Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Law and Technology (5)
- Free speech (4)
- Privacy (4)
- Science and Technology (4)
- Civil Rights and Discrimination (3)
-
- Health Law and Policy (3)
- Intellectual property (3)
- Law and Society (3)
- Public Law and Legal Theory (3)
- Civil Law (2)
- Constitutional Law (2)
- Contracts (2)
- Dispute Resolution (2)
- Domestic Relations (2)
- First Amendment (2)
- Human Rights Law (2)
- Internet (2)
- Security (2)
- Sexuality and the Law (2)
- Surrogacy (2)
- Women (2)
- Accounting (1)
- Administrative inspection/approval (1)
- Agreement (1)
- Avatars (1)
- Baby (1)
- Banking and Finance (1)
- Best interests of the child (1)
- Big data (1)
- Biographic data (1)
Articles 1 - 27 of 27
Full-Text Articles in Entire DC Network
Introduction, Tracy Mitrano
Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano
Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano
Tracy Mitrano
Chapter Four: Information Security, Tracy Mitrano
Chapter One: Free Speech, Tracy Mitrano
Chapter Two: Privacy, Tracy Mitrano
Chapter Two: Privacy, Tracy Mitrano
Tracy Mitrano
Chapter Three: Intellectual Property, Tracy Mitrano
Chapter Three: Intellectual Property, Tracy Mitrano
Tracy Mitrano
No abstract provided.
Conclusion, Tracy Mitrano
Pornography As Pollution, John C. Nagle
Pornography As Pollution, John C. Nagle
John Copeland Nagle
Pornography is often compared to pollution. But little effort has been made to consider what it means to describe pornography as a pollution problem, even as many legal scholars have concluded that the law has failed to control internet pornography. Opponents of pornography maintain passionate convictions about how sexually-explicit materials harm both those who are exposed to them and the broader cultural environment. Viewers of pornography may generally hold less fervent beliefs, but champions of free speech and of a free internet object to anti-pornography regulations with strong convictions of their own. The challenge is how to address the widespread …
Shareholder Wealth Maximization As Means To An End, Robert P. Bartlett, Iii
Shareholder Wealth Maximization As Means To An End, Robert P. Bartlett, Iii
Robert Bartlett
In several recent cases, the Delaware Chancery Court has emphasized that where a conflict of interest exists between holders of a company’s common stock and holders of its preferred stock, the standard of conduct for directors requires that they strive to maximize the value of the corporation for the benefit of its common stockholders rather than for its preferred stockholders. This article interrogates this view of directors’ fiduciary duties from the perspective of incomplete contracting theory. Building on the seminal work of Sanford Grossman and Oliver Hart, incomplete contracting theory examines the critical role of corporate control rights for addressing …
Sex, Videos, And Insurance: How Gawker Could Have Avoided Financial Responsibility For The $140 Million Hulk Hogan Sex Tape Verdict, Christopher French
Sex, Videos, And Insurance: How Gawker Could Have Avoided Financial Responsibility For The $140 Million Hulk Hogan Sex Tape Verdict, Christopher French
Christopher C. French
The More Copyright Laws Change, The More Digital Challenges Stay The Same, Peter K. Yu
The More Copyright Laws Change, The More Digital Challenges Stay The Same, Peter K. Yu
Peter K. Yu
This essay was a contribution to the Liber Amicorum for Professor Jan Rosén of Stockholm University, a former president of the International Association for the Advancement of Teaching and Research in Intellectual Property (ATRIP). Drawing on Professor Rosén's scholarship, the essay shows how today's judges, legislators, policymakers and commentators continue to address questions that copyright and media law scholars have explored in the past decades.
Specifically, this essay focuses on two topics. The first topic concerns the exhaustion of distribution rights in computer software and other digital works, including regional exhaustion within the European Union. The second topic covers the …
Rats, Traps, And Trade Secrets, Elizabeth A. Rowe
Rats, Traps, And Trade Secrets, Elizabeth A. Rowe
Elizabeth A Rowe
Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions. Together, this has created a storm perfectly ripe for economic espionage. Cases involving unknown or anonymous offenders who may not be in the United States and who steal trade secrets using remote access tools (“RATs”) are especially problematic. This Article is the first to address and place trade secret misappropriation within the larger backdrop of cybersecurity. First, it argues that systemic issues related to technology will continue to make legislative and judicial solutions suboptimal for cyber misappropriation. Second, it explores …
Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law -- The Singapore Example, Eliza Karolina Mik
Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law -- The Singapore Example, Eliza Karolina Mik
Eliza Mik
No abstract provided.
Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law -- The Singapore Example, Eliza Karolina Mik
Evaluating The Impact Of The Un Convention On The Use Of Electronic Communications In International Contracts On Domestic Contract Law -- The Singapore Example, Eliza Karolina Mik
Eliza Mik
No abstract provided.
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Gary C. Kessler
"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview
A Sustainable Music Industry For The 21st Century, Aloe Blacc, Irina D. Manta, David S. Olson
A Sustainable Music Industry For The 21st Century, Aloe Blacc, Irina D. Manta, David S. Olson
David S. Olson
This essay argues that the current system of music licensing must be completely overhauled. At this time, songwriters are paid a mere pittance when their work is played through Internet streaming services. The paper traces the evolution of compulsory licensing from the early 20th century, when Congress put this system in place due to concerns over the monopolization of the player piano industry, to today. This essay shows how the separation between copyrights for compositions as opposed to public performances contributed to blanket licensing through royalty-collecting organizations like ASCAP and BMI, which — together with government intervention into pricing based …
Trust And Social Commerce, Julia Y. Lee
Trust And Social Commerce, Julia Y. Lee
Julia Lee
Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace. The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …
Usage-Based Pricing, Zero-Rating, And The Future Of Broadband Innovation, Daniel A. Lyons
Usage-Based Pricing, Zero-Rating, And The Future Of Broadband Innovation, Daniel A. Lyons
Daniel Lyons
No abstract provided.
Title Ii Reclassification Is Rate Regulation, Daniel A. Lyons
Title Ii Reclassification Is Rate Regulation, Daniel A. Lyons
Daniel Lyons
No abstract provided.
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Margaret Hu
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee
New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee
Larissa Lee
Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another, using a peer-to-peer …
Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit
Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit
Hezi Margalit
The last few decades have witnessed dramatic changes in the conceptualization and methodologies of determining legal parentage in the U.S. and other countries in the western world. Through various sociological shifts, growing social openness and bio-medical innovations, the traditional definitions of family and parenthood have been dramatically transformed. This transformation has led to an acute and urgent need for legal and social frameworks to regulate the process of determining legal parentage. Moreover, instead of progressing in a piecemeal, ad-hoc manner, the framework for determining legal parentage should be comprehensive. Only a comprehensive solution will address the differing needs of today’s …
From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit
From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit
Hezi Margalit
In 1985, when Kim Cotton became Britain’s first commercial surrogate mother, Europe was exposed to the issue of surrogacy for the first time on a large scale. Three years later, in 1988, the famous case of Baby M drew the attention of the American public to surrogacy as well. These two cases implicated fundamental ethical and legal issues regarding domestic surrogacy and triggered a fierce debate about motherhood, child-bearing, and the relationship between procreation, science and commerce. These two cases exemplified the debate regarding domestic surrogacy - a debate that has now been raging for decades. Contrary to the well-known …
Fetishizing Copies, Jessica Litman
Fetishizing Copies, Jessica Litman
Jessica Litman
We have copyright laws to encourage authors to create new works and communicate them to the public, because we hope that people will read the books, listen to the music, see the art, watch the films, run the software, and build and inhabit the buildings. That is the way that copyright promotes the Progress of Science. Recently, that not-very-controversial principle has collided with copyright owners’ conviction that they should be able to control, or at least collect royalties from, all uses of their works. A particularly ill-considered manifestation of this conviction is what I have decided to call copy-fetish. This …
Just Cause Discipline For Social Networking In The New Gilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally
Just Cause Discipline For Social Networking In The New Gilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally
William A. Herbert
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson
Stephen E Henderson
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig