Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Law

Can The Liberal Order Be Sustained? Nations, Network Effects, And The Erosion Of Global Institutions, Bryan H. Druzin Feb 2021

Can The Liberal Order Be Sustained? Nations, Network Effects, And The Erosion Of Global Institutions, Bryan H. Druzin

Michigan Journal of International Law

A growing retreat from multilateralism is threatening to upend the institutions that underpin the liberal international order. This article applies network theory to this crisis in global governance, arguing that policymakers can strengthen these institutions by leveraging network effect pressures. Network effects arise when networks of actors—say language speakers or users of a social media platform—interact and the value one user derives from the network increases as other users join the network (e.g., the more people who speak your language, the more useful it is because there are more people with whom you can communicate). Crucially, network effect pressures produce …


Lawyers Democratic Dysfunction, Leah Litman Sep 2020

Lawyers Democratic Dysfunction, Leah Litman

Articles

As part of the symposium on Jack Balkin and Sandy Levinson’s Democracy and Dysfunction, this Article documents another source of the dysfunction that the authors observe—elite lawyers’ unwillingness to break ranks with other elite lawyers who participate in the destruction of various norms that are integral to a well-functioning democracy. These network effects eliminate the possibility of “soft” sanctions on norm violators such as withholding future professional advancement. Thus, rather than enforcing norms and deterring norm violations, the networks serve to insulate norm violators from any meaningful accountability.


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru Oct 2012

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Property As Control: The Case Of Information, Jane B. Baron Jan 2012

Property As Control: The Case Of Information, Jane B. Baron

Michigan Telecommunications & Technology Law Review

If heath policy makers' wishes come true, by the end of the current decade the paper charts in which most of our medical information is currently recorded will be replaced by networked electronic health records ("EHRs").[...] Like all computerized records, networked EHRs are difficult to secure, and the information in EHRs is both particularly sensitive and particularly valuable for commercial purposes. Sadly, the existing federal statute meant to address this problem, the Health Insurance Portability and Accountability Act of 1996 ("HIPAA"), is probably inadequate to the task.[...] Health law, privacy, and intellectual property scholars have all suggested that the river …


Beyond Microfinance: Creating Opportunities For Women At The Base Of The Pyramid, Deborah Burand Jan 2012

Beyond Microfinance: Creating Opportunities For Women At The Base Of The Pyramid, Deborah Burand

Articles

A growing number of innovative social entrepreneurs are tackling this problem by creating 'busmesses in a bag' mspired by the world's largest direct seller of beauty products - Avon. These very small franchise or consignment businesses are affordable enough to be acquired and operated by women living at the base of the economic pyramid. Just as commercial franchise networks such as Avon have helped people with httle or no experience grow mto successful business owners around the world, microfranchise and microconsignment networks may hold similar promise.


Technology Convergence And Federalism: The Case Of Voip Regulation, Daniel A. Lyons Jan 2012

Technology Convergence And Federalism: The Case Of Voip Regulation, Daniel A. Lyons

University of Michigan Journal of Law Reform Caveat

The Vermont Supreme Court may soon consider whether federal law permits the Public Service Board to regulate certain voice-over-internet-protocol (VoIP) services. Across the Hudson, Governor Andrew Cuomo recently sought to bar the New York Public Service Commission from adopting similar regulations. And these states are not alone: from Maine to Florida, several states are considering whether their jurisdiction over traditional telephone service encompasses this new technology, through which nearly one-third of American landline households receive telephone service. If so, nationwide VoIP providers could face up to fifty new legal regimes with which they must comply before offering service. If not, …


Network Neutrality: Verizon V. Fcc, Anna S. Han Jan 2012

Network Neutrality: Verizon V. Fcc, Anna S. Han

University of Michigan Journal of Law Reform Caveat

The Federal Communications Commission (“FCC”) is once again locking horns with the broadband behemoth, Verizon, over the issue of network neutrality. Although this conflict between the government and corporate giants is far from new, recent events have forced courts to give it close scrutiny. Given the explosive pace at which technology has expanded and permeated citizens’ daily lives, the judgments rendered have greater significance now than ever before.


Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble Jan 2010

Ill Telecommunications: How Internet Infrastructure Providers Lose First Amendment Protection, Nicholas Bramble

Michigan Telecommunications & Technology Law Review

The Federal Communications Commission (FCC) recently proposed an Internet nondiscrimination rule: "Subject to reasonable network management, a provider of broadband Internet access service must treat lawful content, applications, and services in a nondiscriminatory manner." Among other requests, the FCC sought comment on whether the proposed nondiscrimination rule would "promote free speech, civic participation, and democratic engagement," and whether it would "impose any burdens on access providers' speech that would be cognizable for purposes of the First Amendment." The purpose of this Article is to suggest that a wide range of responses to these First Amendment questions, offered by telecommunications providers …


Wireless Net Neutrality Regulation And The Problem With Pricing: An Empirical, Cautionary Tale, Babette E.L. Boliek Jan 2009

Wireless Net Neutrality Regulation And The Problem With Pricing: An Empirical, Cautionary Tale, Babette E.L. Boliek

Michigan Telecommunications & Technology Law Review

I present here a unique empirical analysis of the consumer welfare benefits of prior regulation in the mobile telecommunications industry. In particular, I analyze the relative consumer benefits of state rate regulation and federal entry regulation. The institution of filing requirements and FTC review and approval of various consumer pricing regimes is highly analogous to the consumer price controls imposed by various state level public utility commissions in the past. Furthermore, the imposition of a zero-price rule is analogous to past rate regulation; in particular it is similar to past wholesale regulation with its underlying principles of open access and …


Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini Jan 2007

Justice, And Only Justice, You Shall Pursue: Network Neutrality, The First Amendment And John Rawls's Theory Of Justice, Amit M. Schejter, Moran Yemini

Michigan Telecommunications & Technology Law Review

As broadband becomes the public's technology of choice to access the Internet, it is also emerging as the battlefield upon which the struggle for control of the Internet is being fought. Operators who provide physical access to the service claim the right to discriminate among the content providers who use the infrastructure in which the operators have invested. In contrast, content providers warn that exercising such a policy would "undermine the principles that have made the Internet such a success."[...] For academic observers, analysis of this issue has thus far been confined to the areas of property law, innovation, and …


What's Your Sign? -- International Norms, Signals, And Compliance, Charles K. Whitehead Jan 2006

What's Your Sign? -- International Norms, Signals, And Compliance, Charles K. Whitehead

Michigan Journal of International Law

This Article proposes a new approach to understanding state compliance with international obligations, positing that increased interaction among the world's regulators has reinforced network norms, as evidenced in part by a greater reliance among states on legally nonbinding instruments. This Article also begins to fill a gap in the growing scholarship on state compliance by proposing a better framework for understanding how international norms influence senior regulators and how they affect both state decisions to comply as well as levels of compliance.


Transgovernmental Networks Vs. Democracy: The Case Of The European Information Privacy Network, Francesca Bignami Jan 2005

Transgovernmental Networks Vs. Democracy: The Case Of The European Information Privacy Network, Francesca Bignami

Michigan Journal of International Law

The perspective offered by this Article is twofold. The emergence of transgovernmental networks gives rise to two questions, one causal and the other normative. First, how do we explain transnational cooperation through networks? Why do governments and regulators choose to establish networks rather than retain virtually limitless discretion over policymaking, conditioned only by international legal obligations? Based on the author’s examination of the records of the intergovernmental negotiations on the Data Protection Directive, this Article concludes that one precondition for fettering national discretion through networks is common preferences among governments on the substance of the policy to be administered. Compared …


From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans Apr 2004

From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans

Michigan Telecommunications & Technology Law Review

If ISPs are exposed to liability for forwarding others' messages--messages originating with other ISPs or with the ISP's own users--the norm of universal mutual message forwarding that underlies the present operation of the Internet will be threatened. This Note will argue that society presently confronts a choice between a common carrier Internet characterized by universal mutual message forwarding and a monitored and controlled Internet. Part I will describe the underlying rules that govern ISPs' liability for their users' actions. Part II will argue that the present statutory regime governing ISPs' liability for users' copyright infringement includes elements that provide ISPs …


Regime-Collisions: The Vain Search For Legal Unity In The Fragmentation Of Global Law, Andreas Fischer-Lescano, Gunther Teubner Jan 2004

Regime-Collisions: The Vain Search For Legal Unity In The Fragmentation Of Global Law, Andreas Fischer-Lescano, Gunther Teubner

Michigan Journal of International Law

Predictions of future events tend to be a rarity within the social sciences. It is an even more rare occurrence when predicted events come to pass. Niklas Luhmann's prediction on the future of global law is a memorable exception. In 1971, while theorizing on the concept of world society, Luhmann allowed himself the "speculative hypothesis" that global law would experience a radical fragmentation, not along territorial, but along social sectoral lines. The reason for this would be a transformation from normative (politics, morality, law) to cognitive expectations (economy, science, technology); a transformation that would be effected during the transition from …


Computer Systems For Research, Layman E. Allen Jan 1971

Computer Systems For Research, Layman E. Allen

Book Chapters

The legal communication network today is characterized by two features. Any communication network in this century is marked by a division between the extent to which there is a man involved and the extent to which there is a machine involved. And, in terms of emphasis at this stage of things, at least within law, the emphasis is heavily upon the man communicating messages and relatively less upon the machine. The interesting question is, What is going on within this network that is amenable to being handled by machine and what, among those things, is it wise to do that …