Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Santa Clara Law (5)
- Boston University School of Law (3)
- University of Pennsylvania Carey Law School (2)
- University of Pittsburgh School of Law (2)
- Columbia Law School (1)
-
- Cornell University Law School (1)
- Embry-Riddle Aeronautical University (1)
- Maurer School of Law: Indiana University (1)
- Pace University (1)
- Penn State Dickinson Law (1)
- UIC School of Law (1)
- University of Baltimore Law (1)
- University of Colorado Law School (1)
- University of Georgia School of Law (1)
- University of Maine School of Law (1)
- University of Miami Law School (1)
- Keyword
-
- Internet (5)
- Adwords (3)
- Google (3)
- Software (3)
- Trademark (3)
-
- VAT (3)
- Cyberspace (2)
- D-VAT (2)
- Digital VAT (2)
- Intellectual Property Law (2)
- Regressivity (2)
- Streamlined Sales Tax (2)
- 2004 (1)
- AI (1)
- Artificial intelligence (1)
- Biometric identifiers (1)
- Biometrics (1)
- Brand awareness (1)
- CNG (1)
- Carousel Fraud (1)
- Case analysis (1)
- Censorship (1)
- Certified Tax Software (1)
- Certified software (1)
- Certified tax software (1)
- Client/server (1)
- Code (1)
- Comparative study (1)
- Computer (1)
- Computer-assisted legal research (1)
Articles 1 - 24 of 24
Full-Text Articles in Law
Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan
Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Biometrics, Certified Software Solutions, And The Japanese Consumption Tax: A Proposal For The Tax Commission, Richard Thompson Ainsworth
Biometrics, Certified Software Solutions, And The Japanese Consumption Tax: A Proposal For The Tax Commission, Richard Thompson Ainsworth
Faculty Scholarship
Significant change is anticipated in the Japanese Consumption Tax. The Japanese Tax Commission is recommending that the rate should double, multiple rates should be employed, and the "bookkeeping method" of accounting should be abandoned in favor of the European "invoice method."
The Tax Commission faces a tax policy dilemma. The aging population drives the need for a tax increase (making the Consumption Tax an obvious target for revenue enhancement) at exactly the same time the population is shrinking in overall size, thereby reducing the number of working-consumers who can pay the higher tax.
These are dramatic changes for the Japanese …
Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer
Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer
All Faculty Scholarship
The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …
Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang
Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Biometrics: Solving The Regressivity Of Vats And Rsts With 'Smart Card' Technology, Richard Thompson Ainsworth
Biometrics: Solving The Regressivity Of Vats And Rsts With 'Smart Card' Technology, Richard Thompson Ainsworth
Faculty Scholarship
Biometric identifiers embedded in national identity cards puts a formerly impossible goal of consumption taxation within the grasp of policymakers for the first time. Never before has it been possible to design a broad-based, single rate consumption tax that is truly progressive.
No consumption tax has ever had all three of the critical attributes of a progressive consumption tax: a broad base, a single rate, and measured relief for those in greatest need. Although economists have urged that a broad base and a single rate be pursued over progressivity, most consumption taxes instead seek progressivity at the expense of both …
Carousel Fraud In The Eu: A Digital Vat Solution, Richard Thompson Ainsworth
Carousel Fraud In The Eu: A Digital Vat Solution, Richard Thompson Ainsworth
Faculty Scholarship
Recent reports from the UK's Office for National Statistics estimate (as of May 11, 2006) that Missing Trader Intra-community Fraud (MTIC) may exceed 10 billion pounds this year.
Carousel fraud, a variant of MTIC where the same goods are sold over and over again, exploits the lingering non-certified, non-digital attributes of the EU VAT. The UK believes that carousel fraud cost the Exchequer between 1.12 and 1.9 billion pounds in the 2004-05 financial year. This article proposes that carousel fraud be eliminated in the EU through selective insertion of Digital VAT functionality into the present system. In other words, it …
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
All Faculty Scholarship
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …
Vol. Ix, Tab 46 - Ex. 8 - Email From Emily White, Emily White
Vol. Ix, Tab 46 - Ex. 8 - Email From Emily White, Emily White
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Vi, Tab 38 - Ex. 32 - Language Learning In The United States Of America, Rosetta Stone
Vol. Vi, Tab 38 - Ex. 32 - Language Learning In The United States Of America, Rosetta Stone
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman
Online Boilerplate: Would Mandatory Website Disclosure Of E-Standard Terms Backfire?, Robert A. Hillman
Cornell Law Faculty Publications
No abstract provided.
Internet Cookies: When Is Permission Consent?, Max Oppenheimer
Internet Cookies: When Is Permission Consent?, Max Oppenheimer
All Faculty Scholarship
No abstract provided.
Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim
Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim
UIC Law Open Access Faculty Scholarship
It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …
A Dispatch From The Crypto Wars, A. Michael Froomkin
A Dispatch From The Crypto Wars, A. Michael Froomkin
Articles
Matt Curtin's Brute Force is a primarily personal account of one early effort to harness the power of distributed computing. In 1997, Mr. Curtin and other members of the DESCHALL (DES Challenge) project built, distributed, and managed software that united thousands of computers, many of them ordinary personal computers, in the search for a single decryption key among 72 quadrillion possibilities. The DESCHALL project sought to demonstrate that DES, then the U.S. national standard encryption algorithm, was no longer as secure as advertised. While Brute Force also offers some background on encryption regulation, export control policy, and other aspect of …
Search Engine Bias And The Demise Of Search Engine Utopianism, Eric Goldman
Search Engine Bias And The Demise Of Search Engine Utopianism, Eric Goldman
Faculty Publications
Due to search engines' automated operations, people often assume that search engines display search results neutrally and without bias. However, this perception is mistaken. Like any other media company, search engines affirmatively control their users' experiences, which has the consequence of skewing search results (a phenomenon called "search engine bias"). Some commentators believe that search engine bias is a defect requiring legislative correction. Instead, this Essay argues that search engine bias is the beneficial consequence of search engines optimizing content for their users. The Essay further argues that the most problematic aspect of search engine bias, the "winner-take all" effect …
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Articles by Maurer Faculty
No abstract provided.
Taxing Trademarks And Domain Names, Xuan-Thao Nguyen, Jeffrey A. Maine
Taxing Trademarks And Domain Names, Xuan-Thao Nguyen, Jeffrey A. Maine
Faculty Publications
With the arrival of global electronic commerce transactions on the Internet, new forms of intellectual property rights, such as Internet domain names, have emerged. Today, Internet domain names are some companies' most valuable assets. Yet law professors, attorneys, and judges struggle with the legal nature of domain names, which is far from settled. Questions drawing recent attention include: How should domain names be valued? Can domain names be used as collateral in secured transactions, and how does one perfect a security interest in domain names? What will happen to domain names in bankruptcy?
Commercializing Open Source Software: Do Property Rights Still Matter?, Ronald J. Mann
Commercializing Open Source Software: Do Property Rights Still Matter?, Ronald J. Mann
Faculty Scholarship
For several years now, open source software products have been gaining prominence and market share. Yet the products themselves are not as provocative as the way in which they are developed and distributed. Two related features of the open source model are distinctive: the use of collaborative development structures that extend beyond the boundaries of a single firm, and the lack of reliance on intellectual property ("IP") rights as a means of appropriating the value of the underlying technologies. Firm-level control of intellectual property is replaced by a complex set of relations, both informal and sometimes contractual, among strategic partners …
Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe
Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe
Scholarly Works
This article examines the history of judicial and legislative responses to the issue of consumption of pornography and other harmful materials over the Internet by children. The article begins by giving a brief overview of free speech law in the US. Next, summaries of relevant U.S. legislation and corresponding litigation on Internet free speech are given. Highlighted are: 1) the Communications Decency Act (CDA) and the U.S. Supreme Court’s response in Reno v. ACLU; 2) The Child Pornography Prevention Act (CPPA) and Ashcroft v. Free Speech Coalition; 3) the Children’s Internet Protection Act (CIPA) and United States v. American …
The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson
The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson
Elisabeth Haub School of Law Faculty Publications
This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …
Regulating Access To Databases Through Antitrust Law, Daryl Lim
Regulating Access To Databases Through Antitrust Law, Daryl Lim
Faculty Scholarly Works
It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …
Cite Checking: A Brave New World, Susan Nevelow Mart
Cite Checking: A Brave New World, Susan Nevelow Mart
Publications
No abstract provided.
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Publications
This document is Dr. Kessler's review of Digital Crime and Forensic Science in Cyberspace, by P. Kanellis, E. Kiountouzis, N. Kolokotronis, and D. Martakos. Idea Group Publishing, 2006. ISBN: 1-59140-873-3.
Computer Models For Legal Prediction, Kevin D. Ashley, Stephanie Bruninghaus
Computer Models For Legal Prediction, Kevin D. Ashley, Stephanie Bruninghaus
Articles
Computerized algorithms for predicting the outcomes of legal problems can extract and present information from particular databases of cases to guide the legal analysis of new problems. They can have practical value despite the limitations that make reliance on predictions risky for other real-world purposes such as estimating settlement values. An algorithm's ability to generate reasonable legal arguments also is important. In this article, computerized prediction algorithms are compared not only in terms of accuracy, but also in terms of their ability to explain predictions and to integrate predictions and arguments. Our approach, the Issue-Based Prediction algorithm, is a program …
Ip's Problem Child: Shifting The Paradigms For Software Protection, Jacqueline D. Lipton
Ip's Problem Child: Shifting The Paradigms For Software Protection, Jacqueline D. Lipton
Articles
Computer software is somewhat of a problem child for intellectual property law. Courts and legislatures have struggled to encourage innovations in software development while, at the same time, attempting to avoid undesirable digital information monopolies. Neither the patent nor the copyright system has provided a particularly satisfactory paradigm for software protection. Although patents have received greater attention than copyrights in the software context (consider, for example, the recent BlackBerry case), copyright law arguably creates more insidious undercurrents in today's marketplace. This is partly because we have not yet appreciated the potential impact of recent developments in programming methodology and digital …