Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Colorado Law School (11)
- Boston University School of Law (6)
- New York Law School (5)
- American University Washington College of Law (4)
- Schulich School of Law, Dalhousie University (4)
-
- Georgetown University Law Center (2)
- Penn State Law (2)
- University at Buffalo School of Law (2)
- University of Florida Levin College of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Missouri School of Law (2)
- University of Pittsburgh School of Law (2)
- Washington University in St. Louis (2)
- Cleveland State University (1)
- Columbia Law School (1)
- Seattle University School of Law (1)
- St. John's University School of Law (1)
- St. Thomas University College of Law (1)
- Texas A&M University School of Law (1)
- University of Baltimore Law (1)
- University of Georgia School of Law (1)
- University of Pennsylvania Carey Law School (1)
- University of Rhode Island (1)
- Virginia Community College System (1)
- Publication Year
- Publication
-
- Publications (11)
- Faculty Scholarship (10)
- Articles & Chapters (5)
- Articles, Book Chapters, & Popular Press (4)
- Journal Articles (4)
-
- Articles in Law Reviews & Other Academic Journals (3)
- Faculty Publications (3)
- All Faculty Scholarship (2)
- Articles (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Scholarship@WashULaw (2)
- UF Law Faculty Publications (2)
- Amicus Briefs (1)
- Faculty Articles (1)
- Law Faculty Articles and Essays (1)
- Scholarly Works (1)
- Seattle University Law Review SUpra (1)
- Senior Honors Projects (1)
- Student Writing (1)
Articles 31 - 57 of 57
Full-Text Articles in Law
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Articles & Chapters
While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.
I argue that the myth of the online anonym is not only false as a …
Hostile Educational Environments, Ari Ezra Waldman
Hostile Educational Environments, Ari Ezra Waldman
Articles & Chapters
This Article is one in a series about bullying and cyberbullying in schools. I argue that the proper analysis for a First Amendment challenge to school discipline for off-campus misuse of the Internet to harm or harass a member of the school community based on the victim’s identity depends on the nature of the offending behavior. For students who are punished for a single incident – what I will call cyberattacking – a Tinker analysis makes sense. But, given that Tinker’s “substantial disruption” standard originated in the context of student protests and that targeted identity-based harassment can create substantial disruptions …
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
UF Law Faculty Publications
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker, even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman
All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman
Articles & Chapters
Online and face-to-face harassment in schools requires a coordinated response from the school, parents, students, and government. In this Article, I address a particular subset of online and face-to-face harassment, or identity-based harassment. Identity-based aggressors highlight a quality intrinsic to someone’s personhood and demean it, deprive it of value, and use it as a weapon. They attack women, racial minorities, religious minorities, and other traditionally victimized groups. And, as such, they attack not only their particular victims but also their victims’ communities. Identity-based aggressors com- mit a constitutional evil not only because their behavior interferes with victims’ access to education, …
Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski
Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski
Publications
As people increasingly use social media to organize both protests and robberies, government will try to regulate these calls to action. With an eye to this intensifying dynamic, this Article reviews First Amendment jurisprudence on incitement and applies it to existing statutes on incitement to riot at a common law, state, and federal level. The article suggests that First Amendment jurisprudence has a particularly tortuous relationship with regulating speech directed to crowds. It examines current crowd psychology to suggest which crowd behavior, if any, should as a matter of policy be subject to regulation. It concludes that many existing incitement-to-riot …
Incendiary Speech And Social Media, Lyrissa Lidsky
Incendiary Speech And Social Media, Lyrissa Lidsky
Faculty Publications
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan
Supreme Court Amicus Brief Of Aarp And The National Legislative Association On Petition Drug Prices In Support Of Petitioners, William H. Sorrell V. Ims Health, Inc., No. 10-779 (Filed March 1, 2011), Sean Flynn, Meredith Jacob, Stacy Canan
Amicus Briefs
This Court should refuse to apply the First Amendment to Vermont’s Prescription Confidentiality Law based on two essential facts. First, the regulation at issue is limited to the commercial use or private-channel distribution of confidential data. It is thus governed by cases of this Court upholding the regulation of uses of information in purely private settings that do not inform or contribute to the public sphere. Bartnicki v. Vopper, 532 U.S. 514, 526-27 n.10 (2001); Dun & Bradstreet, Inc. v. Greenmoss Builders, Inc., 472 U.S. 749 (1985). Second, it concerns the regulation of secondary uses of information where the government …
Government Speech 2.0, Helen L. Norton, Danielle Keats Citron
Government Speech 2.0, Helen L. Norton, Danielle Keats Citron
Faculty Scholarship
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …
Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton
Regulating Cyberharassment: Some Thoughts On Sexual Harassment 2.0, Helen Norton
Publications
No abstract provided.
Government Speech 2.0, Danielle K. Citron, Helen Norton
Government Speech 2.0, Danielle K. Citron, Helen Norton
Faculty Scholarship
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …
Government Speech 2.0, Helen Norton, Danielle Keats Citron
Government Speech 2.0, Helen Norton, Danielle Keats Citron
Publications
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine--which recognizes "government speech" as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint--only in the context of disputes involving fairly traditional forms of expression. In none of these decisions, moreover, has the …
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky
Faculty Publications
This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky
UF Law Faculty Publications
This Article examines the evolution of the law governing libel suits against anonymous "John Doe" defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire, and other nonfactual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …
Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron
Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …
Who Owns 'Hillary.Com'? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton
Who Owns 'Hillary.Com'? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton
Articles
In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns "hillaryclinton.com", the more generic "hillary.com" is registered to a software firm, Hillary Software, Inc. What about "hillary2008.com"? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …
Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton
Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton
Articles
When the Oscar-winning actress, Julia Roberts, fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual's persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …
Substantive Media Regulation In Three Dimensions, Gregory P. Magarian
Substantive Media Regulation In Three Dimensions, Gregory P. Magarian
Scholarship@WashULaw
Changes in the political and regulatory climates are prompting calls to revive substantive government regulation of the broadcast media, specifically the now-defunct fairness doctrine. In this article, Professor Magarian attempts to sharpen the present debate over substantive regulation by closely examining earlier defenses and criticisms of the fairness doctrine. The article assesses how supporters and opponents of the fairness doctrine have characterized three issues essential for assessing the doctrine's wisdom and constitutionality: who is regulating; who is being regulated; and the goal of the regulatory scheme. As to the first issue, who is regulating, fairness doctrine supporters emphasize the democratic …
Market Triumphalism, Electoral Pathologies, And The Abiding Wisdom Of First Amendment Access Rights, Gregory P. Magarian
Market Triumphalism, Electoral Pathologies, And The Abiding Wisdom Of First Amendment Access Rights, Gregory P. Magarian
Scholarship@WashULaw
Forty years ago, Professor Jerome Barron made the classic case that the First Amendment requires not merely protection of speech against government interference but provision of access to the means of mass communication. The Supreme Court in the ensuing decades has largely rejected Barron's approach. In this article, Professor Magarian defends Barron's case for access rights against the two theoretical critiques that have underwritten its doctrinal rejection. The libertarian critique attacks the normative underpinnings of access rights, maintaining that the First Amendment insulates market-driven distributions of expressive opportunities. Professor Magarian demonstrates that politically progressive and conservative libertarian critics of access …
Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman
Initial Interest Confusion: Standing At The Crossroads Of Trademark Law, Jennifer E. Rothman
All Faculty Scholarship
While the benchmark of trademark infringement traditionally has been a demonstration that consumers are likely to be confused by the use of a similar or identical trademark to identify the goods or services of another, a court-created doctrine called initial interest confusion allows liability for trademark infringement solely on the basis that a consumer might initially be interested, attracted, or distracted by a competitor's, or even a non-competitor's, product or service. Initial interest confusion is being used with increasing frequency, especially on the Internet, to shut down speech critical of trademark holders and their products and services, to prevent comparative …
Society’S Software, Beth Simone Noveck, David R. Johnson
Society’S Software, Beth Simone Noveck, David R. Johnson
Articles & Chapters
No abstract provided.
Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley
Your Money Or Your Speech: The Children's Internet Protection Act And The Congressional Assault On The First Amendment In Public Libraries, Steven D. Hinckley
Journal Articles
This article examines the inherent conflict between This article examines the inherent conflict between two Congressional approaches to public access to the Internet - the provision of federal funding support to schools and public libraries to ensure broad access to online information regardless of financial means, and federal restrictions on children's use of school and public library computers to access content that the government feels could be harmful to them. It analyzes the efficacy and constitutionality of the Children's Internet Protection Act (CIPA), Congress's attempt to use its powers of the purse to control objectionable online content in the very …
Law And Information Platforms, Philip J. Weiser
Resolving Tensions Between Copyright And The Internet, Walter Effross
Resolving Tensions Between Copyright And The Internet, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Application-Centered Internet Analysis, Tim Wu
Application-Centered Internet Analysis, Tim Wu
Faculty Scholarship
There is a now-standard debate about law and the Internet. One side asserts that the Internet is so new and different that it calls for new legal approaches, even its own sovereign law. The other side argues that, although it is a new technology, the Internet nonetheless presents familiar legal problems. It is a battle of analogies: One side refers to Cyberspace as a place, while the other essentially equates the Internet and the telephone.
In my view, these two positions are both wrong and right: wrong in their characterization of the Internet as a whole, yet potentially right about …
Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Karin M. Mika, Aaron J. Reber
Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Karin M. Mika, Aaron J. Reber
Law Faculty Articles and Essays
This article addresses the repercussions of Stern v. Delphi Internet Services Corporation and argues that the decision in Stern opens the door to a broader interpretation of “newsworthiness” and “public interest” that will enable advertisers broader First Amendment protections when using “unauthorized” likenesses. This article posits that artful advertisers could very well use the theory of Stern as a basis for virtually ensuring that every “unauthorized likeness” will enjoy First Amendment protection and not be considered as violative of the right of publicity.
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Closing The Barn Door After The Genie Is Out Of The Bag: Recognizing A "Futility Principle" In First Amendment Jurisprudence, Eric Easton
All Faculty Scholarship
This article argues for a simple proposition: the First Amendment imposes a presumption against the suppression of speech when suppression would be futile. Suppression is futile when the speech is available to the same audience through some other medium or at some other place. The government can overcome this presumption of futility only when it asserts an important interest that is unrelated to the content of the speech in question, and only when the suppression directly advances that interest.
In Part I, the article explores the role that this unarticulated "futility principle" has played in Supreme Court and other decisions …