Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Law
On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford
On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford
Vanderbilt Journal of Entertainment & Technology Law
Although cyberspace and the atmosphere are distinct arenas, they share similar problems of overuse, difficulties of enforcement, and challenges of collective inaction and free riders. With weather patterns changing, global sea levels rising, and temperatures set to exceed 1.5 degrees Celsius by 2100, climate change is a problem that affects the entire world. Yet its benefits are dispersed, and its harms are often concentrated. Similarly, much of the cost of cyber attacks is focused in a few nations even as others are becoming havens for cybercriminals. Yet it is also true that actions taken by a multiplicity of actors on …
Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton
Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton
Vanderbilt Journal of Entertainment & Technology Law
Direct copyright infringement attracts strict liability. However, as a theoretical matter, it is not necessarily clear why. Legislatures and courts have typically imposed strict liability where: (a) a defendant has notice of a plaintiff's rights, particularly where those rights involve a property interest; (b) a mens rea requirement on the part of the defendant would create an untenable burden on the plaintiff; (c) it is easier for the defendant to avoid harming the plaintiff than it is for the plaintiff to avoid the harm; or, (d) it is more administratively or economically efficient for the defendant to bear the risk …
Hume's Penguin, Or, Yochai Benkler And The Nature Of Peer Production, Steven A. Hetcher
Hume's Penguin, Or, Yochai Benkler And The Nature Of Peer Production, Steven A. Hetcher
Vanderbilt Journal of Entertainment & Technology Law
This Article examines 'peer production," a term coined and a concept explicated by Yochai Benkler. My own interest in peer production stems from its importance as a new form of user-generated content. User-generated content is particularly interesting if Benkler is right in his claim that the positive analysis of peer-produced content may have normative implications with respect to copyright law--in particular, the implication that copyright law may play a deleterious role in the formation and maintenance of this potentially significant new form of user-generated content. We are in need of a theory of collective action for the social world that …
Warring Ideologies For Regulating Military Blogs: A Cyberlaw Approach For Balancing Free Speech And Security In Cyberspace, Julia E. Mitchell
Warring Ideologies For Regulating Military Blogs: A Cyberlaw Approach For Balancing Free Speech And Security In Cyberspace, Julia E. Mitchell
Vanderbilt Journal of Entertainment & Technology Law
Part I of this note provides an overview of the use of media during war. It also reviews case law relating to the military's limited right to freedom of speech under the First Amendment. Part II analyzes the problems of regulating milblogs in terms of societal costs and the technological challenges of regulating behavior on the Internet. This note argues that the military's "unexceptionalist" approach toward regulation, wherein it applies the traditional principles embodied in the UCMJ to milblog regulation, undermines its goal of maintaining operational security and impedes the free flow of ideas. Finally, Part II introduces an "exceptionalist" …
Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post
Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post
Vanderbilt Journal of Entertainment & Technology Law
MAPS, the primary focus of this tale, is a California non-profit limited liability company. It coordinates a kind of group boycott by Internet service providers (ISPs) for the purpose of reducing the flow of what is commonly called "spam"- unsolicited bulk e-mail. It operates, roughly, as follows. The managers of MAPS create and maintain what they call the "Realtime Blackhole List" (RBL), which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows …
The Architecture Of Privacy: Remaking Privacy In Cyberspace, Lawrence Lessig
The Architecture Of Privacy: Remaking Privacy In Cyberspace, Lawrence Lessig
Vanderbilt Journal of Entertainment & Technology Law
This is an essay about privacy. My aim is to understand privacy through these two very different ideas. Privacy, in the sense that I mean here, can be described by these two different ideas. It stands in competition with these ideas. It is that part of life that is left after one subtracts, as it were, the monitored and the searchable. A life where less is monitored is a life where more is private; and life where less can (legally or technologically) be searched is also a life where more is private. By understanding the technologies of these two different …