Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Entire DC Network

Net Neutrality, Antitrust, And Startups In The European Union, Megan Sacher Dec 2018

Net Neutrality, Antitrust, And Startups In The European Union, Megan Sacher

San Diego International Law Journal

The problem of internet traffic has now entered the personal sphere for individual users, and has gained attention in popular culture and politics. This was inevitable: from fitness tracking, to sending emails, automated surgeries, social media, and everything in between, more and more is happening on the internet. There are so many people using the internet that controlling the traffic and maintaining manageable speeds for users has become a real problem…For years, the European Union and the United States have found themselves in an uphill battle to maintain the open nature of the Internet, or as it was coined in …


Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo Sep 2018

Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo

San Diego International Law Journal

This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.


Drawing The Line Between Competing Interests: Strengthening Online Data Privacy Protection In An Increasingly Networked World, Lori Chiu Mar 2013

Drawing The Line Between Competing Interests: Strengthening Online Data Privacy Protection In An Increasingly Networked World, Lori Chiu

San Diego International Law Journal

This article seeks to elucidate these issues and provide a roadmap for the U.S. government to create unified federal laws to provide the private sector with specific protocols regarding use and dissemination of consumer personal information. First, this article will provide an explanation of the U.S.’s current sector-by-sector approach to regulating personally identifying information and will provide a case study of the Federal Trade Commission’s (“FTC”) enforcement action against a social networking site in 2011 as one example of the FTC’s recent efforts at regulating online privacy. Next, this article will analyze the U.S.’s current challenge of judicial enforcement of …


Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev Nov 2012

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev

San Diego International Law Journal

The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …


Cyberbullying: What's The "Status" In England?, Krupa A. Patel Mar 2012

Cyberbullying: What's The "Status" In England?, Krupa A. Patel

San Diego International Law Journal

This comment will explore the growing concern of cyberbullying and will highlight the need for the English Parliament to create its own national anti-cyberbullying legislation, or to incorporate this activity into existing laws as a preventative measure. Part II will define cyberbullying, highlight the various ways in which cyberbullying differs from traditional forms of bullying, and explore specific forms and mediums of cyberbullying to underscore the difficulty in regulating such actions through the law. It will also include illustrative examples of cyberbullying incidents. Part III explores the current laws that English prosecutors are attempting to use to penalize those who …


Untangling The Web: Exploring Internet Regulation Schemes In Western Democracies, Renee Keen Oct 2011

Untangling The Web: Exploring Internet Regulation Schemes In Western Democracies, Renee Keen

San Diego International Law Journal

This Comment investigates past censorship schemes proposed and implemented by selected democratic administrations, in order to develop an improved framework and accompanying infrastructure that may accomplish the goals that these policies envisioned, but failed to achieve. The difficulty of this undertaking is in developing the intermediate and legally defensible parameters under which a regulation scheme can endure and gain support in a democratic society. The greater difficulty lies in developing a system that can accomplish these objectives in the burgeoning and ever-changing cyber realm. The challenges posed by Internet activity are novel ones, and the legitimacy of the actions taken …


With Great Power Comes Great Responsibility: Korea's Role In The War Against Online Piracy, Edward Choi Mar 2009

With Great Power Comes Great Responsibility: Korea's Role In The War Against Online Piracy, Edward Choi

San Diego International Law Journal

South Korea is one of the most Internet-savvy countries in the world, with more than 34 million Koreans over the age of six—74.8% of the total population—regularly accessing the Internet. According to the Organization for Economic Co-operation and Development (OECD), as of June 2007, South Korea has the fourth largest number of broadband subscribers at over 14.4 million, behind only Japan, Germany, and the United States, all of which have much higher populations. Studies show the time Koreans spend online is primarily for entertainment purposes, as almost 80% of Korean Internet users report online consumption of audio and video, almost …


Confronting The Limits Of The First Amendment: A Proactive Approach For Media Defendants Facing Liability Abroad, Michelle A. Wyant May 2008

Confronting The Limits Of The First Amendment: A Proactive Approach For Media Defendants Facing Liability Abroad, Michelle A. Wyant

San Diego International Law Journal

This Article confronts the limits this issue imposes on the First Amendment in four parts. Part I described the potential for conflicting defamation laws and forum shopping to undermine the American media's speech protections in the context of the Internet and global publications and outlines the Article's overall method of analysis. Part II first orients these conflicting defamation laws with respect to their development from the common law. It then frames them in terms of the underlying structural and policy differences that have produced their substantive divergence. This frame provides the analytical perspective through which this Article examines the varying …


Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono Nov 2007

Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono

San Diego International Law Journal

Part I of this comment will examine the history and application of freedom of expression in Japanese case law and the evolution of the public welfare concept and its circumscribing effect on individual freedoms. Part II will explore the recent local regulatory efforts and the historical underpinnings for these laws that place restrictions on materials to children. Part III will compare the Japanese legislative endeavors with their American counterparts and highlight the reasons why United States laws will continue to be struck down by courts. Part IV will analyze the response of the video game industry to the onslaught of …


Net Neutrality: An International Policy For The United States, Frederick W. Pfister Nov 2007

Net Neutrality: An International Policy For The United States, Frederick W. Pfister

San Diego International Law Journal

Consider this scenario: Alex and John still are avid video game players and play hours a day, each connecting from the same town through different ISPs. However, since it is a peak Internet traffic time, it may be difficult for them to play. While Alex has the "Diamond" package from his ISP that ensures he has guaranteed high-bandwidth connection, John's ISP does not offer anything other than regular residential service. John must compete with everyone else in his local area for bandwidth, including a few who constantly watch high-definition video-on-demand and subsequently constrain bandwidth for other users. Would it not …


China's Media: The Impact Of The Internet, Richard Cullen, D. W. Choy May 2005

China's Media: The Impact Of The Internet, Richard Cullen, D. W. Choy

San Diego International Law Journal

[T]his paper provides a review of how the use of the Internet has grown and been regulated in China. We then draw some conclusions on what the experience to date may have to tell us about future regulatory and usage patterns with respect to the Internet in China.


Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy May 2004

Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy

San Diego International Law Journal

The debate over whether cyberspace can or should be regulated is essentially dead. This is the conclusion being taught in law schools today. The battle between Judge Frank Easterbrook and Professor Lawrence Lessig over "laws" and "horses", infamous among cyberspace legal scholars, became irrelevant when geographically-based governments began regulating Internet related activities. However, debate over how the Internet should be regulated continues. One way of framing this debate is in terms of deciding how to regulate behavior in cyberspace. Professor Lessig postulated four kinds of constraints regulate behavior: (1) social norms, (2) markets, (3) law, and (4) architecture. This comment …