Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (57)
- Seattle University School of Law (25)
- UIC School of Law (22)
- SelectedWorks (17)
- The University of Akron (17)
-
- Pace University (15)
- Schulich School of Law, Dalhousie University (13)
- University of Richmond (10)
- University of Maryland Francis King Carey School of Law (9)
- University of Michigan Law School (9)
- The Catholic University of America, Columbus School of Law (8)
- Pepperdine University (6)
- Vanderbilt University Law School (6)
- Case Western Reserve University School of Law (4)
- Cornell University Law School (4)
- Loyola Marymount University and Loyola Law School (4)
- University of Colorado Law School (4)
- University of Florida Levin College of Law (4)
- University of Washington School of Law (4)
- Chicago-Kent College of Law (3)
- Duke Law (3)
- Fordham Law School (3)
- University of Georgia School of Law (3)
- University of Pennsylvania Carey Law School (3)
- American University Washington College of Law (2)
- Boston University School of Law (2)
- Brigham Young University Law School (2)
- Hamline University (2)
- Loyola University Chicago, School of Law (2)
- New York Law School (2)
- Keyword
-
- Internet (47)
- Privacy (24)
- Law and Technology (20)
- Social media (20)
- Copyright (16)
-
- Corporate (13)
- Technology (12)
- Blair (11)
- Cybersecurity (11)
- Science and Technology (11)
- Stout (11)
- Corporation (10)
- Team production (10)
- Governance (9)
- Intellectual Property Law (8)
- International law (8)
- Shareholder (8)
- Communications Law (7)
- Computer Law (7)
- First Amendment (7)
- NSA (7)
- Facebook (6)
- Law and Economics (6)
- Legal scholarship (6)
- Regulation (6)
- Surveillance (6)
- Board (5)
- Copyright Act (5)
- Corporations (5)
- FTC (5)
- Publication
-
- Seattle University Law Review (23)
- Akron Law Review (17)
- UIC John Marshall Journal of Information Technology & Privacy Law (15)
- Pace Law Review (13)
- David E. Sorkin (11)
-
- Canadian Journal of Law and Technology (9)
- Faculty Scholarship (9)
- Richmond Journal of Law & Technology (8)
- All Faculty Scholarship (6)
- Catholic University Journal of Law and Technology (6)
- Lawrence J. Trautman Sr. (5)
- Peter K. Yu (5)
- Vanderbilt Journal of Entertainment & Technology Law (5)
- Articles, Book Chapters, & Popular Press (4)
- Faculty Publications (4)
- Journal of Law, Technology, & the Internet (4)
- Maryland Law Review (4)
- Publications (4)
- The Journal of Business, Entrepreneurship & the Law (4)
- UIC Review of Intellectual Property Law (4)
- Articles (3)
- Duke Law & Technology Review (3)
- Florida Law Review (3)
- Law Faculty Scholarship (3)
- Michigan Telecommunications & Technology Law Review (3)
- UIC Law Review (3)
- Washington Journal of Law, Technology & Arts (3)
- William K. Ford (3)
- Ann M. Lousin (2)
- Articles & Chapters (2)
- Publication Type
Articles 31 - 60 of 310
Full-Text Articles in Law
Broadband Institute Of California Amicus Brief.Pdf, Jodi Benassi
Broadband Institute Of California Amicus Brief.Pdf, Jodi Benassi
Jodi Benassi
Fairness, Trust And Security In Online Dispute Resolution, Noam Ebner, John Zeleznikow
Fairness, Trust And Security In Online Dispute Resolution, Noam Ebner, John Zeleznikow
Journal of Public Law and Policy
No abstract provided.
Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage
Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage
Michigan Business & Entrepreneurial Law Review
Rapid developments in digital technology over the past quarter century have made it easier than ever for people to create and instantly share content. These developments have served as the basis for countless innovations and have spawned some of today’s largest and most profitable companies. As content creation and distribution continues to evolve, businesses seek new ways to profit from these technological innovations. But while businesses continue to develop around new methods of content distribution, the law of copyright, which generally aims to encourage the creation of content, has been slow to adapt. This era of modern technological innovation thus …
Big Data Blacklisting, Margaret Hu
Big Data Blacklisting, Margaret Hu
Faculty Publications
“Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation …
"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo
"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo
Críspulo Marmolejo
This paper considers the relationship between blogs and Law and Economics from two perspectives: some aspects of the law and economics approach to blogging, and the influence of blogs in the diffusion of Law and Economics. The article explores how blogs are a modern way of low cost domestic journalism, in a context in which the increasingsize of the blogosphere is a current challenge in terms of free speech and quality of the information. At the same time, blogs such as “The Volokh Conspiracy” are playing an interesting role in the American legal academia as areal instrument to analyze the …
Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest
Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest
Sean Pager
INFRINGEMENT AS UNFAIR COMPETITION: A BLUEPRINT FOR GLOBAL GOVERNANCE?
Sean A. Pager Michigan State University College of Law
Eric Priest University of Oregon School of Law
ABSTRACT
This Article examines a new approach to address persistent regulatory failures in global supply chains. In a series of recent cases, unfair competition actions have been brought in U.S. court against foreign manufacturers who infringe software overseas under the theory that the cost savings from infringement confers an unfair advantage in U.S. markets. While this theory has been advanced in the intellectual property context, the same approach could work to target abuses in …
A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian
A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian
Omri Y Marian
This Essay proposes a conceptual framework for the regulation of transactions involving cryptocurrencies. Cryptocurrencies offer tremendous opportunities for innovation and development but are also uniquely suited to facilitate illicit behavior. The regulatory framework suggested herein is intended to support (or at least not impair) cryptocurrencies’ innovative potential. At the same time, it aims to disrupt cryptocurrencies’ criminal utility. To achieve these purposes, this Essay proposes a regulatory framework that imposes costs on the characteristics of cryptocurrencies that make them especially useful for criminal behavior (in particular, anonymity) but does not impose costs on characteristics that are at the core of …
E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials …
On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock
On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock
William B.T. Mock
The purpose of this Article is to establish the importance of information law and to encourage its further study. By applying information technology theory, economic theory and, and political theory insights, the Article examines the centrality of information law in open societies. Information law rests upon two premises. The first of which is that information is a legally cognizable concept- that it can be framed in legal terms and has legal significance. The second premise is that there exists a rationale for government regulation and provision of information, either explicitly or implicitly. Transparency is a flexible concept used in a …
Paying For Nude Celebrities: Testing The Outer Limits Of Roommates.Com, Accusearch, And Section 230 Immunity, Christian Kaiser
Paying For Nude Celebrities: Testing The Outer Limits Of Roommates.Com, Accusearch, And Section 230 Immunity, Christian Kaiser
Washington Journal of Law, Technology & Arts
The Internet is a powerful tool that promotes commerce, free thought, and free speech. It is these exact values that Congress sought to solidify when it passed Section 230 of the Communications Decency Act. The Internet also has a dark side, which is filled with obscenities, pornography, and illegal activity. In order to protect positive values and activities on the Internet, Congress decided to incentivize websites to police the content posted by their users. This was done by providing broad immunity from lawsuits based on content posted by third parties. But this immunity is not absolute. In the Fair Housing …
Second Annual Report, University Of Washington School Of Law
Second Annual Report, University Of Washington School Of Law
Tech Policy Lab
The Tech Policy Lab at the University of Washington continues to pick up steam in our second year. We have hosted national policy discussions, collaborated directly with policymakers on open data and other issues, and continue to develop strong, method-based interdisciplinary research.
From Inwood To Internet And Beyond: Assessing The Web Host-User Relationship In Contributory Online Trademark Infringement, Julie Liu
Washington Journal of Law, Technology & Arts
While courts have created a doctrine of contributory trademark infringement in response to the expansion of goods and services from brick-and-mortar to the Internet, the exact duties of web hosts under the rule are not yet clear. Despite judicial attempts to carve out new standards to define traditional requirements, the application of these standards remains inconsistent and has left unresolved ambiguities. The disparities between the standards may be balanced through an analysis of the affirmative duties imposed by the law on online service providers, as well as a closer look at the relationship between a service provider and user. This …
Establishing Russia's Responsibility For Cyber-Crime Based On Its Hacker Culture, Trevor Mcdougal
Establishing Russia's Responsibility For Cyber-Crime Based On Its Hacker Culture, Trevor Mcdougal
Brigham Young University International Law & Management Review
No abstract provided.
An Assessment Of Nigeria's Cybercrimes (Prevention, Prevention Etc.) Act 2015, Oluwaseun Viyon Ojo
An Assessment Of Nigeria's Cybercrimes (Prevention, Prevention Etc.) Act 2015, Oluwaseun Viyon Ojo
Oluwaseun Viyon Ojo
This article attempts to examine the key an notable provisions of the Nigeria Cybercrimes (Prohibition, Prevention etc.) Act 2015 with clear emphasis on the importance in the administration of justice in Nigeria.
An Xray Of The Nigeria Cybercrimes Act 2015 Vis-À-Vis Right Of Privacy In Nigeria, Oluwaseun Viyon Ojo
An Xray Of The Nigeria Cybercrimes Act 2015 Vis-À-Vis Right Of Privacy In Nigeria, Oluwaseun Viyon Ojo
Oluwaseun Viyon Ojo
The National Assembly passed the cybercrimes (prevention, prohibition etc.) Bill after having deliberated on its various provisions. On the eve of the administration of Goodluck Ebele Jonathan Administration, the bill passed by the National Assembly became the Cybercrimes (Prevention, prohibition etc.) Act 2015 (hereinafter to be referred to as Act) after having received the presidential Assent. Thus, it entered into the corpus of laws and legislations in force within the Nigerian Legal environment. It must be said that the Act is a laudable development in Nigeria’s legal and commercial jurisprudence after much sustained and vociferous clamour for it from all …
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii
1997 John Marshall National Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 16 J. Marshall J. Computer & Info. L. 685 (1998), David E. Sorkin, Steven A. Mcauley, David B. Nash Iii
David E. Sorkin
Many public libraries provide patrons with free public-access Internet terminals, largely for accessing information available on the World Wide Web. However, public concern exists over the ability of children who browse the Web without adult supervision to view sexually explicit materials and other inappropriate items. This concern has led to the development of various Internet filtering software programs. Some filtering programs operate by blocking access to documents containing certain words or phrases or combinations thereof. However, more common programs permit access only to documents or sites that appear in a pre-selected, "safe" database or that block access to documents that …
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez
The Twenty-Fifth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 24 J. Marshall J. Computer & Info. L. 673 (2006), David E. Sorkin, Larisa V. Benitez-Morgan, J. Preston Carter, William P. Greubel Iii, Matthew Hector, Kellen Keaty, Lisa Rodriguez
David E. Sorkin
No abstract provided.
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
Session Iv: Technology And The Future Of Privacy, 29 J. Marshall J. Computer & Info. L. 379 (2012), David E. Sorkin, Ann Bartow, Robert S. Gurwin, Doris E. Long
David E. Sorkin
No abstract provided.
Spam Legislation In The United States, 22 J. Marshall J. Computer & Info. L. 3 (2003), David E. Sorkin
Spam Legislation In The United States, 22 J. Marshall J. Computer & Info. L. 3 (2003), David E. Sorkin
David E. Sorkin
This article examines the effect of spam legislation in the United States. It discusses state legislation and the common provisions of state spam legislation, such as disclosure and labeling requirements and opt-out provisions. It also analyzes the consequences of state anti-spam legislation. Federal legislation is analyzed, with a brief look at the CAN-SPAM Act of 2003. The article concludes that legislation has not had a big impact on spam, and the CAN-SPAM Act is not likely to change or curb spam.
1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin
1996 John Marshall National Moot Court Competition In Information And Privacy Law: Bench Memorandum, 15 J. Marshall J. Computer & Info. L. 587 (1997), David E. Sorkin
David E. Sorkin
No abstract provided.
Payment Methods For Consumer-To-Consumer Online Transactions, 35 Akron L. Rev. 1 (2001), David E. Sorkin
Payment Methods For Consumer-To-Consumer Online Transactions, 35 Akron L. Rev. 1 (2001), David E. Sorkin
David E. Sorkin
No abstract provided.
