Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Internet (5)
- Sex trafficking (4)
- Prostitution (3)
- Sexual exploitation (3)
- Child sexual abuse (2)
-
- Legislation (2)
- Media (2)
- Pornography (2)
- Privacy (2)
- Sexual assault (2)
- Technology (2)
- American Indian Law (1)
- American Indian Law Journal (1)
- Appellate (1)
- Appellate courts (1)
- Attention (1)
- Backpage.com (1)
- Broadcasting (1)
- CAN-SPAM Act (1)
- Cable (1)
- Campus (1)
- Collaboration (1)
- Communications Decency Act (1)
- Communications law (1)
- Competition (1)
- Cooperation (1)
- Court news (1)
- Courts (1)
- Criminal and civil liabilities (1)
- Customer premises equipment (1)
- Publication
- Publication Type
Articles 1 - 14 of 14
Full-Text Articles in Law
Finding Lost & Found: Designer’S Notes From The Process Of Creating A Jewish Game For Learning, Owen Gottlieb
Finding Lost & Found: Designer’S Notes From The Process Of Creating A Jewish Game For Learning, Owen Gottlieb
Articles
This article provides context for and examines aspects of the design process of a game for learning. Lost & Found (2017a, 2017b) is a tabletop-to-mobile game series designed to teach medieval religious legal systems, beginning with Moses Maimonides’ Mishneh Torah (1180), a cornerstone work of Jewish legal rabbinic literature. Through design narratives, the article demonstrates the complex design decisions faced by the team as they balance the needs of player engagement with learning goals. In the process the designers confront challenges in developing winstates and in working with complex resource management. The article provides insight into the pathways the team …
Stay Woke, Langston A. Williams
Stay Woke, Langston A. Williams
University of New Orleans Theses and Dissertations
Throughout the pages of my thesis, I comprehensively analyze the processes, intentions, and production of my thesis film Stay Woke. My examination will exhaustively probe every stage of the film from development to preproduction to production to postproduction and beyond. Individual aspects of this process including writing, casting, locations, production design, cinematography, directing, budgeting, scheduling, and postproduction workflows will be detailed. As I make elaborations in each section, I will explain my learning experiences from each day’s new tasks, challenges, and lessons. All of these things will be framed with regards to the overall goal and themes of the …
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Journal of International Technology and Information Management
This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.
An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo
An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo
All Faculty Scholarship
Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by the courts …
Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford
Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford
Law Faculty Scholarship
These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316.
The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect. These protections have been largely effective at giving consumers the ability to manage how a large group of companies uses their email addresses for marketing. At the same time, the Act has had little effect on the volume of unsolicited commercial email or on the amount of email sent by scammers and fraudsters. The Act and its implementing Rule, then, have been …
Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman
Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Introduction To Dignity Special Issue: Freedom From Sexploitation, Lisa L. Thompson, Donna M. Hughes
Introduction To Dignity Special Issue: Freedom From Sexploitation, Lisa L. Thompson, Donna M. Hughes
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins
It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
No Connection: The Issue Of Internet On The Reservation, Emily S. Donnellan
No Connection: The Issue Of Internet On The Reservation, Emily S. Donnellan
American Indian Law Journal
No abstract provided.
Surveying The Landscape As Technology Revolutionizes Media Coverage Of Appellate Courts, Howard J. Bashman
Surveying The Landscape As Technology Revolutionizes Media Coverage Of Appellate Courts, Howard J. Bashman
The Journal of Appellate Practice and Process
No abstract provided.
Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael
Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Internet Safe Harbors And The Transformation Of Copyright Law, Matthew Sag
Internet Safe Harbors And The Transformation Of Copyright Law, Matthew Sag
Faculty Articles
This Article explores the potential displacement of substantive copyright law in the increasingly important online environment. In 1998, Congress enacted a system of intermediary safe harbors as part of the Digital Millennium Copyright Act (DMCA). The internet safe harbors and the associated system of notice-and-takedown fundamentally changed the incentives of platforms, users, and rightsholders in relation to claims of copyright infringement. These different incentives interact to yield a functional balance of copyright online that diverges markedly from the experience of copyright law in traditional media environments. More recently, private agreements between rightsholders and large commercial internet platforms have been made …
Reclaiming Attention In The Digital Generation Negotiation, Lauren A. Newell
Reclaiming Attention In The Digital Generation Negotiation, Lauren A. Newell
Law Faculty Scholarship
This chapter considers the relationship between information and communication technologies ("ICTs") and attention and the consequences of this relationship for the "Digital Generation" negotiators of the future. It proceeds in three parts. The first part explores the mechanics of attention and the importance of attention in negotiation. The second part, directed to elder generations of negotiators, aims to help these negotiators understand how ICTs affect the Digital Generation’s attentional capacity. The third part, directed to Digital Generation negotiators, offers practical suggestions for improving their focused attention.
Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll
Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll
Georgetown Law Faculty Publications and Other Works
In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.
Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …