Abstract:
In the past decade we have witnessed a rapid expansion of the Internet gadgets, Internet services and internet applications. This revolutionary communication network has significantly changed the way people live, communicate, and conduct business. However, from legal perspective all of these new challenges remain under covered, things that frequently could generate harm, abuses and cybercrimes. Therefore, by this research, it is proposed to discuss the main risks, which are generated by using of uncontrolled OTT and present perspectives of regulations. The article includes topics such as description of OTT regulations practices used for the moment, problems generated by chaotic regulations of OTT, perspective that we have to take, need for licensing and certification of new internet applications and services, setting of quality standards, and proposes for involvement in development.
References:
[1] BACKER, MCKENZIE, EU intends to regulate Over-the-Top ("OTT") services, Germany 2016. Available at: http://www.bakermckenzie.com/-/media/files/insight/publications/2016/ 03/eu-intends-to-regulate-over-the-top-ott-services/al_germany_regulateottservices_mar16. pdf?la=en[Accessed 14 Dec. 2017]. [2] BEREC, Report on OTT services, 2016.BoR (16)35. Available at: http://berec.europa. eu/eng/document_register/subject_matter/berec/reports/5751-berec-report-on-ott-services [Accessed 14 Dec. 2017]. [3] COMMONWEALTH TELECOMMUNICATIONS ORGANIZATION, Research Study, The Dynamics of Over-The-Top (OTT) Services, 2016. Available at: http://www.cto.int/ media/CTOOTTStudyPaperFinal_ReviewedDraft04Oct2016.pdf [Accessed 14 Dec. 2017]. [4] ETNO Response to the Public Consultation on the draft BEREC Report on OTT services BoR (15) 142, 2015. Available at: https://etno.eu/datas/positions-papers/2015/Reflection-Documents/RD418%20-%20BEREC%20OTT%20services.pdf [Accessed 14 Dec. 2017]. [5] "Internet Manipulation." Wikipedia. Wikimedia Foundation, Available at: https://en.wiki pedia.org/wiki/Internet_manipulation[Accessed 14 Dec. 2017]. [6] "Introduction to OTT", OTT Source. N.p., 22 Mar. 2013. Web. Available at: http://ott source.com/ott-tutorials/introduction-to-ott/ [Accessed 14 Dec. 2017]. [7] PALLERO, J., JIT SINGH CHIMA R., Proposals for regulating internet apps and services: understanding the digital rights impact of the “Over-the-top”, 2017. Available at: https://www.accessnow.org/cms/assets/uploads/2017/08/Access_Now_OTT-position%E2%80%93paper.pdf [Accessed 14 Dec. 2017]. [8] WEEDON, J., NULAND, W., STAMOS A., Information Operations and Facebook, in: Information Operations and Facebook, 2017. Available at: https://fbnewsroomus. files.wordpress.com/2017/04/facebook-and-information-operations-v1.pdf [Accessed 14 Dec. 2017]. [9] BERGER, J., MILKMAN, K. L., What Makes Online Content Viral? in: Journal of Marketing Research, 2012. Available at: http://jonahberger.com/wp-content/uploads/ 2013/02/ViralityB.pdf [Accessed 14 Dec. 2017]. [10] PANDAY, J., An Over-The-Top Approach to Internet Regulation in Developing Countries, in: 2017 revised draft OTT regulation (Indonesia), 2017. Available at: https://www.eff.org/deeplinks/2017/10/over-top-approach-internet-regulation-developing-countries [Accessed 14 Dec. 2017]. [11] LI, W., & ANTHONY, B. (In press), Internet and Video Game Addiction, in: Oxford Bibliographies in Social Work. Ed. Edward J. Mullen. New York: Oxford University Press. [12] "Over-the-top Media Services", Wikipedia. Wikimedia Foundation. Available at: https://en.wikipedia.org/wiki/Over-the-top_media_services [Accessed 14 Dec. 2017]. [13] Policy Department A: Economic and Scientific policy, Over-the-Top players (OTTs), Directorate General for Internal Policies, European Parliament, 2015. PE 569.979. [14] GUPTA, S., GUPTA, P., AHAMAD, M. and KUMARAGURU, P., Abusing phone numbers and cross-application features for crafting, targeted attacks, in CoRR, abs/1512.07330, 2015. Available at: https://arxiv.org/abs/1512.07330v1[Accessed 14 Dec. 2017]. [15] SAHIN, Merve, Over-The-Top Bypass: Study of a Recent Telephony Fraud. Available at: http://s3.eurecom.fr/docs/ccs16_sahin.pdf [Accessed 14 Dec. 2017]. [16] REAVES, B., SHERNAN, E., BATES, A., CARTER, H., and TRAYNOR, P., Blocking cellular interconnect bypass fraud at the network edge, in USENIX Security, 2015. [17] ITU Study Group 3, Question 9/3. Ott bypass. International Telecommunication Union. Available at: https://www.itu.int/itu-t/workprog/wp item.aspx?isn=10892#TOP. [18] CHIN, E., FELT, A. P., SEKAR, V., and WAGNER, D., Measuring user confidence in smartphone security and privacy, in SOUPS ’12, 2012.
Publication:
Including a Workshop on Smart Cities organized by the Congress of Local and Regional Authorities of the Council of Europe
Proceedings of the Central and Eastern European E|Dem and E|Gov Days, May 3-4, 2018, Budapest
Facultas, 1. Ed. (14 May 2018), 506 p.
ISBN-10: 9783708917375,
ISBN-13: 978-3708917375,
ASIN: 3708917375506
Editors: Hendrik Hansen, Robert Müller-Török, András Nemeslaki, Alexander Prosser, Dona Scola, Tamás Szádeczky