Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet (8)
- Censorship (3)
- Freedom of expression (3)
- Australia (2)
- Cyberspace (2)
-
- England (2)
- European Union (2)
- Net neutrality (2)
- United States (2)
- Affirmative consent (1)
- American media (1)
- Antitrust (1)
- Arkansas cyberbullying law (1)
- BEREC (1)
- Body of European Regulators for Electronic Communications (1)
- Bullying (1)
- CAK (1)
- CCP (1)
- Censorship in a Democracy (1)
- Children (1)
- China (1)
- Chinese Communist Party (1)
- Communications Act 2003 (1)
- Consumer Privacy Bill of Rights (1)
- Consumer consent (1)
- Content Blocking (1)
- Copyright Act of Korea (1)
- Copyrights (1)
- Council Regulation 2015/2120 (1)
- Courts (1)
Articles 1 - 12 of 12
Full-Text Articles in Entire DC Network
Net Neutrality, Antitrust, And Startups In The European Union, Megan Sacher
Net Neutrality, Antitrust, And Startups In The European Union, Megan Sacher
San Diego International Law Journal
The problem of internet traffic has now entered the personal sphere for individual users, and has gained attention in popular culture and politics. This was inevitable: from fitness tracking, to sending emails, automated surgeries, social media, and everything in between, more and more is happening on the internet. There are so many people using the internet that controlling the traffic and maintaining manageable speeds for users has become a real problem…For years, the European Union and the United States have found themselves in an uphill battle to maintain the open nature of the Internet, or as it was coined in …
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
San Diego International Law Journal
This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.
Drawing The Line Between Competing Interests: Strengthening Online Data Privacy Protection In An Increasingly Networked World, Lori Chiu
San Diego International Law Journal
This article seeks to elucidate these issues and provide a roadmap for the U.S. government to create unified federal laws to provide the private sector with specific protocols regarding use and dissemination of consumer personal information. First, this article will provide an explanation of the U.S.’s current sector-by-sector approach to regulating personally identifying information and will provide a case study of the Federal Trade Commission’s (“FTC”) enforcement action against a social networking site in 2011 as one example of the FTC’s recent efforts at regulating online privacy. Next, this article will analyze the U.S.’s current challenge of judicial enforcement of …
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
San Diego International Law Journal
The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …
Cyberbullying: What's The "Status" In England?, Krupa A. Patel
Cyberbullying: What's The "Status" In England?, Krupa A. Patel
San Diego International Law Journal
This comment will explore the growing concern of cyberbullying and will highlight the need for the English Parliament to create its own national anti-cyberbullying legislation, or to incorporate this activity into existing laws as a preventative measure. Part II will define cyberbullying, highlight the various ways in which cyberbullying differs from traditional forms of bullying, and explore specific forms and mediums of cyberbullying to underscore the difficulty in regulating such actions through the law. It will also include illustrative examples of cyberbullying incidents. Part III explores the current laws that English prosecutors are attempting to use to penalize those who …
Untangling The Web: Exploring Internet Regulation Schemes In Western Democracies, Renee Keen
Untangling The Web: Exploring Internet Regulation Schemes In Western Democracies, Renee Keen
San Diego International Law Journal
This Comment investigates past censorship schemes proposed and implemented by selected democratic administrations, in order to develop an improved framework and accompanying infrastructure that may accomplish the goals that these policies envisioned, but failed to achieve. The difficulty of this undertaking is in developing the intermediate and legally defensible parameters under which a regulation scheme can endure and gain support in a democratic society. The greater difficulty lies in developing a system that can accomplish these objectives in the burgeoning and ever-changing cyber realm. The challenges posed by Internet activity are novel ones, and the legitimacy of the actions taken …
With Great Power Comes Great Responsibility: Korea's Role In The War Against Online Piracy, Edward Choi
With Great Power Comes Great Responsibility: Korea's Role In The War Against Online Piracy, Edward Choi
San Diego International Law Journal
South Korea is one of the most Internet-savvy countries in the world, with more than 34 million Koreans over the age of six—74.8% of the total population—regularly accessing the Internet. According to the Organization for Economic Co-operation and Development (OECD), as of June 2007, South Korea has the fourth largest number of broadband subscribers at over 14.4 million, behind only Japan, Germany, and the United States, all of which have much higher populations. Studies show the time Koreans spend online is primarily for entertainment purposes, as almost 80% of Korean Internet users report online consumption of audio and video, almost …
Confronting The Limits Of The First Amendment: A Proactive Approach For Media Defendants Facing Liability Abroad, Michelle A. Wyant
Confronting The Limits Of The First Amendment: A Proactive Approach For Media Defendants Facing Liability Abroad, Michelle A. Wyant
San Diego International Law Journal
This Article confronts the limits this issue imposes on the First Amendment in four parts. Part I described the potential for conflicting defamation laws and forum shopping to undermine the American media's speech protections in the context of the Internet and global publications and outlines the Article's overall method of analysis. Part II first orients these conflicting defamation laws with respect to their development from the common law. It then frames them in terms of the underlying structural and policy differences that have produced their substantive divergence. This frame provides the analytical perspective through which this Article examines the varying …
Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono
Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono
San Diego International Law Journal
Part I of this comment will examine the history and application of freedom of expression in Japanese case law and the evolution of the public welfare concept and its circumscribing effect on individual freedoms. Part II will explore the recent local regulatory efforts and the historical underpinnings for these laws that place restrictions on materials to children. Part III will compare the Japanese legislative endeavors with their American counterparts and highlight the reasons why United States laws will continue to be struck down by courts. Part IV will analyze the response of the video game industry to the onslaught of …
Net Neutrality: An International Policy For The United States, Frederick W. Pfister
Net Neutrality: An International Policy For The United States, Frederick W. Pfister
San Diego International Law Journal
Consider this scenario: Alex and John still are avid video game players and play hours a day, each connecting from the same town through different ISPs. However, since it is a peak Internet traffic time, it may be difficult for them to play. While Alex has the "Diamond" package from his ISP that ensures he has guaranteed high-bandwidth connection, John's ISP does not offer anything other than regular residential service. John must compete with everyone else in his local area for bandwidth, including a few who constantly watch high-definition video-on-demand and subsequently constrain bandwidth for other users. Would it not …
China's Media: The Impact Of The Internet, Richard Cullen, D. W. Choy
China's Media: The Impact Of The Internet, Richard Cullen, D. W. Choy
San Diego International Law Journal
[T]his paper provides a review of how the use of the Internet has grown and been regulated in China. We then draw some conclusions on what the experience to date may have to tell us about future regulatory and usage patterns with respect to the Internet in China.
Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy
Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy
San Diego International Law Journal
The debate over whether cyberspace can or should be regulated is essentially dead. This is the conclusion being taught in law schools today. The battle between Judge Frank Easterbrook and Professor Lawrence Lessig over "laws" and "horses", infamous among cyberspace legal scholars, became irrelevant when geographically-based governments began regulating Internet related activities. However, debate over how the Internet should be regulated continues. One way of framing this debate is in terms of deciding how to regulate behavior in cyberspace. Professor Lessig postulated four kinds of constraints regulate behavior: (1) social norms, (2) markets, (3) law, and (4) architecture. This comment …