Научная статья на тему 'COMPARATIVE ANALYSIS OF THE IMPACT OF SOCIAL NETWORKING SITES AND THE RELATING STATUTES'

COMPARATIVE ANALYSIS OF THE IMPACT OF SOCIAL NETWORKING SITES AND THE RELATING STATUTES Текст научной статьи по специальности «СМИ (медиа) и массовые коммуникации»

CC BY
19
5
i Надоели баннеры? Вы всегда можете отключить рекламу.
Журнал
Russian Law Journal
Scopus
ВАК
Ключевые слова
Case study / ANOVA / Facebook / Legal / Jaipur / Rajasthan / Students SNS / and Law

Аннотация научной статьи по СМИ (медиа) и массовым коммуникациям, автор научной работы — Bhanu Gangwal, Mahesh Koolwal

The Internet is a massive computer complex that has caused millions of deaths and served both as a force of protection and destruction. As all coins have two faces, another hand of Internet is that it had overwhelmed the population by making them authentic to such a base, and multitudinous fake malefactors were in control of the situation on a single face where everything from shopping to cooking to watching live sports events was made easier. In addition, a social networking community is a community which connects or adjoins one people or community with another people or community around the globe whose health and backgrounds are insolvable to distinguish. A healthy app like Facebook or LinkedIn allows a person to produce a particular runner that adjoins them to their given family or musketeers or likeinclined individualities and allows them to feel happy and proud. Advanced sweats to limit the internet usage for order and connecting on a following, ethical, educational, safety, and fresh base have redounded from the shocking shift in gregarious authority. These events have redounded in legal and limited sweats to reduce the pitfalls associated with this new normal, which include fraud, pornography, hacking, and hacking while druggies are alone, thinker property, public security, and stoner time alone. In this setting, the current exploration trouble is free to probe the use of social community networking websites and cyber security regulations in an applicable manner. In the present exploration bid, 100 repliers (scholars at universities in Jaipur, Rajasthan, India) who constantly use collaborative media gear for winning performance of their daytoday lives were the subject of exploratory and regular cave into slant for data compendium and psychoanalysis. The views of the repliers were statistically anatomized using SPSS's OneWay ANOVA, and the issues redounded in a negative response to the null thesis and a positive response to the alternate thesis, which states that-H1-There's a significant association between the use of social networking spots and legal violations. The current study can be attributed to some of the well-known cases that made captions. The purpose of this study was to establish a link between the position of the collaborative medium and the specifics or reason for the prevalence in exaggerated statutory businesses.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «COMPARATIVE ANALYSIS OF THE IMPACT OF SOCIAL NETWORKING SITES AND THE RELATING STATUTES»

A COMPARATIVE ANALYSIS OF THE IMPACT OF SOCIAL NETWORKING SITES AND THE RELATING STATUTES

BHANU GANGWAL1, PORF. MAHESH KOOLWAL2 1 Ph.D. Scholar, School of Law, JECRC University, Jaipur 2Dean. School of Law, JECRC University, Jaipur

bhanugangwal9328@gmail.com1 dean.law@jecrcu.edu.in2

ABSTRACT

The Internet is a massive computer complex that has caused millions of deaths and served both as a force of protection and destruction. As all coins have two faces, another hand of Internet is that it had overwhelmed the population by making them authentic to such a base, and multitudinous fake malefactors were in control of the situation on a single face where everything from shopping to cooking to watching live sports events was made easier. In addition, a social networking community is a community which connects or adjoins one people or community with another people or community around the globe whose health and backgrounds are insolvable to distinguish. A healthy app like Facebook or LinkedIn allows a person to produce a particular runner that adjoins them to their given family or musketeers or like- inclined individualities and allows them to feel happy and proud. Advanced sweats to limit the internet usage for order and connecting on a following, ethical, educational, safety, and fresh base have redounded from the shocking shift in gregarious authority. These events have redounded in legal and limited sweats to reduce the pitfalls associated with this new normal, which include fraud, pornography, hacking, and hacking while druggies are alone, thinker property, public security, and stoner time alone. In this setting, the current exploration trouble is free to probe the use of social community networking websites and cyber security regulations in an applicable manner. In the present exploration bid, 100 repliers (scholars at universities in Jaipur, Rajasthan, India) who constantly use collaborative media gear for winning performance of their day- to- day lives were the subject of exploratory and regular cave into slant fordata compendium and psychoanalysis. The views of the repliers were statistically anatomized using SPSS's One- Way ANOVA, and the issues redounded in a negative response to the null thesis and a positive response to the alternate thesis, which states that- H1- There's a significant association between the use of social networking spots and legal violations. The current study can be attributedto some of the well- known cases that made captions. The purpose of this study was to establish a linkbetween the position of the collaborative medium and the specifics or reason for the prevalence in exaggerated statutory businesses.

Key expressions- Case study, ANOVA, Facebook, Legal, Jaipur, Rajasthan, Students SNS, and Law

Table of Contents

1. Introduction

2. REVIEW OF LITERATURE

3. RESEARCH DESIGN / RESEARCH METHODS

4. RESULTS AND ANALYSIS

4.1 DEMOGRAPHIC DETAILS OF RESPONDENTS

4.2 : SOCIAL NETWORKING SITES: LEGAL IMPLICATIONS 4.3. HYPOTHESIS TESTING

5. CONCLUSION AND RECOMMENDATIONS

Table of Contents

1. Preface

2. Review of Literature

3. Research Design/ Research Methods

4. Results and Analysis

. Demographic Details of Respondents . Social Networking Sites- Legal Implications . Hypothesis Testing

5.Conclusions and Recommendation

1. INTRODUCTION:

Since the beginning of the new millennium, social networking websites have gained widespread acceptance. These websites have made it possible for a lot of people to express themselves, learn something new, and connect with old friends. However, it is unfortunate that these websites have been misused by a fake illegal group to serve their illegal purpose. Over the past few years, as the popular have come to rely on them more and more, people have been spending more and more time on such networks. The development of information technology has impacted the lives of people all over the world in the modern era. Each day brings a new challenge to the lawful world, as well as an expansion of the technical scope. With the widespread expansion of these skills, a new type of crime on the fake room has emerged, and it has also become a source of global concern for the future.

In the age of fake earth, as the use of computers became more common, skill levels also increased, and the term Cyber became more widely understood. The spread of information technology (IT) brought about the replicated space, in which everyone has equal access to the internet for order, data storage, analysis, and other purposes. by employing advanced skill. Like assaults on the tenable, these crimes target individuals, businesses, or the government. These kinds of attacks are not carried out on a real corpse but rather on an individual or business near one.

Over the previous two decades, skill has exploded into business, the community, and everyday life, transforming how individuals interact or communicate with each other. Individuals from all over the globe can interchange their ideas, photos or communicate in any possible manner with no time differentiation using a variety of devices, including computers, phones, and drugs. A single person's common photo, videotape, text message, or correspondence can go viral in a matter of seconds and be seen by hundreds or thousands of users. The ability to use the Internet has also emerged as a new standard for engaging in unacceptable behavior or threatening, irritating, or causing harm to others.

As a direct result of the globalization of skill, there is a negative severance flanked by the communal (norm, legislation) and ecological (processor ease of use) constraint of processor illegal performance. Even though computers and the internet have such a huge impact on daily life, only a small percentage of people are aware of what computers and the internet are all about. A lot of organized learning could elaborately discuss the fundamental idea of offense, fake offense, fake room and sense, types, individuality, and the primary mechanism of cyber offense, among other topics.

Since the previous era, the significant present of deity provided by the methodical relationships had led to the emergence of information skill and the communication technology that was connected to it. Because of its epic significance, this knowledge ought to be appropriately referred to as an InfoTech rebellion. By introducing unprecedented rates of order and communication via community medium, this enormous skill has rapidly twisted the lives of every individual group. The user's ability to freely express themselves across social media platforms has a global impact on the following dynamics. Improved efforts to restrict and organize the use of the internet for order and communication on a following, right, cultural, sanctuary, and additional basis have resulted from the extreme move in the outgoing authority. Anderson. H., 2009) The reach of social networking sites (SNSs) has captivated academic and industry researchers. The communal medium is merely a scheme and a channel for messages; This is not a website that you should visit. On the other hand, a communalnetwork is a shared message that uses the beginning of a conversation as its foundation for building relationships. In addition, social media serves as a bridge between people from all over the world, including subcultures and other groups who otherwise would not have access to financial resources or the space to express themselves. According to Levi L. (2012), social media include the following internet-based communication channels:

• Websites for social networks (such as Facebook, MySpace, Google Plus, and others)

• Websites for microblogging (such as Twitter, Weibo, Yammer, and others)

• Websites that distribute videos, such as Flickr, YouTube, and so on

• Website for macro blogging (such as Wordpress, Blogger, or Blogspot)

The rules that apply to podcasts and other social media platforms do not become "a uniform body of law; rather, they are a collection of a wide range of laws and guiding principles designed to exert pressure on the medium's workforce." In addition, a variety of regulations focus on a variety of mediums. However, there is a global system that must be appreciated by all media when performing their duties. This attempt to sabotage the internet has resulted in legal and limited efforts to mitigate the risks associated with this new average, which include hacking, pornography, pornographic content, privacy concerns for users, and threats to national security. According to Sachdeva A. (2007), the narrow problem of the media can typically be addressed in two ways: • Legal regulation; • Moral and moral directive in the form of strategy by a variety of constitutional establishments, such as vote charge.

This situation necessitated a study of the social networking habits of university students in Jaipur, Rajasthan, as well as their legal implications, which is why the current research endeavor has been developed.

2. REVIEW OF LITERATURE

To make the information relevant, extensive literature was reviewed. The following is an explanation of a few key observations and research gaps uncovered by literature citation:

A study conducted in 2010 by Budak. R.K. et al. investigate the utilization of social networking media or community media in the 2008 presidential election and resulted that the success of new media in government was attributed to Barrack Obama's conquest. The information highlighted that the credit goes to proper utilization of novel SNS sites viz Facebook, Twitter etc which had a significant impact on the vote-based procedure that followed. Both the biased plan and the movement economics improvement law show the implication of this. The researcher concluded that the oratory did not compete with the quantitative reality in an evaluation of the new medium and the 2008 Presidential vote.

When Flannery Z. et al. (2010) looked at how children used social media, they found that 93% of young people were active Internet users. "The study revealed that approximately 70% of users used the Internet on a daily basis." The academic community that was well-known for using text messaging had significantly increased the duration of medium multitasking. The academic requirement that young people be well-informed about the positive and negative aspects of communal media.

In similar study conducted in year 2011 by Ahn. K. evaluate the impact of communal media on the communal, educational, and experiential development of adolescents, pointing out that communal media cover a significant portion of everyday life interaction. The cram revealed that the mainstream media had exaggerated social capital, alone time, childhood safety, mental well-being, and academic success. "The academics address the prestigious concern and controversy that surround youth participation in these online communities and offer a tender opportunity for outlook research."

Alsenoy and others 2015) investigate the role of social media in business publicity and determine why Facebook's publicity opt-out plan did not meet the requirements for legal permission. The study exposed Facebook aggregated data from a growing variety of sources. The researcher calls on Facebook to develop a more comprehensive and in-depth profile of its users and to make a way for family members to opt out of using their profiles for third-party publicity purposes.

As a result, there was a lack of research on students' use of social networking sites and the statutory provinces:

• "There is a dearth of recent writing that addresses the issues governing social media behavior in India."

• From a communal media perspective, the accessible text fails to acknowledge the connection between lawmaking, narrowing the gap, and fairness release scheme.

• As a result, the purpose of the current investigation is to empirically investigate "Statutory Provinces and Usage of Social Networking Sites."

