Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Privacy Expectations And Protections For Teachers In The Internet Age, Emily H. Fulmer Sep 2010

Privacy Expectations And Protections For Teachers In The Internet Age, Emily H. Fulmer

Duke Law & Technology Review

Public school teachers have little opportunity for redress if they are dismissed for their activities on social networking websites. With the exception of inappropriate communication with students, a school district should not be able to consider a public educator’s use of a social networking website for disciplinary or employment decisions. Insisting that the law conform to twenty-first century social norms, this iBrief argues that the law should protect teachers’ speech on popular social networking websites like Facebook and MySpace.


Who Owns The Virtual Items?, Leah Shen Aug 2010

Who Owns The Virtual Items?, Leah Shen

Duke Law & Technology Review

Do you WoW? Because millions of people around the world do! Due to this increased traffic, virtual wealth amassed in MMORPGs are intersecting in our real world in unexpected ways. Virtual goods have real-life values and are traded in real-life markets. However, the market for trading in virtual items is highly inefficient because society has not created property rights for virtual items. This lack of regulation has a detrimental effect not just the market for virtual items, but actually the market for MMORPGs. Assuming we want to promote the production of MMORPGs as a market, society requires a set of …


The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness Aug 2010

The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness

Duke Law & Technology Review

The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one's privacy by placing a burden on the individual websites and continuing to support the Internet's development. Additionally, assigning traditional tort liability is problematic as the defendant enjoys an expectation of privacy as well, creating difficulty in securing the necessary information to proceed with legal action. One solution to resolving invasion of privacy disputes involves a uniform identification verification program that ensures user confidentiality while promoting accountability for malicious …


Fcc V. Fox Television Stations And The Role Of Logical Error In Hard Look Review, Samuel G. Brooks May 2010

Fcc V. Fox Television Stations And The Role Of Logical Error In Hard Look Review, Samuel G. Brooks

BYU Law Review

No abstract provided.


A Philology Of Liberation: Dr. Martin Luther King, Jr. As A Reader Of The Classics, Thomas Strunk Ph.D. Jan 2010

A Philology Of Liberation: Dr. Martin Luther King, Jr. As A Reader Of The Classics, Thomas Strunk Ph.D.

Verbum Incarnatum: An Academic Journal of Social Justice

This paper explores the intellectual relationship between Dr. Martin Luther King, Jr. and the classics, particularly the works of Plato, Sophocles, and Aeschylus. Recognizing Dr. King as a reader of the classics is significant for two reasons: the classics played a formative role in Dr. King’s development into a political activist and an intellectual of the first order; moreover, Dr. King shows us the way to read the classics. Dr. King did not read the classics in a pedantic or even academic manner, but for the purpose of liberation. Dr. King’s legacy, thus, is not merely his political accomplishments but …


Finding A Voice: Using The Internet For Free Speech And Expression In Iran, Chelsea Zimmerman Jan 2010

Finding A Voice: Using The Internet For Free Speech And Expression In Iran, Chelsea Zimmerman

Human Rights & Human Welfare

In July 2009, many Iranians took to the streets to protest the results of the presidential election in which Mahmoud Ahmadinejad won with a reported 62% of the vote. The protests, stemming from allegations of electoral fraud, quickly exposed the government's limited tolerance for dissent. In addition to street demonstrations, protestors utilized social networking websites to express their opposition to the election results. The world, following Internet feeds, witnessed the restrictive mechanisms Iran’s government placed on expression and speech. People throughout the world admonished Iran for the government's interference with cell phone and Internet networks. Iran’s free speech and expression …