UTS, Leadbolt to lead research on mobile commerce standard
- 12 March, 2012 17:40
The Communications Law Centre (CLC) at the University of Technology, Sydney and mobile advertising company Leadbolt have teamed up to develop a mobile commerce standard.
The research partnership will look into the current framework of the m-commerce industry worldwide to establish best practice legislation, codes of conduct, industry standards and market regulation.
CLC director, Professor Michael Fraser, told Computerworld Australia that the CLC-Leadbolt partnership will largely focus on consumer rights and protection strategies, such as denying advertisers from accessing personal and sensitive consumer information for targeted ads.
“We’re trying to address privacy issues and try to work out what is the right way to protect privacy for mobile phone users,” he said.
“[We’re trying to protect consumer personal information] from being taken from their mobile devices and used for other purposes… so that advertisers can target their advertisements, so we’re concerned that private information should not be used without consent of the mobile phone user.”
With the use of smartphones set to increase by the day, both parties decided urgent work was needed on updating specific legislation and closing regulatory gaps to support m-commerce and its long-term future.
“There are many regulatory gaps in how to manage privacy in the Cloud across jurisdictions; it’s not working effectively and so we’re looking at not only questions of law reform, but we have concerns that law reform is not keeping pace with the developments in technology,” Fraser said.
“We have to address the gap by a means of developing the industry standards and codes with the cooperation of industry peak bodies to protect the consumer and protect industry so that everybody knows what the ground rules are and can use their new technologies with confidence.
“The issues of privacy protection are just one area in which it’s very difficult for law reform to keep up with the very fast pace of change and so it is good to see industry taking the initiative and working with academics and technology specialists and lawyers to try to fill that gap and try to deal with these problems and regulate them themselves while the legislation is catching up.”
The research will be conducted by UTS academics who are affiliated with the CLC and industry participants, with those involved currently still defining the scope of the research but will start work on the codes and standards soon.
Follow Diana Nguyen on Twitter: @diananguyen9
Follow Computerworld Australia on Twitter: @ComputerworldAU
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Moving to a Private Cloud? Infrastructure Really Matters!
The Cloud isn’t about locality. It is about quality of service delivery, cost, and whether the services consumed satisfy our objectives. For the enterprise, you need to select the right QoS to mitigate the inherent risks or you face the problem of losing data and the ability to execute operationally. Read on.
How the Cloud Changes the Game for Line of Business Managers in Midsize Companies
It can be argued that what distinguishes midsize businesses most from large and small companies is not size, but attitude. While attitude alone cannot mitigate the challenges faced by midsize businesses, technology can help. And no technology offers more promise than the cloud. This paper, explores midsize business challenges from the perspective, not of the IT department, but of the line of business managers they support. Read on.
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
Enterprises and government agencies are under virtually constant attack today. It is clear that the cybercriminals, nation-states, and hacker activists waging these attacks are growing increasingly sophisticated and more effective in their efforts to steal and sabotage. Why are today’s security defenses failing? In this battle, your security teams are using outdated arsenal - download now to learn more.