3. RESEARCH DESIGN / RESEARCH METHODS

RESEARCH DESIGN / RESEARCH METHODS

Objects of Research • "To clarify the legal frame for the use of social networking spots in India." • "To estimate the significance of scholars' point violations to the law."

Research H0's Hypothesis Ho: - There will be a significant rejection of association, accompanied by social networking websites operations and legal violations.

Design of Research Exploratory - Exploratory research design aims to determine the parameter and formulate the hypothesis. Analytical - To probe the parameter's absence from a select group of scholars from Jaipur, Rajasthan, India, universities.

Select group of Universe Group of students from Jaipur, Rajasthan, India, universities.

Design of the slice Stratified chance example method

Sample Size 100 college students

Ways for data collection A frame detect of the check is used to collect primary data. Secondary data collection is used to investigate information about legal counteraccusations, SNS companies, periodic news, computers, law books, journals, and ID, among other things.

Analytical tools For Airman Study The Cronbach's alpha and Kaiser Meyer's grade tests were used in the pilot study to measure predictability and dependability, respectively.

Statistical Analysis for hypothesis testing The Chi square test, the multivariate ANOVA, and the Students' t test were used to test hypotheses.

4. RESULTS AND ANALYSIS 4.1 DEMOGRAPHIC DETAILS OF RESPONDENTS

Segment concentrate on implies investigation of both quantitative and subjective parts of picked individual occupants. Work of art, age, sex, population size, and structure are all quantitative aspects. The precise factor of the investigation, such as the usage of social networking sites, is the qualitative aspect. The evaluation of the current research study's demographic variables can be found in table 1.

TABLE 1 DEMOGRAPHIC DETAILS OF STUDENTS AS RESPONDENTS

Sample characteristic Category No of Respondents ( N=100)

Gender Male 66

Female 34

Age Group (Years) 17-20 10

20-24 38

24-28 25

28-32 13

32 and above 14

Qualification Graduate Pursuing 49

Post Graduate Pursuing 15

Law Pursuing 12

Doctorate Pursuing 7

Others 17

Place of Social Media Usage Home 39

College Library 18

Friend's Place 30

Cyber Space 10

Others 3

Frequency of Social Networking Sites Usage (Per day) 1 -2 Hours 9

2-3Hours 25

3 -5Hours 10

5 - 7 Hours 39

Above 7 Hour 17

Type of Social Networking Sites Used the Most Facebook 42

Twitter 11

LinkedIn 9

You tube 31

Snapchat 7

CHART 1 DEMOGRAPHIC DETAIL OF STUDNETS AS RESPONDENTS

Demographic information for 100 respondents studying at universities in Jaipur, Rajasthan, India, can be gleaned from the table above. The gender of the respondents was looked at in the first parameter. Males made up 66 of the most respondents, while females made up the fewest.

The age range of students attending universities in Jaipur, Rajasthan, was evaluated in the subsequent parameter. The maximum number of respondents was 38, and the minimum number of respondents was 10, all of whom were over the age of 32. The remaining 12 respondents were between the ages of 17 and 20 and 28 were between the ages of 24 and 28. Another significant parameter was the respondents' qualifications, with a maximum of 49 respondents pursuing graduation and a minimum of 7 pursuing a doctorate. The remaining 15 respondents were pursuing law school and pot graduation, respectively. Others were given to the remaining 17 respondents.

The respondent's location of social media use was examined in the subsequent parameter. The minimum number of respondents used social media in other places not listed in the table, whereas the maximum number of respondents, 39, used it at home. The rest 18 respondents were involving web-based entertainment in school library though 10 respondents were involving it in digital bistro.

The frequency with which respondents used social networking sites was examined as another significant parameter. 39 of the respondents used social media for 5 to 7 hours per day, while 9 of the respondents only used it for 1 to 2 hours per day. The remaining 25 respondents used social media for three to five hours, while 17 used it for more than seven hours. The type of social media networking sites that respondents use the most was evaluated in the final demographic parameter. It should be noted that the maximum number of respondents was 42, while the minimum number of respondents was 7. Twitter was used by the remaining 11 respondents, while LinkedIn was used by 9 of them. The remaining 31 respondents primarily used YouTube.

4.2 : SOCIAL NETWORKING SITES: LEGAL IMPLICATIONS

The practices that respondents have observed on social media are the focus of the research in the first statement of analysis, or Statement 1. In frequency table 2 below, their responses are combined.

TABLE 2 RESPONDENTS PRACTICES OF USAGE OF SOCIAL MEDIA

Contents on social media Frequency Percentage (%)

"Defamation or Humiliation" 17 17%

"Vulgar language" 21 21%

"Showing of exclusivity of one's religion" 18 18%

"Exposing on government services" 15 15°%

"Sharing of personal problems" 5 5%

"Insulting advertisement" 11 11%

"Scams Fake accounts" 13 13%

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

CHART 2 RESPONDENTS PRACTICES OF USAGE OF SOCIAL MEDIA

I K \( I K I N RESPONDENTS HAVE SEEN ON SOCIAL MEDIA

21° o

1 lS°o

ll«?o li°/o L

J9o

L 1 L

1

Defamation Vulgar Showing of Exposing oil Sharing of Insulting Scams Fake

or language exclusivity of gov eminent personal advertisement accounts

Humiliation one's religion services problems

Contents on Social Media

Within the preceding table, no two respondents' replies were examined in terms of social media content and legal implications. Mostly respondents is 21%, and the minimum number of respondents is 5%, who believe that social media has a significant impact on the sharing of personal issues. The remaining 17% of respondents believe that most of the social media content is defamation or slander, and 15% believe that revealing services of the government has become a social media trend. Likewise, 11% respondents feel that online entertainment shows offending notices while 13% respondents accept that virtual entertainment has tricks counterfeit records.

The participation of in such practices, as mentioned earlier, is the subject of another statement 2. Respondent's reactions are kept in table 3 underneath:

TABLE 3 INVOLVEMENT OF SELECTED RESPONDENT IN ILLEGAL TACTICS

"Have you been involved in such practices as stated above" Frequency Percentage (%)

Yes 46 46%

No 54 54%

The participation of respondents in the social media practices is evaluated in Table No. 3 above. Maximum of 57% of respondents disagreed with the statement, and 43 agreed that they participated in such practices.

The following assertion of the present research endeavor is crucial which contributes to the statistical data findings of the study. Statement 3 details users' violations of the law while utilizing social networking sites. Frequency table 4 provides an analysis of the responses to this statement.

TABLE 4 LEGAL INFRINGEMENTS OF RESPONDENT'S BY USING SNS

S. No LEGAL INFRINGEMENTS OF RESPONDENT'S BY USING SNS Respondents Opinion

Very Often Often Neutral Rarely Never

1 "Pornography and Obscenity" 11 25 21 34 9

2 "Identity Theft" 9 37 13 29 12

3 "Defamation" 21 13 18 35 13

4 "Privacy Violation by Social Media" 11 17 15 18 39

5 "Cyber Bullying and Harassment" 8 38 16 27 11

The feedback of repliers regarding statute violation of social media platforms are examined in Table No. 4 over. According to the first statement, 22 repliers asserted that they constantly encounter profanity and pornography while utilizing these social media websites, while 30 repliers responded that they infrequently encounter similar content. In the alternate explanation 42 repliers feel that they constantly track down character thieveries via web- grounded entertainment though 22 repliersinfrequently track down similar effects on web. In the third statement, 24 repliers believe they find vilification on social media veritably constantly, while 29 repliers believe they infrequently find it online. In the fourth statement, 21 repliers believe that social media violates a person's sequestration, while nearly 33 believe that social media no way violates a person's security. According to the final statement, 33 respondents constantly encounter cyberbullying and importunity on social media, while 30 repliers infrequently encounter similar importunity. According to these statements, utmost study repliers have discovered legal violations while using social networking spots.:

4.3. HYPOTHESIS TESTING

In the current disquisition, we will consider the forenamed correlation parameters and the legal counteraccusations of repliers' use of social networking spots by scholars. The principles of the Likert scale will be statistically anatomized using one system ANOVA with SPSS, and the results are as follows.

