Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

Series

Internet

Institution
Publication Year
Publication

Articles 1 - 30 of 51

Full-Text Articles in Law

Law Library Blog (February 2024): Legal Beagle's Blog Archive, Roger Williams University School Of Law Feb 2024

Law Library Blog (February 2024): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


All The News That’S Fit To Be Identified: Facilitating Access To High-Quality News Through Internet Platforms, Sonja R. West, Jonathan Peters, Lefteris Jason Anastasopolous Aug 2023

All The News That’S Fit To Be Identified: Facilitating Access To High-Quality News Through Internet Platforms, Sonja R. West, Jonathan Peters, Lefteris Jason Anastasopolous

Scholarly Works

Roughly half of Americans get some of their news from social media, and nearly two-thirds get some of their news from search engines. As our modern information gatekeepers, these internet companies bear a special responsibility to consider the impact of their platform and site policies on users’ access to high-quality news sources. They should adopt policies that clear the digital pathway between the public and press by facilitating such access. To that end, the companies must first, address the threshold issue of how best to identify high-quality news sources. This article examines factors that would be useful, drawing from legal …


Law Library Blog (February 2023): Legal Beagle's Blog Archive, Roger Williams University School Of Law Feb 2023

Law Library Blog (February 2023): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Protecting Low-Income Consumers In The Era Of Digital Grocery Shopping: Implications For Wic Online Ordering, Qi Zhang, Priyanka Patel, Caitlin M. Lowery Jan 2023

Protecting Low-Income Consumers In The Era Of Digital Grocery Shopping: Implications For Wic Online Ordering, Qi Zhang, Priyanka Patel, Caitlin M. Lowery

Community & Environmental Health Faculty Publications

The Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) is now expected to allow participants to redeem their food benefits online, i.e., via online ordering, rather than only in-store. However, it is unclear how this new benefit redemption model may impact participants’ welfare since vendors may have an asymmetric information advantage compared with WIC customers. The WIC online ordering environment may also change the landscape for WIC vendors, which will eventually affect WIC participants. To protect WIC consumers’ rights in the new online ordering model, policymakers need an appropriate legal and regulatory framework. This narrative review provides that …


Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara Apr 2022

Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara

Student Writing

Social media has evolved into an essential mode of communication in recent years, allowing people to express their thoughts with the audience of their choice by sending private messages, posting their thoughts, or sharing their opinions. Such audiences can come from all over the world because this online technology breaks down geographic, linguistic, and cultural barriers. As a result, social media has evolved into a powerful tool for self-expression, allowing anyone with an Internet connection to participate in global debates. However, its misuse has had disastrous consequences in the real world, such as the attack on the Capitol that occurred …


Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2022

Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


The New Bailments, Danielle D'Onfro Jan 2022

The New Bailments, Danielle D'Onfro

Scholarship@WashULaw

The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …


Law Library Blog (December 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Dec 2021

Law Library Blog (December 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Illuminating Regulatory Guidance, Cary Coglianese Jan 2020

Illuminating Regulatory Guidance, Cary Coglianese

All Faculty Scholarship

Administrative agencies issue many guidance documents each year in an effort to provide clarity and direction to the public about important programs, policies, and rules. But these guidance documents are only helpful to the public if they can be readily found by those who they will benefit. Unfortunately, too many agency guidance documents are inaccessible, reaching the point where some observers even worry that guidance has become a form of regulatory “dark matter.” This article identifies a series of measures for agencies to take to bring their guidance documents better into the light. It begins by explaining why, unlike the …


Iran, Diane M. Zorri Jan 2020

Iran, Diane M. Zorri

Publications

Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …


Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher May 2019

Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher

Technical Services Faculty Presentations

Slides from a presentation, "Reuse, Remix, and Create with Creative Commons Licenses," presented at the Rhode Island Library Association Annual Conference 2019, Get Informed!, on May 23, 2019 in North Smithfield, Rhode Island.

An openly-shared Google Slides version of this presentation is also available at https://bit.ly/2w6maqH.

=====

REUSE, REMIX, AND CREATE WITH CREATIVE COMMONS LICENSES | ROOM 2A

What are Creative Commons (CC) licenses and how do they work? What is the difference between something that is free online and something that is truly “open”? Did you know that it is often a Creative Commons license that puts …


Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem Nov 2018

Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem

Library Philosophy and Practice (e-journal)

In this paper, we explore the socio-economic effects of internet use at the community information centres (CICs) on livelihoods in three regions of Ghana. Sustainable livelihood framework was used as a lens to understand the phenomena being studied. Primary and secondary data collection methods were used. Three CICs in three regions were purposively selected and qualitative research method was adopted for the study. The data were analysed using Nvivo. The findings showed that sending email information was largely the reason why people used the Internet. We found that through the Internet, people learn, develop new business ideas and expand the …


Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake Oct 2018

Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake

Faculty Publications

Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …


The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati Aug 2018

The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati

Library Philosophy and Practice (e-journal)

Globalization has influenced many human life scopes with a variety of tools, which the cyberspace playing the most role. Although both cyberspace and globalization have had many benefits to human life, both as a tool and as a process, they have been able to assist offenders to bring crime into the cyberspace without any trouble. Therefore, today criminologists discuss the globalized world of crime. Although, the processes of homogenization and globalization have been precious to human beings, should not be overlooked. In this article, the author has tried to explain the cybercrime in the age of globalization, with an emphasis …


Law Library Blog (April 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law Apr 2018

Law Library Blog (April 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Laws On Erasure Of Online Information: Canada, France, European Union, Germany, Israel, Japan, New Zealand, Norway, Portugal, Russia, Spain, United Kingdom, Luis Acosta Nov 2017

Laws On Erasure Of Online Information: Canada, France, European Union, Germany, Israel, Japan, New Zealand, Norway, Portugal, Russia, Spain, United Kingdom, Luis Acosta

Copyright, Fair Use, Scholarly Communication, etc.

Comparative Summary by Luis Acosta, Chief, Foreign, Comparative, and International Law Division II, Law Library of Congress (United States), Global Legal Research Center

This report describes the laws of twelve jurisdictions that have some form of remedy available enabling the removal of online data based on harm to individuals’ privacy or reputational interests, including but not limited to defamation. Six of the countries surveyed are within the European Union (EU) or the European Economic Area, and therefore have implemented EU law. Five non-EU jurisdictions are also surveyed.

Comparative analysis across jurisdictions presents terminological challenges, because legal language across jurisdictions seems …


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams Jan 2016

Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams

All Faculty Scholarship

In today’s rapidly evolving telecommunications landscape, the development of new technologies and distribution platforms are driving innovation and growth at a breakneck speed across the Internet ecosystem. Broadband connectivity is increasingly important to our civil discourse, our economy, and our future. What is the proper role of government in facilitating robust investment and competition in this critical sector? When technology companies constantly have to reinvent themselves and adapt to survive – what role should government play? This panel of experts at the Federalist Society’s 2014 National Lawyers Convention discussed the current regulatory environment and how government policies – particularly regarding …


Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring Oct 2015

Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring

Sociology & Criminal Justice Faculty Publications

The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long …


Broadband Access In Arkansas Schools, Sarah C. Mckenzie, Gary W. Ritter Apr 2015

Broadband Access In Arkansas Schools, Sarah C. Mckenzie, Gary W. Ritter

Policy Briefs

With the computer-based Partnership for Assessment of Readiness for College and Career (PARCC) test, the Arkansas Digital Learning Act, and Governor Hutchinson’s efforts to increase participation in computer science courses, the Arkansas Legislature is discussing actions to take in order to close the “digital divide” in the state. This brief will explore the technological requirements of providing the recommended bandwidth to schools, the barriers to the provision of that service, and potential steps for the Arkansas Department of Education to take in order to ensure that every Arkansas student has fast, consistent access to the Internet to support their learning.


Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au Apr 2015

Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au

Law Faculty Articles and Essays

We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …


Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame Mar 2015

Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame

Department of Political Science and Law Faculty Scholarship and Creative Works

The purpose of this study was to describe a sample of mental-health blogs, to determine the proportion of sampled blogs still posting several years after identification, and to identify the correlates of survival. One hundred eighty-eight mental-health blogs were identified in 2007–08 and revisited in 2014. Eligible blogs were U.S.-based, in English, and active. Baseline characteristics and survival status were described and variation based on blog focus and survival examined. Mental health bloggers tended to be females blogging as patients and caregivers focusing on specific mental illnesses/conditions. The proportion of blogs still active at follow-up ranged from 25.5 percent to …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

All Faculty Scholarship

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …


Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler Jan 2014

Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman Jan 2014

Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman

All Faculty Scholarship

Private ordering plays a significant role in the application of intellectual property laws, especially in the context of copyright law. In this Article, I highlight some of the dominant modes of private ordering and consider what formal copyright law should do, if anything, to engage with private ordering in the copyright space. I conclude that there is not one single approach that copyright law should take with regard to private ordering, but instead several different approaches. In some instances, the best option is for the law to get out of the way and simply continue to provide room for various …


Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park Apr 2013

Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park

Management Faculty Publications and Presentations

No abstract provided.


Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky Sep 2012

Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky

2012 Energy Justice Conference and Technology Exposition (September 17-18)

Presenter: Dr. Paul Chinowsky, Director, Mortenson Center in Engineering for Developing Communities; Professor, University of Colorado

25 slides


Open Secret: Why The Supreme Court Has Nothing To Fear From The Internet, Keith J. Bybee Jan 2012

Open Secret: Why The Supreme Court Has Nothing To Fear From The Internet, Keith J. Bybee

Institute for the Study of the Judiciary, Politics, and the Media at Syracuse University

The United States Supreme Court has an uneasy relationship with openness: it complies with some calls for transparency, drags its feet in response to others, and sometimes simply refuses to go along. I argue that the Court’s position is understandable given that the internet age of fluid information and openness has often been heralded in terms that are antithetical to the Court’s operations. Even so, I also argue the Court actually has little to fear from greater transparency. The understanding of the Court with the greatest delegitimizing potential is the understanding that the justices render decisions on the basis of …


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …