Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford Jan 2016

On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford

Vanderbilt Journal of Entertainment & Technology Law

Although cyberspace and the atmosphere are distinct arenas, they share similar problems of overuse, difficulties of enforcement, and challenges of collective inaction and free riders. With weather patterns changing, global sea levels rising, and temperatures set to exceed 1.5 degrees Celsius by 2100, climate change is a problem that affects the entire world. Yet its benefits are dispersed, and its harms are often concentrated. Similarly, much of the cost of cyber attacks is focused in a few nations even as others are becoming havens for cybercriminals. Yet it is also true that actions taken by a multiplicity of actors on …


Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton Jan 2011

Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton

Vanderbilt Journal of Entertainment & Technology Law

Direct copyright infringement attracts strict liability. However, as a theoretical matter, it is not necessarily clear why. Legislatures and courts have typically imposed strict liability where: (a) a defendant has notice of a plaintiff's rights, particularly where those rights involve a property interest; (b) a mens rea requirement on the part of the defendant would create an untenable burden on the plaintiff; (c) it is easier for the defendant to avoid harming the plaintiff than it is for the plaintiff to avoid the harm; or, (d) it is more administratively or economically efficient for the defendant to bear the risk …


Hume's Penguin, Or, Yochai Benkler And The Nature Of Peer Production, Steven A. Hetcher Jan 2009

Hume's Penguin, Or, Yochai Benkler And The Nature Of Peer Production, Steven A. Hetcher

Vanderbilt Journal of Entertainment & Technology Law

This Article examines 'peer production," a term coined and a concept explicated by Yochai Benkler. My own interest in peer production stems from its importance as a new form of user-generated content. User-generated content is particularly interesting if Benkler is right in his claim that the positive analysis of peer-produced content may have normative implications with respect to copyright law--in particular, the implication that copyright law may play a deleterious role in the formation and maintenance of this potentially significant new form of user-generated content. We are in need of a theory of collective action for the social world that …


Warring Ideologies For Regulating Military Blogs: A Cyberlaw Approach For Balancing Free Speech And Security In Cyberspace, Julia E. Mitchell Jan 2006

Warring Ideologies For Regulating Military Blogs: A Cyberlaw Approach For Balancing Free Speech And Security In Cyberspace, Julia E. Mitchell

Vanderbilt Journal of Entertainment & Technology Law

Part I of this note provides an overview of the use of media during war. It also reviews case law relating to the military's limited right to freedom of speech under the First Amendment. Part II analyzes the problems of regulating milblogs in terms of societal costs and the technological challenges of regulating behavior on the Internet. This note argues that the military's "unexceptionalist" approach toward regulation, wherein it applies the traditional principles embodied in the UCMJ to milblog regulation, undermines its goal of maintaining operational security and impedes the free flow of ideas. Finally, Part II introduces an "exceptionalist" …


Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post Jan 2000

Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post

Vanderbilt Journal of Entertainment & Technology Law

MAPS, the primary focus of this tale, is a California non-profit limited liability company. It coordinates a kind of group boycott by Internet service providers (ISPs) for the purpose of reducing the flow of what is commonly called "spam"- unsolicited bulk e-mail. It operates, roughly, as follows. The managers of MAPS create and maintain what they call the "Realtime Blackhole List" (RBL), which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows …


The Architecture Of Privacy: Remaking Privacy In Cyberspace, Lawrence Lessig Jan 1999

The Architecture Of Privacy: Remaking Privacy In Cyberspace, Lawrence Lessig

Vanderbilt Journal of Entertainment & Technology Law

This is an essay about privacy. My aim is to understand privacy through these two very different ideas. Privacy, in the sense that I mean here, can be described by these two different ideas. It stands in competition with these ideas. It is that part of life that is left after one subtracts, as it were, the monitored and the searchable. A life where less is monitored is a life where more is private; and life where less can (legally or technologically) be searched is also a life where more is private. By understanding the technologies of these two different …