Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 54

Full-Text Articles in Law

Abc V. Aereo And The Humble Judge, James Y. Stern Sep 2019

Abc V. Aereo And The Humble Judge, James Y. Stern

James Y. Stern

No abstract provided.


The Road To The Virtual Courtroom? A Consideration Of Today’S -- And Tomorrow’S -- High Technology Courtrooms, Fredric I. Lederer Sep 2019

The Road To The Virtual Courtroom? A Consideration Of Today’S -- And Tomorrow’S -- High Technology Courtrooms, Fredric I. Lederer

Fredric I. Lederer

No abstract provided.


The Effect Of Courtroom Technologies On And In Appellate Proceedings And Courtrooms, Fredric I. Lederer Sep 2019

The Effect Of Courtroom Technologies On And In Appellate Proceedings And Courtrooms, Fredric I. Lederer

Fredric I. Lederer

No abstract provided.


The Courtroom Technology Wars Are Here!, Fredric I. Lederer Sep 2019

The Courtroom Technology Wars Are Here!, Fredric I. Lederer

Fredric I. Lederer

No abstract provided.


Technology-Augmented Courtrooms: Progress Amid A Few Complications, Or The Problematic Interrelationship Between Court And Counsel, Fredric I. Lederer Sep 2019

Technology-Augmented Courtrooms: Progress Amid A Few Complications, Or The Problematic Interrelationship Between Court And Counsel, Fredric I. Lederer

Fredric I. Lederer

No abstract provided.


The Courtroom 21 Project: Creating The Courtroom Of The Twenty-First Century, Fredric I. Lederer Sep 2019

The Courtroom 21 Project: Creating The Courtroom Of The Twenty-First Century, Fredric I. Lederer

Fredric I. Lederer

No abstract provided.


Technology Augmented Litigation--Systemic Revolution, Fredric I. Lederer Sep 2019

Technology Augmented Litigation--Systemic Revolution, Fredric I. Lederer

Fredric I. Lederer

This article reviews key aspects of high technology litigation, including technology augmented court records, two-way video arraignment and testimony, and technology based evidence display, and posits some of the critical jurisprudential and pragmatic issues posed by the use of such technologies


Some Thoughts On The Evidentiary Aspects Of Technologically Produced Or Presented Evidence, Fredric I. Lederer Sep 2019

Some Thoughts On The Evidentiary Aspects Of Technologically Produced Or Presented Evidence, Fredric I. Lederer

Fredric I. Lederer

No abstract provided.


Impractically Obscure? Privacy And Courtroom Proceedings In Light Of Webcasting And Other New Technologies, Fredric I. Lederer, Rebecca Green Sep 2019

Impractically Obscure? Privacy And Courtroom Proceedings In Light Of Webcasting And Other New Technologies, Fredric I. Lederer, Rebecca Green

Fredric I. Lederer

No abstract provided.


Courtroom Technology, A Judicial Primer, Fredric I. Lederer Sep 2019

Courtroom Technology, A Judicial Primer, Fredric I. Lederer

Fredric I. Lederer

No abstract provided.


Courtroom Technology: For Trial Lawyers The Future Is Now, Fredric I. Lederer Sep 2019

Courtroom Technology: For Trial Lawyers The Future Is Now, Fredric I. Lederer

Fredric I. Lederer

No abstract provided.


Ehearsay, Jeffrey Bellin Sep 2019

Ehearsay, Jeffrey Bellin

Jeffrey Bellin

No abstract provided.


“Bullets Of Truth”: Julian Assange And The Politics Of Transparency, Mark Fenster Dec 2018

“Bullets Of Truth”: Julian Assange And The Politics Of Transparency, Mark Fenster

Mark Fenster

This essay updates (to early 2019) earlier work on the WikiLeaks story in order to consider what more recent developments reveal about the theoretical promise that Assange articulated at the time of the website’s emergence. Assange has characterized secrecy as both a form and symptom of corruption, and ultimately as the foundation of a “conspiracy” of governance that states like the U.S. inflict on their subjects and the world. He advocates a non-political, vigilante form of transparency in which WikiLeaks serves as a neutral entity that will save the public and free the world with information. He predicted that corrupt …


Feed: State Transparency Amidst Informational Surplus, Mark Fenster Dec 2018

Feed: State Transparency Amidst Informational Surplus, Mark Fenster

Mark Fenster

An email arrives, promising inside information about the perfidious forces that secretly rule the nation. A Twitter feed from a prominent insider at an establishment think-tank announces the latest disclosure about the president’s secret role in the Russian conspiracy to manipulate the election that elevated him with the blast of toy cannon. Meanwhile, the President’s tweets serve to annoy, distract, humor, or comfort those who see them, and they above all announce some truth about his presidency. 

