GENL0230 Law in the Information Age and
GENL0231 Law in the Information Age 2.0

Summer 2010-11

Research Essay Questions

 Date Due:    Friday 17 December 2010, 3:00 pm.

Length:        2500 words including references (GENL0230, or GENL0231 if you do an online contribution),
or 4000 words, PLUS including at least a 500 word annotated bibliography, for GENL2031 with no online contribution.

Notes

References: This is an academic essay. Proper acknowledgement of your sources is expected, and is the only way to avoid allegations of the serious academic misconduct of plagiarism (using the work of others without acknowledgement). Be sure to cite (reference) the sources of all your assertions with full bibliographic details in either footnotes or in-text references, and provide a Reference List of them at the end. Note that a mere URL or web address is not by itself a reference: you should provide all the traditional information, and you can add a URL optionally at the end. Be consistent in your attribution and reference style, ideally using an accepted Style Guide.

Authority of sources: Be careful not to cite anonymous or non-authoritative sources as support for the truth of what is said in them: if you must refer to Wikipedia, for instance, it should be on the basis that while text in it may be true, nothing in any entry can really be relied upon without further scrutiny of its sources. This is also true of many blogs and populist or 'infotainment' mass media outlets. 'Newspapers of record' like Sydney Morning Herald may contain errors of course, but can be more easily relied upon in relation to the basic events in news reports. The presumption is reversed for instance for a major peer reviewed academic journal which has been independently checked: you can generally expect to be able to rely, to a reasonable extent, on the content, especially if it is from a well known author writing in their field of expertise.

Style Guide: If you want to adopt a common legal Style Guide for citations, you can use the Melbourne University Law Review Style Guide, now called Australian Guide to Legal Citation 2nd edn. (2002) at <http://mulr.law.unimelb.edu.au/files/aglcdl.pdf >, viewed 12 December 2009. This is particularly useful for how to cite cases and legislation. However, you are welcome to use any Style Guide commonly used in your major area of study.

Format: Papers must be handed in in hard copy, to the student counter at the Law School building on level 2. Email submissions will not be accepted without prior arrangement. Please keep a digital backup of your master copy, so you can provide it on request if there is some problem with the paper copy.

Cover sheet: You must use a cover sheet on the front of your paper. It is available at the law counter, or you can download and print one from <http://www.law.unsw.edu.au/Current_Students/forms/AssignmentCoverSheet.pdf >.

Answer one of the following questions.

NB: If you are doing GENL0231, you may wish to also additionally observe the implications of Web 2.0, social networking or user generated content developments for your answer.

  1. Problems with consumer confidence resulting from risks to security of online transactions and a history of internet scams have been nominated as factors that have inhibited the growth of e-commerce in Australia, including banking as an optional special case. Assess the level of protection from Internet scams that the law currently offers to buyers and sellers, or online banking customers, on the Internet, offering any suggestions for measures that may improve consumer confidence. Look in particular at the recent review of the EFT Code of Conduct in Australia, the proposals to transfer liability for unauthorised transactions related to computer malware infections to customers, and the contrary outcome in New Zealand, where this proposal did go ahead, leaving the two countries with different rules in this area.

  2. The regulation of the Internet in Australia is characterised by attempts to prevent certain conduct. The Interactive Gambling Act 2001, the Spam Act 2003 and Schedule 5 and 7 to the Broadcasting Services Act 1992 all aim to prohibit specified activities in relation to the Internet, and to assign responsibility and partial immunity to ISPs and others. Assess both the effectiveness of these three Acts to meet their stated aims, and the overall approach to Internet regulation in Australia. Compare at least one of these with an international counterpart, such as in the US, UK, HK, Singapore, or Europe. [For the specific issue of censorship, see the question below.]

  3. The Labor government proposes to commit c.40 billion dollars to extend broadband infrastructure, via the National Broadband Network. Assess the likely impact of the rules about competitive access, and argue the case for either stronger controls on competitive access to the proposed infrastructure funded by this public subsidy, or a more ‘free market’ approach that takes less account of regulation designed to restrain monopoly behaviour (and that thus may result in a different structure for telecoms access services). Frame your answer with a view to the best interests of users, especially poor, disadvantaged, regional, disabled or elderly users, or the broader public interest, not the interests of market participants or specific businesses.

    Refer to any document or statement issued during the course by the Minister, Senator Conroy (and his colleagues in parliament from any party or none) in relation to the operation of these provisions, or the handling of proposals, and material coming out of Parliamentary proceedings, reports, and related documents.

  4. While some critics hold the view that Australia’s various defamation laws stifle public debate, others think that they are necessary in order to protect people’s reputation from unfair damage. Review up to four defamation cases decided in Australia in the last 10 years, especially those decided since the uniform national changes to the law in 2005, and provide your view on the level of protection the law offers to both reputation, on the one hand, and free speech on the other.  Also comment on any other recent legal developments which might affect a citizen’s capacity to freely express themselves about any topics they choose, and in any media.

