Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Computer Law

Discipline
Publication Year
Publication
File Type

Articles 31 - 60 of 84

Full-Text Articles in Law

Social Networking And Student Safety: Balancing Student First Amendment Rights And Disciplining Threatening Speech, John Hughes Sep 2011

Social Networking And Student Safety: Balancing Student First Amendment Rights And Disciplining Threatening Speech, John Hughes

John L Hughes III

As the use of social media increases and becomes an integral part of nearly every student’s life, problems arise when student expression on these sites turns into threats against the school or other students, implicating both student safety and the speaker’s right to free speech. Facing a lack of Supreme Court precedent, school officials need guidance on whether and how to take action when a student makes threats on a social network—how to prevent any danger at school while respecting the student’s right to free speech. This Article provides that guidance. It develops an approach that combines the Supreme Court’s …


Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, Taiwo Oriola Aug 2011

Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, Taiwo Oriola

Taiwo Oriola

Software vulnerabilities are inherent errors or mistakes in software programming and designs, and arguably the weakest link in digital information architecture with high propensity for rendering information systems infrastructure susceptible to compromise and hacking. Given the increasing reliance of the global economy on digital platforms with concomitant imperatives for securing sensitive intelligence, business and personal data, the need for continual corrective patch of perennially recurring critical software bugs is at once urgent and sacrosanct. This has precipitated research and a thriving market in software vulnerabilities, an integral element of the burgeoning multi-million dollars information security industry that epitomizes the externalization …


Mixed Reality: How The Laws Of Virtual Worlds Govern Everyday Life, Joshua A.T. Fairfield Aug 2011

Mixed Reality: How The Laws Of Virtual Worlds Govern Everyday Life, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Just as the Internet linked human knowledge through the simple mechanism of the hyperlink, now reality itself is being hyperlinked, indexed, and augmented with virtual experiences. Imagine being able to check the background of your next date through your cell phone, or experience a hidden world of trolls and goblins while you are out strolling in the park. This is the exploding technology of Mixed Reality, which augments real places, people and things with rich virtual experiences. As virtual and real worlds converge, the law that governs virtual experiences will increasingly come to govern everyday life. The problem is that …


Face-Recognition Surveillance: A Moment Of Truth For Fourth Amendment Rights In Public Places, Douglas Fretty May 2011

Face-Recognition Surveillance: A Moment Of Truth For Fourth Amendment Rights In Public Places, Douglas Fretty

Douglas A Fretty

Americans are increasingly monitored with face-recognition technology (FRT), a surveillance tool that allows the state to identify a pedestrian based on a pre-existing database of facial photographs. This Article argues that FRT embodies the fundamental Fourth Amendment dilemmas raised by contemporary digital surveillance and will serve as harbinger for the Amendment’s future. FRT cases will test whether people retain a reasonable expectation of privacy in their identities when they move in public, and whether the aggregation of information about a person’s movements amounts to an unreasonable search. Further, the suspicionless identification of pedestrians will test whether a seizure can occur …


Public Forum 2.0, Lyrissa Lidsky Mar 2011

Public Forum 2.0, Lyrissa Lidsky

Lyrissa Barnett Lidsky

Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media, or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …


Gene Probes As Unpatentable Printed Matter, Andrew Chin Feb 2011

Gene Probes As Unpatentable Printed Matter, Andrew Chin

Andrew Chin

In this Article, I argue that the most problematic kind of gene patents — those claiming short DNA molecules used to probe for longer gene sequences — should be held invalid as directed to unpatentable printed matter. This argument, which emerges from recent developments in biotechnology and information technology, is grounded in the printed matter doctrine’s structural role of obviating patentability inquiries directed to inapposite information-management considerations. Where the inventive contribution in a claimed gene probe subsists solely in stored sequence information, these inapposite considerations lead the novelty and nonobviousness analyses to anomalous results that the printed matter doctrine was …


Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague Dec 2010

Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States, Lothar Determann, Robert Sprague

Robert Sprague

This Article examines the contrasting policy and legal frameworks relating to data privacy in the United States and the European Union, with a particular focus on workplace privacy and intrusive surveillance technologies and practices. It examines the U.S. perspective on modern work-related employer monitoring practices, the laws giving rise to possible employee privacy rights, and specific types of employer monitoring that may lead to actionable invasions of employee privacy rights. This article then addresses the issue of employee privacy from the EU perspective, beginning with an overview of the formation of authority to protect individual privacy rights, followed by an …


Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague Dec 2010

Invasion Of The Social Networks: Blurring The Line Between Personal Life And The Employment Relationship, Robert Sprague

Robert Sprague

Over one-half billion people worldwide have registered accounts with Facebook, the most popular online social network. This article addresses some of the more significant employment-related legal issues arising from the growing popularity of online social networks. First, the need for employers to investigate the background of prospective employees is examined from the context of employers using online social networks to conduct those investigations. In particular, this article analyzes the degree to which job applicants have privacy rights in the information they post online. This article then examines the interrelationship between online social networks and employees, focusing on limitations faced by …


Is The Attorney-Client Privilege A Privilege Of The Rich? Federal Hmis Database Reporting And Homeless Client Confidentiality, Jennifer Hammitt Dec 2010

Is The Attorney-Client Privilege A Privilege Of The Rich? Federal Hmis Database Reporting And Homeless Client Confidentiality, Jennifer Hammitt

Jennifer Hammitt

No abstract provided.


The Implications Of A Jeopardy! Computer Named Watson: Beating Corporate Boards Of Directors At Fiduciary Duties?, Roger M. Groves Dec 2010

The Implications Of A Jeopardy! Computer Named Watson: Beating Corporate Boards Of Directors At Fiduciary Duties?, Roger M. Groves

Roger M. Groves

Millions of documents, including five million messages, termed electronically stored information (“ESI”) from the Enron litigation have provided an opportunity for software developers to create software that analyzes ESI for behaviors of computer users in more provocative and innovative ways than previously encountered. The law is struggling to clarify e-discovery rules, but the ambiguities provide an opportunity for counsel to manipulate or take advantage of forensic investigations. In this article, the author examines the potential exploitation of e-discovery forensic tools by shareholders of a corporation that suspect a breach of fiduciary duties by members of the board of directors.


The Virtual Construction Of Legality: 'Griefing' & Normative Order In Second Life, Eric M. Fink Dec 2010

The Virtual Construction Of Legality: 'Griefing' & Normative Order In Second Life, Eric M. Fink

Eric M Fink

This article examines the construction of legality in a virtual world, seeking to under-stand how informal social order emerges as residents construct meaning around interpersonal conflicts and interact on the basis of such meaning. ‘Griefing’, a form of disruptive behavior common to virtual worlds, provides a lens through which to investigate emergent social norms and boundaries in the virtual world of Second Life. Identifying and distinguishing rhetorical frames in Second Life residents’ understandings of and responses to griefing, the study aims to elucidate the social meaning of griefing and its place in the construction and maintenance of social order.


Cut In Tiny Pieces: Ensuring That Fragmented Ownership Does Not Chill Creativity, Henry H. Perritt Jr. Dec 2010

Cut In Tiny Pieces: Ensuring That Fragmented Ownership Does Not Chill Creativity, Henry H. Perritt Jr.

Henry H. Perritt, Jr.

The market for video entertainment is growing and becoming more diverse as technology reduces barriers to entry for small, independent moviemakers and distributors and increases consumers’ ability to access the media of their choice. The growing complexity of the market, however, increases transaction costs for new entrants who must obtain licenses to copyrighted music, characters, storylines, or scenes that they incorporate into their movies. The entertainment bonanza offered by new technologies may not be realized in practice because of market failure. The purposes of the Copyright and Patents Clause are frustrated because creators of new works wishing to use new …


Is The Attorney-Client Privilege A Privilege Of The Rich? Federal Hmis Database Reporting And Homeless Client Confidentiality, Jennifer Hammitt Sep 2010

Is The Attorney-Client Privilege A Privilege Of The Rich? Federal Hmis Database Reporting And Homeless Client Confidentiality, Jennifer Hammitt

Jennifer Hammitt

The Homeless Management Information System (HMIS) is a new database reporting system mandated by the Department of Housing and Urban Development to track the usage of HUD services by homeless people. The HMIS requires collecting identifiable personal information about the individuals who use the services and entering that information into a database that enables information sharing and referral services. This comment arose out of an investigation into the HMIS database and confidentiality issues that I did while working at Legal Services of Greater Miami, Inc., as part of the Homeless Legal Assistance Project in the summer of 2009. As this …


Avatar Experimentation: Human Subjects Research In Virtual Worlds, Joshua A.T. Fairfield Aug 2010

Avatar Experimentation: Human Subjects Research In Virtual Worlds, Joshua A.T. Fairfield

Joshua A.T. Fairfield

Researchers love virtual worlds. They are drawn to virtual worlds because of the opportunity to study real populations and real behavior in shared simulated environments. The growing number of virtual worlds and population growth within such worlds has led to a sizeable increase in the number of human subjects experiments taking place in such worlds. Virtual world users care deeply about their avatars, their virtual property, their privacy, their relationships, their community, and their accounts. People within virtual worlds act much as they would in the physical world, because the experience of the virtual world is "real" to them. The …


Cyber Crime In Present World, Amit Gupta Dr. Aug 2010

Cyber Crime In Present World, Amit Gupta Dr.

AMIT GUPTA Dr.

A generalized definition of cyber crime may be “unlawful acts wherein the computer is either a tool or target or both” Cyber crime is the latest and perhaps the most complicated problem in the cyber world. “Cyber crime may be said to be those species, of which, genus is the conventional crime, and where either the computer is an object or subject of the conduct constituting crime”. “Any criminal activity that uses a computer either as an instrumentality, target or a means for perpetuating further crimes comes within the ambit of cyber crime”


A Legal Response Is Necessary For Self Produced Child Pornography: A Legislator's Checklist For Drafting The Bill, Susan Duncan Mar 2010

A Legal Response Is Necessary For Self Produced Child Pornography: A Legislator's Checklist For Drafting The Bill, Susan Duncan

Susan Duncan

This Article explores self produced child pornography, known in the media as “sexting,” and offers a balanced, multi-faceted approach including both a legal response and education. Currently, states are modifying their laws because applying existing child pornography statutes to self produced child pornography results in a punishment which does not fit the crime. The author analyzes and critiques these proposed statutes finding none adequately address the multiple facets of the self produced child pornography problem. The Article concludes by offering a checklist of important provisions legislators should consider and proposed language legislators can incorporate into their bills. Policymakers and scholars …


Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton Feb 2010

Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton

Jacqueline D Lipton

In January of 2010 a United States District Court granted an injunction against a Twilight fan magazine for unauthorized use of copyrighted publicity stills . No surprise there. Intellectual property laws deal effectively – some would argue too effectively – with such cases. Nevertheless, recent Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright …


Regulating Online Buzz Marketing: Untangling A Web Of Deceit, Robert Sprague, Mary Ellen Wells Dec 2009

Regulating Online Buzz Marketing: Untangling A Web Of Deceit, Robert Sprague, Mary Ellen Wells

Robert Sprague

During the past fifteen years, the Internet has swelled into its own virtual world of commentary, opinion, criticism, news, music, videos, gaming, role playing, shopping, banking, finance, and digital commerce. Coupled with the growth of blogs and social networking sites, millions of Americans appear willing to share online their own thoughts and experiences regarding products, services and companies. In response to the public’s interest, companies have begun to rely more heavily in recent years on word of mouth marketing, often referred to as “buzz marketing,” a technique that attempts to generate conversations among and with current and potential customers. Marketers …


Law School & The Web Of Group Affiliation: Socializing, Socialization, & Social Network Site Use Among Law Students, Eric M. Fink Dec 2009

Law School & The Web Of Group Affiliation: Socializing, Socialization, & Social Network Site Use Among Law Students, Eric M. Fink

Eric M Fink

Online social network sites (“SNS”) have emerged as a significant socio-technical phenomenon in the past several years. Scholars from various disciplines have examined these sites to develop a better understanding of their social significance and implications from a variety of perspectives. Within the burgeoning field of SNS studies, one strand of work focuses on the place of SNSs in students’ educational experiences and the potential pedagogical applications of SNSs. However, the SNS phenomenon generally, and its educational/pedagogical significance in particular, have received scant attention from legal scholars. This article examines the place of SNSs within the contemporary law school experience, …


Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill Nov 2009

Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill

Michael Katz

The Federal Communications Commission, taking note of AT&T's complaint, has written to Google with questions about its call blocking. But the implications for our privacy of software-managed call services like Google Voice are a much greater threat to consumers, and that's where the FCC should direct its energy - immediately.


P2p 'System Caching' – The Copyright Dilemma, Assaf Jacob, Zoe Argento Aug 2009

P2p 'System Caching' – The Copyright Dilemma, Assaf Jacob, Zoe Argento

Assaf Jacob

This paper explores the legal ramifications of the prevalent Internet Service Provider practice of providing caching services to P2P network users. First, the paper describes the P2P industry, its benefits and drawbacks. Then the paper discusses several caching techniques that can be implemented, and indeed are implemented, by ISPs around the globe. These practices allow ISPs to provide clients with better services but, by the same token, expose them to copyright infringement suits by third parties. The article will discuss how copyright law should consider the costs and benefits to the public of P2P caching practices, especially in the application …


On Abstraction And Equivalence In Software Patent Doctrine: A Reply To Bessen, Meurer And Klemens, Andrew Chin Mar 2009

On Abstraction And Equivalence In Software Patent Doctrine: A Reply To Bessen, Meurer And Klemens, Andrew Chin

Andrew Chin

Recent books by Professors James Bessen and Michael Meurer and by economist Ben Klemens have argued that software warrants technology-specific treatment in patent doctrine. This article argues that the authors' categorical claims about software are unsupported by computer science, and therefore cannot support their sweeping proposals regarding software patents as a matter of law. Such proposals therefore remain subject to empirical examination and critique as policy choices, and are unlikely to be achieved through judicially developed doctrines.


The New Regulation: From Command To Coordination In The Modern Administrative State, Robert B. Ahdieh Mar 2009

The New Regulation: From Command To Coordination In The Modern Administrative State, Robert B. Ahdieh

Robert B. Ahdieh

Since its earliest days, the administrative state has been rationalized by a particular vision of the world. In the latter, public goods and free-rider problems, collective action and information failures, tragedies of the commons, and negative externalities constitute the “state of nature.” Regulation is the state’s response: command-and-control measures designed to alter the dominant incentives of individuals and institutions to defect from socially optimal equilibria. In environmental law, consumer protection, workplace safety regulation, and other domains of the modern administrative state, this Prisoner’s Dilemma is the motivating tale. To a growing degree, however, the demands of the social and economic …


The New Regulation: From Command To Coordination In The Modern Administrative State, Robert B. Ahdieh Mar 2009

The New Regulation: From Command To Coordination In The Modern Administrative State, Robert B. Ahdieh

Robert B. Ahdieh

Since its earliest days, the administrative state has been rationalized by a particular vision of the world. In the latter, public goods and free-rider problems, collective action and information failures, tragedies of the commons, and negative externalities constitute the “state of nature.” Regulation is the state’s response: command-and-control measures designed to alter the dominant incentives of individuals and institutions to defect from socially optimal equilibria. In environmental law, consumer protection, workplace safety regulation, and other domains of the modern administrative state, this Prisoner’s Dilemma is the motivating tale. To a growing degree, however, the demands of the social and economic …


The New Regulation: From Command To Coordination In The Modern Administrative State, Robert B. Ahdieh Mar 2009

The New Regulation: From Command To Coordination In The Modern Administrative State, Robert B. Ahdieh

