Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Privacy (5)
- Computer Law (4)
- Internet (4)
- Law and Technology (4)
- Intellectual Property Law (3)
-
- Risk (3)
- Social Implications of ICT (3)
- Cloud computing (2)
- Communications Law (2)
- Computer (2)
- Copyright (2)
- Emerging Technologies (2)
- Ethics (2)
- First Amendment (2)
- IT Law (2)
- Intellectual Property (2)
- Location-Based Services (2)
- People (2)
- Science and Technology (2)
- Search engines (2)
- Social media (2)
- Uberveillance (2)
- .mx (1)
- ADNDRC (1)
- Acceptance (1)
- Analysis (1)
- Application of Responsive Regulation (1)
- Arab Spring (1)
- Arts and Entertainment (1)
- Banco Mundial (1)
Articles 1 - 18 of 18
Full-Text Articles in Law
The Copyrightability Of Nonliteral Elements Of Computer Programs, Julian Velasco
The Copyrightability Of Nonliteral Elements Of Computer Programs, Julian Velasco
Julian Velasco
No abstract provided.
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors provide a brief overview of the domain name system and its dispute resolution regulation. The authors then delve into the new gTLDs and tackle some of the questions brought forward by its imminent introduction. /////////////////////////////////////////////////////////////////////////////////////////////////////////////// Los autores ofrecen un panorama general del sistema de nombres de dominio y la regulación de sus procedimientos de solución de controversias. Posteriormente, los autores profundizan en los nuevos gTLDs y tratan de responder a algunas de las preguntas presentadas por su inminente introducción.
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
T. Noble Foster
This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …
What To Do About Google?, James Grimmelmann
What To Do About Google?, James Grimmelmann
James Grimmelmann
Observers have debated whether is a conduit for websites' speech or an editor that speaks for itself. The best answer is neither: search engines should be advisors helping their users find the websites they seek. Good search engine policy would put users first; I give examples including search bias and user privacy.
A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian
Vahagn Amirian
No abstract provided.
Rankings, Reductionism, And Responsibility , Frank Pasquale
Rankings, Reductionism, And Responsibility , Frank Pasquale
Frank A. Pasquale
After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Frank A. Pasquale
Internet service providers and search engines have mapped the web, accelerated e-commerce, and empowered new communities. They also pose new challenges for law. Individuals are rapidly losing the ability to affect their own image on the web - or even to know what data are presented about them. When web users attempt to find information or entertainment, they have little assurance that a carrier or search engine is not biasing the presentation of results in accordance with its own commercial interests. Technology’s impact on privacy and democratic culture needs to be at the center of internet policy-making. Yet before they …
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Allyson Haynes Stuart
This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.
Application Of Responsive Regulation In The Food Safety Regulations Of Bangladesh, Abu Noman M. Atahar Ali
Application Of Responsive Regulation In The Food Safety Regulations Of Bangladesh, Abu Noman M. Atahar Ali
Abu Noman Mohammad Atahar Ali
Application of responsive regulation in the food safety regulations of Bangladesh - Abstract Bangladesh, a developing country of the South Asian region, has been suffering from rampant food adulteration for the last few decades. Recent studies revealed that numerous deaths along with countless physical illnesses are occurring as the consequences of this ongoing food adulteration. Several attempts have been made through to change the food safety regulations [FSR] of Bangladesh to combat this alarming issue. Unfortunately, the situation has hardly been changed. Rather it is getting worse day by day. However, Bangladesh has never changed the regulatory enforcement philosophy of …
Mistaken Identity, Identity Theft And Problems Of Remote Authentication In E-Commerce, Eliza Mik
Mistaken Identity, Identity Theft And Problems Of Remote Authentication In E-Commerce, Eliza Mik
Eliza Mik
The problem of mistaken identity in e-commerce transactions brings together seemingly unrelated issues: privacy, network security, digital signatures – and classic contract law. The technological characteristics of the Internet have a tendency to turn traditional legal doctrines on their head, or, at least expose flaws in existing legal arguments. Combining an academic exercise with the practical implications of the insecurity of the Internet, this paper draws some unexpected conclusions regarding cases of mistaken identity. The latter must be analysed afresh with a number of factors in mind: the more widespread use of fictitious identities in on-line transactions, the higher incidence …
Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach
Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach
Ulf Maunsbach
During recent years the European Court of Justice (ECJ) has proven to be increasingly active in relation to cross-border intellectual property disputes. The relevant cases cover a wide range of issues, from advertisement through use of keywords, to copyright-related issues involved in making protected material available through the Internet. All in all, it might be said that the Internet era has finally reached the Court of Justice. A similar development is visible in Swedish courts. This provides for an unlimited amount of material for further discussion. In this paper I would like to provide a short summary of the recent …
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Professor Katina Michael
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
Professor Katina Michael
Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson
What Alex Kozinski And The Investigation Of Earl Bradley Teach About Searching And Seizing Computers And The Dangers Of Inevitable Discovery, Stephen E. Henderson
Stephen E Henderson
This paper tells two stories. One concerns the investigation of a Delaware physician named Earl B. Bradley that resulted in a conviction and sentence of fourteen consecutive life terms for the sexual abuse of children. The other concerns the computer problems, both judicial and extra-judicial, of Chief Judge Alex Kozinski of the United States Court of Appeals for the Ninth Circuit. Though in a sense unrelated, they share lessons about the practicalities of computers and their search that are worth telling. As courts continue to struggle with how to cabin the searches of computers in order to minimize privacy intrusion …
Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq.
Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq.
Rodolfo C. Rivas
The author provides a brief overview of the World Trade Organization (WTO), the International Monetary Fund (IMF) and the World Bank (WB) by explaining the context of their interrelationship. Afterwards, the author delves into a brief analysis of Mexico’s role in the International Trade arena and concludes by describing the paths through which the private sector can benefit from the WTO.///////////////////////////////////////////////////////////////////////////////////////El autor pone en contexto la interrelación entre la Organización Mundial del Comercio (OMC) el Banco Mundial (BM) y el Fondo Monetario Internacional (FMI). Posteriormente, el autor describe brevemente el rol de México dentro de las instituciones de Comercio Internacional …