Cybercrime - Excel

Document Sample
Cybercrime - Excel Powered By Docstoc
                                          mohamed_chawk Association of
Judge Dr.       Mohamed     Chawki
                                                        Prevention in France

                                                           Emil Ford & Co -
                                                           Lawyers (Sydney,
                                 NSW, Australia);
                David       Ford
                                       Australia and New
                                                           Zealand Education
                                                           Law Association

                                                          Department of
                                                          Psychology, Panteion
Phd Student     Maria       Koletsi                       University of Social
                                                          and Political Science,
                                                          Athens, Greece

                                          zalis@saferintern Safer Internet
PhDr.           Zdenek      Zalis

PhD in                                                    University of Bari -
International                             nadinafoggetti@ Department of
                Nadina      Foggetti
and European                           International and EU
Law                                                       Law

Master of Law
                                                        Universidade Federal
(in conclusion), Arnaldo                  asmn10@yahoo.
                            Morais Neto                 da Paraíba/ Polícia
Lt Col Force     Sobrinho       
                                                        Militar da Paraíba

                                                            Institute of
                                          ales.zavrsnik@pf. Criminology at the
LL.D.           Aleš        Završnik
                                         Faculty of Law,
                                              Dun Laoghaire
                                              Institute of Art,
Dr.   Grainne   Kirwan                        Design and
                                              Technology, Rep. of

                                            NGO "Lawyers For
      Maja      Stojanovid
A Closer Look to the
Regulation of Identity
Theft in Cyberspace

Cyber Bullying in Schools

Cyberterrorists or

European Safer Internet
action plan against

Cyberterrorism and the
right to privacy in the
Third Pillar perspective.


The Power of the Code in
Cyber Policing
Juror behaviour in black-
hat hacker trials

- with reference to
legislation of Serbia
 Identity theft in cyberspace is a major concern for the global community. The introduction, growth, and utilization of
information and communication technologies (ICTs) have been accompanied by an increase in illegal activities. With respect to
cyberspace, the Internet is increasingly used as a tool and medium by transnational organised crime. The FTC states that over
27 million citizens of the USA were victims of identity theft in the last 5 years. According to the FBI the number of victims will
increase by 500000-700000 each year. Although new techniques are constantly being implemented and regulations being
adopted to combat and eradicate diverse forms of identity theft, yet ICTs are also providing new means and tools that facilitate
this threat. Accordingly, this paper seeks to address and analyse the following issues: Firstly, the problem of identity theft,
impact and harm generated by identity theft, and mechanisms of cyberspace identity theft. Secondly, an analysis of the existing
I will provide definitions of bullying and cyber bullying: the bullying carried out using the internet and mobile phone. They allow
the bully to intimidate students online by teasing and making fun of them, spreading rumours about them, insulting and
ridiculing them in chat rooms, putting photos of them on the web with nasty comments, tricking them into sharing private
information and then sharing it online, and sending unwanted messages. These technologies allow bullies to act anonymously.
While not new, the scope for bullying has widened enormously as the new technologies have become easily accessible to
students. Another form of cyber bullying is cyber stalking: when the bully harasses or stalks a person by e-mail or some other
electronic messaging system, usually very frequently and intrusively, and often involving threats. While bullying has traditionally
been associated with school, bullying behaviour among children has also occurred in the home and the local neighbourhood.
Niksic (2003) argues that the new powerful mean in the hands of terrorists are the new gateways and abilities of Information
Communication Technologies. As Niksic (2003), Fountain (2001) and Rosecrance (1996) claim the technological innovations
helped to begin a conversation between a “traditional” state and a newer one which main characterization is the absence of
permanent local presence. The virtual state is based in the insecure environmental contexts and keeps the content of power
and donimation in a more democratic, horizontal and decentralized organizational scheme. It is inevitable that the new state
has borderlines to antisocial and antidemocratic behaviors. Moreover, any kind of state preexist in a “virtual” situation until
there is the appropriate time and space in order to appear as a whole entity. We focus on the above description of the virtual
state and the acceleration of group dynamics in order to examine if in the future it is possible when we talk about
The Safer Internet program of the European Commission will celebrate its 10th anniversary next year. The main task of the
program is to raise awareness on the safer internet issues and struggle against cybercrime - first of all against child pornography
and on-line abuse. The long term experiences show how important is media education in prevention of crime. What are key
principles and benefits of the international cooperation within the program? What are the major experiences of the Czech Safer
Internet combined node operating already almost three years in our country? The paper will try to show how the privacy
infringement occurs if not the main principles of the safer behaviour are not respected starting for instance from placing the PC
in the private room of a child. Inattention of parents and carers is one of the sources of sexual abuse of children exhibiting
themselves for many reasons before Webcams. What are the main forms of the cybercrime endangering children?
Cyberterrorism involves a series of conducts sauch as targeted attacks, politically motivated, conducted with the help of
information technology with significant consequences at economic, political and social level. Against this new threat the EU is
called to give an answer with the instruments that it has at its disposal in the Third Pillar. A specific legal instrument in the fight
agaist cyberterrorim is lacking. The first question that we analyse concerns the definition of cyberterrorism. We analyse the
possibility to apply the existing legal instruments to cyberterrorim. At the same time the fight against cyberterrorism involves
the need to collect data and DNA data and to plug into databases. This data collection is essential in order to adopt the measure
of execution of UN Resolutions for the prevention and repression of terrorist funding, as well as the freezing funds that are
addressed to that end. This data is able to breach fundamental human rights. There is the need to guarantee the right to privacy
The paper aims to address the difficulties of punishment for criminal conduct on the Internet when there is
involvement/participation of individuals and companies in different countries. Thus, from the reporting of cases of cyber child
pornography in Brazil, recorded on Orkut, has been complex problems that indicate the unfeasibility of national law
enforcement to situations that occur on a global dimension. As the phenomenon has a transnational character, the emergence
of legal issues regarding jurisdiction between nations, privacy and freedom of expression of users preclude the police action,
the public prosecutor and consequently of Justice. While there is controversy on how to act, recognize undeniable, for example,
that the cyber pornography, and cyber crime, continues to register and cause incalculable damage to people, government and
businesses. Thus there is need to seek international instruments to reconcile these conflicts. It is, therefore, based on the cases
ICT is generating cyberspace but it also generates its limits. Accordingly, the technology that generates cybercrime is also one of
the most efficient tools that enable its suppression. Cybercrime can thus be perfectly controlled through the same technology
that enabled it in the first place. This thesis of the power of the code was first introduced by Lawrence Lessig, but it still has not
been applied in the “order-maintenance assemblage” at the full extent. With changing of the code, the environment where the
cybercrime occurs vanishes. This form of “engineering out” cybercrime appears in many forms, for instance firewall software,
digital key technology etc. The thesis of “ungovernability” of cyberspace was obviously an illusion. Anonymity of internet users
is also a myth. But, are there any limits in fight against cybercrime through changing the code and “engineering out”
cybercrime? We can be certain that the deployment of technology in combating cybercrime would completely change the
This study attempted to determine how the decision making behaviours of potential jurors are affected by the methods used
and the motives cited by black-hat computer hackers. In particular, it attempted to investigate how influential Hastie’s (1993)
cognitive story model is when an individual attempts to decide on the guilt or innocence of accused hackers. An online
experimental study was conducted where participants were required to consider scenarios describing hacking behaviours and
decide on a suitable verdict and punishment. This research particularly focused on potential jurors’ attitudes concerning
‘ethical’ hacking, and non-technical hacking strategies. The research demonstrates the need to provide adequate instruction to
juries in cybercrime cases.
Information technology, besides its numerous advantages and its great applicability in all spheres of work and life also created
different problems. The dependency on such a technology is ever growing as well as its vulnerability. A lot of problems,
relations and habits have changed by its application. Practically there are no fields in which the information technology hasn't
been involved, changing at least a part of them. Having that in mind, the computer criminal is emerging, especially the hackers.
This specific criminal has taken an outline the sea monster of information environment. It opened legal and ethical gaps
between known, traditional, legal principles, postulates and institutes and new regulations and demands. At the beginning,
hackers treated with friendliness and sympathy by society, but in the meantime their activities show that they are criminal by
themselves. Waging of such a specific war opens a lot of dilemmas, beginning from the treatment of such activities, the legal
I am the senior partner at a Sydney law firm.
I practise mainly in education law. I have
advised well over 50 educational institutions
throughout Australia. I am President of the
New South Wales Chapter of the Australia &
New Zealand Education Law Association. I
am a member of the US and South African
Education Law Associations and of the

Lieutenant Colonel of Military Police of the
state of Paraiba. Researcher in the Master of
Laws (in conclusion), in Universidade Federal
da Paraíba. Criminal Law Professor of the
Colleges ASPER in Joao Pessoa. Expert
associated at Association Internationale de
Lutte Contre la Cybercriminalité, France.
                                                                  Corvinus University of Budapest,
dr.             László     Fekete           Business Ethics Center, 1828
                                                                  Budapest, POB 489

Master in Law   Tatsiana   Kuliashova     -

                Gergely    Spránitz     Unversity of Pécs

                                                                  Karasek Wietrzyk Attorneys-at-law /
Dr. iur.        Leonhard   Reis
                                                                  University of Vienna

                                                                  Faculty of Law, Masaryk University
                Matěj      Myška
                                                                  Faculty of Law, University of Vienna

PhD student     Balazs     Szemes   Legal Faculty, University of Pecs
                          Department of Philosophy,
Univ.Prof.   Herbert   Hrachovec
                                   .at                         University of Vienna

             Jaromír   Šavelka         Masaryk University in Brno

             Abrar     Muhammad     Univesity of Glasgow
Public versus Private Domain

Free and OS Software: Challenges,
Advantages and Disadvantages

The Law and Economics of WebOS
and Other Online Software

Open Content Licensing and the Law
of Collecting Societies

The True Story of DRM

Combating BitTorrent Protocol
Trademarks and the Slippage of

Legal Aspects of Software Resale

Copyright And Webcasting
It goes without saying that knowledge and information are the most valuable commodities in the new economy. Though
knowledge and information as private goods could provide great business opportunities for rights holders, they exhibit the
distinctive characteristics of public goods. Therefore, the commodification of knowledge and information requires a strict
proprietary regime which restrains free access to and enforces effective legal protection over them. If the accessing rights of
the individual users were free and unlimited the legal entitlements of rights holders would be worthless. The pervasiveness
of the new communications technologies as powerful knowledge sharing systems facilitates their production, use, and
dissemination, and at the same time make difficult to enforce effective proprietary regulation and control over them. In
addition, the social climate does not seem to be particularly supportive to the propertization of knowledge and information.
Free software advances comprehension of importance of communications, open cooperation and democratic decisions. Free
software license is effective legal mean for software protection and development protecting copyright. Patents threaten to
free market rules in area of software supply and development and bring negative impact on technological development of
third world countries. Free software enforces equal development, access to knowledge and brings social benefit. Open
source software is widely used in governmental and public sector as mean lowering cost, creating local employment and
security; creating opportunities for innovation, sharing information technologies, potentially new market opportunities for
small businesses; and closing digital divide. Advantages of free software are low development costs, low cost of investment,
training and low barriers to entry. Smaller companies can innovate. Both sides, those who learn and those who share
The aim of the current paper is to discuss the role of a new generation of computer programs from the aspect of law and
economics, through five chapters, using a real example, called Google. The first chapter, is dealing with the technical
background, requirements and the high-tech development, giving a main outline, e. g. the appearance of online applications,
the specific nature of them compare to the offline ones. The economic importance of these programs is discussed by the
second chapter. Like the pricing and the licensing of open source and closed source online applications. Current chapter is
searching for answers to the followings: Are these services really lucrative? Why is it a great deal? How the changes are
executed in the structure of software industry? The third chapter´ s aim is to show the competition law issues linking to the
topic, with special regard to the case-law of the European Courts on compulsory licensing of IPRS. Important question for

Authors of literary or artistic works as well as holders of related rights enjoy exclusive rights to authorize or prohibit the use
of their works. Collecting societies may be authorized to license works and collect royalties as part of a statutory scheme or
by entering into an agreement with the copyright owner to represent the owners interests when dealing with licensees and
potential licensees. As many authors of literary or atistic works use the internet as a platform for exposing their work ist
seems doubtful, if collecting societies are entitled to protect authors' rights arising from their online works. The issue
becomes more crucial, if authors make their work available under open content licences such as Creative Commons.

Digital rights management systems (commonly abbreviated “DRM”) were introduced in 1994 as a technological tool for
control of accessing and handling the digital content. Since then, DRM were a very controversial topic and the story of
implementing DRM is full of turns and twists. In the beginning DRM were seen as a panacea to the problem of illegal sharing
of copyrighted works. However, the unsatisfied users rapidly cracked the DRM protection and consequently another layer of
protection, namely from law banning such behavior was needed. The main aim of this paper is to provide a comprehensive
overview of the milestones in the development of DRM (e.g. the infamous of SONY Rootkit case, Microsoft’s turning down of
its own DRM system “PlaysForSure”, final giving up of DRM on and iTunes) and analyze the corresponding
response of lawmakers on the international, European and national level. Based on this chronological and legal summary,
The Internet has established an unprecedented method of spreading intellectual goods. However this channel of distribution
is – and was – filled with mostly illegal distribution methods and distributors. The evolution of the infringements of copyright
has led in the last decade to the appearance of file-sharing, the development of which is driven mostly by two factors: the
legal actions of the copyright holders and the development of the networks. One of the mainstream file-sharing protocols of
today is BitTorrent, a distributed way of downloading and uploading files with very little – only a web server and a tracker is
needed – centralized vulnerable infrastructure, which uses the TCP/IP protocol stack for connections. However BitTorrent
was made to grab as much bandwidth as possible, endangering seamless real-time connections (i.e. VOIP, Video over IP),
especially over cable or wireless networks. The legal possibilities currently are woefully inefficient against this type of
A handy Platonism is underlying discussions of "intellectual property" in the Humanities. Whereas "ideas" are considered
immaterial and cannot therefore be claimed by individuals, they have to be *instantiated* to achieve recognition. It is this
manifestation within tangible circumstances that is subject to the rules of law. The question of how concepts can be
implemented in a material setting has been a constant challenge throughout the history of philosophy. Theories about
intellectual property should not take folk Platonism for granted and be aware of more advanced strategies to deal with
cognitive structures. Trademarks can serve as a helpful start. A trademark is the characteristic synthesis of some descriptive
content and an image. It is a visual embodiment of the unity claimed to govern a given commercial offering. Trademarks are,
consequently, often in dispute for commercial reasons. But this raises an interesting question. Most of those lawsuits turn on

The paper discusses legal aspects of software resale. It identifies situations in which it is perfectly legal to resale software and
distinguishes them from those in which it is disputable or illegal. According to its licenses different types of software are
assigned to different classes in order to establish some basic scheme for the work. The first sale doctrine is used as the key
point to analyze various situations and a number of different methods that were designed to overcome the doctrine is being
mentioned and discussed. Recent cases from Germany are also being paid attention to.

This article aims to examine certain aspects of the relationship between copyright and electronic media. Media is a general
word to describe both printed and electronic forms. Printed media includes newspaper publications and magazine etc. while
electronic media broadcasts through mobile, computer, radio, TV and Internet. Electronic media is divided further into visual
and audio. TV and Internet are one of the categories of the visual category. The article focuses on Internet broadcasting with
special relation to copyright. There are more ways for broadcasting than ever before - television and radio, cable and
satellite, telephone and cellular, newspaper and magazines, the Internet. Internet broadcasting is a development in the
electronic media field, which raises legal issue in the contemporary world such as webcasting and copyright. The UN, WTO
and WIPO are seeking to enforce these rights through different international conventions, treaties and agreements. The
The submitted abstract touches the issue of
network management (net neutrality)
besides copyright.
Another appropriate stream would be
Prof. Dr.   Michael     Bogdan

BA          Zdenek      Kucera

Dr.         Dan         Svantesson

professor   Adrian      Mihalache

Mgr.        Michal      Koščík

            Dr.Hisham   Tahat
Professor   Tushar Kanti   Saha
                                      Contracts in Cyberspace and the
University of Lund, Sweden
                                      New Regulation "Rome I"

                                      Connecting Factors on the Internet -
Faculty of Law, Charles University,
                                      Simplicity in Use and a Modest
                                      Economic Approach

                                      Cross-border telemedicine – New
Bond University
                                      area, same legal challenges?

Politehnica University of Bucharest,
                                     Taxing e-commerce

                                      An obligation to disclosure of ISP
Masaryk university
                                      users’ details

                                      Online Consumer Protection in
AL albayt University -Jordan
                                      Jordan,A COMPARATIVE ANALYSIS
                                 “War on Words in the Cyberspace- A
National University of Lesotho
                                 Quest for a Sea of Tranquility”
The new EC Regulation on the Law Applicable to Contractual Obligations (Regulation Rome I), adopted in June 2008, contains
rules dealing with situations involving a conflict of laws in the field of contracts. It will replace the 1980 Rome Convention and
bring about a number of important changes, some of which will affect directly contracts entered into or performed through the

Many of the difficulties which arise when applying private international law rules to the Internet can be solved with the help of
connecting factors, i.e. factors determining the governing law and jurisdiction. The key problem, however, lies in the application
of connecting factors which were originally designed for a non-virtual world. It is necessary to find a method which will satisfy
parties and not affect, in a sense, the legal relationship. Moreover, results of the economic analysis, providing us with the
answer as to which party (to contract or tort) economically benefits from which loci, i.e. place decisive for legal consequences
of the legal relationship and which loci represents the lowest costs for all interested parties to the legal relationship, should be
taken into account and reflected under the modern, private international law. This contribution does not attempt to
determine the most effective loci with the lowest costs, but rather intends to raise questions and to provoke thinking about
Cross-border telemedicine – New area, same legal challenges?
The availability of medical services and products online (telemedicine) creates serious regulatory challenges. Those challenges
are complex where the provider and receiver are in the same country, and even more complex when the provider is not in the
same country as the recipient.
Focusing on Australian law, this paper examines the regulatory challenges associated with cross-border telemedicine.

In the romantic years of cyberspace (1995-2000), the e-commerce was exempt from VAT. Upon the 2000 USA presidential
election, the candidate George W. Bush promised to keep the situation as such. Nowadays, "to tax or not to tax" is no longer
the question. We try, based on an analysis within a mathematical framework, to answer the more meaningful question, "how
much to tax?". First, we examine the issue of the origin versus the destination principle. Then,we review the various means of
taxing in the EU, compared to the ones in USA. Finally, we propose a mathematical model that provides an optimum for VAT,
taking into account the gains of the suppliers, as well as the consumer surplus.

Whether we are talking about criminal investigation or civil procedure, the details of internet service users became invaluable
evidence which is crucial to the success of investigation or dispute.
Whereas the obligation of ISP’s provider to provide traffic data and other details of its users to the investigating authorities is
slowly getting settled under the most countries’ laws, an obligation to disclose such data to the third persons is still intensively
This paper intends to focus on the obligation to disclose such data to a third parties, especially in the light of current cases such
- the decision of German court in Offenburg 4 Gs 442/07 which denied representatives of music industry the right to access
such data,
- the decision of of European court of Justice no. C-275/06 which stated that EC directives do not establish an obligation to
disclose user data to a third party
- current disputes between Youtube vs. Viacom which i.a. deal with the disclosure of user data
This article aims to explore the level of consumer protection on the internet according to the Jordanian laws. Within the few
consumer friendly rules in the traditional principles rules such as in the civil code, Jordan has missed the opportunity to provide
a concrete protection on the online environment. Neither there is a cancellation right for consumers nor do they have a
transparency system in forming the contract. We will examine three of the main rules that have been ignored in the electronic
transaction act, the first is avoiding misleading advertisement, the second is transparency in forming the contract and thirdly
the right of canceling the distance contract.
Cyber is understood as computer and the mathematical analysis of the flow of information. The word “Cyber” comes from the
Greek word for navigator originating in kybernété s meaning "helmsman". Cyberspace is the virtual (nonphysical) space created
by computer systems that is, a shared virtual or metaphorical environment whose inhabitants, objects, and spaces comprise
data that is visualised, heard and touched by surfing internet. In other words, it is an artificial, virtual, conceptually constructed
mental environment or notional space developed using computers. This very idyllic conception of imaginary locale was crafted
by a futuristic designer author William Gibson who coined the term cyberspace in Burning Chrome in 1982 and later
popularised by his sci-fi novel Neuromancer in 1984. There are five areas of privacy in the net: search and seizure, unsolicited e-
mail, defamation, secrecy and the creation of databases consisting of personal information. All of these require legal protection
Professor dr.   Aernout       Schmidt

                Eva           Egermann

Mag. iur.       Matthias C.   Kettemann

PhD             Anna          Nawrot

Mgr.            Alžběta       Krausová

Ing.            Tomáš         Pelka

Mgr.            Rastislav     Guľaša

Mgr.            Tomas         Scerba
JUDr.   Miroslav     Chlipala

Dr.     Paul         Polanski


        Małgorzata   Lesiak

                                      Some considerations concerning the
Leiden University, eLaw@Leiden        ‘game’ of a professional and a digital
                                      rights management system.

Institute for Legal Informatics
University of Hannover                Internet governance: Europe good -
Königsworther Platz 1 30167           China bad?

                                       Humanizing Cyberspace: The
Institute of International Law and
                                       Emergence of the Individual in
International Relations, University of
                                       Cyberlaw and its Implications for
Graz, Austria
                                       States and Their Online Powers

Lund University, Raoul Wallenberg
                                      Human Rights in Cyberspace. The
Institute for Human Rights and
                                      Lesson from European Case Law.
Humanitarian Law

ICRI - K.U. Leuven Sint-
                                      Ambient Intelligence Environments:
Michielsstraat 6 3000 Leuven
                                      Focus on a Human

The Faculty of Electrical Engineering
and Communication Brno University Web 2.0 in security context –
of Technology Department of           Transforming services

Faculty of Law of the Commenius
                                      Concept of a signature – has it
University in Bratislava. Právnická
                                      changed by introduction of
fakulta Univerzity Komenského v
                                      electronic signature?

                                      Act on Electronical Acts, Personal
Masaryk University Brno               Numbers and Documents
                                      Authorised Conversion
Katedra právnej informatiky a
počítačového práva, Právnická
fakulta, Univerzita Komenského v

Warsaw University Faculty of Law
                                    The notion of supranational
and Administration Centre for Law
                                    cyberspace law
of the New Technologies (CPNT)

                                    A comparative analysis of the
CPNT (Center of new technologies    Liability of Internet Service
law) Warsaw University Faculty of   Providers in the context of copyright
Law                                 infringement in the U.S., European
                                    Union and Poland
In his “Rational Fools” Amartya Sen criticizes the adequacy of the ‘homo economicus’ as an adequate foundation for welfare-
economic theory, using the construct of two Paretan liberals facing a question about reading Lawrence’s Lady Chatterly’s Lover.
The discussion is an example of how fundamental issues may be discussed effectively where economy and morality are
combined, while only employing stripped models. In this paper it is investigated whether (and concluded that) it makes sense to
apply these reasoning techniques (from a law-theory position) to the combined economic and moral choices any professional
may encounter when playing a ‘digital-rights management’ game with a computer service that has been designed to regulate
When it comes to the regulation of the internet, is there a difference between Germany (or other EU Member States) and
China? Google and Yahoo! have been strongly criticized for filtering the results of the searches accordingly to the regulation of
the Chinese government. Especially in Europe and the USA protests are running high against this violation of the freedom of
opinion and the freedom to information. But is Europe really acting differently? In Germany, the search engines were asked by
the regulation authorities to block certain websites with right-wing extremistic content. So, if you are looking for certain
content in Germany, you will get a notice from the search engine, that a certain result was blocked and further information is
available under The Chinese government is obliging search engines to block access to websites with
information about Tibet, the Tiananmen Massacre and so forth. Thus, they are trying to limit the access to websites they think
“Governments of the Industrial World”, John Peter Barlow wrote in his 1996 Declaration of Cyber Independence, “I come from
Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. *…+ Cyberspace does not lie
within your borders.” States, however, have not left cyberspace alone and have extended their online powers to regulate most
aspects of online behaviour. But they are far from being the only actor: the individual, as I will show, is progressively emerging
as the central reference point of cyberlaw. Accepting this humanization of cyberspace as a new paradigm for its governance, I
will point to important implications for states and their online powers: Cyberlaw policies by states are limited by human rights
law and the security of the Internet as a goal of cyberspace governance is enlarged by the human security of individual users
against threats from private actors and from the state. The Declaration of Cyber Independence argues that governments “have
Human rights so often tend to be perceived as the rights that are more about “the clouds” than “the ground”. Rethinking and re-
comprehension of the relevance of human rights for the cyberspace is required. This paper will present the number of human
rights that might be crucial for a sustainable existence of cyberspace. They are as following: the right to cultural heritage, the
right to freedom of opinion and expression, the right of everyone to take part in cultural life, the right of everyone to enjoy the
benefits of scientific progress and its applications, the right of everyone to benefit from the protection of the moral and
material interests resulting from any scientific, literary or artistic production of which he or she is the author. Having considered
this the relevant case law from ECJ and ECtHR will be introduced. It will be suggested that the ECJ, while examining the cases
In the present time people have to face a dramatic technological development. Ambient intelligence is one of the IT trends
which are predicted to be massively spread in the future. One can imagine ambient intelligence as an environment with
embedded sensors enabling the environment to anticipate wishes of its users and to adapt itself accordingly. Development and
utilization of such environments, however, entail new threats. The aim of this paper is to identify these threats and to analyze
how the current European legislation deals with them. Focus shall be put on the dangers resulting from a need to collect and
further process all kinds of personal data in order to provide highly personalized services. Ways of possible data misuse shall be
described together with impacts of such misuse on concerned persons. In the conclusion of this paper there will be outlined
In the last 5 years new services, called web 2.0 appeared in the internet. To this category we can add not only applications
written in the AJAX style but also quite new services. In the late nineties, all IT specialists spoke a lot about network security.
From the security view point the present web is similar to network security in the nineties. Many use the new on-line services
without thinking about security. A present on-line service allows not only on-line work but also sharing the web browser
bookmarks, contact lists, and address books. The web 2.0 philosophy is based on participation. If the users are properly
stimulated, they participate in the server content. This participation is overly independent of the subject of interest. That may
be blogs, posts in news groups, etc. One way is following the links, this allows mining from shared information not only the
content which the author wants, but also much information about the author. A simple example may be post in discussion
This paper examines the concept of signature in legal system of the Slovak Republic and its changes in relation to introduction
of the laws regulating the use of electronic signatures. The definition, requirements for and the functions of a signature when
used by natural persons, legal entities, government authorities and courts and its uses for different legal acts are discussed first.
Several concepts of a signature from common law systems are mentioned for comparison to civil law approach. The electronic
signature as stipulated by the laws of the Slovak Republic is then described and compared to other approaches of electronic
signature regulation. The paper concludes with the analysis whether the electronic signature is able satisfy all the requirements
The paper shall focus on current theoretical background of the substance of legal acts in general, together with legal milieu
where electronic legal acts exist. The immediate objective of the paper shall be to familiarize the audience with a new legal
framework passed by the Parliament of the Czech Republic which concerns the questions of personal numbers, authorized
conversion of relevant documents as well as questions arising from the usage of data inboxes. The outcome of the paper shall
be to point out particular positive elements of the proposed bill and to try to sort out possible drawbacks of the agenda. Finally
the paper shall create a space for discussion towards any of the mentioned issues as well as to the philosophy whether the
Key words: Electronic submission, electronic signature, advanced/qualified electronic signature, electronic delivery, electronic
registry, electronic application, commercial register/company's register

Resume: The conference papers contain description of legal frame for electronic submission in the Slovak Republic underlining
approach of public authorities to citizens through use of electronic means of communication. The conference papers contain
analysis of contemporary situation with regards to use of electronic submissions in the area of commercial/company's register,
tax administration, social and health insurance. The conference papers contain practical issues on use of electronic submission

Internet remains largely unregulated on international level, despite progressive harmonisation of national laws not only on the
EU level. Concurrently, several forms of private rule-making mechanisms have emerged ranging from template based licensing
as in the case of copyleft licences, to auction-type contract formation mechanisms to spontaneous norm creation through
adherence to certain established practices. The distinguishing feature of these private ordering systems is a presence of
ubiquitous enforcement mechanisms such as reputation systems, DRM mechanisms and similar technology-oriented solutions.
As a result, in many instances these solutions are self-sufficient in a sense that a reference to national legal orders is rarely
necessary or not needed at all. This does not mean that Internet can function without national legal systems - this would be an
oversimplification as all contracts or license agreements need a national system to fill in lacunas and ensure validity . However,

Legal position of Internet Service Providers has been hotly debated in the US and then in the EU for more than a decade now.
Although the European model has been to a significant degree inspired by the American solution, several important differences
remain. This is not only a result of copyright-centered American paradigm, which can be contrasted with a horizontal regulation
of intermediaries position in the European directive on electronic commerce. The aim of this contribution is to discuss the most
important differences between the two regimes, with a special emphasis on the position of online intermediaries in Poland.
Senior Lecturer Stephanus      van Zyl

Ing., Ph.D.       David        Špaček

                  Sorina       Teleanu

                  Tamás        Szádeczky

PhDr.             Aleš         Pekárek

Dr. iur. habil.   Ludwig       Gramlich

Bachelor in IT, a
student of MA                                akhomenkova@vlasnasprava.
                  Anastasiya   Khamiankova
Program                                      info
           Nico            Reiners

           Justina         Kurek

Dr. Jur.   Károly Bálint   Szilágyi

Mgr.       Libor           Kyncl
Department of Mercantile Law         Technological advances in the music
School of Law University of South    industry may cause some consumer
Africa                               tax problems

Faculty of Economics and
                                    E-Participation and Czech
Administration, Masaryk University,
                                    municipalities - selected practice

Commitee for Information
Technology and Communications,
                                   Electronic public procurement
Chamber of Deputies, Parliament of

University of Pécs, Faculty of Law   Evolution of electronic literacy

                                     The importance of public sector
EPMA CHARLES UNIVERSITY              information sources re-use and
                                     awareness raising in Czech society

                                     Next generation universal service in
Chemnitz University of Technology
                                     the field of electronic

NGO "Business and Technologies       Internet Bridges the Gap between
Development Center"(BTDC)            Business and State
Institute for Legal Informatics
University of Hannover
                                     e-justice in a federal state
Königsworther Platz 1 30167

                                     On-line search as a new challenge
                                     for E-Justice

                                     Electronic company formation in
Szilágyi Law Offie and Jogi Forum
                                     Hungary - a practical review