ANOVA

GROUP Sum of Squares df Mean Square F P Value (Sig)

Social Media Usage by Students and Legal Implications Pornography and Obscenity Between Groups 1.472 5 .294 1.010 .023

Within Groups 58.610 5 .292

Total 60.082 5

Identity Theft Between Groups 5.322 5 1.064 3.746 .003

Within Groups 57.118 5 .284

Total 62.440 5

Defamation Between Groups .580 5 .116 .546 .071

Within Groups 42.710 5 .212

Total 43.290 5

Privacy Violation by Social- Media Between Groups 1.493 5 .299 .947 .051

Within Groups 63.364 5 .315

Total 64.858 5

Cyber Bullying and Harassment Between Groups 4.422 5 0.089 .785 .008

Within Groups 43.118 5 .354

Total 47.538 5

Using SPSS's One Way ANOVA, the responses were statistically analyzed. Because the P value was extremely high, the results confirmed the null hypothesis H0: - The cast off and exchange theory says that there isn't much of a connection between using social networking sites and breaking the law: H1: There is a significant association with the use of social networking sites, and its legal violations are acknowledged and demonstrated. It makes it abundantly clear that all the variables studied, including pornography and obscenity; slandering one's own identity; The infringement of security by virtual entertainment, digital torture, and provocations expands into new criminal jurisdictions.

5. CONCLUSION AND RECOMMENDATIONS

A variety of misdeeds on social media seriously disrupted India's society. Beginning with a variety of issues that are connected to communal media, India's regulatory and legislative gaps are revealed. The specifics of the incident and the role that the community media played in exaggerating it were found to be linked in this study.

The study's objective was to investigate the use of social networking sites and the legal implications of their use. Using SPSS's One Way ANOVA, the viewpoints of the respondents were

statistically analyzed. The obtained "p" value was extremely significant, indicating that the results

were negative for the null hypothesis and considered the rotate supposition, which stated that H1 -There is a significant association flanked by community network sites and its legal infringements. Two case studies provided solid support for the research.

According to the findings of the study, society must benefit from strict laws. Today, there is a serious problem with people's lack of awareness regarding the use of social media networks; oftentimes, individuals are excessively hesitant to make a legitimate move against the criminal who has carried out the offense.

The study concludes that laws enacted to punish cybercrime must be fully implemented and used. A lot of arguments have been made in favor of violating the freedom of language guaranteed by Article 19(1) of the establishment of India, which is unique to India's democratic organization, when interpreting Section 66A of the Information Technology Act of 2000. The incoherent and hazy provisions of some laws are supposed to be interpreted extensively and in accordance with societal norms.

The test of legitimate and limit issue demonstrates that the test presented by the collective medium is unlikely to be resolved solely through modification and expansion of realistic legal concept. There are two fundamentally distinct legal concerns that arise as a result of innovative social media communication methods. The idea of freedom of speech and expression in the online age initially stands in stark contrast to the offline world. Second, the web-based world underscores a shiny new system.

REFERENCES

[1] Ahn. K, Rajnathan W, (2013) 'Social media: how the net is closing in on cyber bullies' Ent. L.R. 263, 268

[2] Anderson H, (2009) 'A Privacy Wake-Up Call for Social Networking Sites?' 20 Entertainment Law Review 7, 245

[3] Beale J, (1983) 'The Jurisdiction of a Sovereign State' 36 Harv. L. Rev. 241

[4] Counts C & Martin C, (1996) 'Libel in Cyberspace: A Framework for Addressing Liability and Jurisdictional Issues in this New Frontier' 59 Albany Law Review

[5] Determann L & Sprague R(1999) , 'Intrusive Monitoring: Employment Privacy Expectations Are Reasonable in Europe, Destroyed in the United States' 26 Berkeley Tech. L.J. 979

[6] Budak R. K.and Kanan L, (2012) 'Social Media Privacy: A Dozen Myths and Facts' Stan. Tech. L. Rev. 712

[7] Elefant C, (2011) 'The "power" of social media: legal issues & best practices for utilities Engaging social media' Energy Law Journal, 112-113.

