Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Santa Clara Law (74)
- Selected Works (40)
- Schulich School of Law, Dalhousie University (24)
- SelectedWorks (24)
- UIC School of Law (23)
-
- Maurer School of Law: Indiana University (21)
- University of Maryland Francis King Carey School of Law (13)
- University of Pittsburgh School of Law (12)
- University of Richmond (12)
- Seton Hall University (11)
- University of Michigan Law School (7)
- Duke Law (6)
- Singapore Management University (6)
- Georgetown University Law Center (5)
- Boston University School of Law (4)
- University of Colorado Law School (4)
- Vanderbilt University Law School (4)
- Cornell University Law School (3)
- University of Dayton (3)
- American University Washington College of Law (2)
- Boise State University (2)
- Chicago-Kent College of Law (2)
- Columbia Law School (2)
- New York Law School (2)
- University of Kentucky (2)
- University of Missouri School of Law (2)
- University of Nevada, Las Vegas (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of Pennsylvania Carey Law School (2)
- University of Washington School of Law (2)
- Keyword
-
- Google (58)
- Adwords (48)
- Rosetta Stone (31)
- Internet (25)
- Trademark (24)
-
- Copyright (16)
- Consumer confusion (14)
- Rosetta (13)
- Information privacy (10)
- Intellectual property (10)
- Social media (10)
- Keyword (9)
- Counterfeit (8)
- Cyberspace Law (8)
- Privacy (8)
- Technology (8)
- Internet Governance (7)
- Regulation (7)
- Software (7)
- Trademarked terms (7)
- Cyberlaw (6)
- First Amendment (6)
- Law and Technology (6)
- Trademark infringement (6)
- Web 2.0 (6)
- Civil rights (5)
- Constitutional law (5)
- Cyberspace (5)
- Cyberspace law (5)
- DMCA (5)
- Publication
-
- Rosetta Stone v. Google (Joint Appendix) (73)
- Canadian Journal of Law and Technology (23)
- Federal Communications Law Journal (20)
- UIC John Marshall Journal of Information Technology & Privacy Law (17)
- Faculty Scholarship (16)
-
- Student Works (11)
- Articles (10)
- Henry L Hu (9)
- Mubashshir Sarshar (9)
- Richmond Journal of Law & Technology (9)
- Danielle Keats Citron (8)
- Daniel Lyons (6)
- Duke Law & Technology Review (6)
- Research Collection Yong Pung How School Of Law (6)
- Bruno L. Costantini García (5)
- All Faculty Scholarship (4)
- Publications (4)
- Cornell Law Faculty Publications (3)
- Faculty Publications (3)
- Maryland Law Review (3)
- Michigan Telecommunications & Technology Law Review (3)
- Testimony Before Congress (3)
- UIC Review of Intellectual Property Law (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Book Chapters (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Germán M. Teruel Lozano (2)
- James Grimmelmann (2)
- Kentucky Law Journal (2)
- Law Student Publications (2)
- Publication Type
- File Type
Articles 301 - 330 of 336
Full-Text Articles in Law
A New (Virtual) World Order: A Look At Criminal Activity In Online Communities, J Matthew Johnson
A New (Virtual) World Order: A Look At Criminal Activity In Online Communities, J Matthew Johnson
Student Works
No abstract provided.
Evolving Property Rights In Domain Names, Jeffrey R. Wiedmann
Evolving Property Rights In Domain Names, Jeffrey R. Wiedmann
Student Works
No abstract provided.
An Exploratory Investigation Of The Practice Of Planned Unit Development And Its Theoretical Implementation In The “Second Life” Virtual Community, Ryan M. Jennings
An Exploratory Investigation Of The Practice Of Planned Unit Development And Its Theoretical Implementation In The “Second Life” Virtual Community, Ryan M. Jennings
Student Works
No abstract provided.
The Rise Of Online Gaming: The Dominant Factors Of Poker & The Fall Of The Uigea And Its Predecessors, Peter Schiavone
The Rise Of Online Gaming: The Dominant Factors Of Poker & The Fall Of The Uigea And Its Predecessors, Peter Schiavone
Student Works
No abstract provided.
How To Tame The New Wild-Wild West: Potential Lassos For Virtual Crime, Ian Leyden
How To Tame The New Wild-Wild West: Potential Lassos For Virtual Crime, Ian Leyden
Student Works
No abstract provided.
Mending The Gap: The Use Of Common Law To Supplement Virtual Mass Contracts, Floyd Morris
Mending The Gap: The Use Of Common Law To Supplement Virtual Mass Contracts, Floyd Morris
Student Works
No abstract provided.
Modern Application Of The Right Of Publicity To Virtual Avatars, Elina Slavin
Modern Application Of The Right Of Publicity To Virtual Avatars, Elina Slavin
Student Works
No abstract provided.
Overview Of Trademark Issues Presented To Businesses Owners Within Second Life, Ross J. Switkes
Overview Of Trademark Issues Presented To Businesses Owners Within Second Life, Ross J. Switkes
Student Works
No abstract provided.
Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid
Substitution Effects: A Problematic Justification For The Third-Party Doctrine Of The Fourth Amendment, Blake Ellis Reid
Publications
In the past half-century, the Supreme Court has crafted a vein of jurisprudence virtually eliminating Fourth Amendment protection in information turned over to third parties - regardless of any subjective expectation of privacy or confidentiality in the information on the part of the revealer. This so-called “third-party” doctrine of the Fourth Amendment has become increasingly controversial in light of the growing societal reliance on the Internet in the United States, where nearly every transaction requires a user to turn information over to at least one third party: the Internet service provider (“ISP”).
Citing the scholarship that has criticized the third-party …
Government Speech 2.0, Helen Norton, Danielle Keats Citron
Government Speech 2.0, Helen Norton, Danielle Keats Citron
Publications
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine--which recognizes "government speech" as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint--only in the context of disputes involving fairly traditional forms of expression. In none of these decisions, moreover, has the …
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Articles
Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright works, or engaging in acts of digital copyright piracy and plagiarism. As online conduct becomes more interactive, copyright laws are less effective in creating clear signals about proscribed conduct. This article examines the application of copyright law to Web 2.0 technologies. It suggests that social …
Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton
Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton
Articles
While digital video and multi-media technologies are becoming increasingly prevalent, existing privacy laws tend to focus on text-based personal records. Individuals have little recourse when concerned about infringements of their privacy interests in audio, video, and multi-media files. Often people are simply unaware that video or audio records have been made. Even if they are aware of the existence of the records, they may be unaware of potential legal remedies, or unable to afford legal recourse. This paper concentrates on the ability of individuals to obtain legal redress for unauthorized use of audio, video and multi-media content that infringes their …
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Articles
“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …
What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton
What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton
Articles
Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …
Mapping Online Privacy, Jacqueline D. Lipton
Mapping Online Privacy, Jacqueline D. Lipton
Articles
Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …
Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton
Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property And Restitution, Jacqueline D. Lipton
Articles
The year 2009 marks the tenth anniversary of domain name regulation under the Anti-Cybersquatting Consumer Protection Act (ACPA) and the Uniform Domain Name Dispute Resolution Policy (UDRP). Adopted to combat cybersquatting, these rules left a confused picture of domain name theory in their wake. Early cybersquatters registered Internet domain names corresponding with others’ trademarks to sell them for a profit. However, this practice was quickly and easily contained. New practices arose in domain name markets, not initially contemplated by the drafters of the ACPA and the UDRP. One example is clickfarming – using domain names to generate revenues from click-on …
Constructing Commons In The Cultural Environment, Michael J. Madison, Brett M. Frischmann, Katherine J. Strandburg
Constructing Commons In The Cultural Environment, Michael J. Madison, Brett M. Frischmann, Katherine J. Strandburg
Articles
This Essay considers the problem of understanding intellectual sharing/pooling arrangements and the construction of cultural commons arrangements. We argue that an adaptation of the approach pioneered by Elinor Ostrom and collaborators to commons arrangements in the natural environment may provide a template for the examination of constructed commons in the cultural environment. The approach promises to lead to a better understanding of how participants in commons and pooling arrangements structure their interactions in relation to the environment(s) within which they are embedded and with which they share interdependent relationships. Such an improved understanding is critical for obtaining a more complete …
Beyond Creativity: Copyright As Knowledge Law, Michael J. Madison
Beyond Creativity: Copyright As Knowledge Law, Michael J. Madison
Articles
The Supreme Court’s copyright jurisprudence of the last 100 years has embraced the creativity trope. Spurred in part by themes associated with the story of “romantic authorship” in the 19th and 20th centuries, copyright critiques likewise ask, “Who is creative?” “How should creativity be protected (or not) and encouraged (or not)?” and “ Why protect creativity?” Policy debates and scholarship in recent years have focused on the concept of creativity in framing copyright disputes, transactions, and institutions, reinforcing the notion that these are the central copyright questions. I suggest that this focus on the creativity trope is unhelpful. I argue …
Some Optimism About Fair Use And Copyright Law, Michael J. Madison
Some Optimism About Fair Use And Copyright Law, Michael J. Madison
Articles
This short paper reflects on the emergence of codes of best practices in fair use, highlighting both the relationship between the best practices approach and an institutional perspective on copyright and the relationship between the best practices approach and social processes of innovation and creativity.
Reply: The Complexity Of Commons, Michael J. Madison, Brett M. Frischmann, Katherine J. Strandburg
Reply: The Complexity Of Commons, Michael J. Madison, Brett M. Frischmann, Katherine J. Strandburg
Articles
Constructing Commons in the Cultural Environment, and responses to that article by Professors Thráinn Eggertsson, Wendy Gordon, Gregg Macey, Robert Merges, Elinor Ostrom, and Lawrence Solum. This short Reply comments briefly on each of those responses.
Updating The Electronic Transactions Act? Australia's Accession To The Un Convention On The Use Of Electronic Communications In International Contracts 2005, Eliza Karolina Mik
Updating The Electronic Transactions Act? Australia's Accession To The Un Convention On The Use Of Electronic Communications In International Contracts 2005, Eliza Karolina Mik
Research Collection Yong Pung How School Of Law
This article discusses the Australian Government’s proposal to accede to the United Nations Convention on the Use of Electronic Communications in International Contracts as well as certain amendments to existing Australian electronic transactions legislation, i.e. the Electronic Transactions Act (Commonwealth) 1999 (”ETA”) and its state equivalents. Without going into a detailed discussion of all suggested amendments, this article focuses on those recommendations, which affect the area of contract formation, in particular: the use of automated systems in on-line transactions and the determination of the time the contract comes into existence. A critical review of the proposed changes reveals that their …
Privacy As Product Safety, James Grimmelmann
Privacy As Product Safety, James Grimmelmann
James Grimmelmann
Online social media confound many of our familiar expectaitons about privacy. Contrary to popular myth, users of social software like Facebook do care about privacy, deserve it, and have trouble securing it for themselves. Moreover, traditional database-focused privacy regulations on the Fair Information Practices model, while often worthwhile, fail to engage with the distinctively social aspects of these online services.
Instead, online privacy law should take inspiration from a perhaps surprising quarter: product-safety law. A web site that directs users' personal information in ways they don't expect is a defectively designed product, and many concepts from products liability law could …
The Coming Fifth Amendment Challenge To Net Neutrality Regulation, Daniel Lyons
The Coming Fifth Amendment Challenge To Net Neutrality Regulation, Daniel Lyons
Daniel Lyons
No abstract provided.
Oklahoma’S New E-Discovery Rules, Steven Gensler
Oklahoma’S New E-Discovery Rules, Steven Gensler
Steven S. Gensler
No abstract provided.
Jurisdiction And Internet In Relation To Commercial Law Disputes In A European Context, Ulf Maunsbach, Patrik Lindskoug
Jurisdiction And Internet In Relation To Commercial Law Disputes In A European Context, Ulf Maunsbach, Patrik Lindskoug
Ulf Maunsbach
No abstract provided.
Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm
Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm
James Grimmelmann
In The Future of the Internet--And How to Stop It, Jonathan Zittrain argues that the Internet has succeeded because it is uniquely "generative": individuals can use it in ways its creators never imagined. This Book Review uses the Apple II and the iPhone--the hero and the villain of the story as Zittrain tells it--to show both the strengths and the weaknesses of his argument. Descriptively and normatively, Zittrain has nailed it. Generativity elegantly combines prior theories into a succinct explanation of the technical characteristics that make the Internet what it is, and the book offers a strong argument that preserving …
The Challenges Of Internet To The Radio And Tv Regulation Systems(互联网对广电体制的挑战,Forthcoming), Henry L. Hu
The Challenges Of Internet To The Radio And Tv Regulation Systems(互联网对广电体制的挑战,Forthcoming), Henry L. Hu
Henry L Hu
No abstract provided.
Local Legislation On The Internet Content(地方互联网内容管理), Henry L. Hu
Local Legislation On The Internet Content(地方互联网内容管理), Henry L. Hu
Henry L Hu
No abstract provided.
The Culture War Of The Google Book Search Project(谷歌数字图书馆的文化战争), Henry L. Hu
The Culture War Of The Google Book Search Project(谷歌数字图书馆的文化战争), Henry L. Hu
Henry L Hu
No abstract provided.
Isp And The Internet Content Regulation(网络接入提供商与互联网内容治理), Henry L. Hu
Isp And The Internet Content Regulation(网络接入提供商与互联网内容治理), Henry L. Hu
Henry L Hu
No abstract provided.