Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Entire DC Network

Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron Nov 2008

Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron

Faculty Scholarship

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …


Playing In The Virtual Arena: Avatars, Publicity, And Identity Reconceptualized Through Virtual Worlds And Computer Games, Jon M. Garon Jan 2008

Playing In The Virtual Arena: Avatars, Publicity, And Identity Reconceptualized Through Virtual Worlds And Computer Games, Jon M. Garon

Faculty Scholarship

In many respects, the commercial and social interactions within virtual worlds are essentially the same as those interactions conducted face-to-face or over less engrossing technologies, however, the immersive nature of the virtual world redefines the nature of the experience. Because virtual worlds mimic their bricks-and-mortar counterparts, they exhibit commercial attributes unlike those of plays, television shows, or motion pictures. To the extent that there is commerce conducted within the medium, the historic separation between commercial conduct and expressive speech must be reconceptualized. In the first instance, such legal line drawing will necessarily be done with crude tools, so this article …


What If Drm Fails?: Seeking Patronage In The Iwasteland And The Virtual O , Jon M. Garon Jan 2008

What If Drm Fails?: Seeking Patronage In The Iwasteland And The Virtual O , Jon M. Garon

Faculty Scholarship

Section 1201 of the 1998 Digital Millennium Copyright Act provided sweeping protection for technological measures or virtual locks on digital content to protect the entertainment industries-including music, films, games, and consumer electronics. Manufacturers use digital rights management (DRM) authorized under the law to lock down all software embedded in products, movies on DVDs, and audio files sold on iTunes and other Internet sites. DRM unfairly extends copyright and that legal protection is unnecessary to the robust development of new creative works Critics of the DMCA have charged that the law has extended well past its anti-piracy role to undermine fair …