Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Fordham Law School (6)
- Pace University (5)
- University of Georgia School of Law (4)
- Mitchell Hamline School of Law (3)
- Chicago-Kent College of Law (2)
-
- Schulich School of Law, Dalhousie University (2)
- Selected Works (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- American University Washington College of Law (1)
- Columbia Law School (1)
- DePaul University (1)
- Liberty University (1)
- Marquette University Law School (1)
- Northwestern Pritzker School of Law (1)
- Penn State Dickinson Law (1)
- SJ Quinney College of Law, University of Utah (1)
- St. John's University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Cincinnati College of Law (1)
- University of Colorado Law School (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Michigan Law School (1)
- University of Nebraska - Lincoln (1)
- University of Nebraska at Omaha (1)
- University of Washington School of Law (1)
- Vanderbilt University Law School (1)
- William & Mary Law School (1)
- Publication Year
- Publication
-
- Fordham Intellectual Property, Media and Entertainment Law Journal (6)
- Journal of Intellectual Property Law (4)
- Cybaris® (3)
- Pace Law Review (3)
- Canadian Journal of Law and Technology (2)
-
- Chicago-Kent Law Review (2)
- Pace Intellectual Property, Sports & Entertainment Law Forum (2)
- Touro Law Review (2)
- American University Journal of Gender, Social Policy & the Law (1)
- Catholic University Journal of Law and Technology (1)
- Copyright, Fair Use, Scholarly Communication, etc. (1)
- DePaul Journal of Art, Technology & Intellectual Property Law (1)
- Dickinson Law Review (2017-Present) (1)
- Journal of Business & Technology Law (1)
- Kernochan Center for Law, Media, and the Arts (1)
- Marquette Intellectual Property & Innovation Law Review (1)
- Masters Theses (1)
- Northwestern Journal of Technology and Intellectual Property (1)
- Publications (1)
- Raizel Liebler (1)
- Rodolfo C. Rivas (1)
- St. John's Law Review (1)
- The University of Cincinnati Intellectual Property and Computer Law Journal (1)
- Theses/Capstones/Creative Projects (1)
- University of Michigan Journal of Law Reform (1)
- Utah Law Faculty Scholarship (1)
- Vanderbilt Law Review (1)
- Washington Law Review (1)
- William & Mary Law Review (1)
- Publication Type
Articles 31 - 45 of 45
Full-Text Articles in Law
Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione
Wide Right: How Isp Immunity And Current Laws Are Off The Mark In Protecting The Modern Athlete On Social Media, Dominick J. Mingione
Pace Intellectual Property, Sports & Entertainment Law Forum
“[Y]our tranny looking dad is a disgrace to American football,” “I would rape the shit out of her,” and “[The] [B]ears are easier than you on prom night,” are just a sampling of some of the alarmingly harassing tweets received by Chloe Trestman between the night of November 9, 2014 and November 10, 2014. Who is Chloe Trestman, and what could she have possibly done to warrant such abuse? Chloe’s father is Marc Trestman, the head coach of the Chicago Bears. And the twitter vitriol, or “twitriol,” directed toward Chloe was in response to the Bears’ blowout loss to their …
Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman
Copyright And Social Media: A Tale Of Legislative Abdication, Diane Leenheer Zimmerman
Pace Law Review
The focus of this article will be on what I call DMCA 2.0. It will begin by discussing the Digital Millennium Copyright Act (DMCA) and why that statute, passed in 1998 to shore up the enforceability of copyright online by protecting content providers’ ability to engage in forms of technological self-help against online copyright infringers, has been problematic. Part II describes largely unsuccessful efforts in the form of statutes and trade agreements to shore up the DMCA. Part III turns to the latest salvo, the adoption of “voluntary agreements” whereby content owners and ISPs, in particular social media platforms, join …
Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky
Social Justice, Social Norms And The Governance Of Social Media, Tal Z. Zarsky
Pace Law Review
This article proceeds as follows: Part II briefly addresses the theoretical arguments regarding the pros and cons of various governance strategies, focusing on the advantages, disadvantages and pitfalls of reliance on private parties. In Part III, the article describes, in general terms, the above-mentioned empirical study, explaining its methodology, the specific challenges to its design and implementation, and how these were met. The discussion specifically centers on a survey taken to establish the nature of social norms. Part IV presents a specific test case: whether pseudonymity should be permitted in social media or should “real names” be mandatory. Part V …
Anarchy, Status Updates, And Utopia, James Grimmelmann
Anarchy, Status Updates, And Utopia, James Grimmelmann
Pace Law Review
Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; PayPal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.
Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power, there is also social power. Whenever people come together …
Keep Your Friends Close: A Framework For Addressing Rights To Social Media Contacts, Courtney J. Mitchel
Keep Your Friends Close: A Framework For Addressing Rights To Social Media Contacts, Courtney J. Mitchel
Vanderbilt Law Review
A group of entrepreneurial recent college graduates starts a tutoring and test prep company focused on helping promising high school students get an edge on their college applications. Since the cost of print advertising exceeds the group's budget, they each actively promote the business on their personal social media accounts, garnering their first clients. They also create company accounts on Facebook, Linkedln, and Twitter, which clients join for easy, direct communication and quick access to information. Though all the founders contribute occasional posts and encourage their personal social media contacts to join the company accounts, one eventually becomes, in practice …
Understanding Blogging And Copyright Infringement Within A Pinterest Generation, Ashley Mcalpin
Understanding Blogging And Copyright Infringement Within A Pinterest Generation, Ashley Mcalpin
Masters Theses
Copyright infringement within a Pinterest generation is growing at an alarming rate. This study sought to explain the phenomenon of stealing on Pinterest through a study of social interaction and perception thereof. The author found that the overall concept of interaction was widely misunderstood, along with the current copyright laws, leading to a broken sense of ethicality among the Pinterest generation. Through this study the impact of peer interaction, in compliance with the standards of Bandura's Social Learning theory (1977), was reviewed and found applicable to the Pinterest generation today. This study proved it relevant to further research the ethical …
Journalists, Social Media And Copyright: Demystifing Fair Use In The Emergent Digital Environment, Patricia Aufderheide
Journalists, Social Media And Copyright: Demystifing Fair Use In The Emergent Digital Environment, Patricia Aufderheide
Journal of Business & Technology Law
No abstract provided.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.
Access Denied: How Social Media Accounts Fall Outside The Scope Of Intellectual Property Law And Into The Realm Of The Computer Fraud And Abuse Act, Tiffany Miao
Fordham Intellectual Property, Media and Entertainment Law Journal
This note addresses the challenge of applying intellectual property laws to determining ownership rights over social media accounts, specifically in the employer and employee context. This note suggests that IP regimes, namely Trademark, Copyright,and Trade Secrets, fail to provide an adequate framework for determining such ownership rights. Instead, this note proposes that the Computer Fraud and Abuse Act serves as a more appropriate legal framework.
Social Media In Sports: Can Professional Sports League Commissioners Punish 'Twackle Dummies'?, Daniel J. Friedman
Social Media In Sports: Can Professional Sports League Commissioners Punish 'Twackle Dummies'?, Daniel J. Friedman
Pace Intellectual Property, Sports & Entertainment Law Forum
Daniel J. Friedman writes an article discussing the rise and popularity in social media use by professional athletes. He then discusses some of the new problems that have arisen due to social media misuse and the power of the Commissioner to restrict and punish the players for misuse. The article culminates with a case study hypothetical related to content based social media misuse and whether the Commissioners of professional sports league can punish a player for the content of their social media messages.
Tweet Me Fairly: Finding Attribution Rights Through Fair Use In The Twittersphere, Adam S. Nelson
Tweet Me Fairly: Finding Attribution Rights Through Fair Use In The Twittersphere, Adam S. Nelson
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
E-Incitement: A Framework For Regulating The Incitement Of Criminal Flash Mobs, Hannah Steinblatt
E-Incitement: A Framework For Regulating The Incitement Of Criminal Flash Mobs, Hannah Steinblatt
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Struggling With Sunshine: Analyzing The Impact Of Technology On Compliance With Open Government Laws Using Florida As A Case Study, Sandra F. Chance, Christine M. Locke
Struggling With Sunshine: Analyzing The Impact Of Technology On Compliance With Open Government Laws Using Florida As A Case Study, Sandra F. Chance, Christine M. Locke
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung
Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung
Chicago-Kent Law Review
Within the past couple of years, social networking websites have become an immensely popular destination for people from all walks of life. Websites like Facebook and Twitter now count tens of millions of worldwide users, including world leaders and a number of celebrities. Eventually, users realized that social networking websites lent themselves to the quick and easy impersonation of celebrities through the creation of fake social networking accounts, often as a form of parody. One subject of such impersonation was professional baseball manager Tony La Russa, who took the then-unprecedented step of suing his impersonators and Twitter over the incident. …
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …