1) The Seven.
Chapter 8 – Tuesday, June 30th Political Science 100.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 Intellectual Property in Canada Morgan N. Elliott Global Policy & Government Affairs.
Weekly Words Vocabulary for Students Definitions derived from Merriam Webster Unabridged Dictionary.
Disclaimer The views and opinions expressed in the following PowerPoint slides are those of the individual presenter and should not be attributed to Drug.
PowerPoint 2: Rights and Responsibilities in a Democracy.
Today’s PR Message. Times are Changing! …It’s important we ask ourselves the right questions in the current context.
Data, Security and Human Subjects Research Deborah Barnard, MS.
LEGAL AND ETHICAL ISSUES MLA EDUCATION DAY May 13, 2006.
Ethical Internet Use TECH 503 By A. Greenwell. Ethics in the Virtual World We all grow up learning the rules, regulations, and laws of the real world.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Public4/24/2008 EMS 1 How to Partner with the Primes Emily Martinez Stein Program Manager Global Supplier.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Add User - To My Account - To a Clients Account eDelivery Team Oct 8.
Lesson 2: Democratic Rights and Responsibilities
2.1 Properties and Operations
Netiquette and Online Safety By: H F. Netiquette Netiquette is the do’s and don’ts of the internet. Basically netiquette is the rules of online communication.
Internet Safety By Blair Number 1 Use a nickname not your real name.
Presented By: Buybulkwebtraffic Presented By: Buybulkwebtraffic
$$ Day 2 $$ In This Unit, You will be able to:  Understand & Explain the KISS rule of investing.  Examine the relationship between diversification and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Communicating over the Network Network Fundamentals – Chapter 2.
Political Philosophy: Introduction Political Philosophy can be boiled down to 2 principal questions: Political Philosophy can be boiled down to 2 principal.
Rohan Samarajiva Dhulikhel, July 2017
The Basic Properties of
Properties of Addition and Multiplication
Properties of Real Numbers
Properties of Real Numbers
Basic Rules Of ALGEBRA.
Definition Common Rules
Netiquette.
COMPUTING FUNDAMENTALS
Welcome to the 7th grade component of the Get Real comprehensive sex education classes. What do you remember from 6th grade?
Learning Area 1 Information And Communication Technology and Society
The Children’s bill of rights
Prof. Dr. Natali Helberger
Unit 1 – Foundations of Reason and Logic
Marketing in Today’s Economy
Netiquette M B.
1.3 Properties of Real Numbers

The more we talk about it, the more we understand it and the better we are at protecting and enjoying ourselves.
Learning and Leading for Transformative Technology Integration
Rules for Multiplication and Division

PowerPoint 2: Rights and Responsibilities in a Democracy
Properties of Real Numbers
Web Page Design and Development I Standards
Digital Privacy: Philosophical Underpinnings
Protecting Privacy with Federated AA
Presentation transcript:

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Virtual Worlds, Real Regulation – Richard Allan 22nd July 2008

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 2 Context – Q+A On the subject of virtual worlds and regulation I … A.… have a high degree of knowledge/expertise B.… know something but am by no means expert C.… know very little or nothing about it

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 3 Context - Results A.… have a high degree of knowledge/expertise B.… know something but am by no means expert C.… know nothing or very little

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 4 Seven Regulatory Challenges Morality Money Mere Conduit Property Privacy Propriety Politics

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 5 Morality

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 6 Money

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 7 Mere Conduit-edness

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 8 Property

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 9 Privacy The UK definition of personal data (Data Protection Act 1998): “personal data” means data which relate to a living individual who can be identified— (a) from those data, or (b) from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller, and includes any expression of opinion about the individual and any indication of the intentions of the data controller or any other person in respect of the individual;

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 10 Propriety

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 11 Politics and Mass Audiovisual Media

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 12 Proposition 1 – Virtual Worlds are not geography-free but need a regulatory “home”

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 13 Proposition 2 – Any form of currency will invite close control by governments

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 14 Proposition 3 – In-world characters have no ‘rights’ beyond in-world rules

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 15 Proposition 4 – People carry rights such as privacy with them into virtual worlds

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 16 Proposition 5 – Horizontal relationships change the nature of internet activity

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 17 Proposition 6 – We will all need to get used to living with alternative identities

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 18 Proposition 7 – Audiovisual media holds a ‘unique power’ for politicians

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 19 Seven Regulatory Propositions Geography (increasingly) Matters Money Matters (too much) Fictional People Don’t Matter (much) Real People’s Privacy Matters Horizontal Relationships Matter Multiple Identities Matter Mass Media Matters (politically)

© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID Advertisement