Whose name is it anyway? With the explosion of the commercial internet industry names and domain registries have become the preverbal golden goose for some and a nightmare for others. Many famous people and well know companies have fallen prey to cybersquatters and typosquatters. The terms cybersquatting and typosquatting are two topics that are separate and distinct however they are closely inter-related. Cybersquatting is defined as registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark. Typosquatter is registering domain names which closely resemble high-traffic websites, but feature common misspellings and consumer confusions .
Cybersquatters unethically register domain names in hopes that someday a person or group will want to register a website with the intent that that person would be willing to pay a large amount of money to recover the rights to the domain. Due to the increasing commercial use of the internet the act of cybersquatting has cause a lack of availability of domain names for people, business and organizations wishing to conduct online activity. Many well know organizations, celebrities and private citizens are suffering greatly from cybersquatters registering domain names. Cybersquatting is a simple act to conduct. The cybersquatter can simply register a name for a very low cost and hold onto to it in hopes of selling it for big profits.
Many people, companies and organizations believe in the simple belief that their name is their property. Furthermore many companies and organizations that have legally registered trade mark names should be granted protected to file a domain name under their trademark without having to fight for the righ...
... middle of paper ...
...11, from Cybersquatting.com-The Domain Law Resource: http://cybersquatting.com/
McCarthy, K. (2001, November 26). Kevin Spacey loses pivotal cybersquatting court case. Retrieved from The Register: http://www.theregister.co.uk/2001/11/26/kevin_spacey_loses_pivotal_cybersquatting/
Mitchell, R. L. (2005, June 25). Computer World. Retrieved October 16, 2011, from Computer World: http://www.computerworld.com/s/article/9134605/Domain_name_wars_Rise_of_the_cybersquatters
Pollick, M. (2003-2011). Wise Geek Clear Answers For Comon Questions. Retrieved October 11, 2011, from Wise Geek: http://www.wisegeek.com/what-is-a-typosquatter.htm
Wayne, H. P. (2001). The AntiCybersquatting Consumer Protection Act & Sporty's Far, LLC. Technology Law Journal , pp. Vol 16 Issue 1, p205,24p.
WIPO. (n.d.). Retrieved from World Intellectual Property Organization : http://www.wipo.int
“Processor Editorial Article - Antitrust Laws: Not Just For The Big Boys.” Editorial.Processor 19 Nov. 2004: 27+. Processor.com. Web. 29 Nov. 2011 .
Web. The Web. The Web. 9 May 2012. Lipking, Lawrence I, Stephen Greenblatt, and M. H. Abrams.
"Internet History Sourcebooks Project." Internet History Sourcebooks Project. N.p., n.d. Web. 23 Nov. 2013. .
22 Oct. 2013. Mark A. R. Kleiman. “How To Regulate and How Not to.” Web log post. Room for Debate.
Modern scholars have in the recent decades engaged in the controversial debate on the actual classification of the group Anonymous. Some scholars classify the group as trolls while other associates it with hackers groups. As defined, hackers are individuals or groups that search and exploit the computer system weakness (Messmer 65). In most instances, hackers engage in discouraging and unappealing activities for multiple reasons including challenging the existing systems, protesting against the prevailing rules and regulations, and for profit making. On the other hand, trolls are groups of individuals who engage in the process of sowing discord on the internet through instigating arguments that aim at upsetting community members and leaders (Keith 11). Trolls are also popular for posting off-topic, extraneous, and inflammatory information on the internet. Although hackers and trolls are the main actors in the current threatening cyber crimes, the two groups have varying reasons for abusing the existing technology. Moreover, despite the existence of detailed and intensive strategies to address the two groups of crime, the actors have been outshining the global policy implementers and formulators in numerous occasions (Messmer 65). However, based on the available evidence, the Anonymous group is more of a hacker group than a troll group.
Leiner, Barry. "Internet." Encyclopaedia Britannica. Encyclopaedia Britannica Online Academic Edition. Encyclopedia Britannica Inc., 2013. Web. 30 Nov. 2013
Halsall, Paul. "Internet History Sourcebooks." Internet History Sourcebooks. N.p., Aug. 1997. Web. 31 Dec. 2012.
The 20 Enemies of the Internet. 1999. Radio Free Europe / Radio Liberty. Feb 20, 2001. <http://www.rferl.org/nca/special/enemies.html>.
Nissan Motor Co. would be concerned about the use of the two domain names being used by Nissan Computer Corp for several reasons. Firstly, as the Web has become a major marketing tool, customers and potential customers of Nissan Motor Co. might have difficulties finding their information due to the two domain names currently owned by Nissan Computer Corp. Ultimately this could result in the company losing profits if customers are not able to access their website. Another concern would be in regards to the names of the companies and possible confusion of these names by customers. Evidently, persons could presume that there is a connection between these two companies especially taking into consideration the fact that Nissan Motor Co. started marketing cars in the US with the name Nissan in the late 1980s. Following this, in 1991, Nissan Computer Corp was formed with two domains names being acquired Nissan.com and Nissan.net in 1994 and 1996 respectively.
The. Internet. The Internet. The Internet. 19 Nov. 2013. Available: http://web.ebscohost.com.ezproxy.lib.purdue.edu/ehost/detail.
As the Internet becomes more popular, Dot-coms also become more prosperous. And the pace of the world becomes faster as well. Nowadays, with these huge changes in information transmission, some nonmarket issues gradually appear in this new industry because of its characteristics of free-resource, high-speed and anonymity. In this case about HiMoney.com, this firm got two pressing nonmarket issues since it launched last year. One was concerning the conflicts between two groups in this year¡¦s presidential election in Taiwan. Another issue is targeting the free-resource in the Internet. A similar case that happened recently is Napster.com (a dot-com that provides software to let people download MP3 music for free). I¡¦ll talk about it later in detail.
McGuffin, Chris, and Paul Mitchell. “On domains: cyber and the practice of warfare.” International Journal 69.3 (2014): 394+. Academic OneFile. Web. 5 Oct. 2015.
The first step is to register a domain name. A domain name is used to identify your unique location on the web. There are a...
The 90's internet boom gave rise to new ways of writing in through access to cyberspace. What used to be printed or handwritten on physical surfaces such as paper, cardboard, or bulletin boards has changed to 0's and 1's, bits and bytes of digitized information that can be displayed thru the projections of computer screens. Moreover, the internet has made the process of publishing one's works, writing letters, or chatting with one another much easier and convenient for everyone around the globe. The internet became a universal tool, giving much freedom and flexibility to the users; it gave them opportunity to deliver their thoughts with little or no restrictions. Since it's impossible to regulate all cyber-activities, internet users are often unrestricted by the normal laws or authorities that would set boundaries around the various online transactions. More importantly, the fact that a net user can take on different identities in cyberspace brings about several ethical and social issues. These anonymous and unrestrictive characteristics of cyberspace often permite abusive users to easily involve themselves in serious cybercrimes such as cyberstalking, cyber-rape, and cyber-harassment through chatting services, emails, cyber communities, and other online communication.
Cybercrime is a global issue plaguing the world. The dictionary defines cybercrime as “crime conducted via the Internet or some other computer network”(Merriam-Webster). The definition remains very broad because the word “cyber” is defined as “relating to the culture of computers, information technology, and virtual reality.” Due to the growing number of people gaining access to the internet, rapid development of technology, and the globalization of the world, more of the world population is becoming susceptible to involvement in cybercrime – whether it be as a victim or a criminal. Cybercrime involves different levels of the world on both the victim and criminal side, from an individual citizen, to small groups, businesses, and the government, to the countries of the world.