Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (57)
- Seattle University School of Law (25)
- UIC School of Law (22)
- SelectedWorks (17)
- The University of Akron (17)
-
- Pace University (15)
- Schulich School of Law, Dalhousie University (13)
- University of Richmond (10)
- University of Maryland Francis King Carey School of Law (9)
- University of Michigan Law School (9)
- The Catholic University of America, Columbus School of Law (8)
- Pepperdine University (6)
- Vanderbilt University Law School (6)
- Case Western Reserve University School of Law (4)
- Cornell University Law School (4)
- Loyola Marymount University and Loyola Law School (4)
- University of Colorado Law School (4)
- University of Florida Levin College of Law (4)
- University of Washington School of Law (4)
- Chicago-Kent College of Law (3)
- Duke Law (3)
- Fordham Law School (3)
- University of Georgia School of Law (3)
- University of Pennsylvania Carey Law School (3)
- American University Washington College of Law (2)
- Boston University School of Law (2)
- Brigham Young University Law School (2)
- Hamline University (2)
- Loyola University Chicago, School of Law (2)
- New York Law School (2)
- Keyword
-
- Internet (47)
- Privacy (24)
- Law and Technology (20)
- Social media (20)
- Copyright (16)
-
- Corporate (13)
- Technology (12)
- Blair (11)
- Cybersecurity (11)
- Science and Technology (11)
- Stout (11)
- Corporation (10)
- Team production (10)
- Governance (9)
- Intellectual Property Law (8)
- International law (8)
- Shareholder (8)
- Communications Law (7)
- Computer Law (7)
- First Amendment (7)
- NSA (7)
- Facebook (6)
- Law and Economics (6)
- Legal scholarship (6)
- Regulation (6)
- Surveillance (6)
- Board (5)
- Copyright Act (5)
- Corporations (5)
- FTC (5)
- Publication
-
- Seattle University Law Review (23)
- Akron Law Review (17)
- UIC John Marshall Journal of Information Technology & Privacy Law (15)
- Pace Law Review (13)
- David E. Sorkin (11)
-
- Canadian Journal of Law and Technology (9)
- Faculty Scholarship (9)
- Richmond Journal of Law & Technology (8)
- All Faculty Scholarship (6)
- Catholic University Journal of Law and Technology (6)
- Lawrence J. Trautman Sr. (5)
- Peter K. Yu (5)
- Vanderbilt Journal of Entertainment & Technology Law (5)
- Articles, Book Chapters, & Popular Press (4)
- Faculty Publications (4)
- Journal of Law, Technology, & the Internet (4)
- Maryland Law Review (4)
- Publications (4)
- The Journal of Business, Entrepreneurship & the Law (4)
- UIC Review of Intellectual Property Law (4)
- Articles (3)
- Duke Law & Technology Review (3)
- Florida Law Review (3)
- Law Faculty Scholarship (3)
- Michigan Telecommunications & Technology Law Review (3)
- UIC Law Review (3)
- Washington Journal of Law, Technology & Arts (3)
- William K. Ford (3)
- Ann M. Lousin (2)
- Articles & Chapters (2)
- Publication Type
Articles 1 - 30 of 310
Full-Text Articles in Law
Table Of Contents
Catholic University Journal of Law and Technology
No abstract provided.
Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss
Alternative Restrictions Of Sex Offenders' Social Media Use & The Freedom Of Speech, Norah M. Sloss
Catholic University Journal of Law and Technology
No abstract provided.
Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao
Catholic University Journal of Law and Technology
No abstract provided.
Don’T Tread On Me…Online: The Fec Should Stay Out Of Free Internet-Based Political Speech, Timothy J. D’Elia
Don’T Tread On Me…Online: The Fec Should Stay Out Of Free Internet-Based Political Speech, Timothy J. D’Elia
Catholic University Journal of Law and Technology
No abstract provided.
Extending Copyright Protection To Combat Free-Riding By Digital News Aggregators And Online Search Engines, Nancy J. Whitmore
Extending Copyright Protection To Combat Free-Riding By Digital News Aggregators And Online Search Engines, Nancy J. Whitmore
Catholic University Journal of Law and Technology
No abstract provided.
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Submarine Cables, Cybersecurity And International Law: An Intersectional Analysis, Tara Davenport
Catholic University Journal of Law and Technology
No abstract provided.
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Lorrie F Cranor
We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …
Reputation And Defamatory Meaning On The Internet: Communications, Contexts And Communities, Gary Kok Yew Chan
Reputation And Defamatory Meaning On The Internet: Communications, Contexts And Communities, Gary Kok Yew Chan
Research Collection Yong Pung How School Of Law
The determination of the appropriate scope of protection of reputation in the tort of defamation is crucially dependent on the construction of defamatory meaning. With the continuing rise of Internet publications, it is important to assess the impact of the various modes of Internet communications such as Internet websites, hyperlinking, blogs, emails, Twitter, Facebook and other forms of social media on defamatory meaning. Such defamatory meaning is being constructed based on the unique contexts and social expectations that have been generated by the various modes of Internet communications. The potential impact on defamatory meaning can also be assessed from the …
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Michigan Journal of International Law
The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start? (With Albert J. Plawinski", Henry H. Perritt Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start? (With Albert J. Plawinski", Henry H. Perritt Jr.
Henry H. Perritt, Jr.
Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Meg Penrose
Sharing Stupid $H*T With Friends And Followers: The First Amendment Rights Of College Athletes To Use Social Media, Meg Penrose
Meg Penrose
This paper takes a closer look at the First Amendment rights of college athletes to access social media while simultaneously participating in intercollegiate athletics. The question posed is quite simple: can a coach or athletic department at a public university legally restrict a student-athlete's use of social media? If so, does the First Amendment provide any restraints on the type or length of restrictions that can be imposed? Thus far, neither question has been presented to a court for resolution. However, the answers are vital, as college coaches and athletic directors seek to regulate their athletes in a constitutional manner.
Tinkering With Success: College Athletes, Social Media And The First Amendment, Meg Penrose
Tinkering With Success: College Athletes, Social Media And The First Amendment, Meg Penrose
Meg Penrose
Good law does not always make good policy. This article seeks to provide a legal assessment, not a policy directive. The policy choices made by individual institutions and athletic departments should be guided by law, but absolutely left to institutional discretion. Many articles written on college student-athletes' social media usage attempt to urge policy directives clothed in constitutional analysis. In this author's opinion, these articles have lost perspective-constitutional perspective. This article seeks primarily to provide a legal and constitutional assessment so that schools and their athletic departments will have ample information to then make their own policy choices.
Regulating Interconnection (Lightly!), Daniel A. Lyons
Regulating Interconnection (Lightly!), Daniel A. Lyons
Daniel Lyons
No abstract provided.
Cutting Out The Middleman: Why "Look And Feel" Should Be Ignored In Trade Dress Law, Nicholas Dimarino
Cutting Out The Middleman: Why "Look And Feel" Should Be Ignored In Trade Dress Law, Nicholas Dimarino
St. John's Law Review
(Excerpt)
Part I of this Note discusses the background and elements of general trade dress law. Part II discusses the narrower issue of "look and feel" in the context of websites and outlines how courts have currently addressed the "look and feel" issue. Part III proposes that courts ignore the artificial "look and feel" distinction and instead apply normal trade dress analyses and elements. This solution, which requires that courts adhere to a workable standard that serves the underlying purpose of trade dress law, allows recognition of the distinctive characteristics of website trade dress claims, while reducing the risk of …
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg
Alberto Bernabe
No abstract provided.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
All Faculty Scholarship
The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.
Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …
Why Confronting The Internet’S Dark Side?, Raphael Cohen-Almagor
Why Confronting The Internet’S Dark Side?, Raphael Cohen-Almagor
raphael cohen-almagor
Raphael Cohen-Almagor, the author of Confronting the Internet's Dark Side, explains his motivation for exploring the dangerous side of the world wide web. This new book is the first comprehensive book on social responsibility on the Internet.
Doj’S “All-Tools” Approach To Cyber And National Security, Peter Margulies
Doj’S “All-Tools” Approach To Cyber And National Security, Peter Margulies
Law Faculty Scholarship
No abstract provided.
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
Homeland Security Publications
No abstract provided.
Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn
Network Neutrality And The First Amendment, Andrew Patrick, Eric Scharphorn
Michigan Telecommunications & Technology Law Review
The First Amendment reflects the conviction that the widest possible dissemination of information from diverse and antagonistic sources is essential to public welfare. Like the printing press, the Internet has dramatically transformed the marketplace of ideas by providing unprecedented opportunities for individuals to communicate. Though its growth continues to be phenomenal, broadband service providers— acting as Internet gatekeepers—have developed the ability to discriminate against specific content and applications. First, these gatekeepers intercept and inspect data transferred over public networks, then selectively block or slow it. This practice has the potential to stifle the Internet’s value as a speech platform by …
Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker
Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker
Homeland Security Publications
No abstract provided.
Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring
Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring
Sociology & Criminal Justice Faculty Publications
The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long …
Section 230 Of The Communications Decency Act: The True Culprit Of Internet Defamation, Heather Saint
Section 230 Of The Communications Decency Act: The True Culprit Of Internet Defamation, Heather Saint
Loyola of Los Angeles Entertainment Law Review
This Note highlights the growing concern of Internet defamation and the lack of viable legal remedies available to its victims. Internet defamation is internet speech with the purpose to disparage another’s reputation. At common law, a victim of alleged defamation has the right to file suit against not only the original speaker of the defamatory statements, but the person or entity to give that statement further publication as well. In certain cases even the distributor, such as a newspaper stand, can be held liable for a defamation claim. However, liability due to defamatory speech on the Internet is quite different. …
Some Key Things Entrepreneurs Need To Know About The Law And Lawyers, Lawrence J. Trautman, Anthony Luppino, Malika S. Simmons
Some Key Things Entrepreneurs Need To Know About The Law And Lawyers, Lawrence J. Trautman, Anthony Luppino, Malika S. Simmons
Lawrence J. Trautman Sr.
New business formation is a powerful economic engine that creates jobs. Diverse legal issues are encountered as a start-up entity approaches formation, initial capitalization and fundraising, arrangements with employees and independent contractors, and relationships with other third parties. The endeavors of a typical start-up in the United States will likely implicate many of the following areas of law: intellectual property; business organizations; tax laws; employment and labor laws; securities regulation; contracts and licensing agreements; commercial sales; debtor-creditor relations; real estate law; health and safety laws/codes; permits and licenses; environmental protection; industry specific regulatory laws and approval processes; tort/personal injury, products …
Walk A Mile In The Shoes Of A Copyright Troll: Analyzing And Overcoming The Joinder Issue In Bittorrent Lawsuits, Kristina Unanyan
Walk A Mile In The Shoes Of A Copyright Troll: Analyzing And Overcoming The Joinder Issue In Bittorrent Lawsuits, Kristina Unanyan
The Journal of Business, Entrepreneurship & the Law
This Comment analyzes the issues surrounding joinder of copyright infringers who use BitTorrent, explores how joinder can be used and limited to create a more viable solution for copyright holders and consumers, as well as, supplements the sparse regulations that encompass joinder to create a rule that accommodates this technological era. Part II explains Copyright Law and the procedural aspects of a copyright infringement suit and joinder of defendants. Part III delves into the history of peer-to-peer (P2P) file-sharing lawsuits and provides an illustration of where case law rests today regarding P2P networks. Part IV describes the BitTorrent network and …
Note: A Series Of (Inseparable) Tubes? “New Media” Streaming And The Impact Of In Re. Pandora Media, Related Decisions, And Performance Licensing In The Internet Era, Ross Coker
The Journal of Business, Entrepreneurship & the Law
No abstract provided.
Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek
Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek
The Journal of Business, Entrepreneurship & the Law
No abstract provided.
The Sharing Economy And Consumer Protection Regulation: The Case For Policy Change, Christopher Koopman, Matthew Mitchell, Adam Thierer
The Sharing Economy And Consumer Protection Regulation: The Case For Policy Change, Christopher Koopman, Matthew Mitchell, Adam Thierer
The Journal of Business, Entrepreneurship & the Law
In this Paper, we discuss the central benefit of the sharing economy thus far: it has overcome market imperfections without recourse to regulatory bodies prone to capture by entrenched firms. As an introduction to the various issues surrounding this ongoing debate, we begin with an explanation of the sharing economy. Then we review the traditional “consumer protection” rationales for economic regulation and explain why many regulations persist even though their initial justifications are no longer valid. We argue continued application of these outmoded regulatory regimes is likely to harm consumers. In the last section, we explain how the Internet and …
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Giancarlo Francesco Frosio
In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …
Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman
Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman
Lawrence J. Trautman Sr.
Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …