Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Selected Works

Cyberspace

Discipline
Institution
Publication Year
Publication

Articles 1 - 30 of 37

Full-Text Articles in Law

Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler Mar 2016

Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler

Gary C. Kessler

This document is Dr. Kessler's review of Digital Crime and Forensic Science in Cyberspace, by P. Kanellis, E. Kiountouzis, N. Kolokotronis, and D. Martakos. Idea Group Publishing, 2006. ISBN: 1-59140-873-3.


A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker Feb 2016

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker

Thomas E. Baker

This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.


Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman Jul 2015

Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman

Shlomit Yanisky-Ravid Professor of Law

Increasingly, there has been a focus on creating democratic standards and procedures in order to best facilitate open exchange of information and communication online—a goal that fits neatly within the feminist aim to democratize content creation and community. Collaborative websites, such as blogs, social networks, and, as focused on in this Article, Wikipedia, represent both a Cyberspace community entirely outside the strictures of the traditional (intellectual) proprietary paradigm and one that professes to truly embody the philosophy of a completely open, free, and democratic resource for all. In theory, collaborative websites are the solution that social activists, Intellectual Property opponents …


Becoming A Competent 21st Century Legal Ethics Professor: Everything You Always Wanted To Know About Technology (But Were Afraid To Ask), Catherine Lanctot Dec 2014

Becoming A Competent 21st Century Legal Ethics Professor: Everything You Always Wanted To Know About Technology (But Were Afraid To Ask), Catherine Lanctot

Catherine J. Lanctot

This Article provides a roadmap for rebooting the legal ethics curriculum. It describes how to revise a traditional legal ethics class to respond to twenty-first century law practice, and provides a detailed overview of the landscape of technological issues currently affecting the practice of law, including many cautionary tales of lawyers who ignored their ethical responsibilities.

We have finally hit the tipping point with respect to the use of technology within the legal profession, as bar regulators have begun to warn attorneys that they may no longer plead ignorance of technological advances if such ignorance harms the interests of their …


Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati Apr 2014

Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati

Rodolfo C. Rivas

The authors provide a brief rundown of strategies to protect a wide range of IP rights in cyberspace. The strategies tackle practical advice and suggest a series of progressive actions in order to ensure maximum protection with an efficient use of resources.//////////////////////////////// Los autores proporcionan un breve resumen de las estrategias para proteger una amplia gama de derechos de propiedad intelectual en el ciberespacio. Las estrategias abordan consejos prácticos y sugieren una serie de acciones en orden progresivo con la finalidad de garantizar la máxima protección manteniendo un uso eficiente de los recursos.


Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li May 2013

Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li

Jeffrey Li

Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …


Shaping Preventive Policy In “Cyber War” And Cyber Security: A Pragmatic Approach, Tony Guo Apr 2012

Shaping Preventive Policy In “Cyber War” And Cyber Security: A Pragmatic Approach, Tony Guo

Tony Guo

As the Egyptian government took the country offline—in an effort to squelch public dissent—the U.S. Senate considers a bill that would give the President the same emergency powers to shut off “critical” Internet infrastructure in the event of a “cyber emergency.” This bill, along with others like it, has been introduced in light of recent political rhetoric on “cyber war.” The proponents of “cyber war” evoke images of large explosions, poison gas clouds, and a high degree of mortality. In reality, cyber warfare is a misleading metaphor, and has long been confused with crime and espionage. "Cyber war" is not …


Uses And Abuses Of Cyberspace, Andrew D. Murray Apr 2012

Uses And Abuses Of Cyberspace, Andrew D. Murray

Professor Andrew D Murray

No abstract provided.


'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik Jan 2012

'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik

Warren Bartholomew CHIK

The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …


Right To Information Identity, Elad Oreg Jan 2012

Right To Information Identity, Elad Oreg

Elad Oreg

Inspired by the famous Warren&Brandeis conceptualization of the "right to privacy", this article tries to answer a different modern conceptual lacuna and present the argument for the need to conceptualize and recognize a new, independent legal principle of a "right to information-identity". This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. What was happening regarding privacy in the late 19th century happens now with identity. Changes in technology and social standards make the very notion of identity increasingly fluid, …


De Rechtsstaat In Cyberspace?, Mireille Hildebrandt Dec 2011

De Rechtsstaat In Cyberspace?, Mireille Hildebrandt

Mireille Hildebrandt

Cyberspace is inmiddels overal. Wat tien jaar geleden misschien nog een aparte niet-fysieke wereld leek waar niemand wist dat je een hond was, gaat steeds meer lijken op een verzameling onderling verbonden dorpspleinen. Met dien verstande dat alles wat iedereen doet permanent wordt opgenomen, opgeslagen en doorzocht op betekenisvolle patronen. Steeds meer personen, organisaties maar ook dingen raken verbonden via het internet. De Internationale Telecommunicatie Unie sprak in 2005 van het ‘internet van de dingen’, om aan te geven dat binnen afzienbare tijd alles overal (‘everyware’) via draadloze identificatiesystemen traceerbaar is. Intussen raakt iedereen via de smartphone ‘always on(line)’. Deze …


La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano Aug 2010

La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano

Germán M. Teruel Lozano

Master's thesis about freedom of speech in Internet and the constitutional guarantees in the control of websides content.


Repairing Online Reputation: A New Multi-Modal Regulatory Approach, Jacqueline Lipton Jul 2010

Repairing Online Reputation: A New Multi-Modal Regulatory Approach, Jacqueline Lipton

Jacqueline D Lipton

In today’s interconnected digital society, high profile examples of online abuses abound. Cyberbullies launch attacks on the less powerful, often significantly damaging victims’ reputations. Outside of reputational damage, online harassment, bullying and stalking has led to severe emotional distress, loss of employment, physical assault and even death. Recent scholarship has identified this phenomenon but has done little more than note that current laws are ineffective in combating abusive online behaviors. This article moves the debate forward both by suggesting specific reforms to criminal and tort laws and, more importantly, by situating those reforms within a new multi-modal framework for combating …


Cyberspace Is Outside The Schoolhouse Gate: Offensive Online Student Speech Receives First Amendment Protection, Joseph Tomain Mar 2010

Cyberspace Is Outside The Schoolhouse Gate: Offensive Online Student Speech Receives First Amendment Protection, Joseph Tomain

Joseph A Tomain

Doctrinal and normative analysis show that schools do not possess jurisdiction over offensive online student speech, at least when it does not cause a substantial disruption of the school environment. This article is a timely analysis on the limits of school jurisdiction over offensive online student speech.

On February 4, 2010, two different Third Circuit panels issued opinions reaching opposite conclusions on whether schools may punish students based on online speech created by students when they are off-campus; one of these cases may be heard en banc. Another case addressing this same issue is currently pending before the Second Circuit. …


Poisoned Flowers In Cyberspace: Resolving Focal Point Abuses And Tradmark-Related Conflicts In Space By Rewriting Code, Thomas C. Folsom Jan 2010

Poisoned Flowers In Cyberspace: Resolving Focal Point Abuses And Tradmark-Related Conflicts In Space By Rewriting Code, Thomas C. Folsom

Thomas C. Folsom

In cyberspace, dynamically coded focal points don’t just provide salient references. They can actually deliver a person’s augmented presence to a location. Placing reliable focal points as navigational markers in coded space is useful and indexing them is even better because these activities support the public good by providing a virtual map to cyberspace, thereby promoting access, navigation, information-activity and trust among augmented presences. In an objective cyberspace which relies upon a virtual map featuring dynamically coded focal points functioning as markers, addresses, magnets, roadblocks or detours, I propose that conduct which (a) alters the virtual map, (b) plants deceptive …


Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable Aug 2009

Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable

Kelly Gable

No abstract provided.


Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable Aug 2009

Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable

Kelly Gable

No abstract provided.


Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington May 2009

Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington

Matthew Hoisington

Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via cyberspace strains traditional definitions of the use of force. In order to clearly delineate the rights of the parties involved, including the right to self-defense, the international community must come to some consensus on the meaning of cyberwarfare within the existing jus ad bellum paradigm. After examining the shortcomings inherent in classifying cyberattacks according to classical notions of kinetic warfare, …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Apr 2009

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds

William L. Reynolds

This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.


Website Proprietorship And Cyber Harassment, Nancy Kim Jan 2009

Website Proprietorship And Cyber Harassment, Nancy Kim

Nancy Kim

While harassment and bullying have always existed, when such behavior is conducted online, the consequences can be uniquely devastating. The anonymity of harassers, the ease of widespread digital dissemination, and the inability to contain and/or eliminate online information aggravate the nature of harassment on the Internet. Furthermore, Section 230 of the Communications Decency Act provides website sponsors with immunity for content posted by others and no incentive to remove offending content. Given the unique nature of cyber harassment, ex post punitive measures are inadequate to redress grievances. In this Article, I propose the imposition of proprietorship liability upon website sponsors …


From Nuclear War To Net War: Analogizing Cyber Attacks In International Law, Scott James Shackelford Jul 2008

From Nuclear War To Net War: Analogizing Cyber Attacks In International Law, Scott James Shackelford

Scott Shackelford

On April 27, 2007, Estonia was attacked by a computer network causing widespread damage. It is currently unclear what legal rights a state has as a victim of a cyber attack. Even if Estonia could conclusively prove that it was Russia, for example, behind the March 2007 attack, could it respond with force or its own cyber attack? There is a paucity of literature dealing with these questions, as well as the ethical, humanitarian, and human rights implications of information warfare (“IW”) on national and international security. Treatments of IW outside the orthodox international humanitarian law (“IHL”) framework are nearly …


Space Pirates, Hitchhikers, Guides And The Public Interest: Transformational Trademark Law In Cyberspace, Thomas C. Folsom Apr 2008

Space Pirates, Hitchhikers, Guides And The Public Interest: Transformational Trademark Law In Cyberspace, Thomas C. Folsom

Thomas C. Folsom

Modern trademark law has come of age. Like copyright and patent, it not only has a metaphysic of its own, but it also has the capacity to take goods and services out of the commons. The tendency of modern trademark law to dimi-nish, waste or spoil the commons is nowhere more apparent than in cyber-space. My prior analytic, descriptive and doctrinal articles asserted the leading cases either overprotect or under–protect marks in space, and both extremes are wrong. The cases reach the wrong results at the critical margin because they neither define cyberspace nor distinguish the mark–type conflicts typical-ly occurring …


Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline Lipton Feb 2008

Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline Lipton

Jacqueline D Lipton

When the Oscar™-winning actress Julia Roberts fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual’s persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …


Pornography, Coercion, And Copyright Law 2.0, Ann Bartow Dec 2007

Pornography, Coercion, And Copyright Law 2.0, Ann Bartow

Ann Bartow

The lack of regulation of the production of pornography in the United States leaves pornography performers exposed to substantial risks. Producers of pornography typically respond to attempts to regulate pornography as infringements upon free speech. At the same time, large corporations involved in the production and sale of pornography rely on copyright law's complex regulatory framework to protect their pornographic content from copying and unauthorized distribution. Web 2.0 also facilitates the production and distribution of pornography by individuals. These user-generators produce their own pornography, often looking to monetize their productions themselves via advertising revenues and subscription models. Much like their …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds Dec 2007

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds

Juliet M. Moringiello

In this survey, we discuss electronic contracting cases decided between July 1, 2007 and June 30, 2008. In addition to cases adding to the literature on the enforceability of online contracts, this survey includes cases discussing modification of online contracts, incorporation by reference, and unconscionability. We conclude that our common law is developing nicely to address the issues presented by internet contracting.


Review Of Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Dec 2006

Review Of Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Ann Bartow

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds Dec 2006

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds

Juliet M. Moringiello

In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Ii Dec 2005

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Ii

Juliet M. Moringiello

This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.


Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow Feb 2005

Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow

Ann Bartow

This Essay suggests possible explanations for why there is not very much legal scholarship devoted to gender issues on the Internet; and it asserts that there is a powerful need for Internet legal theorists and activists to pay substantially more attention to the gender-based differences in communicative style and substance that have been imported from real space to cyberspace. Information portals, such as libraries and web logs, are "gendered" in ways that may not be facially apparent. Women are creating and experiencing social solidarity online in ways that male scholars and commentators do not seem to either recognize or deem …


Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello Dec 2004

Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello

Juliet M. Moringiello

This article reviews recent developments in the United States and the European Union involving Internet transactions. It describes those developments and analyzes both from a normative and practical perspective.