Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Communication Technology and New Media

PDF

Series

Institution
Keyword
Publication Year
Publication

Articles 31 - 60 of 159

Full-Text Articles in Law

Kline & Specter: A Professional Corporation, Ibraheem Bussey Apr 2019

Kline & Specter: A Professional Corporation, Ibraheem Bussey

Media and Communication Studies Presentations

No abstract provided.


Initiatives To Counter Fake News In Selected Countries: Argentina, Brazil, Canada, China, Egypt, France, Germany, Israel, Japan, Kenya, Malaysia, Nicaragua, Russia, Sweden, United Kingdom, Peter Roudik, Graciela Rodriguez-Ferrand, Edouardo Soares, Tariq Ahmad, Laney Zhang, George Sadek, Nicolas Boring, Jenny Gesley, Ruth Levush, Sayuri Umeda, Hanibal Goitom, Kelly Buchanan, Norma C. Gutiérrez, Astghik Grigoryan, Elin Hofverberg, Clare Feikert-Ahalt Apr 2019

Initiatives To Counter Fake News In Selected Countries: Argentina, Brazil, Canada, China, Egypt, France, Germany, Israel, Japan, Kenya, Malaysia, Nicaragua, Russia, Sweden, United Kingdom, Peter Roudik, Graciela Rodriguez-Ferrand, Edouardo Soares, Tariq Ahmad, Laney Zhang, George Sadek, Nicolas Boring, Jenny Gesley, Ruth Levush, Sayuri Umeda, Hanibal Goitom, Kelly Buchanan, Norma C. Gutiérrez, Astghik Grigoryan, Elin Hofverberg, Clare Feikert-Ahalt

Copyright, Fair Use, Scholarly Communication, etc.

Comparative Summary by Peter Roudik, Director of Legal Research

This report examines the legal approaches of fifteen countries, representing all regions of the world, to the emerging problem of manipulation with “fake news” using mass and social media, especially the impact of fake news on ongoing political processes and elections, and the legislative measures undertaken to counteract the dissemination of false information. Fake news as a phenomenon is not new and has been known since ancient times, but the present-day proliferation of digital and social media platforms, which allow for much broader distribution of information to a global audience, makes …


Globalizing Online Learning: Exploring Culture, Corporate Social Responsibility, And Domestic Violence In An International Classroom, Daniela Peterka-Benton, Bond Benton Mar 2019

Globalizing Online Learning: Exploring Culture, Corporate Social Responsibility, And Domestic Violence In An International Classroom, Daniela Peterka-Benton, Bond Benton

Department of Justice Studies Faculty Scholarship and Creative Works

The construction of a successful online collaboration between distinct cultural groups requires an informed cultural awareness. This is the exploration of such an online collaboration between American and Turkish Students. The focus of the shared student interaction was the concept of corporate social responsibility. As the concept is enacted differently in different cultures, this represented an ideal opportunity for topical student reflection and for cultural exploration. The approach utilized focused on relationship-building as a preface to content discussion based participant preferences suggested by relevant cultural research (e.g., Hofstede). Corporate social responsibility campaigns in the United States and Turkey focused on …


5g And Net Neutrality, Christopher S. Yoo, Jesse Lambert Jan 2019

5g And Net Neutrality, Christopher S. Yoo, Jesse Lambert

All Faculty Scholarship

Industry observers have raised the possibility that European network neutrality regulations may obstruct the deployment of 5G. To assess those claims, this Chapter describes the key technologies likely to be incorporated into 5G, including millimeter wave band radios, massive multiple input/multiple output (MIMO), ultra-densification, multiple radio access technologies (multi-RAT), and support for device-to-device (D2D) and machine-to-machine (M2M) connectivity. It then reviews the business models likely to be associated with 5G, including network management through biasing and blanking, an emphasis on business-to-business (B2B) communications, and network function virtualization/network slicing. It then lays out the network neutrality regulations created by the EU …


What's News?, Michael J. Madison Jan 2019

What's News?, Michael J. Madison

Articles

This review of Will Slauter’s Who Owns the News? (2019) highlights three ways in which its history of copyright in news tracks and illustrates key themes in the history of cultural policy. One is how copyright law and journalistic style co-evolved, confirming the attributes of modern journalism itself and deploying style as a device for defining the scope of news producers’ legitimate copyright claims. In the news, as elsewhere in copyright, exclusivity and genre largely co-created each other. Two is how the labor and skill of individual human producers of knowledge are often hidden amid prominent debates about relationships between …


The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard Jan 2019

The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.

1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …


Whole-Of-Society Approach Needed Against Truth Decay, Eugene K. B. Tan Nov 2018

Whole-Of-Society Approach Needed Against Truth Decay, Eugene K. B. Tan

Research Collection Yong Pung How School Of Law

In an age of pervasive informationflows, governments do not defeat fake news. It's the people as a society whodo.The threatof deliberate falsehoods, or more popularly "fake news", posesserious threats to the democratic wellbeing of societies. The marketplace ofideas increasingly suffers from truth decay, propagated online or offline,imperilling an already vulnerable information ecosystem. In turn,this compromises the functioning of a democracy, which is premised on citizenshaving a shared reality rather than multiple distorted realities.


The Lost & Found Game Series: Teaching Medieval Religious Law In Context, Owen Gottlieb, Ian Schreiber Aug 2018

The Lost & Found Game Series: Teaching Medieval Religious Law In Context, Owen Gottlieb, Ian Schreiber

Presentations and other scholarship

Lost & Found is a strategy card-to-mobile game series that teaches medieval religious legal systems with attention to period accuracy and cultural and historical context. The Lost & Found project seeks to expand the discourse around religious legal systems, to enrich public conversations in a variety of communities, and to promote greater understanding of the religious traditions that build the fabric of the United States. Comparative religious literacy can build bridges between and within communities and prepare learners to be responsible citizens in our pluralist democracy. The first game in the series is a strategy game called Lost & Found …


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


Finding Lost & Found: Designer’S Notes From The Process Of Creating A Jewish Game For Learning, Owen Gottlieb Dec 2017

Finding Lost & Found: Designer’S Notes From The Process Of Creating A Jewish Game For Learning, Owen Gottlieb

Articles

This article provides context for and examines aspects of the design process of a game for learning. Lost & Found (2017a, 2017b) is a tabletop-to-mobile game series designed to teach medieval religious legal systems, beginning with Moses Maimonides’ Mishneh Torah (1180), a cornerstone work of Jewish legal rabbinic literature. Through design narratives, the article demonstrates the complex design decisions faced by the team as they balance the needs of player engagement with learning goals. In the process the designers confront challenges in developing winstates and in working with complex resource management. The article provides insight into the pathways the team …


An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo Nov 2017

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo

All Faculty Scholarship

Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by the courts …


Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford Aug 2017

Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford

Law Faculty Scholarship

These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316.

The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect. These protections have been largely effective at giving consumers the ability to manage how a large group of companies uses their email addresses for marketing. At the same time, the Act has had little effect on the volume of unsolicited commercial email or on the amount of email sent by scammers and fraudsters. The Act and its implementing Rule, then, have been …


Internet Safe Harbors And The Transformation Of Copyright Law, Matthew Sag Jan 2017

Internet Safe Harbors And The Transformation Of Copyright Law, Matthew Sag

Faculty Articles

This Article explores the potential displacement of substantive copyright law in the increasingly important online environment. In 1998, Congress enacted a system of intermediary safe harbors as part of the Digital Millennium Copyright Act (DMCA). The internet safe harbors and the associated system of notice-and-takedown fundamentally changed the incentives of platforms, users, and rightsholders in relation to claims of copyright infringement. These different incentives interact to yield a functional balance of copyright online that diverges markedly from the experience of copyright law in traditional media environments. More recently, private agreements between rightsholders and large commercial internet platforms have been made …


Reclaiming Attention In The Digital Generation Negotiation, Lauren A. Newell Jan 2017

Reclaiming Attention In The Digital Generation Negotiation, Lauren A. Newell

Law Faculty Scholarship

This chapter considers the relationship between information and communication technologies ("ICTs") and attention and the consequences of this relationship for the "Digital Generation" negotiators of the future. It proceeds in three parts. The first part explores the mechanics of attention and the importance of attention in negotiation. The second part, directed to elder generations of negotiators, aims to help these negotiators understand how ICTs affect the Digital Generation’s attentional capacity. The third part, directed to Digital Generation negotiators, offers practical suggestions for improving their focused attention.


Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll Jan 2017

Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.

Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …


Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo Nov 2016

Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo

All Faculty Scholarship

Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the …


Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril Oct 2016

Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril

Management Faculty Publications and Presentations

Imagine an upandcoming company hires you as one of its first employees. Passionate about your employer, you put in long hours doing everything from marketing to accounting to event planning. You are also proud of your employer's product, so you begin to publicize it to your friends through your social network accounts. (In fact, the company's founder is also one of your Facebook friends.) You tell your friends about the product launch, invite them to marketing events, and eventually blog about your industry, amassing a significant social media following while creating buzz about your employer. But one day, during layoffs …


Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo Jan 2016

Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo

All Faculty Scholarship

One key aspect of the debate over network neutrality has been whether and how network neutrality should apply to wireless networks. The existing commentary has focused on the economics of wireless network neutrality, but to date a detailed analysis of how the technical aspects of wireless networks affect the implementation of network neutrality has yet to appear in the literature. As an initial matter, bad handoffs, local congestion, and the physics of wave propagation make wireless broadband networks significantly less reliable than fixed broadband networks. These technical differences require the network to manage dropped packets and congestion in a way …


Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams Jan 2016

Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams

All Faculty Scholarship

In today’s rapidly evolving telecommunications landscape, the development of new technologies and distribution platforms are driving innovation and growth at a breakneck speed across the Internet ecosystem. Broadband connectivity is increasingly important to our civil discourse, our economy, and our future. What is the proper role of government in facilitating robust investment and competition in this critical sector? When technology companies constantly have to reinvent themselves and adapt to survive – what role should government play? This panel of experts at the Federalist Society’s 2014 National Lawyers Convention discussed the current regulatory environment and how government policies – particularly regarding …


Trending @ Rwu Law: Dean Yelnosky's Post: Why I Tweet Every Day, Michael Yelnosky Dec 2015

Trending @ Rwu Law: Dean Yelnosky's Post: Why I Tweet Every Day, Michael Yelnosky

Law School Blogs

No abstract provided.


Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring Oct 2015

Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring

Sociology & Criminal Justice Faculty Publications

The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


Copyright Trolling, An Empirical Study, Matthew Sag Jan 2015

Copyright Trolling, An Empirical Study, Matthew Sag

Faculty Articles

This Article proceeds as follows: Part II locates MDJD suits within the broader context of the IP troll debate. It explains why attempts to define copyright trolls in terms of status—i.e., in terms of the plaintiff’s relationship to the underlying IP—are ultimately flawed and suggests a conduct-focused approach based on identifying systematic opportunism. Part II explains why MDJD lawsuits have all of the hallmarks of copyright trolling, and it explores the basic economics of MDJD litigation. It then presents empirical data documenting the astonishing rise of MDJD lawsuits over the past decade. Part III explores the role of statutory damages …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo Jan 2015

A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo

All Faculty Scholarship

Policymakers have long invoked the concept of a “terminating access monopoly” to inform communications policy. Roughly speaking, the concept holds that a consumer-facing network provider, no matter how small or how subject to retail competition, generally possesses monopoly power vis-à-vis third-party senders of communications traffic to its customers. Regulators and advocates have routinely cited that concern to justify regulatory intervention in a variety of contexts where the regulated party may or may not have possessed market power in any relevant retail market.

Despite the centrality of the terminating access monopoly to modern communications policy, there is surprisingly little academic literature …


Making "Friends" With The #Ethics Rules: Avoiding Pitfalls In Professional Social Media Use, Cynthia Laury Dahl Jan 2015

Making "Friends" With The #Ethics Rules: Avoiding Pitfalls In Professional Social Media Use, Cynthia Laury Dahl

All Faculty Scholarship

Lawyers’ professional use of social media is widespread and a critical component to running a successful practice. Yet some common uses of social media easily – and often innocently -- violate the professional rules of ethics. The American Bar Association recently passed amendments to the Model Rules of Professional Conduct to include topics related to social media use, but the amendments still do not address all issues. Likewise, advisory opinions of state and local bar associations and court opinions give scant and sometimes contradictory advice about when a use does or does not violate a Rule. This essay discusses four …


Abc V. Aereo And The Humble Judge, James Y. Stern Jan 2015

Abc V. Aereo And The Humble Judge, James Y. Stern

Faculty Publications

No abstract provided.


The Internet Grows Up?, Neil M. Richards Jan 2015

The Internet Grows Up?, Neil M. Richards

Scholarship@WashULaw

Danielle Citron’s Hate Crimes in Cyberspace is one of the most important publications to date in the emerging fields of privacy and cyberlaw. In her thoughtful and insightful book, Citron explains the uneven playing field and frequently shocking acts of abuse that women face online, and demonstrates practical steps that we can take to remedy the problem of online hate through law, education, and the development of better, more inclusive norms. Other contributors to this Symposium have examined these contributions in great detail, pointing out important nuances of Citron’s argument, urging her in at least one case to be even …


Review Of Covering The United States Supreme Court In The Digital Age, Susan David Demaine Jan 2015

Review Of Covering The United States Supreme Court In The Digital Age, Susan David Demaine

Articles by Maurer Faculty

No abstract provided.


Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo Jan 2014

Response To Questions In The First White Paper, 'Modernizing The Communications Act', Randolph J. May, Richard A. Epstein, Justin (Gus) Hurwitz, Daniel Lyons, James B. Speeta, Christopher S. Yoo

All Faculty Scholarship

The House Energy and Commerce Committee has begun a process to review and update the Communications Act of 1934, last revised in any material way in 1996. As the Committee begins the review process, this paper responds to questions posed by the Committee that all relate, in fundamental ways, to the question: "What should a modern Communications Act look like?"


The Response advocates a "clean slate" approach under which the regulatory silos that characterize the current statute would be eliminated, along with almost all of the ubiquitous 'public interest' delegation of authority found throughout the Communications Act. The replacement regime …