[8] Goodrum A, (2013), 'SNOPA and the PIPA: Do You Know What it means For You?' Hamline J. Pub. L. & Poly 131

[9] Flannery Z, (2010), 'Regulation of the Internet: An Impossible Task?' Galway Student L. Rev. 33-34

[10] Levi L, (2012), 'Social Media and the press' North Carolina Law Review 90-95

[11] Miller.S,(2003)'Prescriptive Jurisdiction over Internet Activity: The Need to Define and Establish the Boundaries of Cyber liberty' Indiana Journal of Global Legal Studies. 33-35

[12] Paslawsky A, (2012) 'The growth of social media norms and governments attempts at regulation' Fordham Int l L.J. 1485-1486

[13] Randall K, (1988) Universal jurisdiction under international law' Tex. L. Rev. 785

[14] Rylich J, (2008) 'Buzzword the (R)Evolution of The Web' MASARYK U. J.L. & Tech. 177

[15] Sachdeva A, (2007) 'International Jurisdiction in Cyberspace' C.T.L.R. 245

[16] Sardar S & Shah B(2012), Social Media, 'Censorship, and Control: Beyond SOPA, PIPA, and The Arab Spring' 15 Univ. of Pennsylvania Journal of Law and Social Change 577

[17] Strutin K, (2011) 'Social Media and the Vanishing Points of Ethical and Constitutional Boundaries' Pace L. Rev. 228

[18] Yntema H, (1996) 'The Comity Doctrine', 65 Mich. L. Rev. , 19 WEBLIOGRAPHY

[1] Ali M, 'Student arrested for Facebook post about Azam Khan' (The Hindu, 18 March 2015) <http://www.thehindu.com/news/national/other-states/bareilly-boy-arrested-for-attributing-objectionable-statement-to-azam-khan-in-facebook-post/article7007393.ece> accessed on 19 March 2015

[2] Bowcott O, 'Twitter joke trial: Paul Chambers wins high court appeal against conviction'(The Gaurdian, Friday 27 July 2012 10.09) <http://www.theguardian.com/law/2012/jul/27/twitter-joke-trial-high-court> accessed 18 December 2014

[3] Collins G, 'UK: Social Media - The IP Angle' (Mondaq, 17 November 2010) <http://www.mondaq.com/x/115844/Trademark/Social+Media+The+IP+Angle> accessed on 14 Nov. 2013

[4] Sharma P, 'Core Characteristics of Web 2.0 Service's (Tech Pluto Staff, 28 Nov. 2008)

<http://www.techpluto.com/web-20-services/ > accessed 23 February 2013

[5] Thomas T, 'Google, Facebook should share revenue with us: Airtel' (The Hindu Business Line, 20 July 2012) <http://www.thehindubusinessline.com/opinion/columns/thomas-k-thomas/google-facebook- should-share-revenue-with-us-airtel/article3662533.ece> accessed on 27 Sept. 2014

[6] White N, 'Net Neutrality and the Future of the Internet' (The Huffington Post, 03 May 2014) <www.huffingtonpost.com/nathan-white/net-neutrality_b_5256423.htm> accessed on 16 January 2015

[7] Wolfe J, 'What's the Impact of gTLDs on Social Media?' (Clickz, 11 September 2013) <www.clickz.com/clickz/column/2293903/whats-the-impact-of-gtlds-on-social-media> accessed 10 January 2015

[8] Woodward A, 'Viewpoint: Changing the way the internet is governed is risky' (BBC News, 14 June 2012) <www.bbc.com/news/technology-18440558> accessed on 15 January 2015

i Надоели баннеры? Вы всегда можете отключить рекламу.