ROOM NO. 038
Full name: Title of the paper
10:45 - 12:15: Psychology of Cyberspace I: workshop on online presence and gaming (ch
Anna Felnhofer, Oswald D. Kothgassner, Leon
Beutl, Helmut Hlavacs & Ilse Kryspin-Exner: A
Gender Gap in Presence? Looking at men’s and
women’s experiences in virtual environments
Olivia Metcalf, Kristen Pammer: Physiological
arousal deficits in addicted gamers vary
according to sub-types of game addiction
Katerina Skarupova: Online Gaming Addiction:
What do we actually measure? Review of tools.
13:15 - 14:45: Psychology of Cyberspace II: Workshop on Self-disclosure and privacy onl
Wannes Heirman, Michel Walrave: Applying the
integrative model of organizational trust to
adolescents’ disclosure of personal information
to commercial websites
Robert Thomson, Naoya Ito: Socio-ecological
structure and online privacy concern: The role
of relational mobility
Daneback, K., Mansson, S-A., & Ross, M.W.:
Technological advancements and internet
sexuality: Does private access to the internet
influence online sexual behavior?
15:00 - 16:30: Psychology of Cyberspace III: Workshop on Health and Internet (chair: Da
Oswald D. Kothgassner, Anna Felnhofer, Lisa M.
Glenk, Anna K. Heinzle, Leon Beutl, Helmut
Hlavacs, Jasmine Gomm, Rupert Palme & Ilse
Kryspin-Exner: Cardiovascular and salivary
cortisol stress response and recovery to a
virtual and real life public speaking task
Iveta Fajnerová, Mabel Rodriguez, Kamil Vlček,
Cyril Brom, Zuzana Čeplová, Lucie Konrádová:
Development of virtual methods for diagnostic
and therapy of cognitive functions in
Dr Jo Bell: The Influence of the Internet in Self-
harming and Suicidal Behaviour in Young People
16:45 - 18:15: Psychology of Cyberspace IV: Workshop on Quality of life in Cyberspace a
Anna Bąk, Aleksandra Jaszczak, Karol Wolski:
Seniors’ attitudes towards using the internet –
data from polish qualitative research
Petr Lupac: Questioning the Digital Divide Core
Argument: The Internet and Quality of Life
Zdenek Metodej Zalis: Czech Safer Internet
ROOM NO. 038
Psychology of Cyberspace I: workshop on online presence and gaming (chair: David Smahel)
Up till now, only a few studies have been conducted considering gender differences in the sense of presence. Previous results
however indicate that men and women may indeed differ in the levels of presence they report when experiencing virtual
environments. Given the scarcity of findings thus far, the present study aimed at broadening the understanding of a possible
gender gap in presence experiences. Students (N=40) were randomly assigned to either an experimental group giving a
presentation in front of a virtual audience in a specifically designed virtual lecture hall or a control group imagining the
audience. Results demonstrate a considerable gender gap: Significant gender differences were found on all presence
subscales (Spatial Presence, Realness, Sense of Being There) except for Involvement. Men generally reported a higher sense
of spatial presence, more perceived realism and higher levels of the sense of actually being there than women. The inclusion
of social interaction anxiety as a covariate revealed a significant influence only on the presence factor Sense of Being There.
Other factors possibly accounting for the observed gender differences are discussed and implications for future research
considering gender as a mediating factor in presence experiences are given.
We investigated physiological and subjective levels of arousal in addicted and non-addicted gamers and whether these
arousal patterns differed by genre of game addiction. We also investigated the relationship between sensation-seeking and
addiction. Heart rate, blood pressure and skin conductance were recorded at baseline, during, and after gaming for 30
MMORPG and 30 first-person shooter (FPS) male gamers. Psychometric measures included the Arnett Inventory of Sensation-
Seeking and Addiction-Engagement Questionnaire. Comparisons were made between arousal at baseline and gaming and
between gaming and post-gaming levels. Addicted MMORPG gamers (n = 16) displayed significant decreases in cardiovascular
activity during gaming which increased significantly after gaming. Addicted FPS gamers (n = 13) had significant increases in
blood pressure during gaming which decreased significantly after gaming. Non-addicted MMORPG gamers had significant
decreases in heart rate during gaming whereas blood pressure for non-addicted MMORPG and FPS gamers increased
throughout. Electrodermal activity increased throughout for all participants. FPS addiction and sensation seeking approached
significant (p = .076) whereas there was no relationship between MMORPG addiction and sensation-seeking. We found
Recent online gaming research uses variety of definitions and tools to measure its more problematic forms, often referred to
as excessive online gaming or online gaming addiction. In total, 88 papers published between 2000 and 2012 that presented
survey data on excessive online play were reviewed focusing on scales measuring problematic use and addiction. When
possible the scales were tracked back to original articles and publications and the development process was examined. The
presentation will address topics of conceptualisation and operationalisation of excessive online gaming in quantitative
research studies aiming at describing how there concepts are contextualised an in what terms can cultural differences play a
role in how researchers deal with definitions and issues of validity of their tools.
Psychology of Cyberspace II: Workshop on Self-disclosure and privacy online (chair: David Smahel)
This study aims to offer further understanding of adolescents’ disclosure of personal information to commercial websites. We
propose a causal model, based on the tenets of the integrative model of organizational trust developed by Mayer, Davis and
Schoorman (1995), that examines the relationship between on the one hand adolescents’ perceived trustworthiness of a
specific commercial website and on the other hand their behavioral intention to disclose four categories of personal
information for online data collection purposes to the same website: identity data, geographical data, lifestyle information
and contact information. In order to test the proposed model of this study, 1,042 Flemish adolescents selected by means of a
stratified cluster sample design were involved in a survey study. A comprehensive set of hypotheses was formulated and
subsequently tested using Structural Equation Modeling (SEM). Our analyses indicate a good fit of the model to the data. As
predicted by the proposed model of this study, our analyses show that respondents’ level of perceived trustworthiness and
perceived risk of disclosure perform as mediating variables between on the one hand trust propensity, privacy violation
experience and website familiarity as independent variables in the model and on the other hand adolescents’ willingness to
Previous studies show that people in different countries greatly differ in online privacy concern. These differences are often
explained in terms of national culture differences. A weakness of this “explanation” is in its tautological nature; simply
equating what theorists claim “culture” prescribes, with people’s behavior. Addressing this limitation, we propose a novel
theoretical account from a socio-ecological/adaptationist perspective, focusing on the effect of a socio-ecological factor,
relational mobility. Relational mobility is the degree to which there are options regarding interpersonal relationships in any
given society or social context (Yuki et al., 2007). In high relational mobility societies (e.g. USA) where individuals inhabit a
relatively open relational market, strategic self-presentation signaling high social value is adaptive; this leads to relational
success. In low relational mobility societies (e.g. Japan) where relationships are relatively stable, this is not as important (c.f.
Falk et al., 2009). Therefore privacy (the control of information about oneself) should be of greater concern in high, rather
than low, relational mobility societies. We tested this hypothesis by comparing Facebook users’ privacy concern across 18
The aim of this study was to investigate if demographic characteristics and sexual behavior online and offline were associated
with private respectively non-private access to the internet in a web sample of people who use the internet for sexual
purposes. A total of 1,913 respondents completed an online questionnaire about internet sexuality and 1,614 reported to use
the internet for sexual purposes. The majority of these respondents reported having access to an internet connected
computer no one else had access to (62% women and 70% men). The results showed that it is possible to differentiate
between those who have access to an internet connected computer no one else has access to and those who have shared
access to an internet connected computer. Not only did they differ in demographic characteristics, but also in the sexual
activities they engaged in on the internet. Different patterns were found for women and men. For example, men who had
private access to internet connected computers were more likely than those who had shared access to seek information
about sexual issues. Thus, having access to internet computers no one else has access to may promote sexual knowledge and
health for men. The results of this study along with the technological development implies that in future research attention
Psychology of Cyberspace III: Workshop on Health and Internet (chair: David Smahel)
When human beings are confronted with a stressful situation or event a series of adaptive physiological and behavioural
responses are initiated in effort to reduce the potentially negative consequences of the stressor. Unfortunately there is a lack
of research regarding differences between real life stressors or virtual stressors.
Two studies were conducted to compare stress response and recovery to a public speaking in front of an audience of 20
virtual or physically present people using a multi-method approach for stress assessment.
The first study (N=50) investigated the effect of the Big Five personality traits (NEO-FFI; Costa & McCrae,1992) and presence
(IPQ; Schubert et al., 2001) on subjective anxiety measures (STAI; Spielberger et al., 2005;PRCS-12; Hook et al., 2008) and
cardiovascular stress response to a 5minute virtual public speaking task. The second study (N=47) focus on the effect of
gender and stress recovery in virtual stress provocation in front of a virtual and a real life audience assessed by subjective
anxiety measures, heart rate and heart rate variability and salivary cortisol.
The studies show a comparable stress provocation during virtual and real life public speaking tasks, but reveal differences
The aim of our project is to design methods useful in both clinical research and practice. The study is focused on
schizophrenia patients which cognitive functions are affected by psychotic attacks. Cognitive deficit in psychotic illness is very
complex and variable. Various methods mainly paper-pencil tests are used to assess this deficit. To improve ecologic validity,
we have developed a screening virtual test of spatial cognition called The Hidden Goal Task using the game engine Unreal
Tournament 2004. The subject needs to search for a hidden target position in a circular arena and to remember it using
visible orientation marks. After short training the target position is changed for each three trials to test the flexibility of
learning and working memory function. Cognitive deficit affects the social outcome of psychotic patients; therefore
remediation of cognitive functions becomes equally important as their assessment. Currently, many virtual remediation
methods are offered. However, remediation of cognitive deficit in psychotic illness demands individual long-term approach.
To achieve this we create online cognitive remediation interface. Patients can train their abilities in various flash games
Self-harm and suicidal behaviour among young people is now a major public health issue in Europe and beyond. Suicide
consistently ranks as one of the leading causes of death for young people between 15 – 24 years of age in most Westernised
countries. The Internet plays an increasingly important role in the lives, treatment, and recovery of self-harming and suicidal
young people. The proliferation of message boards, Web sites, blogs, and other virtual socializing venues dedicated to the
issue of self-harm and suicide, which have come into existence over the last decade, highlight the critical place of the Internet
for effective intervention. However, very little is known about how Internet use influences self-harming and suicidal
behaviour in young people and current literature presents a picture of contradictions.
Psychology of Cyberspace IV: Workshop on Quality of life in Cyberspace and safer Internet (chair: David
Internet usage in the group of elderly people is a significant issue not only for the psychology of the internet but also for the
applied psychology. Creating a theory capable of explaining people's engagement in online activities appears to be one of the
most important issues. The most commonly used theoretical approaches are Theory of Planned Behavior and Technology
Acceptance Model. However, almost all studies conducted in this area explore young peoples' behavior. Focusing on elderly
internet users seems to be a valuable step towards more complex knowledge, especially in the light of digital divide in this
The aim of this report is to present the results of a pilot study on Polish seniors’ attitudes regarding internet usage. Using
Focus Group Interview method, 17 people have been surveyed. Empirical analysis of gathered material allowed to create a
preliminary list of attitudes, that were most common in the participants’ statements, and to isolate categories, which
participants’ opinions referred to. These opinions related to: seniors' attitude towards computer and the internet, process of
gaining computer skills, reasons for using computer and the internet, benefits connected with theseset of assumptions.of new
Since its beginning almost twenty years ago, the digital divide research has been based on a limited activities, the role One
of the most developed explicit elaborations of this set is van Dijk’s core argument, worked up into four stage model of the
digital divide. Even today, however, some relations in this model lack sufficient empirical grounding, thus weakening the very
validity of the core argument. Surprisingly, the thorough empirical coverage of the relation between (quality of) Internet use
and quality of life is still scarce and weak. By analyzing declared changes in selected life dimensions (health, career, social life,
shopping, leisure, etc.), the author tries to add to discussion about the validity of digital divide thesis. The source of data is the
“Actor 12-2011” survey of the Department of Sociology, Faculty of Arts, Charles University in Prague.
Narodni centrum bezpecnejsiho internetu (NCBI) is a Czech NGO which coordinates the last project of the Safer Internet
program of the EC. The project is running in the Czech Republic since 2006. What are the lessons learnt? What the NCBI is
doing now to make the Internet safer? What are the Czech stakeholders and what is the game about? What is the state-of-
the-art of the dialog between generations to make the Internet safer?
Important directives have been adopted by The EC recently setting up a legal frame of better consumer protection and also
legislation against sexual abuse and sexual exploitation of children. New data protection rules are under preparation - what
can we expect in this field?
Finally - the future of the program is being discussed now in the frame of the Connecting Europe Facility strategy 2014 - 2020.
What are the tasks and expectations?
The paper is going to answer the above questions presenting some experiences of the NCBI to make the picture a bit clearer.
ROOM NO. 025
Full name: Title of the paper Abstract
9:00 – 10:30: Workshop on social networks as a tool for analyses (chair: Kurt Daneback)
Saskia Stäudtner, Alexander Bohn, Nicola Online social networking sites supply a wealth of applications, offering new possibilities for self-expression and communication
Döring: Opinion Leadership 2.0: Identifying for opinion leaders. They are favoring effects of word-of-mouth and are used for marketing purposes. Especially the social
Characteristics of German Facebook Users networking site Facebook might be a good platform for opinion leaders because several possibilities like linking to brands
enable them to pass on information.
Aim of the presented study was to analyze opinion leadership on Facebook. Opinion leaders were identified using a self-report
instrument. Differences between three groups of opinion leaders regarding the frequency of usage and the influence on other
users involved were tested.
As part of a larger field study on German Facebook users, data were collected with an online questionnaire. The ad-hoc sample
was recruited by spreading the link in Facebook groups and forums. N=463 valid questionnaires were included in the analysis.
Results showed that high opinion leaders on Facebook use the platform more frequently than medium and low opinion leaders.
Furthermore, we showed that participants with a higher usage have more influence on other users than participants with less
With the emergence of smarthphones and social networks, networking sites has hardly been explored yet. place on short
Rocío Abascal-Mena, Rose Lema and Erick López- Identifying characteristics of opinion leaders in online sociala very large proportion of communication takes With the results of
Ornelas: Political persuasion in social networks: texts. This type of communication, often anonymous, has allowed a new public participation in political issues.
an analysis of the tweets before, during and
after the 2012 mexican presidential elections Thus, social networks have become an important part of the social phenomena, its development and outcome. The ability to
communicate in real time to a huge masses of people, was the determining factor in the outcome of many events. In particular
electoral phenomena all over the world, have been greatly influenced by these networks. The perception of candidates
depends largely on the way their personality is discussed on social networks. The campaign teams advising candidates in many
parts of the world, give great importance to the performance of candidates in these networks.
Recently, citizens' movements are summoned through social networks. An interesting case are the the recent elections in
Mexico where the use of the micro-blogging site like Twitter became a virtual place to bring together scientists, artists,
politicians, adults, youth and students around the conviction of one who was the best candidate to the presidency: Andrés
Manuel López Obrador (AMLO).
Our research is based on the collection of all tweets sent before, during and after the presidential elections of July 1, 2012 in
Mexico containing the hashtg #AMLO. The aim of this study is to analyze the different orientations of the messages in three
different times. Similarly, we apply SentiWordNet 3.0 to analyze how these messages were positive or negative around this
Social networks have become in recent years, an excellent media that works in parallel to the traditional ones. In many
countries, social media like Twitter, blogs and Facebook, are playing important rols in politics. For example, in the absence of
democratic elections, an estimated of 70 million bloggers in China have become the voice of the people (Friedman, 2010). In
another example, a growing number of Pakistanis turned to YouTube, Flickr, Facebook and short message service (SMS) text
messages as alternative media during the "Pakistan Emergency" from 2007 to 2008. This began after Pakistani President
General Pervez Musharraf suspended the chief justice of the Supreme Court and the government canceled cell phone networks
and some news channels blocked (Yusuf, 2009). Similarly, in Arab countries like Iran a large-scale protests were coordinated
from Twitter. In the same way as in the Arab countries did the "Arab Spring", Mexico had its "Mexican Spring" this 2012 during
election campaigns for President of the Republic.
Heimann, Christiane & Kerpen, Daniel: The role 0
of social media for intercultural knowledge
creation and preservation - A case study of web
forums for expatriates
10:45 - 12:15: New Media and Society II: Internet, politics and democracy (chair: Kurt Daneback)
Luis Hestres: App neutrality: Apple’s App Store Since launching the revolutionary iPhone in the summer of 2007, Apple Inc. has become one of the leading manufacturers of
and the future of democratic culture online mobile communication devices in the world, having sold more than 314 million iOS-based devices (including the iPhone, iPod
Touch and iPad) to date. Apple’s dominant position in this market includes its App Store, which as of this writing boasts more
than 585,000 apps and has surpassed 25 billion downloads. Apple’s iOS ecosystem has become a critical entry points unto the
Internet, which is one of the most important platforms for political action and personal expression available today.
Unlike the Internet, however, the App Store is a closed ecosystem. To gain access to the App Store, developers must have their
apps approved by Apple. The company’s app review and approval policies have been widely criticized for being opaque and
arbitrary, and have resulted in the rejection of both explicitly and implicitly political apps. This paper discusses the
consequences of Apple’s app approval process for freedom of expression—a key component for the development of a
democratic culture in the information age. Drawing on the notion that private industry policies can have a significant impact on
Vladimir Dulov: Internet and cultural relations The article examines this paper role of the Apple’s and digital culture in the approval process; integration of current and
network governance,the specificwill analyzeInternet developer guidelines and process of cultural discuss rejections of both
Europe, Balkans future EU members from the Balkans. The topic is addressed in the context of three types of cultural transformations - the
transition from totalitarian to democratic societies, the EU accession and the overall transformation of culture and
communication from the application of information technologies.
Author analyzes empirical parameters of cultural identity of new Internet users and Internet communities. The main emphasis
is made on the role of Internet in the modernization of social relations in the process of social change. The analysis, based on
empirical data has concluded that Internet communications substantially change the impact of media on cultural sociodynamics
of modern societies.
The paper pays special attention to the emerging culture of social networks, its values and the role of dynamic network
communities in shaping the public agenda of societies. Empirical evidence shows that social networks are already a significant
social and political factors, which seriously affect the formation of public opinion.
The paper represents the empirical data from studies and surveys of the Regional Research Centre "Balkans-Europe" at SWU
Christiane Heimann: The role of web 2.0 for Facing the latest social movements in the Islamic World like the Arab Spring or the Green Revolution – which were supported
social movements in the Islamic World - a case and strengthened by social media – the Iranian government is currently preparing to introduce a “clean” Internet without
study of the Green Revolution in Iran freedom of expression (Hosseini, 2012). These social movements did not only use internet to send information and to organize
demonstrations, but also to unify the civil society. Therefore, it will be shown how web-based communication is able to
mobilize people, and why the impact of web 2.0 on social movements is even higher in authoritarian Islamic countries than in
Western states. The extent of the public sphere in Muslim societies is less than in Western societies (Eisenstadt, 2004), and
aspirations of participation are oppressed in authoritarian regimes (Khosrokhavar, 2004). It will be argued that social media as a
platform for participation played an eminent role for the irreversible breakthrough of social movement in the Islamic Republic
of Iran – the Green Revolution. This claim will be proven by literature review, expert interviews, and media analysis. First,
cultural, geographical, historical, and political barriers for a non-virtual civil society will be pointed out. Second, the web 2.0 will
13:15 - 14:45: New Media and Society III: Online social groups (chair: Kurt Daneback)
Radoslaw Michalski, Jaroslaw Jankowski, PiotrThe purpose of this article is to answer the question how overlapping are the communities in the cyberspace when studying
Brodka, Przemyslaw Kazienko: The Same variety forms of communication. Authors analyse the structure of user groups formed by different layers of social network
Network – Different Communities? The created among users of a virtual world. Each layer represents some type of activity and relations in the network: being marked
Multidimensional Study of Groups in the as a friend, exchange of private messages and transactions in the system. By extracting groups and analysing their structure,
Cyberspace dynamics and relationship between each other, some interesting properties are shown. To name only a few research questions:
do we form the same groups when exchanging messages and money, and, if yes, do they evolve with the same speed? Is the
friendship relation formed at the beginning of the message exchange between users or it is a formal confirmation of the
intensity of their correspondence? Are the relationship groups incoherent with groups formed by the message exchange, what
may prove that some other factors imply the friendship, not only the intensity of virtual world contacts. The research was
performed within the social platform working in a form of virtual world connecting functions of chat and entertainment
platform, in which users have the opportunity to engage in the life of the on-line community. By performing this research
Alena Mackova: Internet-based activism „Zit A potential of the new media to stimulate political communication and enhance civic participation has been examined in
Brno“ group numerous theoretical and empirical studies. There is a growing body of work on non–institutionalized political actors using new
media. In this research we document on a particular case of “Žít Brno” group how the new media have shaped and are shaping
a collective action repertoire of social movements and other non-institutionalized actors pursuing social and political change.
The research is based on Tilly’s (1984) notion of repertoire of contention, Van Laer and Van Aelst’s (2010) electronic repertoire
and on concepts of subactivism (Bakardjieva 2009), life politics (Giddens 1991) and sub-politics (Beck 1997), as well as on more
more vernacular terms such as cyberactivism, cyberprotest or hactivism. The new technologies, on the one hand, facilitate
offline collective action in terms of mobilization, of organisation or transnationalisation. On the other hand, they enable to
create new modes of collective action. This research is dealing with the second type. In our qualitative case study we deal with a
question whether such type of internet-based action is functional, how the activities of “Žít Brno” group are perceived by their
fans as political or not and if a communication intention of the group meets reception of its audience.
Jakub Macek: Media Ensemble: on construction How people construct the set of media technologies they use in everyday life? Such question seemed to have rather obvious
of media experience in everyday life answer in days of "television home". However, a domestication of domestication of a variety of new media technologies has
changed the "simplicity" of the answer. The multiplicity of media artifacts reveals the fact that people construct a "media
ensemble" - a more or less reflexively created, changeable and negotiated structure of media artifacts and communication
channels that fulfill their needs and which reflects the moral economy of the family. The presentation introduces the concept
"media ensemble" based on Giddens' structuration theory and Silverstone's and Morley's notion of domestication. The concept
and its analytical usefulness is illustrated on data collected in ethnographic research.
15:00 - 16:30: Social media, marketing and online biographies (chair: Kurt Daneback)
Kerpen, Daniel & Heimann, Christiane: Adaption Today, (non-)profit-organizations are confronted with urgent competencies in planning, implementing, and monitoring of social
to web 2.0 technologies: social media in human media activities (Schueler, 2011). Because this domain is of growing importance for HRM departments, we firstly review social
resource management and its implications for media usage helping organizations to attract, recruit and retain its employees. Secondly, we expand these findings by
professional practice considering social media management as a specific professional feature: Which references do apply for social media managers
in HR? Drawing on discussions of (new) media management practice (Bartosova, 2011), we follow an exploratory case study
approach (Yin, 2009):
1) ualitative analysis of 20 job offers (“social media manager” m/f) out of ca. 2,900 related offerings in the German StepStone
dataset with categorical regard of qualification requirements, and
2)their comparison with social media management related offers adressing professionals (i.e. courses, seminars, workshops in
extramural/distance studies) by searching German databases for vocational learning and professional development.
We firstly present a set of qualification requirements along with subject-specific experiences and abilities. Secondly, the
As part of the Web 2.0 media management course materials reveals only increasing part of their leisure time in the Internet.
Daniel Schultheiss, Christina Lajter: “Thumbs up comparison with social and so-called social media people are spending an a partially congruence with expected qualification
for social media marketing?”: Corporate Most popular are social networks, especially Facebook.
targeting on Facebook Whether and how about any brand or company is communicated in the online world becomes more important for companies’
success, because user-generated contributions can significantly influence debate and public exposure of companies and brands
due to their potential high ranges.
Consequently, the question of how companies deal with these relatively new conditions and the strategies they pursue in the
context of social media marketing is asked. This research project deals with the question of how companies in Germany deal
with the new challenges that social media marketing brings. We examine what strategies companies pursue to Facebook and
what experiences they have done so far in dealing with social media marketing. To lighten this topic we ask the following
1. Which challenges arise in the context of social media marketing for companies targeting on Facebook?
2. How are companies using Facebook in German speaking countries currently for targeting?
Martin Gloger: Biographies in cyberspace Narrating one´s biography is established a narration from countless and different life-events.
Against this background, the constructingresearch questions are examined using qualitative interviews. To get a comprehensive
Generating a biography is using certain institutions – biography generators. Society is regulating this by adjusting institutions
which are respechted for biography. These generators are focussing the awarenes on certrain aspects of the subjechts life
experience. Wellknown generators are dairy, confession, auto-biographical sketches, anamnesis and many more. The
constructed biography is strong connected to the institution from which it emerged.
In „modern times“ there was certenty on one biography but the „corrosion of character“ the self turns self-referential it is also
re inventing itselve repeatively. What role do new media play in constructing biographies in this late capitalist condition? My
paper will deliver some thoughts on communicating the late capitalists subject in mediating it´s own biography. How does the
late capitalist subject use technology for the construction of it´s own biography? This paper shall argue that the generators for
biography is delivering a liquid identity. The generator can be argued as a apparatus which leads to this liquid identity.
Thomas Roessing: Iconoclasm? The dispute over The online encyclopedia Wikipedia is not only a huge collection of written knowledge in many languages of the world. It also
filtering “indecent” imagery in Wikipedia contains numerous images, including drawings, paintings, and charts. Some of these images are rejected by some users.
Politicians and interest groups have repeatedly expressed concern over Wikipedia’s visual content. Central bone of contention
seems to be nudity and sexual content, which is perceived as pornographic by some users. But there is also opposition against
the depiction of violence or religious figures, e. g. Muhammad. The Wikimedia Foundation, the organization that runs
Wikipedia, decided to develop individual filter systems. These filters were intended allow users to read Wikipedia without being
confronted with unwanted images. This project sparked a fierce dispute within Wikipedia’s community. The present paper
documents and analyzes this dispute and sheds some light on the social and legal premises and implications of filtering disputed
Full name: Title of the paper Abstract
9:00 - 10:30: Open Acces Workshop (chair: Matej Myska)
Ales Pekarek: Europeana Newspapers project - LIBER (Ligue des Bibliothèques Européennes de Recherche - Association of European Research Libraries) is the main research
An open access gateway to European libraries network in Europe. LIBER encompasses more than 420 national, university and other libraries from more than 40
newspapers countries. LIBER's network is not restricted to the area of the European Union and the participation of European research
libraries outside the European Union is widely encouraged.
LIBER has been currently involved in several EU funded projects related to the open-data and open-access approach, especially
in field of research data, such as ODE (Opportunities for Data Exchange), Europeana Libraries, and MedOANet (Mediterranean
Open Access Tracker). The newest LIBER's EU funded project is the Europeana Newspapers project, which will be described in
The Europeana Newspapers project (ICT PSP Best Practise) aims at the aggregation and refinement of newspapers for The
European Library and Europeana. It will use refinement methods for OCR, OLR (article segmentation) and named entity (NER)
and class recognition. The libraries participating in the project will provide around 18 million digitised newspaper pages to
Europeana. Further libraries will be encouraged to contribute newspapers to Europeana and The European Library by the
project. There are five main objectives of the project.
Selection, refinement and aggregation of 18 million pages of digitised newspapers – 8 million pages “as it is” (content
providers), 10 million refined pages (OCR) and 2 million refined pages (article segmentation).
Analysis of existing digitised newspaper collections will be carried out through survey on the extent of the digitised newspapers
collections throughout Europe. Potential new partners for the extension of the network will be suggested by survey and it may
also be useful to judge technical status of digitised data and as part of gathering descriptive metadata.
Kucera: How walled gardens of corporate Metadata, "data about data", generated by various business processes in information systems of private corporations has fallen
metadata restrict knowledge and how to under trade secret for a long time. Such approach can be understood standing in contrast to contemporary processes of
overcome it opening (meta)data of various (semi)public bodies. But how legitimate corporate walled garden of metadata is when the
metadata stems from activity of customers/users? Is it reasonable to ask corporations to "give back" to customers/users?
Limitations to unleash knowledge, which is hidden in corporate metadata, for academic and general public purpose is
demonstrated on particular geographic analysis based on data from "Google Insights for Search" - Google's tool for examining
trends in search queries inserted by users. Final part of the paper discuss possible way to open corporate data and protect
rights of all parties as well.
Matej Myska: The new Creative Commons 4.0 This paper analyzes the upcoming version 4.0 of the popular Creative Commons licensing suite that was firstly publicly
Licences introduced on the Creative Commons Global Summit in September 2011. Firstly the paper identifies the reasons for and the aim
foreseen to be achieved by the new version. The paper then subsequently deals with and discusses all the new proposed
changes, namely Attribution and marking; Disclaimer of warranties and related issues; Internationalization of the licensing
suite; License subject matter; Treatment of Moral rights; definition and scope of the NonCommercial and ShareAlike conditions
of the licences and finally the issue of Technical protection measures. In conclusion, the paper discusses the practical
implications of the new 4.0 Creative Commons licences.
10:45 - 12:15: Ideas for Cyberspace I (chairs: prof. Herbert Hrachovec, Radim Polcak)
Marie Okacova: Cento: a poetics of derivation A cento is a poem composed entirely of unconnected quotations adopted (more or less) verbatim from one or several canonical
authors. As a continuum of quotations, the cento represents a unique case of declared literary derivation, being, however, at
the same time an original work in terms of its content. In the patchwork poems, the quoted units acquire new contextual
meanings, producing narratives not found in the source poetry, and a change of the original genre is also quite common. An
introduction to the cento technique, which formed a part of literary history from Greek and Roman antiquity until the
eighteenth century, is followed by remarks on the specific aspects of this secondary literary form. Further, typical imitation
strategies applied in the centos are illustrated with examples taken from late antique poetry. Finally, parallels between the
cento and a couple of techniques used in modern fine art are drawn, and the relation of the cento to the historically changing
notions of originality and authorship is discussed.
Alzbeta Krausova: Brain-Computer Interfaces: The aim of this paper is to examine the possibility of direct interconnection of organic neural systems that is in the future
Technologically Enabled Symbiosis presumed by brain-computer interfaces. Such kind of linkage poses not only ethical questions but relates to philosophical
problems of unified consciousness and integration of intelligence.
All these above mentioned issues will be introduced and analyzed with regard to current social and research trends and
discussed from the perspective of different theories. Special focus will be put on a theory of mind, the law of complexity, and
fundamental rights to survival and self-development.
Finally, the paper should outline justifications for using the technology for the purposes of interconnecting neural systems as
well as for refraining from using the technology for such purposes.
Alicja Gniewek: Cloud Computing caught in Cloud Computing, a new major trend in ICT, is a concept which extends and reformulates existing paradigms such as utility
national chains – comparison of French, computing and grid computing. New features of Cloud Computing such as dynamic data distribution possibly in different data
German and Luxembourgish attempts to attract centers around the world and resource sharing (multitenancy) raise questions not only for computer scientists, engineers and
Cloud Computing companies. economists, but also for lawyers and policy makers.
Legal challenges of this topic address mainly data protection and intellectual property, but they also touch upon other areas of
law – e.g. contract law, e-commerce law. These issues are being tackled by the European Union which has started to develop
recently its own approach in respect of Cloud Computing (e.g. public consultations carried out by the Commission on Cloud
Computing, European Cloud Computing Strategy as well as reform of data protection law that takes into account Cloud
The paper assesses the impact of Cloud Computing on the Information Society and digital environment of the EU from a legal
point of view. It studies the application of the current EU legal order as well as national legislative frameworks with regard to
Cloud Computing. Additionally, in view of the fast developing Cloud Computing solutions it focuses on examination of general
directions in which legal frameworks of France, Germany and Luxembourg evolve. Paper studies “protectionist” moves on the
13:15 - 14:45: Ideas for Cyberspace II (chair: prof. Herbert Hrachovec, Radim Polcak)
Nicholas J. Gervassis: Redefining Regulation of The ubiquitous presence of developments like Web 2.0 applications, boosted by the expansive use of wireless technologies and
Digital Assets in Check with the Social and especially of mobile telephony, marks the next stage in the global experience of the digital era. It would not be an exaggeration
Cultural Input to claim that our social and cultural lives are migrating online, since the actual communication processes which give them shape
are becoming one way or the other connected to the online circulation and management of digital assets. Here we treat the
term ‘digital asset’ in its broader meaning, one including not only digital information artefacts per se (for example, texts,
images, multimedia files etc) but also online service accounts (email, social networks, ecommerce platforms and so on).
Technology and economy are pushing us to “go online”, where personal human development involves mainly interacting with
such digital environments.
This presentation is based on a simple notion: the as indicated dependence of our social and cultural lives on the use of digital
assets summons back slightly neglected in recent years cyberculture theories, about how control can be exercised over human
beings in (and through) the manner that digital assets are being regulated. Control over the resources which are essential for
communicating with others and for transferring knowledge grants power over the broader processes of socialising and culture;
it may interrupt them or even lock them down.
Reflecting critically these understandings on the contemporary practice of law we discover in its planning and realisation
particular shortcomings. On the one hand, intellectual property law is presented as overemphasising the economic dimensions
Mine Ersoy Özcan: The possibility to create an of digital assets, aimed to protect theof productionof creative industries on several crises throughout its history, after the 1980's,
As a consequence of capitalist mode exclusivities which has to cope with publicly available information artefacts. On the
online union movement: The practice of social the globalization as the deepened and the extended form of capitalism has been on the scene. Within the context of global
network unionism unequal division of labor, the structural adjustment policies has been harshly applied in terms of privatization and flexibility and
by this way, countries have been integrated within the global economy. During the last decade, the
standard norm of employment understood as permanent, full-time, one employer with social security has been eroded and
new forms of employment have been emerged. It has been shifted to precarious employment which includes fixed-term and
part-time, temporary, unsecured, low-paid jobs in terms of flexibility. Moreover, the power of the labor solidarity has been
solved and lost most of its negotiation power. As the working class solidarity has been dissolved, the trade unionism has been
weakened. Many workers in the world now out of the protectionist mechanisms of trade unions. However, for some time,
social networks are finding a ground as dynamic forms of communication and collective action tools. Many activists are getting
involved to the social network organizations. The aim of this paper is to discuss the possibility of "Social Network Unionism" as a
15:00 - 16:30: Intellectual Property Online I (chair: prof. Andreas Wiebe, Wittmann)
Leonhard Reis: Collective Management of The first draft of the Directive on collective management of copyright in the single market by the EC is not only adressed to
Copyright in the Single Market collecting societes but includes also the first ideas regarding a pan-european online license for music. The paper adresses the
legal issues raised by the draft, such as the principle of territorialty, drafting of agreements and - of course - the role of the
collecting societies in case of granting one multi-territorial online license for online music rights.
Andreas Rahmatian: ACTA – Unnecessary or The negotiation process of the Anti-Counterfeiting Trade Agreement (ACTA) has been criticised widely for its lack of
illegitimate? transparency. At the moment it suffers a significant backlash in its ratification process, because the European Parliament’s
International Trade Committee has recommended in June 2012 that members of the Parliament vote against adopting ACTA.
Civil Liberties Groups as well as the IT and internet communities are concerned. Relevant in the present context are particularly
the provisions in Chapter 2, Section 5 on the Enforcement of Intellectual Property Rights in the Digital Environment. This talk
will explore whether we need ACTA (or as similar kind of international agreement) at all and whether it is a worrisome piece of
legislation. The discussion will focus on the aspects of ACTA that are relevant to copyright and the internet.
Michaela MacDonald: Open Source Licensing The underlying principles of open source software are ‘openness’ and interoperability. The licensing infrastructure ensures that
and Cloud Computing: Allies or Enemies? these values will be preserved. However, the ideology may be under threat in the networked era. Cloud computing is a
maturing technology practice, whose success is contingent on utilizing open source software. Open source licenses apply when
software is distributed – mere running or making available does not trigger the protection. The new license, Affero GPL, aims to
prevent a potential proprietary lock-in in the cloud. This article argues that the attempt is futile. The freedom to modify
software may be relevant for hobbyists, not for the majority of commercial enterprises. Examining current practices and
successful business models of enterprise computing it is clear, that the elements of these ecosystems, which depend on the
commercialization of modifications of open source products, are minimal and shrinking. In the current technology set-up the
values of open source worth preserving are accessibility, interoperability, and re-usability. And these will not be saved thanks to
a licensing scheme, but thanks to an open and flexible architecture. It is the publication of open standards, which empower
collaboration, that are determining the future of software.
16:45 - 18:15: Intellectual Property Online II (chair: prof. Andreas Wiebe, Wittmann)
Martin Husovec: Website blocking: effective The courts in various European jurisdictions disagree on the issue of blocking the websites by the access providers. Can
remedy or infringement plaster? intellectual property rights holders demand the website blocking as a remedy under current Union laws? And if so, does this
remedy really help them in preventing any future infringements? Or is it just a "plaster" that stops the infringements for a
while, but never solves the problem? In the article, these and related legal questions will be answered. Possible outcomes in the
currently pending CJEU case UPC Telekabel Wien C-314/12 will be also discussed.
Ebenezer Duah: Internet Protocol Address as Strategies to control file-sharing have evolved since the original Napster service was forced to close down about a decade ago.
Key Evidence in Matching an Infringer: Some As the race with new technologies continues, the copyright owners have also pushed for legal reforms and other technical
Issues enforcement actions to try to secure their position in the digital environment. Central to this goal has been to contain the
unauthorised dissemination of copyrighted works, results of which have been mixed. In recent years however, attention has
focused on the internet service providers (ISPs), requiring several obligations, among them, the disclosure of alleged infringer’s
identity, which largely rely on the supply of subscribers’ internet protocol (IP) address as the key evidence in linking the
infringer. The subscriber details once obtained, has led to the rights holder either seeking financial compensation or pursuing
legal action against an alleged infringer, except that the key evidence also raises a two-tier situation. Although the majority of
the orders sought have been granted, some courts have also begun to be wary of such key evidence, thereby influencing a few
decisions in favour of the defendants (alleged infringers) in both Europe and the United States. This paper argues that the
reliance on IP address to link an infringer may present a bigger challenge for the copyright industry in the future.
Sandra Schmitz: Liability of Internet access Over the years, German courts repeatedly had to determine in how far the subscriber of an Internet access may be liable for
subscribers for copyright infringements - An copyright infringements. The courts recognised that the subscriber of an Internet access is not necessarily the actual infringer
analysis of German case law when an infringement is committed via his connection. It is common that there is only one Internet connection subscription
per household, and even neighbours may share a connection. The same applies to shared accommodation. The right holder
that claims that his copyright has been infringed carries the burden of proof that the Internet access subscriber is the actual
infringer. This proof is regularly difficult to produce unless the subscriber does not admit to be the actual infringer. If the
subscriber cannot be identified as the actual infringer, he will not be liable for damages under German law. However, anyone
who knowingly contributes to the infringement of a protected right, will be liable as a so called Störer, i.e. disturber, to cease
and desist. In general, liability will be established if the Störer has breached a reasonable duty of care in relation to operating an
Internet connection and granting access to further individuals.
This paper will look at recent decisions by German courts, in particular the Federal Court of Justice and the Constitutional Court
ROOM NO. 131
Full name: Title of the paper Abstract
9:00 - 10:30: Cybersecurity and Cybercrime I (chairs: Zsolt Balogh, Vaclav Stupka)
Roksana Moore: Symantec-Pfizer, please update Information security is widely regarded as safeguarding the confidentiality, integrity, and availability of information, which from
your data listing and fix my cold: The case for a technical perspective is the responsibility of the computer security industry, a private entity increasingly entrusted with
regulating the software security industry protecting global information resources.
This paper addresses two fundamental points. The first is that the need for quality is increasingly taking a central role within
information and computer security, and that as increased demands are placed on information availability, quality is becoming
paramount for ensuring that integrity and, where applicable, confidentiality are maintained. The second is that the
responsibilities entrusted to the computer security industry continue to grow, thereby privatising security and with it the
growing dependency for safeguarding information security. This raises many questions that are addressed throughout this
paper. For instance whether security is a public good, why the privatisation of security in general is so hotly contested, and how
security should be considered in an online context. Finally this paper addresses arguably the most fundamental concern, which
Karoly Balint Szilagyi: What is Third-Party is to whatTwitter,the law should be concerned withwhole lot of others provide so called third-party a privately operated security
LinkedIn, extent Yahoo, Facebook, Google - and a quality, and how quality can be ensured within authentication (TPA)
Authentication on the Web and why should You services, where the registered user of one service (the TPA) can access external sites as a registered user without providing
care (almost) any personal information to this third party.
In this 15-20 minute session I'm trying to give a technological overview of the third-party authentication services and highlight
the most important legal issues - mainly in the domain of privacy - surrounding the field.
- The need for authentication (why personal identification is relevant in web applications)
- Registration is passé (why the model of separate usernames and passwords will have to go away)
- Inside a single-sign-on system (technology and terminology of TPA)
- Your personal data (who gets to know your personal data, means of maintaining control)
Pavol Sokol: Legal issues of the honeypots and - Other legal implications
The Network forensic analysis is one of the basic branch of the digital forensic analysis which deals with monitoring network
honeynets traffic and analyzing the captured data order to identify network intrusions and obtain legal evidence. In arcticle we focus on
the honeypots and honeynets that are common tools for network forensic and present them from a technical and legal
perspective. Honeypot is a security resource whose value lies in being probed, attacked or compromised. On the other hand,
the honeynet is simply a network that contains one or more honeypots. It provides real systems, applications or services order
to capture extensive information on the threats and the attackers. This paper provides a discussion of major issues affecting the
deployment and usage of the honeynets. It focuses on the issue of data retention with regard to the use of forensics methods.
The paper also discusses the the concept of cyber crime and relationship between it and honeynets. Finally, this paper provides
an approach on the issues pertaining to liability and data retention.
Lawrence Siry: European Child Pornography In November 2011, the EU adopted the Directive on combating the sexual abuse and sexual exploitation of children and child
Directive: Recent Developments. pornography. The Directive replaces the Council Framework Decision of 2004 and strengthens the role of the Union in the
struggle against child exploitation and pornography. The Directive represents the first major foray of the Union into the realm
of criminal law, post Lisbon. The measure expands and harmonizes criminal sanctions for child pornography as well as child
exploitation. The Directive also includes the crime of grooming -or the enticement of children into sexual activity over the
Internet. This will add new criminal provisions for many member states.
This paper will dissect the new Directive, comparing it with the Framework Decision, with a view towards understanding the
implication of the new measure. The paper will look at the adoption process of the Directive looking at the compromises that
were reached along the way, especially concerning at the question of whether illegal material ought to be blocked or erased
from the Internet. The paper will compare the Unions approach with that of the Council of Europe’s anti child pornography
measure: The Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse.
Further, the paper will review the procedural safeguards for criminal defendants and examine the efficacy of the measure.
Lastly, the paper will explore future measures that may be taken by the Union as they reach into the criminal law, can the
Directive can be seen as a step towards the greater harmonization of legal norms within the Union.
10:45 - 12:15: Cybersecurity and Cybercrime II (chairs: Zsolt Balogh, Vaclav Stupka)
Olena M. Orlenko: Limits on the I.We all in our daily lives have encountered these or that manifistations of cybercrime. For example, hacker broke an email box,
Jurisdiction of State in Counteracting a bank is robbed, information is stolen from the tax service about bank accounts of the millions of people. How to prevent
Cybercrime these types of crime is not the matter of one individual, for sometimes cyber crime takes such threatening forms that individual
efforts are not enough. Instead, it is a matter of a state and even not one state but the whole international community for
cybercrime is the global social phenomenon
II.Twenty and twenty first century that is characterized by the increase of application of telecommunication technology has
fundamentally changed some of the presumtions on which the traditional model of jurisdiction had been based. In particular, it
has become easier for anyone to commit a crime in one state and quickly leave its territory, thus inhibiting the ability of that
state to apply sanctions to the criminal. The advent of Internet has made possible for a citizen, say, of a country A to commit a
crime against the citizen of a country B wihout factual presence in the territory of this very country B..
In the Law of the United States of America the notion of “jurisdiction” is defined as “the ability of a state to legislate,
adjuducate and enforce laws”.  Traditionally, all three types of jurisdiction are grounded on the concept of territoriality. A
state has the ability to prescribe what is lawful or unlawful behavior within its territory and the ability to enforce laws on the
individuals whose offence has taken place within its territory. This concept of “jurisdiction” stems from the main hypothesis
that sovereign entity has supreme power in its territory that incudes power to control its territory and power to enforce laws
What is the relation of this concept of “jurisdiction” to cyber crimes? It is widely known that on the problem of cybercrime
within the framework of Council fo Europe on the 23 November 2003 the Convention on Cybercrime was enacted, which came
into force on the 1 July 2004. The Article 22 of the Convention deals with the problem of submittance to the jurisdiction of a
state for commiting cybercrime defining that each state shall adopt such legislative and other measures as may be necessary to
establish jurisdiction over any offence committed: а) in its territory; b) on board a ship flying the flag of that state; c) on board
Giulio Calcara: The role of INTERPOL and With the advent of new technology transnational crime has changed shape and become more insidious. As a consequence the
EUROPOL in the fight against cybercrime with modus operandi of the entities involved in the fight against crime had to be drastically renewed. INTERPOL and EUROPOL have
particular reference to the sexual exploitation found themselves in the frontline in the combat against cybercrime, playing a key role in particular in the area of child
of children online and child pornography pornography. They usually work indipendently, and develop different strategies, sometimes not fully efficient, but worth being
analyzed. INTERPOL has mainly invested in the organization of training courses for police officers and in the creation of a new
database called “International Child Sexual Exploitation image database” (ICSE DB). The database operates through the
INTERPOL communications system I-247, and is a powerful tool of investigation, allowing police officers to identify victims of
sexual crimes. EUROPOL response instead, due to the regional nature of the office, has always had a more operative approach
and has permitted police officers of different Member States to interact actively instead of simply exchanging information. In
2013 EUROPOL is going to launch the European Cybercrime Centre with a section specialized in the combat againts online child
abuse. INTERPOL and EUROPOL have not managed to cooperate in this matter. It will be vital for these entities to increase their
Pedro Miguel Dias Venancio: The Council of The Council of Europe's Convention on Cybercrime provides three types of cybercrime for very similar acts on computer data:
Europe's Convention on Cybercrime and the Data interference (art. 4. º), System interference (art. 5. º) and Computer-related forgery (Art. 7. º).
Portuguese Cybercrime Law – similarity and All these crimes criminalize acts that are in their objective factors materially identical: "damaging, deletion, deterioration,
competition between cybercrimes related to alteration or suppression of computer data" (Art. 4.º); "inputting, transmitting, damaging, deleting, deteriorating, altering or
computer data. suppressing computer data" (Art. 5.º); or "input, alteration, deletion, or suppression of computer data" (Art. 7.º).
What really distinguishes these cybercrimes are the protected legal interests, and therefore the damage potentially affected by
these acts. Thus, integration of an identical behavior on one of these types of cybercrimes requires the evaluation of the
technical effect produced. Since the difference in some cases may prove to be only in the intensity / extent of damage, the
distinction is not always easy. On the other hand, this similarity brings us to the question of potential competition between
This convention was transposed to the portuguese law by the Cybercrime Law, approved by the Portuguese Parliament by Law
no. 109/2009 of 15/09, that keeps the material acts similarity provided in these crimes.
Parisa Hajizadeh: Cybersecurity, Cybercrime Internet service providers (ISPs) are largely immune from legal of thesefor the various forms of online malfeasance Law and The
Our proposed communication will focus on the differentiation liability cybercrimes under Portuguese Cybercrime to which
they contribute. This is surprising. After all, while it surely would be unwise to punish ISPs for every bad act committed by their
subscribers and it would be equally foolish to force service providers to play policeman in instances where the costs of doing so
would overwhelm any plausible benefits, legal liability can take more modest forms.
There's for and against about the subject that holding the ISPs accountable or users for bad acts. Although the ISPs makes a
very attractive defendant because it is more readily identifiable in the realm, but we will attempt to describe some potentially
troublesome areas for ISPs, and give some suggestions. Also we explain, whether ISPs liability can be minimized or avoided.
13:15 - 14:45: Religion in Cyberspace I (chair: Vít Šisler)
Roxanne D. Marcotte: The Jewish “other” of We hope to show that the contemporary Muslim gaze at the Jewish “other” embodied in Jewish fatwas, i.e. about Jews and/or
online “Jewish fatwas” Judaism, available on IslamOnline.net construct a particular “situated” gaze. This is achieved through their use of traditional
(fiqhi/classical jurisprudence) religious knowledge, but coupled with an inescapable contemporary contextualization of the
fatwas’ content. Jewish fatwas thus depend on the “situatedness” of their interpretations, as localized interpreters reread the
tradition through the lens of their particular situational horizons, i.e., horizons that are inextricably grounded in recent social,
economic, political or cultural developments of the global Muslim ummah that is the new audience of those online fatwas. Out
of these emerges a Muslim gaze at the Jewish “other” that cannot fail to remain a dynamic construction, equally molded by
established or unsettled power relations, and whose meanings reflect socially negotiated and constructed interpretations of
this “other”. Data was collected through a search of the Fatwa Bank contained on the English site of IslamOnline.net, an
exercise that returned over a hundred fatwas that either deal with Jews and/or Judaism or mention them (accessed from June
2009 to March 2010), fatwas that are penned by individual Muslim scholars, national and transnational Muslim fatwa issuing
Gregory Price Grieve: Digital Zen: Buddhism, Focusing on online silent meditation, "Digital Zen" argues that much contemporary popular religious practice is a creative
Virtual Worlds and Silent Online Meditation protest against, and also a product of, the suffering produced by the desires of living in late capitalism. Digital Zen concentrates
on Buddhism in the virtual world of Second Life, a 3D interactive world of over 20 million residents in which users interact with
one another through animated avatars. This study focuses on the Second Life non-Heritage Buddhist community—a term that
refers to the primarily Western converts who have reshaped older forms into practices that stress self-therapy, meditation,
egalitarianism, pacifism, and ecology.
Marek Cejka: Religious Judaism on the Internet The paper will be continuation of my paper in Cyberspace 2009 called "Making Internet Kosher". There was significant
development since that time, including creating amount of new software for religious Jews protecting against secular threads
(search engines, filtering software, Shabbat protection etc.). There were also several events and rallies concerning "Kosher
Internet" including mega-rally in New York in 2012 with attendance of ten thousands of religious Jews.
Christopher Helland: Virtual Tibet: From Media This paper will examine the significant impact of new media upon the maintenance of Tibetan religious and cultural identity in
Spectacle to Maintaining Identity diaspora. Despite “geographical” Tibet being subsumed under the Chinese State, the Tibetan government in exile has begun to
actively engage new media to promote their autonomy and maintain their religious and cultural identity. Through a detailed
examination of three websites (exilelens.com, tibetsites.com, dalailama.com), two Facebook pages, and interviews with
webmasters and religious authorities, I will demonstrate how new media is being socially shaped and “spiritualized” to create
virtual religious environments that have significant real-world impact upon the practice and promotion of Tibetan Buddhism.
Due to the lack of Internet access within Tibet, this influence is focused upon the diaspora community and non-Tibetans (who
may or may not be Buddhist), creating a “virtual” network that is actively supporting and maintaining a religious tradition.
Servais: Religious transformation and funeral's Our research of the past two years has been focused particularly on World of Warcraft (WoW). How does studying these virtual
mutations of virtual universes universes help us to understand contemporary religious transformations and especially funeral’s mutations? This is the
objective of this communication. Our talk will be divided into two parts. The first moment gives a brief outline of the different
perspectives in current research on the study of religion on the Internet. This permits us to clarify our research approach and
methods. On that understanding, we describe the principal dimensions that characterize that characterize the land of WoW.
Finally, we synthesize the religious reality in WoW. This first part will thus serve as part of the framework of the investigation.
Secondly, we will focus our discussion on a significant question about this religious transformation, the case of cyberfunerals in
WoW. Starting from the symbolic controversy around a ceremony honoring a deceased gamer, an affair of meditation and
prayer by avatars (digital representations of individuals), which was unexpectedly and violently interrupted by other avatars, we
will consider the changes in religious anthropological borders that this case reflects.
15:00 - 16:30: Religion in Cyberspace II (chair: Vít Šisler)
Attila Kovacs: Visual Hamas: The visual The Palestinian Islamic movements Hamas has relied on every possible medium to get its message across: political speeches and
representation of the an Islamic movement in communiqués, print and electronic media, books and pamphlets, songs and poems, slogans, graffiti, murals, posters, movies
the cyberspace and videos. In this correlation between the texts and images we can even say that the visual representations of the radical
Palestinian Islamic movement have a central position equal to the textual narratives. The main medium for the visual
representations of Hamas for the recent years is predominantly the cyberspace. The description an analysis of this
controversial, but important new medium for da’wa and jihad will be in the center of my paper.
Nuri Tinaz: Emerging A New Halal Social Emerging A New Halal Social Network on Cyberspace: The case of SalamWorld.com and Islamic Facebook
Network on Cyberspace: The case of
SalamWorld.com and Islamic Facebook Young Muslim professionals, businessmen and activists have recently realised the challenges, impacts and consequences of
globalization and intended to take measurement and action to protect Muslims from its negative and harmful effects. Their
initiatives and attempts aim to create a new global social network based on religious, moral and cultural values and peace
mission. It intends globally to interconnect Muslims around the globe crossing national, and ethnic and language barriers as
well as different understanding religion, cultures and practices in order to form a global platform for Muslims. Earlier, referring
to Muslims’ engagements, activities and communications through /on internet, and mass communication technologies,
Mandaville (2003) described it ‘A Virtual Ummah’ and Bunt (2009) called it ‘The Digital Umma’. With this emerging network, the
imagined and ideal thought will be embodied and materialised with the social, political and financial supports from across the
Muslim World and Muslims in Diaspora, and by establishing and opening its regional offices throughout in major cities in
Michael Waltemathe: Playing Religion – The Muslim countries, with its head office in Istanbul, Turkey, and gain insight into and interacting with 8which thesefirst then will be
A phenomenological analysis of Computer-Games can help us communicating the primary mode in languages computer-
Computer-Game as a playground. manifested universes can be experienced: the mode of playfulness. If such Computer-Games require a playful approach towards
them, what does this mean for their relation to religion? Are there certain specifics of Computer-Games that enable them to
communicate religious thought and ideas more “effectively”? Are they a playground in which to explore religion? Is it possible
to describe religious symbols - which are quite often used in Computer-Games - as samples of “real” religiosity or is their virtual
The resulting consequences for religious content and religious experiences within or with these type of playfully communicated
symbolic universes are profound and make it possible to describe Computer-Games as a testing ground for religious ideas and
The paper will give an analysis of the computer being a cross between medium and tool, accessible only in a certain playful way,
which is far less virtual than commonly thought. This makes it possible to describe Computer-Games as a testing ground for
The aim Religion is - is that sense - easier to experience in computer-worlds than America website, with particular as lasting
Carlo De Angelo: "Ask the fiqh experts": Fatwas Religion.of my paper in to analyze the content of the Assembly of Muslim Jurists ofin everyday life. It is, however, notreference
on-line for Muslim minorities in USA to its fatwas issued in matters related to family issues, and to examine the way in which its members deals with possibile
conflict with American legal system.
16:45 - 18:15: Religion in Cyberspace III (chair: Vít Šisler)
Tim Hutchings: YouVersion: The Bible in the The Bible plays a central role in Christian discourse, called upon to support normative frameworks, analysed socially in
Digital Age community reading groups and studied privately as a source of individual strength and guidance. These patterns of engagement
with the text have been shaped historically by complex interactions between traditions, values and technologies. Particular
religious groups have come to identify very closely with particular media formats, developing attitudes to the Bible that sustain
and are sustained by unique media cultures.
This paper examines the impact of digital media on these “Bible cultures”, presenting new data on the significance of “digital
sacred text”. Mobile Bible apps have proven highly popular in recent years, supporting private reading with extensive
multimedia study resources and offering opportunities to share personal responses through social media. I will analyse some of
the most successful examples of Bible apps from the Evangelical Christian tradition to show how they are designed, promoted
and used. For the organisations behind these apps, digital media offers a new opportunity to promote ancient Christian ideas.
Lawrence Siry: When Media Freedom Clashes The realof 2012, of their creations, I will suggest, may be more controversy with its frontor religious leaders have realised.
In June impact the German parody magazine Titanic created complex than academics and back cover depicting Pope Benedict
with Religious Freedom and Privacy: Looking to in having soiled himself with the title: Die undichte Stelle ist gefunden (The leak has been found). The ensuing polemic has
a Higher Authority. brought to light the difficult nature of media discourse.
Hussain: XXX 0
Vit Sisler: Playing with Religion: Representation This paper analyzes mainstream video games produced in the United States, Europe, and the Arab world and explores the ways
of Islam in Video Games these games deal with the representation of Islam and Muslim identity. It is based on a content analysis of more than 80 games
developed between the years 2005-2011, alongside interviews with 8 different game producers. It analyzes audiovisual
signifiers, narrative structures, and rule systems utilized by these games in order to construct the “virtual representation” of
Islam. The research methodology encompasses recent trends in Islamic studies, cultural studies, and game studies. Substantive
portions of the materials considered in this paper were gathered during fieldwork trips to Egypt, Syria, and Lebanon. Essentially,
this paper analyzes how various genres of mainstream European and American video games have portrayed Islam and Muslim
identity. It then compares these representations with portrayals of Islam found in existing Arab games of similar genres.
Capitalizing on the Bogost’s notion of “procedural rhetoric,” this paper specifically discusses how Islam is embedded into the
rule systems governing the player’s interaction with the game.
ROOM NO. 133
Full name: Title of the paper Abstract
9:00 - 10:30: Legal Informatics I (Jaromir Savelka)
Ondrej Korhon: Evaluation of legal information The paper stems from elaborated PhD thesis focused about different law information systems and their comparison with similar
systems information systems in Germany and USA. The paper deals with methods of evaluation of various kinds of law information
systems. The paper also deals, why it is so difficult to evaluate the quality of legal information systems, and about the
(in)applicability of the conventional evaluation methods as efficiency or effectiveness. The paper brings its own criteria to
evaluate legal information systems with, as connectivity or provided user help. These criteria will be explained using different
kinds of Czech and foreign legal information systems.
Augustin Mrazik, Jan Domankus, Lukas Augustin Trust-ex is a system for trusted electronic (virtual) identity and user-controlled maintenance and disclosure of private data to
Mrazik: TRUST-EX - Concept and Framework for other parties.
Trusted Identity and Control of Private Data The aim of Trust-ex is to contribute to the solution of some of the most important today’s problems of the Internet:
• rusted electronic identity of natural and legal persons acting in the cyberspace – including their responsibility for their acts
and mandates to other persons to act in the name of the owner
• aintenance and protection of private data (first of all of the natural persons) and their differentiated disclosure to other
parties – the user decides and sets in his profile which of his private data may be disclosed on-line to particular other party (e.g.
state authority, bank, e-shop or anonymous system)
Trust-ex aims to provide a full-featured “virtual person” with a sole virtual identity in order not to split / duplicate
“registrations” of a user in different systems (which also leads to the loss of security). It deploys SSO (single sign-on) for
attached portals (the user has to authenticate only once) and two-factor authentication for maximum security.
For the owner Trust-ex also provides practical “links to the reality” – e-mail address and mobile number for authorization and
notifications, wallet (credit) for small cash for micropayments associated with activities in cyberspace (e.g. for sending SMS),
maintenance of credit cards and other cards and others.
Private data of the user may be attested by trusted parties (e.g. municipality or notary), such data cannot be altered anymore
10:45 – 12:15: Legal Informatics II (Jaromir Savelka)
Pavel Loutocky: Binding or non - binding Recent discussions are still trying to reach the conclusion, which type of online dispute resolution ("ODR") is more suitable for
enforcement of ODR: The outcome? resolving electronic disputes in B2C (business - to - consumer), C2C (consumer - to - consumer) and B2B (business - to –
business) transactions. It is necessary to decide the application of appropriate mechanisms in specific situations by using two
most relevant indicators - efficiency ratio of the enforced decisions and enforcement mechanisms. It is an indisputable fact, that
to enforce cross - border international binding decision, the most essential role is played by New York Convention. However is it
suitable for solving business or even consumer disputes? Or does the use of NYC significantly reduce the advantages of the
online tools? On the other hand non - binding decision provides less formalized, cheaper and faster enforcement by private
organization in specific community (such as the users of online shops or auctions), which is not connected to national or
international legislation. Could the non – binding enforcement mechanisms be suitable for solving smaller – value disputes? The
outcome is to decide, which type of ODR should be used for specific disputes and if it should be equally focused on further
Seamus Keating: Digital Signatures and
development of both types of assess
The objective of this research is toODR. the challenges posed by the use of digital signatures as part of the introduction of an electronic
Electronic Transfer of Land transfer of land ownership system.
This research reviews the current legal framework for executing documents that assign, transfer, convey or create an interest in land. The role
and function of manuscript signatures has developed over centuries. These historical developments are analysed with a focus on the
jurisprudence relating to the form and function of signatures in the context of wills and transactions involving land. A review of electronic land
ownership in other common law jurisdictions is conducted. The technological and legal initiatives relating to digital signatures are analysed. In
particular, the development of a legal framework for digital signatures is evaluated. This research focuses on whether the form of digital
signature that is suggested meets the requirements of the Electronic Signatures Directive and the UNICTRAL
Model Law on Electronic Signatures.
Electronic conveyancing will transform the current paper-based conveyancing system. Digital signatures will play a vital role in this process.
The affect that the introduction of digital signatures will have on the conveyancing process has not been addressed. This research evaluates
how liability for fraudulent transactions will be distributed in an electronic conveyancing process which relies on digital signatures.
Jeremy Northcote, Jamie Moore: Embracing While an increasing number of health services make use of online modes of delivery, many are merely approaching the web as
innovation in online health programs: Making merely an information portal or helpline that digitally reproduces, rather than transforms, offline information and service
the shift from Web 1.0 to Web 2.0 delivery. Some health services, however, are searching for innovative ways to integrate new social media and promote user
interaction in ways that that offer distinctively new approaches to health provision. The case of Hello Sunday Morning (HSM),
an Australian based online alcohol self-help program that utilises blog-based self-publishing as its central platform, will be used
to demonstrate the way new approaches to health are being explored through Web 2.0 platforms. One of the key benefits of
this online approach is the way that participation can be undertaken in an anonymous, elective manner, which enables HSM to
reach the type of clients who might otherwise be reluctant to join offline self-help groups. HSM also promotes its program as a
user-driven movement to effect social change rather than a health service as such, thereby tapping into the ‘viral’ and
democratising potential of social media networking. It will be argued that utilising the full potential of online health services
involves more than just familiarity with web-based technologies, but requires something of a paradigmatic shift in the way
13:15 - 14:45: International Internet Law I (chair: Dan Svantesson)
Michael Bogdan: Jurisdiction in Disputes about The paper discusses the recent case law of the Court of Justice of the European Union, in particular the Wintersteiger judgment
Infringements of Intellectual Property Rights on of 19 April 2012, concerning jurisdiction pursuant to Article 5(3) of the Brussels I Regulation in disputes arising out of alleged
the Internet in View of Recent ECJ Case Law intellectual property rights infringements committed by means of content placed on the Internet.
Hossein Kaviar: Competent Court for Hearing The unique nature of the internet and contracts concluded in virtual space have the remarkable effects in many of traditional
the Lawsuits resulting from Electronic Contracts principles and concepts of courts jurisdiction. One of these contracts is the electronic contracts of business to consumer (B2C) in
of Business to Consumer which the consumer is primarily considered as the weaker party of the contract. Hence, it needs a protective mechanism. One
of the protective aspects of the consumer is to determine a competent court and to pay attention to “a special procedure in
lawsuits of electronic contracts”. By way of determining such court, the presentation of an analysis based on theory of “Activity-
Orientation” is the final outcome which is offered to the Iranian legislator as an approach.
Dan Svantesson: Extraterritoriality in the An examination of current and proposed regulatory initiatives relating to data privacy shows a tendency of extraterritorial
context of data privacy regulation jurisdictional claims. While there is nothing novel about extraterritorial jurisdictional claims as such, the impact they have in the
data privacy setting is largely unexplored.
This paper discusses extraterritorial jurisdictional claims found in a selection of current and proposed regulatory initiatives
relating to data privacy. Special attention is given to how such claims affect, and are affected by, modern use of information
and communication technologies.
15:00 - 16:30: International Internet Law II (Dan Svantesson)
Tereza Kyselovska: Rules for determining Aim of this contribution is to analyze rules for determining jurisidction in B2B online contracts. Due to inceasing use of internet
jurisdiction in B2B online contracts the traditional notion of private international law and its jurisdictional rules is deeply rooted. Since the 17th century private
international law is based on principle of territoriality. Legal conduct and its legal consequences have been tied to the territory
of a particular state (s). Cyberspace (internet) has changed that. Internet is traditionally understood as place without borders
between national jurisdiction. Therefore rules of private international law do not function properly within this
„new“environment. Rules for determining jurisdiciton are still territorially based. And the question stays – where is the forum?
This constribution will present theoretical/philosofical analysis of the rules determining jurisdiction in B2B online contracts and
their suitabilityfor legal relations on the internet. We will analyze primarily Art. 5 Section 1 of the Brussels I Regulation and the
connecting factor „place of performace“. Recent case law will be discussed here.
Anabela Susana de Sousa Gonçalves: The The Regulation nº 864/2007 on the law applicable to non-contractual obligations (Rome II) doesn’t have a specific rule for the
application of the Rome II Regulation to the Internet delict. However, many different types of torts may occur on the cybernetic space, and the absence of special rules does
Internet torts not make the Rome II Regulation inapplicable to those torts. Sometimes, the application of the Rome II Regulation rules to the
Internet torts will not have particular features, but most of the times the global scope and flexibility of location, two of the main
characteristics of the Internet, require an effort of adaptation of the Rome II Regulation rules.
The previous step is to set out the relationship of the Rome II Regulation and other provisions of European Union law. In this
context, it is essential to determine the scope of application of the Directive 2000/31/EC of the European Parliament and of the
Council of 8 June 2000 on certain legal aspects of information society services, in particular electronic commerce, in the Internal
Market (Directive on electronic commerce). Art. 27 of the Rome II Regulation states that the provisions of European Union law
that lay down conflict-of-law rules concerning non-contractual obligations in particular matters prevails over the Rome II
Regulation. Even though, Art. 1 (4) of the Directive on electronic commerce states that Directive does not establish additional
rules on private international law, the Recital 23 determine that the provisions of the Directive overcome the rules of private
international law. The Directive on electronic commerce creates a coordinated field by the harmonization of certain provisions
on the field of the information society services. The requirements concerning the liability of the information society service
provider is one of the legal aspects ruled by the Directive on electronic commerce. Therefore, it is important to articulate the
Rome II Regulation with the Directive on electronic commerce.
Erich Schweighofer: New gTLDs Set down the Regulation´s scopeICANN has started the application and evaluation process for New gTLDs in 2012. The
After a long preparation period, of application, we realize that the non-contractual obligations arising out of privacy violations
globalisation challenge for names and trademarks should be solved by formal objections and GAC advice. This process will be
assessed, in particular from the point of view of international law.
ROOM NO. 034
Full name: Title of the paper Abstract
9:00 - 10:30: Cybersurveillance I (chair: Dr. Ales Zavrsnik)
Teresa Alexandra Coelho Moreira: Every breath The theme of privacy and cybersurveillance of the employer have been turning in a matter of considerable interest and
you take, every move you make: surrounded of great controversy in the last years.
cybersurveillance in the workplace and the The Internet changed the business landscape, making it far more competitive and the workplace considerably more fast-
worker’s privacy moving.
But, on the other hand, it also hastened the advent of widespread twenty-four-hour connectivity, particularly through
Together, these factors led to a re-conceptualization of work time and private life, making that the concept of work-life balance
gained new meaning in a highly competitive and global economy in which each worker is accessible any time, any place and
employees can access their colleagues, documents, and data from just about anywhere
These new forms control constitute powerful means of cybersurveillance and of memorization, but also of analysis and of
interference in the people’ privacy, and one of the major challenges put today is the regulation of the electronic control in the
workplace, because the advancement of modern technology, notably computers and the Internet, has made it possible to
collect and store information on a seemingly limitless scale, while also facilitating access to it.
Eva Fialova: Right to be forgotten On 25 lead to a new form of control much more intrusive and that controls Data Protection Regulation. The proposal contains
This asJanuary 2012 the European Commission has published a proposal of a almost everything even the way the worker thinks,
also a right to be forgotten. The concept of this right goes hand in hand with the right to privacy and informational self-
determination of a data subject. Even though the right to be forgotten raises concerns about the freedom of expression among
journalist, predominately the ordinary users of social networks and user generated content webpages are those, who will have
to erase the personal data of a third person on request, or whose contributions may be erased by internet service providers.
Still the Regulation gives the individuals an important tool to protect their online privacy as well as to prevent stalking, as the
cyberspace is the place where stalking occurs or where a stalker gets details about a private life of his/her victim.
Wojciech Nazarek: Citizen Facebook. Designing The inevitable development of the information society has started, significantly affecting the traditional ways of legal protection
own rights and freedoms guaranteed by the (civil) law or regulatory and administrative bodies. Prof. Zygmunt Bauman said, that the Lebenswelt of the
inhabitants of the XXI century split up into two parts: offline and online. In that case, whom should we allow to control and
protect the right and freedoms in the online world? Nowadays, citizens of the digital world have already a set of design tools
allowing them, not only to assure their own privacy, but also to access information (of any kind) or to protect the intellectual
property. Privacy by design, universal design in case of people with disabilities, technical standardisation, free software, Digital
Rights Management systems – this are just few of the existing and rapidly evolving tools that might be used by the ‘citizen
Facebook’ to protect own rights and freedoms. This paper aims to present the improvement, existing barriers and the future of
the self-determination and self-regulation within the realm of online Social Networking Services with regard to the data
protection and privacy. How should we frame the relation between public and private set of rules and practices with regard to
10:45 - 12:15: Cybersurveillance II (chair: Dr. Ales Zavrsnik)
Atilla Kiss: Facial recognition as a risk to privacy Social networking sites started new types of online services with the help of the latest technologies, such as face detection and
recognizing their users on their photos. After many years of developing the methods some well-known search engines were
successful also in the start-with-an-image way of searching the internet. Visitors of the site can upload an image which will be
analyzed, and a mathematical model will be created based on shapes, lines, colors and other elements. Then the engine
matches this model against images already indexed by the search site, and shows the similar results to the users.
Ales Zavrsnik: Resistance and critique of These image processing technologies can determine the locations and sizes of human faces even on video recordings, and equip
surveillance private companies with a powerful method to process sensitive or personal data of their users. Legislation in the field of data
protection has to be able to follow these technological changes and regulate face recognition in the European level to protect
the privacy of the citizens. The concept of this legal framework was set by the Article 29 Working Party in March 2012, which
will be examined in this presentation.
13:15 - 14:45: Videogames and Society I (chair: dr. Cyril Brom)
Jan L. Plass: Design factors for effective learning Digital Games are pervasive, constantly evolving in their complexity and features, and are heralded by many as an agent for
games education reform. Arguably, digital games are also among the least understood tools in education. Proponents have made a
strong case for the potential of games to engage students in meaningful learning activities that are highly motivating, engaging,
and fun. However, research has only slowly been able to gather evidence for the effectiveness of games for learning. In this
presentation I will summarize arguments for the use of games for learning and will review empirical research studies
investigating a variety of cognitive, social, and emotional design patterns to make games and game-like environments effective
learning tools. I will conclude by discussing a series of questions and challenges related to the study of games.
Martin Flasar, Patrik Vacek: What Lies Beneath Computer games curriculum at university level is a subject of an ever increasing interest both in the camps of students and
or Current Trends in Hidden Computer Game scholars. While the first group is being fascinated by the mere presence of the attractive topic within the respective field of
Curriculum at Masaryk University study, the latter one tends to observe possibilites and limitations as well as scientific and educational outreach the topic
possesess. In our paper we would like to focus on some of the most frequent preconceptions, errors and omissions that
accompany the study of computer games at Masaryk University with a special attention paid to the recent results and
prospective development at Department of Educaton (Faculty of Education) and Department of Musicology (the field of Theory
of Interactive Media). Our contribution should also include some corrective and questioning doubts and/or remarks related to
the position of computer games within recent teaching and resarch activites in the Czech Republic as a whole.
15:00 - 16:30: Videogames and Society II (chair: Michaela Buchtova)
Peter Versteeg: The Magic of MMO games: Sociological approaches of game studies have treated MMO games as narratives which are told through the players who
Players' Actions and Game Narratives position themselves in a virtual world. This view sees MMO games as part of a broader proces of “re-enchantment” in popular
culture, i.e. the choice to play in a virtual fantasy (or scifi) world reflects players’ desire to actually live in a magical world.
Playing would then grant them the experience of being part of a fantasy reality. While aspects of re-enchantment undeniably
are part of the worlds of MMO games, the narrative view nevertheless neglects what actually constitutes a virtual world: the
people who inhabit it with their player characters. Through the angle of the player we see that the narrative is a possible
structure for playing, whereas players’ actions and play styles determine how the game is played. In this paper I will show how
narrative and players relate by focussing on a common experience in games: player death. I will argue that MMO games should
not exclusively be understood through its overarching narrative but through player's behavior within a virtual world, in which
magical and offline worlds constantly communicate.
Daniel Schultheiss, Christopher Domogalla: Online gaming becomes more and more important from a social and academic perspective. So this study examines the
“Massively Marketing Online?”: Marketing demands of European Massively Multiplayer Online Game (MMOG) players regarding the marketing instruments of this type of
instruments for online games digital games.
Needless to say not all instruments can be researched sufficiently in general. Therefore one example game (Aion, a popular an
spread MMOG published and developed by NCsoft) was chosen to be examined.
Data was collected using an online questionnaire, which was distributed via private and commercial websites about digital
games and inside the community of Aion. The data of n=843 participants, of which 86% (n=725) bought Aion, was used for a
descriptive analysis. The explorative approach led to a multitude of findings about the demands of European consumers
regarding the marketing instruments for online games. Furthermore, a cluster analysis helped to identify five groups that
include consumers with similar demands. The results give an overview of this complex matter and simultaneously show several
starting points to intensify the research in this field. Especially the core product offers great potential for future studies.
Katerina Lukavska: Promoting Time Control in Today, we witness a broad discussion about the rising popularity of the virtual gaming worlds of massive multiplayer online role-
Excessive MMORPG Players by Identifying of playing games (MMORPGs). Especially adolescents and young adults invest considerable amount of time playing these games.
Start and Stop Cues Although high frequency of playing video/computer games does not automatically constitute problematic playing, a player
should be able to control his or her playing time. Unfortunately, this time control seems to be beyond many MMORPG players'
reach. This paper presents a questionnaire-based study focused on the control of playing time. We will introduce the concept of
sensitivity to start and stop cues which positively correlates with the time spent by playing and which, combined with
Zimbardo's time perspective, we believe is a key factor in promoting the reasonable (controlled) playing.
16:45 - 18:15: Videogames and Society III (chair: Katerina Lukavska)
Lisa Maria Glenk, Oswald David Kothgassner, Over the past decades, there has been an increasing interest in games and related technologies. Research on the
Anna Felnhofer, Mario Lehenbauer, Rupert implementation of psychological methodology into computer games is a relatively novel scientific field. To date, it is merely
Palme, Michaela Buchtova & Cyril Brom: Non- unsure how games influence parameters that mediate human psychological health. The potential of interactive gaming and
invasive assessment of psycho-physiological virtual reality to affect physiological responses, induce excitement or promote relaxation has not yet been thoroughly
parameters in games and virtual reality evaluated. To assess bodily processes, non-invasive measurements have become state-of-the-art instruments in
psychophysiology. Several studies suggest that electrodermal activity, heart rate and cortisol, a glucocorticoid hormone that is
related to cascading levels of arousal, can be assessed during gaming. There have also been attempts to include biometric
sensors into commercial game devices. Benefits, challenges and limitations of these novel approaches will be discussed. In
addition, results of our pilot study (N=26) assessing level of arousal of high-school students by means of measuring salivary
cortisol levels during participating in a 6 hours long educational workshop with the serious game Europe 2045 and
complementary activities will be presented. The results of this pre-study helped us to pinpoint several weaknesses of our
Zongkui Zhou, Hua Wei, Na Bao: Relationship Social interaction is one source of self-esteem. According to the sociometer theory, self-esteem is a reflection of the quality of
between Social Experience and Virtual Self- interpersonal communication. Self-esteem is scenario-specific, different self-evaluation will be formed in different social scenes.
esteem in Online Game The self-evaluation based on the scene of online games is called "virtual self-esteem". Online scenes are extremely different
with real scenes, the interpersonal interaction in these two scenes are different too. So it is reasonable to speculate that people
will form Internet-based self-evaluation, which are different from the reality-based self-evaluation. Social interaction in online
games have some impacts on individuals. Current researchers focus more on negative impact, but there is few study to explore
its impact on virtual self-esteem.
To examine the relationship between virtual self-esteem and social experience of online games, a total of 459 male college
students took part in the study. The results showed that: (1) the virtual self-esteem in the online games is divided into two
dimensions, self-approval and self-denial. (2) the belonging and recognition of online games was significantly positively related
to self-approval, one of the dimensions of virtual self-esteem. (3) the belonging and approval of online games can significantly
While there has been a significant amount of self-esteem.
Gabriela T. Richard: What gendered experiences predict the self-affirming dimension of virtual work on gender and video game play, especially when it comes to increasing
in video game culture can teach us about female participation in game culture, and educationally-based game design activities, there is still a lot to learn about what the
educational game design potential effects of differential gendered experience in game culture and in game play can have on players. It seems important
that we understand the ways in which individuals may be affected by designed experiences (and resulting social environments)
in order to develop and encourage the development of equitable educational games and learning experiences. This paper will
highlight gendered experience in game culture through interviews and surveys of game players. The paper will also discuss
related literature on the potential effects of negative social context and climate on individual’s performance. This paper will
suggest best practices, based on the data, for effective educational game design that is sensitive to gender and intersections,
such as culture and ethnicity.
Dr. Robert M Geraci, Nat Recine, Esteban Soto: While it would be laudable to study the Enlightenment political philosophy upon which modern societies rely, and to apply such
Enlightening the Galaxy: How Players study to our world, only the uncommon student still reads Hobbes or his followers. And yet, this is not to say that there is no
Experience Political Philosophy in Star Wars: access to Enlightenment thinking. Of course, for the archeologist of politics, it might be possible to reconstruct the influence of
The Old Republic Hobbes, Rousseau, or Kant from the inner workings of contemporary politics, especially if one accesses historical archives. But
even fewer would recourse to this than to simply read the original sources! That said, there are ways in which philosophy
continues to inform the cultural experience of people today, and online gaming is one such experience.
In Star Wars: The Old Republic (SWTOR), players absorb Enlightenment political philosophy through game play. They must join
the Empire or the Republic, or remain neutral in the conflict between the two. No matter their decision, all players will engage
in the debate between the two groups and their opposing political ideologies. In doing so, they actually learn many of the basics
of political philosophy and can apply that knowledge to politics more broadly. This paper evaluates the impact of Enlightenment
political philosophy on player experiences in SWTOR through empirical research. Survey and interview data reveal the powerful
ROOM NO. 129
Full name: Title of the paper Abstract
9:00 - 10:30: eFinance I (chair: dr. Libor Kyncl)
Otakar Schlossberger: The use of electronic Banks and other financial institutions that offer products and services in their office, they are often at risk of an incident or a
recording equipment in banks for increasing non-standard behavior of the bank visitors. In order to successfully solve the problem, electronic video recording of the
security workplace of a bank or other financial institution has often assisted. But as interpreted by the Office for the Protection of
Personal Data, bank can not keep those records as being contrary to applicable law. This paper will focus on analysis of current
legislation and assessing whether it is not time to review the interpretation or whether it is necessary to consider the change of
legislation. The general interest should follow an assumption which is based on the highest possible safety of banks and other
financial institutions in providing financial services.
Silvia Lattova: Protection of the money in the In my work I woul like to write about the protection of the bank notes and coins in the virtual reality and more concrete about
virtual reality its protection in the legal regulations. I would like to write about the possibility of using of the bank notes and coins in the
internet. Special regulation states the right and obligations of using of the bank notes and coins (and also its protection as the
object of the intellectual property rights) in the internet.
Denisa Jindrichova: Payment System legislation •PSD and Payment Systems Act
in the Czech Republic •Czech issuers of E-Money
•Czech payment service providers
•Revision of PSD
•Regulation of „innovative payments“
10:45 - 12:15: eFinance II (chair: dr. Libor Kyncl)
Michal Koscik: EU action on online gambling - In March 2011 the European Commission lunched an extensive public consultation on all relevant public policy challenges and
recent developments possible Internal Market issues resulting from the rapid development of on-line gambling. The published green paper received
249 responses by the end of July 2011, yet no official stance was adopted by the commission so far. However, the commission’s
communication on on-line gambling in the Internal Market is expected to be adopted soon.
In October 2011 the Committee on the Internal Market and Consumer Protection of European Parliament adopted Motion for a
European parliament resolution on online gambling in the Internal Market. This Motion was accepted by European parliament
and the resolution which calls for more regulation on European level was approved.
The paper aims to analyze the possible impact of the resolution and eventual Commission’s communication, which should be
published before the Cyberspace conference takes place.
Libor Kyncl: Electronic concluding of financial This paper will focus on the recodification of the civil law as the contractual background in online-based financial services. As of
service and recodification of civil law January 1st 2014, the new Civil Code, Act No. 89/2012 Sb., will be effective in the Czech Republic. It deals with legal acts in
general and with consumer contracts in a new manner, it has also rebuilt the legal concepts in legal capacity of corporations
and natural persons, property rights and other basic principles of private law. Banking, insurance, investment, pension
insurance and other financial contracts will definitely be affected by the massive changes in the legal regulation. The new
legislation contains the intertemporal regulation in § 3028 part 3 of this Act which causes the previously concluded contracts to
carry their previous legal regime on even after the effectivity of the new Civil Code. Therefore this paper will focus on the basic
contractual principles of newly concluded contracts and on the constructive criticism of new legislation. The paper will also try
to compare the Czech situation in this legal area with the situation in other European states and to find a new inspiration in
foreign legal systems.