                                     Free Information Providing and
Masaryk University, Faculty of Law   Personal Data Protection on
                                     Financial Market
The music industry has seen a memorable technological advancement from the vinyl to magnetic tape, CD and now completely
digital in the format of MP3 and MP4 files that can be played by many devices. These digital files are virtually intangible as
transfer from one device to another can be done by merely connecting to the internet or using infrared or Bluetooth
technology. VAT as a consumer tax in South Africa is levied in terms section 7(1)(a) of the Value Added Tax Act 89 of 1991,
subject to exemptions and exceptions, on all supplies of goods and services rendered by a VAT vendor in the furtherance of his
enterprise. Section 7(1)(b) states that VAT will be levied on any person who imports goods to South Africa. Section 7(1)(c)
imposes VAT on any person who imports services to South Africa. This article will discuss how digital music technology
influences the ability of The South African Revenue Services to levy VAT on the sale of digital music and the importation
Today, participation is often underlined due to the called democratic deficit and empirically still tested low public trust in
institutions which have gained the power to regulate the life of a society. Attempts to increase legitimacy of their purposes,
goals and results are clearly visible. Ideas of ICT use for improving quality of government have been discussed and translated
into practice intensively. Today, e-participation represents a single category in some e-government concepts, also in addition to
the concepts of e-democracy or a single category of the e-democracy. In compliance with the e-government movement, e-
participation apparently attempts to improve government by achieving better governance. Municipalities represents usually
front-line administrative institutions. Citizens opinions on quality of their functioning may affect their perception of the whole
administrative system. The paper will deals with selected practice of e-participation that can be visible in initiatives of Czech
The public authorities are not only providers of public services, but also users of goods and services which they procure through
the public procurement process. In the context of the information society’s evolution, transforming the traditional public
procurement system into an electronic one is part of the efforts meant to promote the knowledge based economy. Supporting
the idea of electronic procurement, the European Union has adopted directives and Action Plans addressing this issue. The use
of electronic public procurement brings advantages to the contracting authorities, to the private sector and to the citizens:
more transparency and efficiency in the granting of procurement contracts; diminishing the costs connected with the
procurement procedure, both for the contracting authorities as well as for the economic operators and a more efficient way of
using the public budget. The European Union member states have implemented electronic procurement systems allowing
The article introduces electronic literacy by drawing a comparison between histories of electronic and conventional literacy. It
also shows the technical and legal basis and currently reached achievements. In relation with technical elements it acquaints
with the development and current effects of computer technology and especially the cryptography. In relation of the legal basis
the work presents emerged regulation which made possible legal acceptation of digital signature and electronic documents in
the United States of America, the European Union and its certain member countries including Hungary. The article reviews
formed regulations and developed practice in the field of e-commerce, electronic invoices, electronic records management and
certain e-government functions in Hungary, which are necessary to electronic literacy. The work draws attention to the
importance of secure keeping of electronic documents which is also enforced by legal environment. The author points on
 Public sector information (PSI) is today one of the most important and relevant information sources, including majority of
digital data formats. There still exists lack of PSI re-using throughout the world, but Czech Republic has today quite good
position to learn from the best practices to make a quantum leap to the country with one of the best PSI structure and quality in
the world. However, there is a lot to do to develop current situation and methods of PSI creation, collection, classification and
dissemination to be re-used by the Czech society, including all its parts, especially public sector itself, enterprises, SMEs,
universities, students of different fields, other "mindworking" institutions and individuals. This paper presents most important
initiatives, ideas and actions taken in Czech Republic to enhance and promote PSI re-use, such as EU funded EPSIplus network,
CzechPSI Watch initiative, university programmes including PSI re-use problematics etc. It also highlights some best PSI re-use
Broadband access is a part of an electronic communications service available for the public as a whole at any place in a modern
country which thus should be designated as a new universal service enabling important improvements relating to e-commerce
as well as to e-government. Would this concept be consistent with EC law, which modifications of the directive of 2002 would
be necessary? Moreover, the German Telecommunications Act of 2004 would have to be altered to include an obligation
granting broadband access to every customer at an affordable price. Although German Basic Law does also contain a provision
requiring the Federation to care about “basic” services to be delivered by private operators within the telecommunications
sector, those enterprises might be unwilling if they would have to extend their services to the public in a commercially
unreasonable way. Do public interests or “market failure” in fact justify the ways and instruments of German broadband access
This article takes as a point of potential of Internet as a platform for Public-Private-Dialogue (PPD) between society and the
officials for improving state regulation, building capacity, strengthening advocacy and fostering governance. The aim of the
paper is to examine the practice of BTDC in PPD Platforms designing and promotion in Ukraine and Belarus and indicate the gap
and strength of such practice. We focus on PPD Platform usage on Ukrainian and Belarusian popular resources for business – so
called SME Toolkit (smetoolkit . org). The article explores how trust-based PPD are among Belarusian and Ukrainian Internet
users and how it fosters the involving of the officials, business associations and independent experts in reforming processes.
The current patterns do not encourage dialogue between business and other stakeholders but prove the availability and trust of
Internet as a source of communication between SMEs and the officials. The analysis is based on the results of focus-groups and
What exactly is e-justice? We would like to give a definition and some guidance on e-justice in Germany including references to
the systems in Austria and Switzerland. This presentation of the status quo in the legislation of the countries leads to the arising
problems. For these, we would like to propose possible solutions. The problems to be discussed are: the harmonization of the
legislation, respectively the current non-harmonization and the functioning of e-justice in reality. In real life, e-justice does not
seem to work the way foreseen during the drafting of the laws. This is partly due to the difficulties posed by the use of
electronic signatures. A number of different legislations exist alone in Germany on how documents may be submitted to which
courts. Thus, it seems highly probable that the situation is similar in other Member States. Therefore, it should be discussed
whether it is advisable to introduce a European Standard for electronic communication with courts. This could solve the
The natural consequence of development of Information Society is that investigators should be able to collect evidence in
digital environment. Access to data stored on personal computers enables col-lection of important information about suspects -
for example their plans, habits and contacts. Using hacking tools investigators can detect bank account numbers or secret pin
codes. The development of Internet technologies made it possible to do it secretly, without people knowing that they are be-ing
watched. Furthermore, the methods typically used to commit crimes on the Net such as: Trojan software, keyloggers or sniffers
can be also used by investigators and police to protect citizens and to fight terror effectively.
Are traditional legal measures, typical for off-line police operational activities such as surveillance, bugging telephones,
searching homes or requesting data from third parties, sufficient for on-line investigation? Or is it necessary to adopt a special
Summary: 1. European outlook #1 – relevant directives 2. Legal framework of the Hungarian electronic company formation
system 3. E-procedure: what can be done on-line. Is it enough? 4. Why the technical details matter so much – an overview from
the users point of view 5. Opinion of a practitioner: discrepancy between theory and practice – but why it still works? 6. Live
demonstration of the system 7. European outlook #2 – a brief look at the e-company formation systems in the member states
I'm proposing a 40 minute talk about the Hungarian electronic company formation system based on our law office's
experiences. I'd like to emphasize two question: the electronic procedures provided by the relevant acts and regulations on
one hand, the technical details and execution on the other. In my opinion this talk would be able to demonstrate in detail the
most „developed” aspect of the Hungarian e-government/e-justice regime. Moreover it would be possible to evaluate the legal,
The aim of this paper is to analyze the area of Financial Market from the perspective of free information providing and on the
contrary protection of personal data as two important and antagonistic principles concerning Financial Market and institutional
supervision over it. Especially the internet access to information and personal and commercial data that may never be
Co-author: Forename Kerstin Surname
Orantek Academic title Dr. iur.
Dr. Karoly Szilagyi works as a trainee lawyer
in Szilagyi Law Office, Pécs, Hungary. He is
also a PhD student at the Faculty of Law
University Of Pécs, Hungary and the editor
in chief of the largest Hungarian law-related
web-portal Jogi Forum (information in
engish is available at: jogiforum dot
hu/about). His book “Practical guide to the
Workshop 1: Politics and Identity in the Blogosphere

9.30 - 10.00                   Klimowicz Drabek com

                 Jeong         Kim      

10.00 - 10.30

10.30 - 11.00    Shadi         Zabet    

Workshop 2: Online Communities, Social Interactions and Public Debates

11.15 - 11.45                  Seganti  

11.45 - 12.15    Maria         Pipenko

12.15 - 12.45    Jana          Krátká   

Workshop 3: Between Virtual and Real: Community, Technology and Commerce

13.30 - 14.00    Benjamin      Bigl     
14.00 - 14.30   Patrycja     Rudnicka

14.30 - 15.00   Patrik       Vacek

15.00-15.30     Bartłomiej   Walczak
                                               Blogosphere as a Community. The Case of
          Univeristy of Wrocław

          London School of Economics and       (In)visible silences in the South Korean
          Political Science                    Blogosphere

          Stendhal university- Grenoble 3-
                                               Recognition and self-esteem in Iranian blogs


          London Metropolitan University       The Web as a substitute for the mother figure

                                              Internet as a tool for instrumentalization of
          Ulyanovsk State University, Russia;
                                              sexual relations (by the example of San
          UC Berkeley,USA
                                              –Francisco Bay Area

          Masaryk University, Faculty of       When social subject is not enough: Specifics of
          Education, Department of             social communication and fan activities in
          Education                            virtual Buffy community

and Commerce

                                               Associative Transfer Effects at Computer
          University of Leipzig, Department
                                               Games. Empirical study about transfers in
          of Empirical Communication
                                               shooters, simulations, and sport-/role-playing
                                               games in everyday life.
University of Silesia              Psychological Aspects of E-Learning 2.0

Masaryk University, Faculty of Arts, Long Lens, Short Hands: Digital Camera
Department of Film and               Discussion Forums And The Domination of Tech-
Audiovisual Culture                  Talk Over The Art of Photography

University of Warsaw; Pedagogium The Virtual Fair: Social and cultural dimensions
College of Rehabilitation Pedagogy of B2C and C2C segment of Polish e-commerce
Blogging is one of the most popular Internet activity in Poland. Some
numbers say there is even more than three millions of weblogs. We
have not seen here any occurrences as in American blogosphere (e.g.
Trent Lott’s or Eason Jordan’s cases) and the traditional media still
Drawing from Noelle-Neumann’s still, of silence theory, this paper
play the most important role. Butspiraleven without almost any
explores how the desire for social inclusion in parallel with collective
social pressure in the form of online comment posted by readers
hinders self-expression and interaction in the South Korean
blogosphere. Based on a case study of the candlelight vigil protesting
a beef importseveral theorists (Mead, Honneth, etc.), recognition
According to deal with the United States and the discussion
from others is a process that can contribute the construction of one's
identity. Interpersonal communications, beyond their instrumental
aims, are means of searching for recognition by individuals(Lipiansky,
2005). In this paper we will try to study the question of recognition
produced by the reaction of the blog visitors in Iranian blogs.To have

Some of the earliest studies on cyberspace claim that in virtual
realms there is a potential of becoming immersed in private or
solitary endeavours, and the Web is seen as a matrix providing a
perfect mother substitute. Those studies focused on relationships
developing exclusively in the online dimension. My paper will
confirm their findings showing that cyberspace can work as a tool to
Internet defined the new dynamics and strategies of personal
relations in general and sexual encounters particularly.From cybersex
in chats to web-sites that are specialized in search of partners for
sex. The new territories are developed. For the last two years,
Craiglist- a central network of online free classified advertisements,
became a significant source of only) fans can come alongAnalyzing
Internet is a place, where (not sex encounters in the US. and discuss
the show without the fear of being ridiculed with reactions or
misunderstanding, and a place, where fans routinely analyze and
comment the text in terms of their knowledge of media product
style, genre and production. Furthermore, virtual community
promotes any presentation of fan activities. Due to the possibility of
instant presentation of fans' creative efforts through Internet and

The purpose of this thesis was to adjust the disproportion that the
perspectives of computer game players are often neglected by
scientific research. Online-Communities were the primary platform
to get in contact with computer players. Based on the transfer model
by Jürgen Fritz (Cologne) a two-step model was developed and
empirical proved. The goal was to answer the question if players
recognize transfer effects after having played. First, a quantitative
The scope of e-learning systematically broadens and aside Moodle-
like sites new emerging educational environments are taking
advantages of Web 2.0 and 3D virtual worlds. The case of Second Life
shows off that those environments become more than mere
entertainment as growing number of real-life institutions enter into.
Emerging educational environments resemble everyday experience
of the users. Many students are members of online communities or
 Bigger, better, faster and more rugged seem to be one of the key
words of contemporary tech-oriented vocabulary of camera market
as well as those who own and frequently visit camera technology
discussion groups. Given the classification by the brand, model or
even by the subjective feeling of handling any given camera there
rises a group of users that define and identify themselves primarily
with their dedication to the mere fact of „ownership“ and to a much
The role of electronic commerce in global economy
seems to be well described and analyzed, per instance
in well known Castell’s theory of informational society.
However, there are few studies of e-commerce from
Workshop 1: Children, Adolescents and Virtual Relationships

                                                                      Research Centre Adolescent
13.30 - 14.00    Maarten       Selfhout 
                                                                      Development, Utrecht University

                                                                    Gresec (Groupe de Recherche sur les
                                                  antchen@hotmail.c Enjeux de la
14.00 - 14.30    Yunmin        Chen
                                                  om                Communication),Stendhal
                                                                    University-Grenoble III, France

                                                                    Faculty of Sociology and Social
14.30 - 15.00    Monica        Barbovschi                           Work, Babes-Bolyai University Cluj,

                                                                      Hungarian National Institute of
14.30 - 14.50    Katalin       Parti    

Workshop 2: Teenagers and self-disclosure

                 Michel        Walrave            michel.walrave@ua.
15.15 - 15.45                                                        University of Antwerp
                 Wannes        Heirman  

                                                                   Babes Bolyai University Cluj-Napoca,
                                         Romania, Faculty of Sociology and
15.45 - 16.15    Maria         Diaconescu
                                                  uk               Social Work, Social Work

16.15 - 16.45
                 Hana          Červáková          14219@mail.muni.c Faculty of Social Studies, Masaryk
                 Zdepka        Vykoukalová        z                 University

Workshop 3: Youth, Virtual Identity and Self Presentation
17.00 - 17.30   Andra       Siibak       University of Tartu,Estonia

                                                           University of Wolverhampton,
                Chris       Fullwood                       School of Applied Sciences,
17.30 - 18.00   Libby       Evans                          Psychology Subject Group,
                Neil        Morris                         Wolverhampton, West Midlands,
                                                           WV1 1SB, UK

                                                             University of Wolverhampton,
                Lisa J.     Orchard                          School of Applied Sciences,
18.00 - 18.30   Chris       Fullwood                         Psychology Subject Group,
                Agnieszka   Michalska                        Wolverhampton, West Midlands,
                                                             WV1 1SB, UK
                                                   The current study examined the longitudinal associations of time spent on
Internet Use and Adolescent Depression: the Internet activities for communication purposes (i.e., IM-ing) versus time spent
Role of Friendship Quality                  on Internet activities for non-communication purposes (i.e., surfing) with
                                                   depression and social anxiety, as well as the moderating role of perceived
                                                      Based on the materials associations. interviews with Chinese gathered
                                                   friendship quality in thesecollected in 46Questionnaire data were children,
New Communication Competences:                     their parents and teachers and the observations in 3 cybercafés in 2007, two
Children's practices of the Internet and the       questions have been explored in this study:1) What kind of new
                                                   communication competences have Chinese children acquired via their
transformation in parent-child relationship in
                                                   Internet practices ? 2) Which changes have these new communication
China                                              competencesbrought in the parent-child relationship in China? Main
                                                   findings of the study: 1. Not only the Internet has become a good helper for
                                                   Early concerns about the way children and teenagers are using the Internet
Meet the E-Strangers. Predictors of                have generally followed the trend established by dystopian theories about
Teenagers’ Online-Offline Encounters               ICTs, suspected to have negative side-effects, such as increasing depression
                                                   and loneliness, weakening social ties and promoting superficial relations
                                                   (Kraut areal., 1998, 2002). More recent theories suggest that an authoritative,
                                                   There et two different major changes in understanding of victims nowadays.
Internet hotlines for victims – importance         The victim recently has become more important concerning its scope of rights
and future development                             through the criminal procedure and also its mental peace. The other major
                                                   change is the appearance and instant growing of the internet. As an essential
                                                   part of the public-private partnership (urged by European Commission’s i2010

                                                   When chatting and browsing, teenagers can be inclined or encouraged to
                                                   disclose personal data. To analyse teens’ self-disclosure while visiting
Teenagers and online privacy: balancing            commercial websites and chatting, a survey was conducted among 1318
between self-disclosure and concerns.              Belgian 12- to 18-year-olds. Besides, their privacy concerns, experiences with
                                                   and reactions to unsolicited commercial e-mails were sounded out. Results
                                                   confirm gender and age differences in privacy sensitivity, girls scoring higher
                                                   thanpresent paper discusses the assertivity and protection in the current
                                                   The boys and older teens being more concerned. Also in disclosing personal
                                                   online interactions among teenagers. The statistical data of our research in
Disclosure and Anonymity among Teenagers           Cluj, shows that 90% of teens use IM – instant messenger. The questions of
Online                                             the further qualitative research are based on the premise that teenagers
                                                   choose to disclose themselves online on IM and social networks in order to
                                                   The research belongingness examining possible consequences between
                                                   get a sense ofwas focused on and to exercise assertivity and self-confidence.
                                                   temperamental characteristics of the individual and the way they use mobile
Even the shy can flirt? Connection between phone. Thus, the goal of the research was to find out, whether mobile phone
individual temperamental characteristics and usage differs depending on the degree of extroversion or neuroticism in the
their relation to mobile phone usage         way Eysenck Personality Inventory understands it. The research sample was
                                                   composed of 129 first year university students in the age from 19-23. The
                                     The aim of my article is to show what aspects young people consider crucial
How to become popular on SNS? The    in order to become popular among one`s peers on SNS. Erving Goffman`s
younsgters views on the ought self   (1959) ideas and the self-discrepancy theory of Higgins (1987) is used as a
                                     theoretical starting point in order to introduce the habits of self-presentation
                                     of young peopleto be gendered. For example, women typically use friendlier,
                                     Narratives tend on social networking sites (SNS). The empirical data is
                                     less-dominant language devices. With the advent of computer-mediated
                                     communication (for example MySpace), individuals can socialise, with less
Linguistic Androgyny in Myspace      inhibition, with others online. This makes the Internet more egalitarian and
                                     socially liberating. This paper examines whether such egalitarianism would
                                     be reflected in the use of less stereotypic language devices in an online
                                     context. A range of linguistic devices were investigated in ‘male’ and ‘female’
                                     ‘aboutnetworking sites MySpace. Although women were more likely to use
                                     Social me’ sections on require the creation of a profile page to represent a
                                     user’s image online. This study aims to investigate how accurate these
                                     profiles are in aiding impression formation by other users, when level of
MySpace Profile Construction and     content information is varied. The profiles of three users were
Personality Perception               altered to create four variants, each displaying differing amounts of detail.
                                     Each user completed a personality assessment. Twenty-eight participants
                                     were then split into four groups, and were asked to rate the personality of the
                                     three profilers, based solely on the profiles they were provided with; each
and Internet

and Internet

and Internet

and Internet

and Internet
Workshop 1: Riscs of the Internet: Cyberbullying and Cybercrime

                 Wannes         Heirman  
9.30 - 10.00
                 Michel         Walrave            be

                 Petr           Soukup   

10.00 - 10.30

                 Anna           Ševčíková
10.30 - 11.00                            
                 David          Šmahel

Workshop 2: E-Health

11.15 - 11.45    Mario          Lehenbauer

11.45 - 12.15    Alexander      Voiskounski

12.15 - 12.45    Birgit U.      Stetina

Workshop 3: Individual Characteristics of the Internet Use

                 Sarah J.       Davis
13.30 - 14.00    Jade           Black    
                 Chris          Fullwood
14.00 - 14.30    Cornelia     Schramel

14.30 - 15.00    Nejra        Besic    

Workshop 4: Social groups and the Internet: Non-users, Virtual Teams, Family and Gamers

15.15 - 15.45    Jan          Sládek   

15.45 - 16.15    Francesco    Pisanu

                 Kristian     Daneback           kristian.daneback@socw
16.15 - 16.45
                 Lars         Plantin  

16.45 - 17.15    Serkan       Bicer    
University of Antwerp                Triggers for cyberbullies

                                     Czech Internet – Cybercrime & Typology of
FSV, Charles University
                                     users in the Czech Republic (2005-2008)

Faculty of Social Studies, Masaryk   Cyberbullying among Czech Internet Users :
University                           Preliminary Results

Research and Training Practice,
                                     Health Related Internet Use: Influences on the
Institute of Clinical and Health
                                     Physician-Patient Relationship
Psychology, University of Vienna

Moscow University                    VIEWS ON THE PROBLEMATIC INTERNET USE

Research and Training Practice
Institute for Differential, Biological Online-Information as Source of
and Clinical Psychology Faculty of Empowerment???
Psychology University of Vienna

University of Wolverhampton,
School of Applied Sciences,
                                     The Narcissistic Net: Promoting MySelf on
Psychology Subject Group,
Wolverhampton, West Midlands,
          Research and Training Practice
          Faculty of Psychology, University of Self-Efficacy of Online Health Seekers

          Department of Behavioral, Social,
          and Legal Sciences: Center for       Chatting with peers or strangers: The role of
          Developmental Research , Orebro      shyness in online communication

eams, Family and Gamers

          Department of Sociology, Faculty
          of Arts & Philosophy, Charles        No to the Internet?

                                               When ‘looking at the inside’ is not enough: a
          IPRASE Trentino, Italy               socio-psychological study of the opposing
                                               internal and external forces in virtual teams

                                               Research on Parenthood and the Internet:
          Goeteborg University
                                               Themes and Trends

          Anadolu University Social Science
                                               Imaginary game, real depression
There are basically two ways of approaching the relation between
traditional bullying and cyberbullying: while many studies have
accentuated similarities in both types of bullying, in this article the
uniqueness of electronic bullying is stressed by distinguishing five
The main features of communication technology. The following
triggering goal of our article is to describe cybercrime threats and
victimization of Czech Internet users. For clearer picture we show at
the beginning changes in Internet usage in last four years (2005-
2008) with the use of user’s typology. For our analysis we use data
from World Internet Project (big quantitative survey) for the Czech
Republic. We added a large module about cybercrime to the World
The presentation shows results from the World Internet Project: the
Czech Republic 2008. The research was carried out on the
representative sample of population, more than 2200 respondents
were surveyed in September 2008. We show basic descriptives of the
results in the issue of cyberbullying.

Background: Many people use the Internet health related
information searches and the impact on personal health care is still
unclear. We tried to investigate personal attitudes towards online
health care and possible changes of physician-patient-relationship as
a result of using eHealth applications. Methods: We used the the
Attitudes towards Online Health Care Scale (ATOHC, LaCousiere,
Problematic Internet use, also known as Internet addiction or
dependency, as compulsive, or pathological Internet use, as Internet
abuse or misuse is an often discussed phenomenon, probably the
only one in the field of cybeprpsychology which is fully psychological,
and thus is much less studied in communication science or in human-
The Internet plays a substantially two role as a seem care resource,
computer interaction – the latter largedisciplineshealth to cover the
but its impact on personal health care is still unclear (as stated by
Lehenbauer et al., submitted). The present study investigates
personal attitudes towards online health care in an offline sample
and analyses the general and health related empowerment in
connection with the Internet use. The cross-sectional study was
conducted using a quota sample with 300 participants (52% male,

The increased popularity of social networking sites such as MySpace
has made it much easier for individuals to create their own personal
homepages. In the past males have been found to be more skilled in
the use of the internet, feel more comfortable and tend to be more
self-promoting than females are. This research aimed to investigate
gender differences on MySpace forums and profiles in terms of self-
interest, defined as an excessive interest in oneself and one’s
More than half of the Internet users, so called „health seeker“
(Powell & Clarke, 2002), search for health related information online
(Fox, 2005). The present study investigated information sources and
self-efficacy of so-called health seekers regarding the four main
factors of health behaviour: nutrition, movement, smoking and
alcohol, following the BRAHMS study (Renner et al., 1996).
According to the social compensation hypothesis, shy individuals
benefit from internet use more than non-shy individuals (Walther,
1996). Previous research on shy youths’ online habits shows that
their shyness becomes less online than in face-to-face interactions
(Yuen & Lavin, 2004). Shy youths might be able to express
themselves more freely when chatting online (Sheeks & Birchmeier,
2007), as negative or inhibitory feedback cues from other people

In his presentation, the author gathers various reasons for not using
the Internet. Apart from theoretical reasons, the reasons mentioned
by respondents in WIP surveys will be presented. Other source of
data will be the surveys of Dept. of Sociology, Prague. Using this, the
group of those who say "no" will be described and put into context.
The characteristics of virtual or computer-based teams in socio-
psychological research approaches are very focused on ‘internal’
psychological group dynamics, rather than the ‘external’ ones. These
are often depicted as ‘environmental constraints to the task’
(Cuevas, Fiore, Salas & Bowers, 2004). The aim of my paper is to
explore relationships between virtual teams internal and external
issues, considering them as different sides of the same process. Main
research questions are: in was to conditions do the external relations
The purpose of this study which review articles about parenthood
and the internet published in the medical, educational, and social
sciences. The aim was to identify themes and trends in the available
literature. A building blocks strategy was designed and used to
achieve a high recall rate. By searching PubMed, ERIC, PsycINFO,
In this research, the aim is to define how people of modern times are
bound to an image of a virtual computer world in which clans and
societies live and whose mountains, rivers, forests and residential
areas created by graphic programs designed thanks to the global
technological developments. In this context, the focus is on a very
popular game called “Call of Duty 4” played by thousands of people
                  Kevin      Lande

Mgr.              Petr       Lupač

Bachelor of Art
                  Maria      Iancu
(in Sociology)

B.A., M.A.        Musetta    Durkee

Bc.               Palo       Fabuš

Mgr. Ing. Ph.D.   Miroslav   Vacura

Dr.               Tomasz     Rowioski
                                      The Social Ontologies of Cyberspace: The
Montana State University-Bozeman
                                      Dualism of the Internet

Department of Sociology, Charles
University, Prague, Czech Republic &
Philosophical Institute at the       Discoursive Roots of Digital Divide Research
Academy of Sciences, Prague, Czech

                                      Discursive practices within cyberspace:
University of Bucharest
                                      Negotiating identity and self-positioning

independent scholar (formerly
                                      Subjectivity, Democracy and Rights in a Web
Columbia University, New York
                                      2.0 World

                                      Large numbers of Friends: Significance and
                                      character of informative relationships

Katedra filosofie, Vysoká škola
                                      Ethics of Corporatized Internet
ekonomická v Praze

Cardinal Stefan Wyszyoski University Digitalized Identity: question for the next
in Warsaw                            generation
The social ontology of the internet can take one of at least two forms: First, the internet can be recognized as a
technology for communication among social actors (e.g. Paul DiMaggio et. al. and reports on “addictiveness” to
the internet). Second, the internet can be taken as a sui generis space of social interaction, of normalized and
normalizing behavior (as in Barry Wellman et. al.). Accompanying this dichotomy is a distinction in the means for
defining objects in the theory and in a social agent’s experience. In the first case, the internet is a substantial
object—a technology—predicated on the prior social structures and needs of an extant cultural milieu. In the
second case, cyberspace is itself the presupposed grounding for interpreting and defining needs, objects and
events, such as blogs and video game quests. The methodologies and leading questions that guide projects into

In his presentation, the author introduces decisive actor-networks of the development of information society
discourse. In the second part, the emergence and development of digital divide issue is shown as the part of the
process. Having combined this with contemporary digital divide concepts, the author shows how this process put
limits on proving digital divide as the social problem requiring state interventions and recommends areas of future
research to overcome these limits.