Robert B. Ahdieh

Since its earliest days, the administrative state has been rationalized by a particular vision of the world. In the latter, public goods and free-rider problems, collective action and information failures, tragedies of the commons, and negative externalities constitute the “state of nature.” Regulation is the state’s response: command-and-control measures designed to alter the dominant incentives of individuals and institutions to defect from socially optimal equilibria. In environmental law, consumer protection, workplace safety regulation, and other domains of the modern administrative state, this Prisoner’s Dilemma is the motivating tale. To a growing degree, however, the demands of the social and economic …


The New Regulation: From Command To Coordination In The Modern Administrative State, Robert B. Ahdieh Mar 2009

The New Regulation: From Command To Coordination In The Modern Administrative State, Robert B. Ahdieh

Robert B. Ahdieh

Since its earliest days, the administrative state has been rationalized by a particular vision of the world. In the latter, public goods and free-rider problems, collective action and information failures, tragedies of the commons, and negative externalities constitute the “state of nature.” Regulation is the state’s response: command-and-control measures designed to alter the dominant incentives of individuals and institutions to defect from socially optimal equilibria. In environmental law, consumer protection, workplace safety regulation, and other domains of the modern administrative state, this Prisoner’s Dilemma is the motivating tale. To a growing degree, however, the demands of the social and economic …


The New Regulation: From Command To Coordination In The Modern Administrative State, Robert B. Ahdieh Mar 2009

The New Regulation: From Command To Coordination In The Modern Administrative State, Robert B. Ahdieh

Robert B. Ahdieh

Since its earliest days, the administrative state has been rationalized by a particular vision of the world. In the latter, public goods and free-rider problems, collective action and information failures, tragedies of the commons, and negative externalities constitute the “state of nature.” Regulation is the state’s response: command-and-control measures designed to alter the dominant incentives of individuals and institutions to defect from socially optimal equilibria. In environmental law, consumer protection, workplace safety regulation, and other domains of the modern administrative state, this Prisoner’s Dilemma is the motivating tale. To a growing degree, however, the demands of the social and economic …


The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi Mar 2009

The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi

Mark F. Grady

One of the most controversial theoretical issues of our time is the governance of cybersecurity. Computer security experts, national security experts, and policy analysts have all struggled to bring meaningful analysis to cybersecurity; however, the discipline of law & economics has yet to be fully applied to the issue. This introduction presents work by leading national scholars who examine this complex national security challenge from a law and economics perspective. The focus spans from a discussion of pure market solutions to public-private issue analysis, providing a valuable basis for policy considerations concerning the appropriate governmental role on the issue of …


¿Por Qué Blawgueamos? Breve Análisis Económico De Los Blogs Jurídicos (Blawgs) Y De La Blogósfera, Maximiliano Marzetti Dec 2008

¿Por Qué Blawgueamos? Breve Análisis Económico De Los Blogs Jurídicos (Blawgs) Y De La Blogósfera, Maximiliano Marzetti

Maximiliano Marzetti

BREVE ANÁLISIS ECONÓMICO DE LOS BLOGS JURÍDICOS (BLAWGS) Y DE LA BLOGÓSFERA.


Facebook 2 Blackberry And Database Trading Systems: Morphing Social Networking To Business Growth In A Global Recession, Roger M. Groves Dec 2008

Facebook 2 Blackberry And Database Trading Systems: Morphing Social Networking To Business Growth In A Global Recession, Roger M. Groves

Roger M. Groves

FACEBOOK 2 BLACKBERRY AND DATABASE TRADING SYSTEMS: MORPHING SOCIAL NETWORKING TO BUSINESS GROWTH IN A GLOBAL RECESSION Summary Facebook has now applications to the Blackberry Smartphone and IPhone. And Facebook has exploded internationally. If the Facebook social networking technology has applications to Blackberry, why not business? And as any business looks for growth, the market is not an existing heavily saturated United States, but a global market. Can the Facebook model of data sharing be customized to propel US technology firms into new international markets? This article claims the affirmative, through a multilateral clearing system, with credits and vouchers, as …