Abstract
The early forms of corporate entities which emerged during the early 17th century in Europe were created to serve the common good, such as the building of hospitals and creation of orphanages. The concept of a commercial corporation in the UK was defined by an 1844 Act of Parliament. This permitted corporations to define their own purpose and activities. A second Act in 1854 gave shareholders limited liability that protected their personal assets from the consequences of the financial failure of a corporation. This legislation stimulated the emergence of business corporations in both England and Holland. In many of the existing trading companies, partners combined their personal assets and exchanged them for company shares in return for receiving relief from personal liability. This form of organisation gave corporations the added benefit of unlimited life and easy transferability of ownership (Grant, 2003).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alano, K (2012) ‘Aktar Islam begins legal action for defamation against food blogger’, Caterer & Hotelkeeper, London, 29 June, p. 7.
Anon. (2008) ‘The principles for user generated content services: a middle ground approach to cyber-governance’, Harvard Law Review, Vol. 121 No. 5, pp. 1387–408.
Anon. (2009) ‘Child pornography, the Internet and the challenge of updating statutory terms’, Harvard Law Review, Vol. 122 No. 8, pp. 2206–27.
August, R. (2002) ‘International cyber-jurisdiction: a comparative analysis’, American Business Law Journal, Vol. 39, pp. 531–48.
Balleste, R. (2011) ‘Persuasion and exhortations: acknowledging Internet governance and human dignity for all’, Syracuse Journal of International Law & Commerce, Vol. 38 No. 2, pp. 228–56.
Bartoli, E. (2009) ‘Children’s data protection vs marketing companies’, International Review of Law, Computers & Technology, Vol. 23 No. 1/2, pp. 35–45.
Buffett, W. (2002) ‘Who really cooks the books?’, The New York Times, 24 July, p. A19.
Chang, C. (2010) ‘Internet safety: Who will protect the children?’, Berkeley Technology Law, Vol. 25 No. 1, pp. 501–27.
Cheffins, B.R. (2001) ‘History and the global corporate governance revolution: the UK perspective begins’, Business History, Vol. 43 No. 4, pp. 87–121.
Christou, G. and Simpson, S. (2009) ‘New governance, the Internet, and country code top-level domains in Europe’, Governance, Vol. 22 No. 4, pp. 599–624.
Cranor, L.F. (1999) ‘Internet privacy’, Communications of the ACM, Vol. 42 No. 2, pp. 28–31.
Dehue, F., C. Bolman and T. Vollink (2008) ‘Cyberbullying: Youngsters’ experiences and parental perception’, Cyber Psychology & Behavior, Vol. 11 No. 2, pp. 217–23.
Ehrlinger, J. and R. P. Eibach (2011) ‘Focalism and the failure to foresee unintended consequences’, Basic & Applied Social Psychology, Vol. 33 No. 1, pp. 59–68.
Finklea, K. (2010) ‘Identity theft: Trends and issues’, Congressional Research Service, Library of Congress, Washington, 10 January.
Goodno, N. H. (2011) ‘How public schools can constitutionally halt cyberbullying’, Wake Forest Law Review, Vol. 46 No. 4, pp. 641–700.
Grant, G.H. (2003) ‘The evolution of corporate governance and its impact on modern corporate America’, Management Decision, Vol. 41, No. 9, pp. 923–34.
Hill, K. (2011) ‘Courtney Love’s $430,000 Tweets’, Forbes, New York, 4 March, p. 6.
Hofman, M.A. (2010) ‘Court finds out-of-state blogger liable’, Business Insurance, New York, 21 June, p. 3.
Hoy, M. and M. Lwin (2008) ‘An international perspective of online disclosure’, Journal of Consumer Policy, Vol. 31, pp. 327–47.
Industry Canada (1998) ‘The Canadian Electronic Commerce Strategy’, Ottawa.
Ivan, I., D. Milodin and C. Sbora (2012) ‘Non security — Premise of cybercrime’, Theoretical & Applied Economics, Vol. 19 No. 4, pp. 59–78.
