Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Entire DC Network
Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron
Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …
Playing In The Virtual Arena: Avatars, Publicity, And Identity Reconceptualized Through Virtual Worlds And Computer Games, Jon M. Garon
Playing In The Virtual Arena: Avatars, Publicity, And Identity Reconceptualized Through Virtual Worlds And Computer Games, Jon M. Garon
Faculty Scholarship
In many respects, the commercial and social interactions within virtual worlds are essentially the same as those interactions conducted face-to-face or over less engrossing technologies, however, the immersive nature of the virtual world redefines the nature of the experience. Because virtual worlds mimic their bricks-and-mortar counterparts, they exhibit commercial attributes unlike those of plays, television shows, or motion pictures. To the extent that there is commerce conducted within the medium, the historic separation between commercial conduct and expressive speech must be reconceptualized. In the first instance, such legal line drawing will necessarily be done with crude tools, so this article …
What If Drm Fails?: Seeking Patronage In The Iwasteland And The Virtual O , Jon M. Garon
What If Drm Fails?: Seeking Patronage In The Iwasteland And The Virtual O , Jon M. Garon
Faculty Scholarship
Section 1201 of the 1998 Digital Millennium Copyright Act provided sweeping protection for technological measures or virtual locks on digital content to protect the entertainment industries-including music, films, games, and consumer electronics. Manufacturers use digital rights management (DRM) authorized under the law to lock down all software embedded in products, movies on DVDs, and audio files sold on iTunes and other Internet sites. DRM unfairly extends copyright and that legal protection is unnecessary to the robust development of new creative works Critics of the DMCA have charged that the law has extended well past its anti-piracy role to undermine fair …