Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Trending @ Rwu Law: Dean Yelnosky's Post: Why I Tweet Every Day, Michael Yelnosky Dec 2015

Trending @ Rwu Law: Dean Yelnosky's Post: Why I Tweet Every Day, Michael Yelnosky

Law School Blogs

No abstract provided.


Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring Oct 2015

Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring

Sociology & Criminal Justice Faculty Publications

The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


Copyright Trolling, An Empirical Study, Matthew Sag Jan 2015

Copyright Trolling, An Empirical Study, Matthew Sag

Faculty Articles

This Article proceeds as follows: Part II locates MDJD suits within the broader context of the IP troll debate. It explains why attempts to define copyright trolls in terms of status—i.e., in terms of the plaintiff’s relationship to the underlying IP—are ultimately flawed and suggests a conduct-focused approach based on identifying systematic opportunism. Part II explains why MDJD lawsuits have all of the hallmarks of copyright trolling, and it explores the basic economics of MDJD litigation. It then presents empirical data documenting the astonishing rise of MDJD lawsuits over the past decade. Part III explores the role of statutory damages …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo Jan 2015

A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo

All Faculty Scholarship

Policymakers have long invoked the concept of a “terminating access monopoly” to inform communications policy. Roughly speaking, the concept holds that a consumer-facing network provider, no matter how small or how subject to retail competition, generally possesses monopoly power vis-à-vis third-party senders of communications traffic to its customers. Regulators and advocates have routinely cited that concern to justify regulatory intervention in a variety of contexts where the regulated party may or may not have possessed market power in any relevant retail market.

Despite the centrality of the terminating access monopoly to modern communications policy, there is surprisingly little academic literature …


Making "Friends" With The #Ethics Rules: Avoiding Pitfalls In Professional Social Media Use, Cynthia Laury Dahl Jan 2015

Making "Friends" With The #Ethics Rules: Avoiding Pitfalls In Professional Social Media Use, Cynthia Laury Dahl

All Faculty Scholarship

Lawyers’ professional use of social media is widespread and a critical component to running a successful practice. Yet some common uses of social media easily – and often innocently -- violate the professional rules of ethics. The American Bar Association recently passed amendments to the Model Rules of Professional Conduct to include topics related to social media use, but the amendments still do not address all issues. Likewise, advisory opinions of state and local bar associations and court opinions give scant and sometimes contradictory advice about when a use does or does not violate a Rule. This essay discusses four …


Abc V. Aereo And The Humble Judge, James Y. Stern Jan 2015

Abc V. Aereo And The Humble Judge, James Y. Stern

Faculty Publications

No abstract provided.


The Internet Grows Up?, Neil M. Richards Jan 2015

The Internet Grows Up?, Neil M. Richards

Scholarship@WashULaw

Danielle Citron’s Hate Crimes in Cyberspace is one of the most important publications to date in the emerging fields of privacy and cyberlaw. In her thoughtful and insightful book, Citron explains the uneven playing field and frequently shocking acts of abuse that women face online, and demonstrates practical steps that we can take to remedy the problem of online hate through law, education, and the development of better, more inclusive norms. Other contributors to this Symposium have examined these contributions in great detail, pointing out important nuances of Citron’s argument, urging her in at least one case to be even …


Review Of Covering The United States Supreme Court In The Digital Age, Susan David Demaine Jan 2015

Review Of Covering The United States Supreme Court In The Digital Age, Susan David Demaine

Articles by Maurer Faculty

No abstract provided.