Kaplin, W. A. and B. A. Lee (2009) A Legal Guide For Student Affairs Professionals (University of Syracuse Press).
Kayhan, V. and A. Bhattacherjee (2013) ‘Content use from websites: Effects of governance mechanisms’, Journal of Computer Information Systems, Vol. 53 No. 4, pp. 68–80.
Kissinger, A. S. and K. Larsen (2009) ‘Shielding Jane and John: Can the media protect anonymous online speech?’, Commercial Law, Vol. 38 No. 4, pp. 8–18.
Leung, P. and B. J. Cooper (2003) ‘The mad hatter’s corporate tea party’, Managerial Auditing Journal, Vol. 18 No. 6/7, pp. 505–16.
McCarty, C., A. D. Prawitz, L. E. Derscheid and B. Motgomery (2011) ‘Perceived safety and teen risk taking in online chat sites’, Cyber Psychology, Behavior & Social Networking, Vol. 14 No. 3, pp. 169–74.
Maignan, I., O. C. Ferrell and G. T. Hult (1999) ‘Corporate citizenship: Cultural antecedents and business benefits’, Journal of the Academy of Marketing Science, Vol. 27 No. 4, pp. 455–69.
Mascarenhas, O. A. (1995) ‘Exonerating unethical marketing behaviors: A diagnostic framework’, Journal of Marketing, Vol. 59 No. 2, pp. 43–58.
Nair, A. (2006) ‘Mobile phones and the Internet: Legal issues in the protection of children’, International Review of Law, Computers & Technology, Vol. 20 No. 1/2, pp. 177–85.
Ourston, D., S. Matzner, W. Stump and B. Hopkins (2004) ‘Coordinated Internet attacks: responding to attack complexity’, Journal of Computer Security, Vol. 12 No. 2, pp. 165–90.
Paré, D. J. (2003) Internet Governance in Transition: Who Is the Master of This Domain? (Illinois: Lanham, Rowman and Littlefield Publishers).
Petrick, J. (2011) ‘Sustainable stakeholder capitalism: A moral vision of responsible global financial risk management’, Journal of Business Ethics, Vol. 99, pp. 93–109.
Ramsey, G. and S. Venkatesan (2010) ‘Cybercrime strategy for social networking and other online platforms’, Licensing Journal, Vol. 30 No. 7, pp. 23–7.
Rego, A., S. Leal and M. Pina e Cunha (2011) ‘Rethinking the employees’ perceptions of corporate citizenship dimensionalization’, Journal of Business Ethics, Vol. 104, pp. 207–18.
Satola, D. (2007) ‘Legal aspects of Internet governance reform’, The International Journal of Government & Democracy in the Information Age, Vol. 12 No. 1/2, pp. 49–62.
Schaaper, M. (2008) ‘Measuring security and trust in the online environment’, Industry for the Organisation for Economic Co-operation and Development, Paris, 29 January.
Seounmi, Y. (2008) ‘Parental influence and teens’ attitude toward online privacy protection’, Journal of Consumer Affairs, Vol. 42 No. 3, pp. 362–88.
Townsend, A. M., R. J. Aaalberts and S. A. Gibson (2000) ‘Libel and slander on the Internet’, Communications of the ACM, Vol. 43 No. 6, pp. 15–17.
Wootton, C. and C. L. Roszkowski (1999) ‘Legal aspects of corporate governance in early American railroads’, Business and Economic History, Vol. 28, No. 2, pp. 325–6.
Zielonka, J. (2007) ‘Plurilateral governance in the enlarged European Union’, Journal of Common Market Studies, Vol. 45 No. 1, pp. 187–209.
Author information
Authors and Affiliations
Copyright information
© 2015 Ian Chaston
About this chapter
Cite this chapter
Chaston, I. (2015). Online Governance. In: Internet Marketing and Big Data Exploitation. Palgrave Macmillan, London. https://doi.org/10.1057/9781137488961_14
Download citation
DOI: https://doi.org/10.1057/9781137488961_14
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-50414-5
Online ISBN: 978-1-137-48896-1
eBook Packages: Palgrave Business & Management CollectionBusiness and Management (R0)