Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Communication Technology and New Media

Internet

Articles 1 - 26 of 26

Full-Text Articles in Law

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


Iran, Diane M. Zorri Jan 2020

Iran, Diane M. Zorri

Publications

Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …


No Connection: The Issue Of Internet On The Reservation, Emily S. Donnellan Jul 2017

No Connection: The Issue Of Internet On The Reservation, Emily S. Donnellan

American Indian Law Journal

No abstract provided.


Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman Jul 2017

Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins Jul 2017

It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Surveying The Landscape As Technology Revolutionizes Media Coverage Of Appellate Courts, Howard J. Bashman Apr 2017

Surveying The Landscape As Technology Revolutionizes Media Coverage Of Appellate Courts, Howard J. Bashman

The Journal of Appellate Practice and Process

No abstract provided.


Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael Mar 2017

Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams Jan 2016

Telecommunications: Competition Policy In The Telecommunications Space, Gene Kimmelman, Maureen K. Ohlhausen, Michael O’Rielly, Christopher S. Yoo, Stephen F. Williams

All Faculty Scholarship

In today’s rapidly evolving telecommunications landscape, the development of new technologies and distribution platforms are driving innovation and growth at a breakneck speed across the Internet ecosystem. Broadband connectivity is increasingly important to our civil discourse, our economy, and our future. What is the proper role of government in facilitating robust investment and competition in this critical sector? When technology companies constantly have to reinvent themselves and adapt to survive – what role should government play? This panel of experts at the Federalist Society’s 2014 National Lawyers Convention discussed the current regulatory environment and how government policies – particularly regarding …


Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring Oct 2015

Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring

Sociology & Criminal Justice Faculty Publications

The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long …


Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman Jan 2014

Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman

All Faculty Scholarship

Private ordering plays a significant role in the application of intellectual property laws, especially in the context of copyright law. In this Article, I highlight some of the dominant modes of private ordering and consider what formal copyright law should do, if anything, to engage with private ordering in the copyright space. I conclude that there is not one single approach that copyright law should take with regard to private ordering, but instead several different approaches. In some instances, the best option is for the law to get out of the way and simply continue to provide room for various …


Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park Apr 2013

Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park

Management Faculty Publications and Presentations

No abstract provided.


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


Internet History, Raphael Cohen-Almagor Apr 2011

Internet History, Raphael Cohen-Almagor

raphael cohen-almagor

This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase (1984-1989). It was facilitated by the upgrading of backbone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different …


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton Jan 2010

What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton

Articles

Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …


The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo Dec 2009

The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo

All Faculty Scholarship

This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …


Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo Feb 2009

Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo

All Faculty Scholarship

The Federal Communications Commission’s recent Comcast decision has rejected categorical, ex ante restrictions on Internet providers’ ability to manage their networks in favor of a more flexible approach that examines each dispute on a case-by-case basis, as I have long advocated. This book chapter, written for a conference held in February 2009, discusses the considerations that a case-by-case approach should take into account. First, allowing the network to evolve will promote innovation by allowing the emergence of applications that depend on a fundamentally different network architecture. Indeed, as the universe of Internet users and applications becomes more heterogeneous, it is …


Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer Nov 2006

Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer

All Faculty Scholarship

The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …


What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley Sep 2006

What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley

The University of New Hampshire Law Review

Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


The Blogosphere And The New Pamphleteers, Donald J. Kochan Dec 2005

The Blogosphere And The New Pamphleteers, Donald J. Kochan

Donald J. Kochan

The future of the free dissemination of information lies in the blog, some may say. The internet has entirely transformed how we receive and consume information. It’s the newest incarnation of information dissemination. From the insights of Alexis de Tocqueville, “Feelings and opinions are recruited, the heart is enlarged, and the human mind is developed only by the reciprocal influence of men upon one another.” Bloggers are a powerful force in the distribution of information and ideas and the creation of communities of conversation. Throughout history, the dissemination of information, news, opinions, and ideas has continuously transformed. In the 18th …


Preemption Of State Spam Laws By The Federal Can-Spam Act, Roger Allen Ford Jan 2005

Preemption Of State Spam Laws By The Federal Can-Spam Act, Roger Allen Ford

Law Faculty Scholarship

Unsolicited bulk commercial email is an increasing problem, and though many states have passed laws aimed at curbing its use and abuse, for several years the federal government took no action. In 2003 that changed when Congress passed the CAN-SPAM Act. Though the law contains many different restrictions on spam messages, including some restriction of nearly every type that states had adopted, the Act was widely criticized as weak. Many of the CAN-SPAM Act's provisions are weaker than corresponding provisions of state law, and the Act preempts most state spam laws that would go farther, including two state laws that …


Public Access To Legal Resources On The Internet, Alice M. Mccanless Oct 2001

Public Access To Legal Resources On The Internet, Alice M. Mccanless

The Southeastern Librarian

In the not so distant past, before the Internet, doing legal research necessitated access to either a substantial law collection or one of the expensive legal databases, Lexis-Nexis or Westlaw. That limited legal reference to law librarians, some special librarians and reference librarians at large university or public libraries. The Internet has changed all of that, giving any library with an Internet connection access to a wealth of current law, especially at the state and federal level.

Based on a presentation at the Joint Conference of the Georgia Council of Media Organizations and Southeastern Library Association on October 12, 2000.


The Role Of The Internet In Chinese Foreign And Domestic Affairs, Jean Bowman Leedy Aug 2001

The Role Of The Internet In Chinese Foreign And Domestic Affairs, Jean Bowman Leedy

Graduate Program in International Studies Theses & Dissertations

Problem: Rapid dissemination of Internet technology and the free access to information it affords poses a threat to non-democratic states that rely on control of information to maintain power and stability. This is of substantial concern to the Communist regime in The People's Republic of China due to the fact that its repressed population constitutes the fastest growing body of Internet users in the world.

Methods: This paper examines the potential impact of the Internet on Chinese foreign and domestic policy through interpretation of existing literature as it applies to the Internet, interviews with experts studying the emergence of China's …


The Impact Of The Use Of New Communications And Information Technologies On Trafficking In Human Beings For Sexual Exploitation: A Study Of The Users, Donna M. Hughes Dr. Apr 2001

The Impact Of The Use Of New Communications And Information Technologies On Trafficking In Human Beings For Sexual Exploitation: A Study Of The Users, Donna M. Hughes Dr.

Donna M. Hughes

The trafficking in women and children for sexual exploitation is a global human rights crisis being

perpetrated by individual criminals and organized crime groups, and facilitated by increased tolerance

for the sexual exploitation and sexual abuse of women and children.

New communications and information technologies have created a global revolution in

communications, access to information, and media delivery. There are a lot of positive aspects to the

global revolution, but there are also some very negative ones. This report describes the most negative

ones—how communications and information technologies are used to facilitate the trafficking of

women and children for sexual …


The Threat Of Long-Arm Jurisdiction To Electronic Commerce, Robert J. Aalberts, Anthony M. Townsend, Michael E. Whitman Dec 1998

The Threat Of Long-Arm Jurisdiction To Electronic Commerce, Robert J. Aalberts, Anthony M. Townsend, Michael E. Whitman

Faculty and Research Publications

Unfortunately for those whose businesses rely on the Internet, an increasing amount of legal conflict is also arising in reaction to this new business medium. As attorneys and the courts attempt to sort out the Internet’s legal status quo, both are considering such pressing substantive issues as electronic contracts, privacy, trademark, copyright, defamation, computer crimes, censorship, and taxation. It is imperative that information system professionals become aware of how evolving Internet law will affect the medium they are charged with administrating. An informed IS community is also much more capable of mounting legal and political challenges to law that might …