In this paper we offer an analysis of the enactment of culturally intelligible discourse patterns that the individual
employs within cyberspace. The study is sustained with data from arguably the most visited Romanian Internet
address, a sports website. We infer that the plurality of institutionalized discourse forms outlines the engagement
of individual in acquiring various identity positions. As well, it can be implied that in cyberspace prevails
hybridization, as the processes of identification and positioning are constituted inter-subjectively.

Web 2.0, characterized by horizontal intercommunication and multi-leveled participation is, in Deleuze and
Guattari's words, "deterritorializing" dominant, hierarchical modes of information gathering, production and
consumption and is, by extension, demanding new non-hierarchical understandings of subjectivity. Furthermore,
Web 2.0, with its emphasis on horizontal modes of production, relationally-constituted subjectivities that span
time and space, and radically decentralized networks, distinctly challenges Enlightenment configurations of
sovereign and autonomous subjectivity, inherent rights, and essential truths. However, if Web 2.0 both challenges
the dominance of the hierarchical, arbolic Enlightenment framework while also being so promising for civic
participation and a healthy democracy, how do the Enlightenment ideals on which current Western democracies
What good are hundreds and thousands of friends for? What kind of friends they actually are? This study looks
into one of the significant features of social network sites (SNSs) - unusually large numbers of friends one relates
to -, and tries to interpret it in a light of Wittel's concept of 'network sociality'. Wittel suggest there is two types of
relationships: narrative and informative. This study looks into the latter one. First, related accounts by authors
such as Trebor Scholz, danah boyd, Hugo Liu or Eszter Hargittai are considered in order to sketch up a variety
motivation behind 'friending'. Then, a grounded theory approach is taken to identify what kind of information is
delivered within informative relationships of selected SNSs. The major finding of the study includes prevailence of
taste-related and quantitative character of facilitated information. Moreover the ways of it's delivery is analysed in
With the dawn of 21st century everyday life of common citizen of western society becomes more and more
interconnected with Internet technologies and services. Email and web are becoming not only working tools, but in
recent years with advent of Web 2.0 technologies also means of communication with friends and relatives, means
of spending free time and relaxation, tools for education and in some cases they are replacing more traditional
media like television and newspaper. Internet, originally viewed as sphere of research activities, individual
creativity and plurality, is becoming increasingly commercialized and multinational corporations are now starting
to play dominant role. This paper analyzes ethical concerns that are related to this development. We focus on
strategies that corporations use to define ethical standards for their business activities and how they then solve
During the recent time we can observe that technology, especially ICT, has strong impact on our lives - changing
the society and our identity. Digital divide, cyberculture, virtual communities and information society are typical
for our century. We can find a lot of sociological, psychological studies on this phenomena. But there is also
another aspect of technology and informatics development: biotechnology and nanotechnology.
Susan Greenfiled (2008) has point out, that the possibility of brains and genes manipulation might be challenge for
the next generation. The advancement in healthcare to preserve such tremendous brain diseases allow us to
change our brains and genes. If we assumed that mind (identity) could define as personalized brain that is time to
concern how technical (and also informatics) interventions in our brain can shape our personality and identity.
Workshop 1: Religion Online

9.30 - 10.00    Simon         Jenkins

10.00 - 10.30   Libuše        Martínková

10.30 - 11.00   Pavel         Šindelář

Workshop 2: Religion Online

11.15 - 11.45   Vladimir      Dulov

11.45 - 12.15   Marek         Čejka

12.15 - 12.45   Tomas         Gal

Workshop 3: Islam in Cyberspace

13.30 - 14.00   Rüdiger       Lohlker
14.00 - 14.30   Carmen        Becker

14.30 - 15.00   Jens          Kutscher

Workshop 4: Islam in Cyberspace

15.15 - 15.45   Iveta         Kouřilová

15.45 - 16.15   Attila        Kovacs
                                    Holy pixels: creating sacred space and religious
Ship of Fools
                                    community online

                                    Preachers on the Net (From Tool of Evil to
Charles University in Prague

                                    Whose Message Will Win the Souls: Future
Masaryk University in Brno          Development of Religious Life in Cyberspace
                                    and its “Chinese Characteristic”

he South West University in         The Religious Normative System in Semantic
Blagoevgrad                         and Perceptive Continuum of Virtual Reality

                                    Religious Zionist and Religious Anti-Zionist
Masaryk University in Brno
                                    Jewish Groups on the Internet

Slovak Association for the Study of
                                    The regress of on-line religion

University of Vienna                Sufism online: Transformation of rituals
                                      Back to the Source Code: The transformation of
Institute for the Study of Islam in
                                      Salafi knowledge in the Netherlands and
the Modern World
                                      Germany through CMC practices

Friedrich Alexander University of     The Politics of Virtual Fatwa Counseling in the
Erlangen-Nuremberg                    21st Century

Charles University in Prague          New Age Islam on the Internet

                                      Virtual Resistance - Palestinian Islamic Visual
Comenius University in Bratislava
                                      Art in the Cyberspace
In the summer of 2004, Ship of Fools (, an
iconoclastic online magazine and community, launched a
three-month experiment in online church. Church of Fools, as
it was known, was the first project in which 3D virtual world
The aim of this paper is to describe, analyze and interpret
social and culture changes in the field of Christian homiletics
and preaching. Despite some confessional “objections”,
homiletics and preaching as well as missiology and
evangelization are the domains, where the impact of Internet
Internet culminates the in substantial changes. The extent
is enormous and results development of tools for human of
communication. This evolution line begins with appearance of
language and continues with inventions of writing,
typography, radio, television to the contemporary computer
mediated communication. At each stage of applying these

This paper represents the basic moments, which characterize
the virtual analysis of the religious behaviour in the
cyberspace. This type of analysis is established because of the
new dimensions of sensibility, conscious activity and social
communication in computer networks. We have a new
Religious Zionism of space and time, Non-Zionist or even
qualitative natureon the one side andwhich generates specific
Anti-Zionist Jewish Religious groups on the other side are
from the political point of view two very different streams of
contemporary Judaism. The first mentioned stream is
influential especially in internal Israeli Politics. Religious
In the last decade, Internet became to space friendly for both;
religious on-line presentations and also a tool for on-line
religion. Most researchers mention, according the second
way, that the Internet, will provide possibilities to apply
innovative religious manifestations. In those years,
cyberspace was open for various life styles and seemingly
unlimited identities. After the consolidation connected with

New developments in the field of modern Islamic social
movements can be noticed in several fields. Some of
these developments are taking place in real life, some in
virtual life. The Jihadist tendency in modern Islam may
be one of the important aspects present in cyberspace.
Less known is the presence of Sufi movements (i.e.
Islamic mysticism) online since many years. One of the
Computer-mediated communication (CMC) activities framed
as Salafist have been on the rise in recent years. Chat rooms
with online duroos (lessons) following a Salafi 'aqida (creed)
and manhaj (method of practice) as well as online forums
enjoy popularity among Salafi activist. Within this “Salafi web
sphere”, ideas are constantly re-produced and contextualized.
A multitude of fatwa services sprung up broader context
These developments “take place” in the on the Internet of
during the last few years and have grown since. One finds,,, and among them. Yet it is not only these private
Muslim jurisconsults who maintain websites, but also
government-sponsored muftis and agencies have increasingly
established an online presence. At the same time the private

We are currently witnessing an erosion of the traditional
boundaries that separate the ulama’ from popular religious
figures, activists, and intellectuals. Especially on the Islamic TV
channels like Iqraa TV and al-Resalah, a new form of Islam has
emerged and evolved. The direction and style of Islamic
The Palestinian Islamic resistance have make the TV
discourse has been changed in order tomany ways and forms.
One of them is visual art and its several forms as a praticullary
intresing issue: the virtual art of resistance located on many
sites and performed by "artists" or authors as Khaleel or
Eyelash. My paper is foscused on description and analasys of
Islamic orientated visual art during and afther th second, Al-
Aqsa Intifada.