  5. The Classification Act 1995 and the Guidelines for the Classification of Films and Computer Games 2003 have been used to classify and in some cases prohibit the sale of computer games in Australia. One of the reasons that games might be banned is that they are classified ‘R18+’. Examine two recent decisions of the Classification Board or the Classification Review Board relating to computer games and present your views on whether the Australian system for classifying games adequately meets the needs of both games users and the wider community. Take into account well supported and researched arguments and evidence about the impact of the more recent examples of immersive, violent multiplayer online games, where relevant, and refer to reliable evidence about whether this causes harm in your answer -- do not just assert a position without considering in detail the arguments of the other side, and the evidence and experience material which may support their case.

  6. Alternatively, outline the arguments both for and against mandatory ISP level content filtering using the confidential 'RC' blacklist from ACMA. Consider which types of behaviour might be targeted (inadvertent or deliberate), what types of content (just 'child porn' or a wider range, and if so how classified), what methods (just http/Web or others like P2P etc.), and how the list is made and what might be on it. Consider evidence about the effectiveness or otherwise of this for various purposes especially promoting the interests of young people, and compare with other means to eg. protect against the harm from child porn. Consider international comparisons, and draw on infromation from recent debates, including the UNSW forums. Also consider how, if possible, the proposals could be implemented without Parliamentary support for changes to legislation.

    Supplementary note: this is a large topic, so we suggest you restrict your paper to only one or a few aspects. Perhaps the real and imagined needs of parents concerned about their offspring engaging with online material, and the degree to which the proposed static filter will deliver on consumer expectations. Is a flawed scheme better than nothing, a contribution to an overall suite of remedies, or in some way worse than nothing (perhaps due to encouragement of a false sense of security)?
    - Make sure you specifiy the way you are limiting the scope of the discussion.
    - Avoid simplistic reiterations of passionate advocacy positions, investigate the extent to which evidence exists to support or undermine positions: assess the strenght of the arguments.

  7. In both the US and Australia record companies have been diligent in pursuing companies or individuals that provide software or online services which might enable users to exchange music files at little or no cost, with a view to making them also liable for unauthorised copying by their customers. Taking into account the key court cases about such file sharing, and who is responsible for what (including those dealing with iiNet, Cooper, Kazaa and Grokster cases), assess arguments made by record companies seeking to protect their rights and those of their artists; software providers; and the users who benefit from the software. Comment on whether the changes to the law introduced by the Copyright Act amendments in December 2006 have affected or improved the balance in any significant way, or consider how the recent case started, but not yeat heard in court, against iiNet fits in with the principles developed in those earlier cases. In particular consider the impact of the iiNet v Roadshow and others case in the Federal Court in 2010 (appeal decision due any day).

  8. (New topic) Wikileaks: is it journalism? National Security threat? Illegal? (Necessary?) secrecy of state v. levelling intent of individuals? Describe the key legal features of the recent publication of the next in the series of US diplomatic cables by Wikileaks. Set out the competing arguments from supporters, impartial observers and critics concerning the risks and benefits of the activity, how it should be characterised, the basis for it to be legal or illegal, and ramifications for say the reintroduction of a D-Notice style government gag system in Australia, or the impact on the proposed Internet filter: Does its RC category test mean this material could be filtered? Refer as much as possible to expert legal commentary, not just popular narrative or news.

______________________

NB: Answer only one question out of 1. to 7.  above.

Hand in your essay to the Law School office on Level 2 of  Law Building with a signed cover sheet available from the Law School office.  (Only students who will be overseas or interstate on the due date will be permitted to submit via email, and ONLY by prior arrangement. )

This research essay is for individual student assessment and is not a collaborative assessment exercise. You must properly acknowledge any secondary material, and otherwise comply with all plagiarism rules. Complete and consistent referencing is expected.

For more information, including information on the use of footnoting, see the guidelines set out by the Law School, extracted below in part:

http://www.law.unsw.edu.au/Current_Students/adminInfo/misconduct/index.asp

 

Rules for the Acknowledgment of the Work of Others    
Essays or other written work reflecting research by students submitted for assessment should always give due acknowledgment to the sources which have been used. The basic principles are that you should not attempt to pass off the work of another person as your own, and you should enable a reader to check in the original source the information and ideas which you have used. It is difficult to be more precise, but the following are examples of breaches of these principles:

A.     Quotation, without use of quotation marks. This is a common, and very serious, breach. It is a serious breach of these rules to quote another's work without using quotation marks, even if one then refers to the quoted source. The fact that it is quoted must be acknowledged.

B.      Significant paraphrasing - eg several sentences, or one very important sentence, which in wording are very similar to the source. This applies even if the source is mentioned unless there is also due acknowledgment of the fact that the source has been paraphrased.

C.      Unacknowledged use of information or ideas, unless such information or ideas are commonplace.

D.     Citing sources (eg cases, texts) which you have not read, without acknowledging the 'secondary' source from which knowledge of them has been obtained.

These principles apply to both text and footnotes of sources. They also apply to sources such as teaching materials and to any work by any student (including the student submitting the essay) which has been or will be otherwise submitted for assessment.

 

MARKING GUIDE - RESEARCH ESSAY - 60% option (GENL0230, or GENL0231 with online contribution)

 

Accurately stating

law/policy

and general understanding and analysis of the issues

 

 

Original ideas, arrangement and presentation of material, quality of writing

 

 

 

/10

Selection and use of resources

 

 

 

 

 

 /10

Total Mark

 

 

 

 

 

 

/60

Law

/20

Issues

/20