4. RoadMap Mobile Mayhem: What Can the ‘Net Teach Us About the Future of Mobile Environments? Failures of Real-World Enforcement Regimes in Novel Contexts Incentives: Workable Alternatives to Enforcement
5. Mobile Mayhem: Mutating Issues “Measured in terms of depravity, insularity and traffic-driven turnover, the culture of /b/ has little precedent. /b/ reads like the inside of a high-school bathroom stall, or an obscene telephone party line, or a blog with no posts and all comments filled with slang that you are too old to understand.” –Matthias Schwartz, “The Trolls Among Us,” inThe New York Times, 2008 Marginal Conduct Appeared on the Internet Immediately
22. Mobile Commerce is now much more threatening to personal privacy than any world government.
23. Mobile Mayhem: Holistic Approach Invasions of Privacy Hate Speech, Cyber-Bullying, Kid-to-Kid Explicit Chat Adult Content Accessible to Children Users Must Be Protected from Social AND Economic Misconduct in Online Environments Deceptive Advertising Fraud/Scamming Technical Attack
26. Fraudulent Apps or WebsitesMobile Devices offer more varied means of contact, increasing risk that user will be unaware of threat and trust communication too easily.
37. The U.S. system of COLLECTION SALE, and RESALE of personal information cannot be allowed to migrate to mobile markets.
38. Traditional Enforcement Regimes have been Forced into Novel Environments (the internet, virtual worlds, and now the mobile marketplace)
39. Enforcement is Ineffective Low Equipment Cost $1000s Profit Through Comm. Fraud Strong Incentive to Defraud + = Many Wrongdoers Engaging in Fraud Strong Incentive to Defraud Ineffectiveness of Even Harsh Penalties + =
48. The Myth of the Tech-Savvy Third Grader: She may know which buttons do what, but she does NOT know how to keep herself [or her (parents’) money] safe.
49. Make Abuses Less Profitable! Lower Profit Margins, and Lower Incentive for Abuse Lower Profit Margins, and Lower Incentive for Invasion Fewer Users Falling For Scams Fewer Devices Vulnerable to Attack Fewer Users Allowing Privacy Invasions Competitive Marketplace for Non-Invasive Products + = + =
You can be tracked via GPS, RFID, Cell tower, or Wifi access point.
15. Commerce, not the government, has proven the greatest invader of personal dignity and privacy.
Buying products for the phone from carrier-approved markets (the App store, the Android market)Buying products from WITHIN apps- whether online shopping for real products like this shopsavvy screenshot, or buying virtual objects in exchanges like Pocket Empire’s stock exchange (screenshot available on the regulating private money slide).“Upsell” products- premium texts, multimedia plans, etc.
16. This will become significantly more important as our computers -- in the form of smartphones -- follow us everywhere we go and monitor everything we do. Thus, the final recommendation that I make is that personal information collected by a provider be used only for the purposes for which it was collected; it cannot be resold, or traded, or used by other party without express opt-in permission on a per-operation basis.