Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cyberspace Law (5)
- Information Privacy Law (2)
- Privacy (2)
- Social networks (2)
- Administrative Law (1)
-
- Administrative law (1)
- Call blocking (1)
- Call recording (1)
- Carrier (1)
- Computer Law (1)
- Condemnation (1)
- Conflict of Law (1)
- Constitutional Law (1)
- Contracts (1)
- Cyber gender harassment (1)
- Cyber law (1)
- Cyberspace (1)
- Electronic commerce (1)
- Eminent domain (1)
- FCC (1)
- Facebook (1)
- Gender discrimination (1)
- Gender harassment (1)
- Google Voice (1)
- Government (1)
- Information privacy (1)
- Information technology (1)
- Intellectual Property Law (1)
- Jurisdiction (1)
- Kelo (1)
Articles 1 - 9 of 9
Full-Text Articles in Law
Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill
Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill
Michael Katz
The Federal Communications Commission, taking note of AT&T's complaint, has written to Google with questions about its call blocking. But the implications for our privacy of software-managed call services like Google Voice are a much greater threat to consumers, and that's where the FCC should direct its energy - immediately.
Civil Rights In The Cyber World, Danielle Citron
Civil Rights In The Cyber World, Danielle Citron
Danielle Keats Citron
No abstract provided.
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Citron
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Citron
Danielle Keats Citron
The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …
Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Citron
Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Citron
Danielle Keats Citron
The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women’s home addresses alongside suggestions that they should be sexually assaulted and technological attacks that shut down blogs and websites. It impedes women’s full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women’s experience, deeming it harmless teasing that women should expect, and tolerate, given the Internet’s Wild West norms …
Technological Due Process, Danielle Citron
Technological Due Process, Danielle Citron
Danielle Keats Citron
Today, computer systems terminate Medicaid benefits, remove voters from the rolls, exclude travelers from flying on commercial airlines, label (and often mislabel) individuals as dead-beat parents, and flag people as possible terrorists from their email and telephone records. But when an automated system rules against an individual, that person often has no way of knowing if a defective algorithm, erroneous facts, or some combination of the two produced the decision. Research showing strong psychological tendencies to defer to automated systems suggests that a hearing officer’s check on computer decisions will have limited value. At the same time, automation impairs participatory …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds
William L. Reynolds
In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.
Public Use, Public Choice And The Urban Growth Machine: Competing Political Economies Of Takings Law, Daniel Lyons
Public Use, Public Choice And The Urban Growth Machine: Competing Political Economies Of Takings Law, Daniel Lyons
Daniel Lyons
The Kelo decision has unleashed a tidal wave of legislative reforms ostensibly seeking to control eminent domain abuse. But as a policy matter, it is impossible to determine what limits should be placed upon local government without understanding how cities grow and develop, and how local governments make decisions to shape the communities over which they preside. This article examines takings through two very different models of urban political economy: public choice theory and the quasi-Marxist Urban Growth Machine model. These models approach takings from diametrically opposite perspectives, and offer differing perspectives at the margin regarding proper and improper condemnations. …
Domain Names As Jurisdiction-Creating Property In Sweden, Ulf Maunsbach, Michael Bogdan
Domain Names As Jurisdiction-Creating Property In Sweden, Ulf Maunsbach, Michael Bogdan
Ulf Maunsbach
No abstract provided.
A Comment On James Grimmelmann’S Saving Facebook, Susan Freiwald
A Comment On James Grimmelmann’S Saving Facebook, Susan Freiwald
Susan Freiwald
This paper comments on Professor James Grimmelmann’s article Saving Facebook (94 Iowa L. Rev. 1137 (2009) http://http://works.bepress.com/james_grimmelmann/20). provides a useful analysis of the privacy debates surrounding this social networking web site. Grimmelmann provides valuable sociological and psychological material for future legislators to draw on in considering legislative control of Facebook and similar sites. Grimmelmann uses Facebook to provide concrete examples of privacy concerns to build on the more general framework provided by the works of Daniel Solove. The comment does take exception to Grimmelmann’s analysis in several points. Chief among these is Grinnlemann’s lack of evidence in support of his …