Judicial Review Of Icann Domain Name Dispute Decisions, 18 Santa Clara Computer & High Tech. L.J. 35 (2001), David E. Sorkin
Judicial Review Of Icann Domain Name Dispute Decisions, 18 Santa Clara Computer & High Tech. L.J. 35 (2001), David E. Sorkin
David E. Sorkin
No abstract provided.
Technical And Legal Approaches To Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001), David E. Sorkin
Technical And Legal Approaches To Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001), David E. Sorkin
David E. Sorkin
No abstract provided.
Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, 45 Buff. L. Rev. 1001 (1997), David E. Sorkin
Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, 45 Buff. L. Rev. 1001 (1997), David E. Sorkin
David E. Sorkin
No abstract provided.
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
The 20th Belle R. And Joseph H. Braun Memorial Symposium: The Development Of Privacy Law From Brandeis To Today: Opening Remarks, 29 J. Marshall J. Computer & Info. L. 279 (2012), Ralph Ruebner, Leslie Ann Reis, David E. Sorkin
David E. Sorkin
No abstract provided.
The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat
The Twenty-Sixth Annual John Marshall International Moot Court Competition In Information Technology And Privacy Law: Bench Memorandum, 25 J. Marshall J. Computer & Info. L. 305 (2008), Leslie Ann Reis, David E. Sorkin, Panagiota Kelali, Jessica Diehl, Carlos A. Encinas, Matthew Hector, Gina Spada, Steven Tseng, Priya Krishnamoorthy Venkat
David E. Sorkin
No abstract provided.
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Shlomit Yanisky-Ravid Professor of Law
Increasingly, there has been a focus on creating democratic standards and procedures in order to best facilitate open exchange of information and communication online—a goal that fits neatly within the feminist aim to democratize content creation and community. Collaborative websites, such as blogs, social networks, and, as focused on in this Article, Wikipedia, represent both a Cyberspace community entirely outside the strictures of the traditional (intellectual) proprietary paradigm and one that professes to truly embody the philosophy of a completely open, free, and democratic resource for all. In theory, collaborative websites are the solution that social activists, Intellectual Property opponents …
Using Occam’S Razor To Solve International Attorney-Client Privilege Choice Of Law Issues: An Old Solution To A New Problem, Nathan M. Crystal, Francesca Giannoni-Crystal
Using Occam’S Razor To Solve International Attorney-Client Privilege Choice Of Law Issues: An Old Solution To A New Problem, Nathan M. Crystal, Francesca Giannoni-Crystal
Nathan M. Crystal
The practice of law is increasingly becoming “delocalized.” Globalization and the use of technology are two important factors in this fundamental change in practice. Delocalization is affecting almost all areas of practice, including issues involving attorney-client privilege (ACP). To some extent the choice-of-law rules governing ACP are also – like other fields of the law - being “delocalized,” but in our view only partially. This paper discusses six approaches to choice of law issues governing ACP that are being used by the courts. Aside from the traditional lex loci approach (which simply applies the law of the forum to the …
Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas
Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas
Politics Summer Fellows
Contemporary mainstream discussions of the Supreme Court are often qualified with the warning that the nine justices are out of touch with everyday American life, especially when it comes to the newest and most popular technologies. For instance, during oral argument for City of Ontario v. Quon, a 2010 case that dealt with sexting on government-issued devices, Chief Justice John Roberts famously asked what the difference was “between email and a pager,” and Justice Antonin Scalia wondered if the “spicy little conversations” held via text message could be printed and distributed. While these comments have garnered a great deal of …
The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford
The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford
William K. Ford
"[A]s a general rule," writes Pulitzer Prize-winning journalist Edward Humes, "courts don't do science very well."' Susan Haack, a professor of law and philosophy, elaborates on why this may be true, offering several reasons for "deep tensions" between science and law. The reasons offered by Haack may be less of a concern where the dispute involves litigation against the government on significant questions of public policy. Recent decisions assessing the constitutionality of laws restricting minors' access to violent video games therefore offer an opportunity to examine how well the courts handled scientific evidence in a situation lacking some of the …