Debates about government transparency presume that the state controls an informational spigot, which can be made to allow information to flow or to …


How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow Jan 2018

How Different Are Young Adults From Older Adults When It Comes To Information Privacy Attitudes & Policies?, Chris Jay Hoofnagle, Jennifer King, Su Li, Joseph Turow

Chris Jay Hoofnagle

Media reports teem with stories of young people posting salacious photos online, writing about alcohol-fueled misdeeds on social networking sites, and publicizing other ill-considered escapades that may haunt them in the future. These anecdotes are interpreted as representing a generation-wide shift in attitude toward information privacy. Many commentators therefore claim that young people “are less concerned with maintaining privacy than older people are.” Surprisingly, though, few empirical investigations have explored the privacy attitudes of young adults. This report is among the first quantitative studies evaluating young adults’ attitudes. It demonstrates that the picture is more nuanced than portrayed in the …


The Federal Trade Commission And Consumer Privacy In The Coming Decade, Joseph Turow, Chris Jay Hoofnagle, Deirdre K. Mulligan, Nathaniel Good, Jens Grossklags Jan 2018

The Federal Trade Commission And Consumer Privacy In The Coming Decade, Joseph Turow, Chris Jay Hoofnagle, Deirdre K. Mulligan, Nathaniel Good, Jens Grossklags

Chris Jay Hoofnagle

The large majority of consumers believe that the term “privacy policy” describes a baseline level of information practices that protect their privacy. In short, “privacy,” like “free” before it, has taken on a normative meaning in the marketplace. When consumers see the term “privacy policy,” they believe that their personal information will be protected in specific ways; in particular, they assume that a website that advertises a privacy policy will not share their personal information. Of course, this is not the case. Privacy policies today come in all different flavors. Some companies make affirmative commitments not to share the personal …


Welcome To Dignity, Donna M. Hughes Dr. Oct 2016

Welcome To Dignity, Donna M. Hughes Dr.

Donna M. Hughes

No abstract provided.


The Digital Dionysus: Nietzsche & The Network-Centric Condition Dec 2015

The Digital Dionysus: Nietzsche & The Network-Centric Condition

Dan Mellamphy

No abstract provided.


Why K-Pop Will Continue To Dominate Social Media: Jenkins' Convergence Culture In Action, Keidra Chaney, Raizel Liebler Dec 2015

Why K-Pop Will Continue To Dominate Social Media: Jenkins' Convergence Culture In Action, Keidra Chaney, Raizel Liebler

Raizel Liebler

YouTube’s first music awards surprised many mainstream music fans in 2013, when the Korean pop (“K-pop”) group Girls’ Generation beat out many U.S. pop music stars for Video of the Year (Yang, 2013). In 2015, the fans of K-pop group T-ara won Billboard’s Fan Army Face-Off, beating out the fans of well-established Western artists like One Direction and Beyoncé (“Fan Army,” 2015). The matchup against One Direction led to the globally trending hashtag on Twitter, #WeLove1DandKpop (“Fan Army,” 2015). While some U.S. critics and Western music fans may see these events as flukes, there is a complex history at play …


Take Two Tablets And Do Not Call For Judicial Review Until Our Heads Clear: The Supreme Court Prepares To Demolish The 'Wall Of Separation' Between Church And State, Terence Lau, William Wines Nov 2015

Take Two Tablets And Do Not Call For Judicial Review Until Our Heads Clear: The Supreme Court Prepares To Demolish The 'Wall Of Separation' Between Church And State, Terence Lau, William Wines

Terence Lau

In this article, we examine the issues that bring First Amendment jurisprudence to the grant of certiorari in Pleasant Grove v. Summum, scheduled for oral argument in the Supreme Court of the United States in November. We examine the historical basis for America’s religious heritage, the historical judicial treatment of the religious clauses, and the erosion of the wall of separation between church and state. We examine the Ten Commandments, finding inherent discrimination present in modern-day attempts to advance a particular version of the Ten Commandments as secular. By drawing upon Rousseau’s civic religion, we suggest alternative routes for the …


Is Google & People?, Sajjad Khaksari Jul 2015

Is Google & People?, Sajjad Khaksari

SAJJAD KHAKSARI

"Google Advertisement Strategy" strictly dominated the "Searching Ranks Results". On the other hand, 70% of the United State population and 90% of European use to used Google as their "Favorite Search Engine".
People use Google but the Google thanks to its "Famous Google Algorithm" offers them the arrangement of links that is consciously favored before by "Google Ad. Engine". In addition, unfortunately Google has many traps to bind, copy and save almost all the information from the users.


Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park Dec 2014

Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park

Susan Park

Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.


Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo Mar 2014

Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo

Daniel Lyons

The House Energy and Commerce Committee has begun a process to review and update the Communications Act of 1934, last revised in any material way in 1996. As the Committee begins the review process, this paper responds to questions posed by the Committee that all relate, in fundamental ways, to the question: "What should a modern Communications Act look like?" The Response advocates a "clean slate" approach under which the regulatory silos that characterize the current statute would be eliminated, along with almost all of the ubiquitous 'public interest' delegation of authority found throughout the Communications Act. The replacement regime …


Cable Television In Massachusetts, Padraig O'Malley Feb 2014

Cable Television In Massachusetts, Padraig O'Malley

Padraig O'Malley

Today the electromagnetic spectrum is crowded with signal traffic used for just about every conceivable communications purpose, ranging from standard navigational time signals at the Very Low Frequency band to satellite communications at the Superhigh Frequency band. Between these two frequency extremes there are five other frequency bands — Low Frequency, Medium Frequency, High Frequency, Very High Frequency, and Ultra High Frequency — each of which can accommodate only a limited number of uses, and each of which is better suited for some uses than for others. Because the spectrum was, like oil, once believed to be in almost unlimited …


Justice Stewart Meets The Press, Keith Bybee Jan 2014

Justice Stewart Meets The Press, Keith Bybee

Keith J. Bybee

Among the Supreme Court Justices who have articulated distinctive views of free expression, Justice Potter Stewart alone placed particular emphasis on the First Amendment's protection of a free press. Drawing upon the lessons of history, the plain language of the Constitution, the political events of his day, and his own personal experience, Stewart argued that the organized news media should be considered an essential part of the checks-and-balances competition between the legislative, executive, and judicial branches of the federal government. Stewart’s emphasis on the special structural function of the established press placed him at odds with most of his colleagues …


Structuring Big Data To Facilitate Participation In International Law, Roslyn Fuller Dec 2013

Structuring Big Data To Facilitate Participation In International Law, Roslyn Fuller

Roslyn Fuller

This is an interdisciplinary article focusing on the interplay between information and communication technology (ICT) and international law (IL). Its purpose is to open up a dialogue between ICT and IL practitioners that focuses on the ways in which ICT can enhance equitable participation in international legal structures, particularly through capturing the possibilities associated with big data. This depends on the ability of individuals to access big data, for it to be structured in a manner that makes it accessible and for the individual to be able to take action based on it.


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


Tolerance Is Law: Remixing Homage Parodying Plagiarism, Mathias Klang, Jan Nolin Aug 2012

Tolerance Is Law: Remixing Homage Parodying Plagiarism, Mathias Klang, Jan Nolin

Mathias Klang

Three centuries have passed since copyright law was developed to stimulate creativity and promote learning. The fundamental principles still apply, despite radical developments in the technology of production and distribution of cultural material. In particular the last decades’ developments and adoption of ICTs have drastically lowered barriers, which previously prevented entry into the production and distribution side of the cultural marketplace, and led to a widening of the base at which cultural production occurs and is disseminated. Additionally, digitalisation has made it economically and technically feasible for users to appropriate and manipulate earlier works as method of production. The renegotiation …


Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley Mar 2012

Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley

Steven D. Hinckley

This article examines the inherent conflict between This article examines the inherent conflict between two Congressional approaches to public access to the Internet - the provision of federal funding support to schools and public libraries to ensure broad access to online information regardless of financial means, and federal restrictions on children's use of school and public library computers to access content that the government feels could be harmful to them. It analyzes the efficacy and constitutionality of the Children's Internet Protection Act (CIPA), Congress's attempt to use its powers of the purse to control objectionable online content in the very …


A People's History Of Baseball, Mitchell J. Nathanson Feb 2012

A People's History Of Baseball, Mitchell J. Nathanson

Mitchell J Nathanson

Baseball is much more than the national pastime. It has become an emblem of America itself. From its initial popularity in the mid-nineteenth century, the game has reflected national values and beliefs and promoted what it means to be an American. Stories abound that illustrate baseball's significance in eradicating racial barriers, bringing neighborhoods together, building civic pride, and creating on the field of play an instructive civics lesson for immigrants on the national character. In A People's History of Baseball, Mitchell Nathanson probes the less well-known but no less meaningful other side of baseball: episodes not involving equality, patriotism, heroism, …