{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:02:45Z","timestamp":1754157765993,"version":"3.41.2"},"reference-count":11,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2006,2,1]],"date-time":"2006-02-01T00:00:00Z","timestamp":1138752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,2,1]]},"abstract":"<jats:p>This paper examines what role the law can and should play with regard to unreliable information available on fast communication networks, such as the Internet. Users of electronic information find it increasingly difficult to assess its reliability. The traditional structures for assessing reliability are lacking or function inadequately. Clear social norms have not yet been developed. As regards the law, traditionally liability law is the first legal guard against undesirable societal developments. We conclude however, that liability law is an inadequate remedy for unreliable information. Self\u2010regulatory\ninitiatives such as trust mark seals for websites providing reliable information offer a more promising perspective, although these also have their limitations, especially in the sphere of enforcement and legitimacy. In this paper, self\u2010regulation is nonetheless hailed as an important instrument because it provides an indispensable test\u2010bed for more concrete legal norms derived from reliability criteria for information. Even if self\u2010regulation may not completely materialise, discussion about self\u2010regulation could be a stepping stone to the development of pertinent social norms.<\/jats:p>","DOI":"10.1108\/14779960680000281","type":"journal-article","created":{"date-parts":[[2010,6,5]],"date-time":"2010-06-05T07:14:13Z","timestamp":1275722053000},"page":"49-59","source":"Crossref","is-referenced-by-count":3,"title":["Unreliable information on the internet: a challenging dilemma for the law"],"prefix":"10.1108","volume":"4","author":[{"given":"Maurice","family":"Schellekens","sequence":"first","affiliation":[]},{"given":"Corien","family":"Prins","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"volume-title":"A Declaration of the Independence of Cyberspace http:\/\/homes.eff.org\/~barlow\/Declaration-Final.html","year":"1996","author":"Barlow J. P.","key":"p_1"},{"volume-title":"Information als Gegenstand des Rechts: Entwurf einer Grundlegung","year":"1995","author":"Druey J.N .","key":"p_2"},{"key":"p_3","first-page":"292","volume-title":"Bundesgesndheitsbl - Gesundheitsforsch - Gesundheitsschutz 4\/","author":"Eysenbach G.","year":"2003"},{"volume-title":"Search Engine Users","year":"2005","author":"Fallows D.","key":"p_4"},{"issue":"3","key":"p_5","doi-asserted-by":"crossref","DOI":"10.2307\/1342583","author":"Froomkin A. M.","year":"2003","journal-title":"Harvard Law Review"},{"key":"p_6","series-title":"JAMA","first-page":"1466","volume":"282","author":"Hodge J. G.","year":"1999"},{"volume-title":"Law and Electronic Commerce, 10. The Hague: Kluwer Law International","year":"2000","author":"Koops B. J.","key":"p_7"},{"volume-title":"The Commodification of Information, The Hague","year":"2002","author":"Litman J.","key":"p_8"},{"key":"p_9","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-6704-579-7_13"},{"key":"p_10","volume-title":"Rutgers Law Journal, Rutgers School of Law","volume":"29","author":"Rothstein Wolfson J.","year":"2001"},{"volume-title":"Ethics & Information Technology, 6, nr. 1.","year":"2004","author":"Vedder A.","key":"p_11"}],"container-title":["Journal of Information, Communication and Ethics in Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779960680000281\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14779960680000281\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:13:01Z","timestamp":1753402381000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jices\/article\/4\/1\/49-59\/226967"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,2,1]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,2,1]]}},"alternative-id":["10.1108\/14779960680000281"],"URL":"https:\/\/doi.org\/10.1108\/14779960680000281","relation":{},"ISSN":["1477-996X"],"issn-type":[{"type":"print","value":"1477-996X"}],"subject":[],"published":{"date-parts":[[2006,2,1]]}}}