Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 22 of 22

Full-Text Articles in Law

Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo Nov 2010

Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo

All Faculty Scholarship

Much of the recent debate over Internet policy has focused on the permissibility of business practices that are becoming increasingly common, such as new forms of network management, prioritization, pricing, and strategic partnerships. This Essay analyzes these developments through the lens of the management literature on the product life cycle, dominant designs, technological trajectories and design hierarchies, and the role of complementary assets in determining industry structure. This analysis suggests that many of these business practices may represent nothing more than a reflection of how the nature of competition changes as industries mature. This in turn suggests that network neutrality …


Can Google-Tv Help Liberate Cable-Tv?, Erik Ugland Sep 2010

Can Google-Tv Help Liberate Cable-Tv?, Erik Ugland

Erik Ugland

No abstract provided.


Privacy Expectations And Protections For Teachers In The Internet Age, Emily H. Fulmer Sep 2010

Privacy Expectations And Protections For Teachers In The Internet Age, Emily H. Fulmer

Duke Law & Technology Review

Public school teachers have little opportunity for redress if they are dismissed for their activities on social networking websites. With the exception of inappropriate communication with students, a school district should not be able to consider a public educator’s use of a social networking website for disciplinary or employment decisions. Insisting that the law conform to twenty-first century social norms, this iBrief argues that the law should protect teachers’ speech on popular social networking websites like Facebook and MySpace.


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


Who Owns The Virtual Items?, Leah Shen Aug 2010

Who Owns The Virtual Items?, Leah Shen

Duke Law & Technology Review

Do you WoW? Because millions of people around the world do! Due to this increased traffic, virtual wealth amassed in MMORPGs are intersecting in our real world in unexpected ways. Virtual goods have real-life values and are traded in real-life markets. However, the market for trading in virtual items is highly inefficient because society has not created property rights for virtual items. This lack of regulation has a detrimental effect not just the market for virtual items, but actually the market for MMORPGs. Assuming we want to promote the production of MMORPGs as a market, society requires a set of …


The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness Aug 2010

The Anonymous Poster: How To Protect Internet Users’ Privacy And Prevent Abuse, Scott Ness

Duke Law & Technology Review

The threat of anonymous Internet posting to individual privacy has been met with congressional and judicial indecisiveness. Part of the problem stems from the inherent conflict between punishing those who disrespect one's privacy by placing a burden on the individual websites and continuing to support the Internet's development. Additionally, assigning traditional tort liability is problematic as the defendant enjoys an expectation of privacy as well, creating difficulty in securing the necessary information to proceed with legal action. One solution to resolving invasion of privacy disputes involves a uniform identification verification program that ensures user confidentiality while promoting accountability for malicious …


Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park Jun 2010

Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Corporate social networking sites provide employees and employers with considerable opportunity to share information and become friends. Unfortunately, American laws do not directly address social networking site usage. The National Labor Relations Act, civil rights laws, and various common law doctrines such as employment at-will and defamation provide the pattern for future social networking laws. Ethical considerations such as productivity, security, goodwill, privacy, accuracy, and discipline fairness also affect future laws. Corporate policies on corporate social networking should balance the employer‘s and employee‘s interests. Existing laws and ethical issues associated with social networking should impact social networking policies related to …


The Reporter's Privilege Goes Incognito In Wisconsin, Erik Ugland May 2010

The Reporter's Privilege Goes Incognito In Wisconsin, Erik Ugland

Erik Ugland

No abstract provided.


Dissemination Of Communication And Information In Inland Fisheries, Ganesh Chandra Apr 2010

Dissemination Of Communication And Information In Inland Fisheries, Ganesh Chandra

Ganesh Chandra

Flow of communication and information from the research station to the end user is sine qua non for the sustainable production as well as productivity enhancement in inland fisheries and the development of fishers as a whole. The resource poor who are often more in need than others of information on sustainable and low external input technologies is least likely to gain access to the information required. This has been seen particularly in the fisheries sector where the channels of information accessible to the resource poor delivered information on new practices and recommendations as well as the new culture technologies, …


Network Neutrality Or Internet Innovation?, Christopher S. Yoo Apr 2010

Network Neutrality Or Internet Innovation?, Christopher S. Yoo

All Faculty Scholarship

Over the past two decades, the Internet has undergone an extensive re-ordering of its topology that has resulted in increased variation in the price and quality of its services. Innovations such as private peering, multihoming, secondary peering, server farms, and content delivery networks have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Relatedly, network providers have begun to employ an increasingly varied array of business arrangements and pricing. This variation has been interpreted by some as network providers attempting to promote their self interest at the expense of the public. In fact, these …


'My Little Genius' And The Role Of The Fcc, Erik Ugland Mar 2010

'My Little Genius' And The Role Of The Fcc, Erik Ugland

Erik Ugland

No abstract provided.


Manifest Greatness The Final Original Version By Emmanuel Mario B Santos Aka Marc Guerrero, Emmanuel Mario B. Santos Aka Marc Guerrero Jan 2010

Manifest Greatness The Final Original Version By Emmanuel Mario B Santos Aka Marc Guerrero, Emmanuel Mario B. Santos Aka Marc Guerrero

Emmanuel Mario B Santos aka Marc Guerrero

MANIFEST GREATNESS vf24jan2010 WE COME TOGETHER THERE OUGHT TO BE NO POOR WE TAKE CHARGE.


Wired: What We've Learned About Courtroom Technology, Fredric I. Lederer Jan 2010

Wired: What We've Learned About Courtroom Technology, Fredric I. Lederer

Popular Media

No abstract provided.


Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney Jan 2010

Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney

UIC Law Open Access Faculty Scholarship

The next wave of concern regarding Google involves web analytics. Web analytics is the measurement, collection, analysis, and reporting of Internet data for the purposes of understanding and optimizing web usage. The concerns of web analytics use touches on issues of online user privacy, government use of personal information, and information on website user activity. While Google Analytics is not the sole web analytics product on the market, it is widely used by corporate, non-profit, and government organizations. The product has been reported to have a 59% market share among web analytics vendors in a 2008 study.

Web analytics technology …


What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton Jan 2010

What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton

Articles

Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …


Space Age Love Song: The Mix Tape In A Digital Universe, Megan M. Carpenter Jan 2010

Space Age Love Song: The Mix Tape In A Digital Universe, Megan M. Carpenter

Law Faculty Scholarship

Music sharing is one of the most controversial topics in copyright law. And mix tapes have been the classic, iconic form of music sharing for the last 30 years. Even in the face of technological development so rapid and far-reaching as to remove the literal “tape” from “mix tape,” there are nonetheless modern incarnations that crop up on a regular basis, from mix CDs to mix-sharing websites. Social norms permit and even encourage the creation of these modern mix tapes for such diverse reasons as wedding favors and birthday gifts.

If copyright law is meant to promote creativity and proscribe …


Wikipedia And The European Union Database Directive, Jacqueline D. Lipton Jan 2010

Wikipedia And The European Union Database Directive, Jacqueline D. Lipton

Articles

“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …


Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park Jan 2010

Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park

Management Faculty Publications and Presentations

Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.


Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo Jan 2010

Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo

All Faculty Scholarship

The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …


The Changing Patterns Of Internet Usage, Christopher S. Yoo Jan 2010

The Changing Patterns Of Internet Usage, Christopher S. Yoo

All Faculty Scholarship

The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …


The Aims Of Public Scholarship In Media Law And Ethics, Erik Ugland Dec 2009

The Aims Of Public Scholarship In Media Law And Ethics, Erik Ugland

Erik Ugland

No abstract provided.


Newspaper Theft, Self-Preservation And The Dimensions Of Censorship, Erik Ugland, Jennifer Lambe Dec 2009

Newspaper Theft, Self-Preservation And The Dimensions Of Censorship, Erik Ugland, Jennifer Lambe

Erik Ugland

One of the most common yet understudied means of suppressing free expression on college and university campuses is the theft of freely-distributed student publications, particularly newspapers. This study examines news accounts of nearly 300 newspaper theft incidents at colleges and universities between 1995 and 2008 in order to identify the manifestations and consequences of this peculiar form of censorship, and to augment existing research on censorship and tolerance by looking not at what people say about free expression but at what they do when they have the power of censorship in their own hands. Among the key findings is that …