Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 52

Full-Text Articles in Law

Leveraging Technology To Promote Access To Justice, Amy Emerson Oct 2023

Leveraging Technology To Promote Access To Justice, Amy Emerson

Faculty Publications

No abstract provided.


Of Systems Thinking And Straw Men, Kate Klonick Jan 2023

Of Systems Thinking And Straw Men, Kate Klonick

Faculty Publications

(Excerpt)

In Content Moderation as Systems Thinking, Professor Evelyn Douek, as the title suggests, endorses an approach to the people, rules, and processes governing online speech as one not of anecdote and doctrine but of systems thinking. She constructs this concept as a novel and superior understanding of the problems of online-speech governance as compared to those existent in what she calls the “standard [scholarly] picture of content moderation.” This standard picture of content moderation — which is roughly five years old — is “outdated and incomplete,” she argues. It is preoccupied with anecdotal, high-profile adjudications in which platforms …


Pandora’S Loot Box, Sheldon Evans Jan 2022

Pandora’S Loot Box, Sheldon Evans

Faculty Publications

The emerging trend of loot boxes in video game platforms continues to expand the shifting boundaries between the real and virtual world and presents unique insights into the impact each world should have on the other. Borrowing their design from the gambling industry, loot boxes operate as a hybrid between slot machines and trading cards. A consumer pays real-world money to buy a virtual box without knowing its contents. Upon opening the box, the consumer receives a virtual good that may be of great value, but more commonly is of little or no value.

This Article contributes a novel theory …


The Facebook Oversight Board: Creating An Independent Institution To Adjudicate Online Free Expression, Kate Klonick Jan 2020

The Facebook Oversight Board: Creating An Independent Institution To Adjudicate Online Free Expression, Kate Klonick

Faculty Publications

For a decade and a half, Facebook has dominated the landscape of digital social networks, becoming one of the most powerful arbiters of online speech. Twenty-four hours a day, seven days a week, over two billion users leverage the platform to post, share, discuss, react to, and access content from all over the globe. Through a system of semipublic rules called “Community Standards,” Facebook has created a body of “laws” and a system of governance that dictate what users may say on the platform. In recent years, as this intricately built system to dispatch the company’s immense private power over …


Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam Jan 2020

Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam

Faculty Publications

In the sustainability IoT, the cybersecurity risks to things, sensors, and monitoring systems are distinct from the conventional networking systems in many aspects. The interaction of sustainability IoT with the physical world phenomena (e.g., weather, climate, water, and oceans) is mostly not found in the modern information technology systems. Accordingly, actuation, the ability of these devices to make changes in real world based on sensing and monitoring, requires special consideration in terms of privacy and security. Moreover, the energy efficiency, safety, power, performance requirements of these device distinguish them from conventional computers systems. In this chapter, the cybersecurity approaches towards …


The Ironic Privacy Act, Margaret Hu Jan 2019

The Ironic Privacy Act, Margaret Hu

Faculty Publications

This Article contends that the Privacy Act of 1974, a law intended to engender trust in government records, can be implemented in a way that inverts its intent. Specifically, pursuant to the Privacy Act's reporting requirements, in September 2017, the U.S. Department of Homeland Security (DHS) notified the public that record systems would be modified to encompass the collection of social media data. The notification justified the collection of social media data as a part of national security screening and immigration vetting procedures. However, the collection will encompass social media data on both citizens and noncitizens, and was not explicitly …


#I U: Considering The Context Of Online Threats, Lyrissa Lidsky Dec 2018

#I U: Considering The Context Of Online Threats, Lyrissa Lidsky

Faculty Publications

The United States Supreme Court has failed to grapple with the unique interpretive difficulties presented by social media threats cases. Social media make hateful and threatening speech more common but also magnify the potential for a speaker's innocent words to be misunderstood People speak differently on different social media platforms, and architecturalf eatures ofplatforms, such as character limits, affect the meaning of speech. The same is true of other contextual clues unique to social media, such as gifs, hashtags, and emojis. Only by understanding social media contexts can legal decision-makers avoid overcriminalization of speech protected by the First Amendment. This …


Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake Oct 2018

Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake

Faculty Publications

Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …


There's An "App" For That: Developing Online Dispute Resolution To Empower Economic Development, Amy J. Schmitz Jan 2018

There's An "App" For That: Developing Online Dispute Resolution To Empower Economic Development, Amy J. Schmitz

Faculty Publications

Traditionally, litigation has been the norm for resolving disputes. It takes place in a public forum and face-to-face. In a global economy, however, such public and face-to-face dispute resolution is not feasible. This is especially true with cross-border purchases through e-commerce. E-commerce requires more efficient and less litigious remedy systems that allow consumers to obtain remedies on their purchases without the cost and travel associated with traditional face-to-face procedures. This has led to development of online dispute resolution (“ODR”) processes, especially with respect to business-to-consumer contracts. Accordingly, scholarship and policy papers have advanced ODR for the benefit of consumers. What …


A Blueprint For Online Dispute Resolution System Design, Amy J. Schmitz Jan 2018

A Blueprint For Online Dispute Resolution System Design, Amy J. Schmitz

Faculty Publications

A great deal of discussion focuses on how arbitration and similar private dispute resolution harms consumers, and how businesses seek ways to avoid helping consumers. It is often assumed that companies and consumers are on opposing “teams.” In reality, however, consumers and companies enjoy more commonalities than contradictions. Both benefit when deals go well and disputes are resolved quickly and cheaply. The problem is that face-to-face dispute resolution can be costly in terms of time and money. Furthermore, getting lawyers involved may inspire gamesmanship and adversarial antics aimed to protect one’s reputation for staying “strong” and refusing to settle or …


Reader Privacy In Digital Library Collaborations: Signs Of Commitment, Opportunities For Improvement, Anne Klinefelter Oct 2016

Reader Privacy In Digital Library Collaborations: Signs Of Commitment, Opportunities For Improvement, Anne Klinefelter

Faculty Publications

Libraries collaborate to digitize collections large and small in order to provide information with fewer geographical, temporal, or socio-economic barriers. These collaborations promise economy of scale and breadth of impact, both for access to content and for preservation of decaying print source material. Some suggest this increased access to information through the digital environment comes at the expense of reader privacy, a value that United States librarians have advanced for nearly eighty years. Multiplying risks to digital reader privacy are said to weaken librarians’ commitment to privacy of library use and to overwhelm libraries’ ability to ensure confidential access to …


Of Reasonable Readers And Unreasonable Speakers: Libel Law In A Networked World, Lyrissa Lidsky, Ronnell Anderson Jones Apr 2016

Of Reasonable Readers And Unreasonable Speakers: Libel Law In A Networked World, Lyrissa Lidsky, Ronnell Anderson Jones

Faculty Publications

Social-media libel cases require courts to map existing defamation doctrines onto social-media fact patterns in ways that create adequate breathing space for expression without lincensing character assassination. This Article explores these challenges by investigating developments involving two important constitutional doctrines - the so-called opinion privlege, which protects statements that are unverifiable or cannot be regarded as stating actual facts about a person, and the actual malice rule, which requires defamation plaintiff's who are public officials or public figures to prove that the defendant made a defamatory statement with knowledge of or reckless disregard for, its falsity. Given the critical role …


Re-Shaming The Debate: Social Norms, Shame, And Regulation In An Internet Age, Kate Klonick Jan 2016

Re-Shaming The Debate: Social Norms, Shame, And Regulation In An Internet Age, Kate Klonick

Faculty Publications

Advances in technological communication have dramatically changed the ways in which social norm enforcement is used to constrain behavior. Nowhere is this more powerfully demonstrated than through current events around online shaming and cyber harassment. Low cost, anonymous, instant, and ubiquitous access to the Internet has removed most—if not all—of the natural checks on shaming. The result is norm enforcement that is indeterminate, uncalibrated, and often tips into behavior punishable in its own right—thus generating a debate over whether the state should intervene to curb online shaming and cyber harassment.

A few years before this change in technology, a group …


Big Data Blacklisting, Margaret Hu Sep 2015

Big Data Blacklisting, Margaret Hu

Faculty Publications

“Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation …


The History And Future Of E-Commerce Patents, Dennis D. Crouch, Mitchell L. Terry May 2015

The History And Future Of E-Commerce Patents, Dennis D. Crouch, Mitchell L. Terry

Faculty Publications

The past two decades have seen a great rise in the patenting of e-commerce inventions. Now, those same patents are taking an equally great fall. In a series of four recent cases, the U.S. Supreme Court has shifted the doctrine of patent eligibility and, in the process, raised the bar for e-commerce and software patents - making it more difficult to obtain and enforce those types of patents.


A New Taxonomy For Online Harms, Kate Klonick Jan 2015

A New Taxonomy For Online Harms, Kate Klonick

Faculty Publications

(Excerpt)

Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …


Privacy And The New Press, Lyrissa Lidsky Jan 2015

Privacy And The New Press, Lyrissa Lidsky

Faculty Publications

In The First Amendment Bubble, Professor Amy Gajda comprehensively examines privacy threats posed by digital media and “quasi-journalists” and demonstrates how their intrusive practices threaten existing press freedoms.


Using Internet Artifacts To Profile A Child Pornography Suspect, Kathryn C. Seigfried-Spellar, Marcus K. Rogers Jan 2014

Using Internet Artifacts To Profile A Child Pornography Suspect, Kathryn C. Seigfried-Spellar, Marcus K. Rogers

Faculty Publications

Digital evidence plays a crucial role in child pornography investigations. However, in the following case study, the authors argue that the behavioral analysis or “profiling” of digital evidence can also play a vital role in child pornography investigations. The following case study assessed the Internet Browsing History (Internet Explorer Bookmarks, Mozilla Bookmarks, and Mozilla History) from a suspected child pornography user’s computer. The suspect in this case claimed to be conducting an ad hoc law enforcement investigation. After the URLs were classified (Neutral; Adult Porn; Child Porn; Adult Dating sites; Pictures from Social Networking Profiles; Chat Sessions; Bestiality; Data Cleaning; …


Biometric Id Cybersurveillance, Margaret Hu Oct 2013

Biometric Id Cybersurveillance, Margaret Hu

Faculty Publications

The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …


Government Sponsored Social Media And Public Forum Doctrine Under The First Amendment: Perils And Pitfalls, Lyrissa Lidsky Jul 2011

Government Sponsored Social Media And Public Forum Doctrine Under The First Amendment: Perils And Pitfalls, Lyrissa Lidsky

Faculty Publications

Between the extremes of no interactivity and complete interactivity, it is difficult to predict whether courts will label a government sponsored social media site a public forum or not. But it is precisely "in between" where government actors are likely to wish to engage citizens and where citizens are most likely to benefit from government social media initiatives. The goal of this article, therefore, is to provide guidance to lawyers trying to navigate the morass that is the U.S. Supreme Court's public forum jurisprudence in order to advise government actors wishing to establish social media forums.


Incendiary Speech And Social Media, Lyrissa Lidsky Jan 2011

Incendiary Speech And Social Media, Lyrissa Lidsky

Faculty Publications

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


The Future Of Music: Reconfiguring Public Performance Rights, Gary Myers, George Howard Apr 2010

The Future Of Music: Reconfiguring Public Performance Rights, Gary Myers, George Howard

Faculty Publications

This article focuses on two concrete measures to improve the music industry prognosis. Public performance rights have long been an important piece of the economic pie that helps support the music business. This article suggests that the scope of public performance rights should be fundamentally reassessed and expanded. This expansion involves two specific and complementary reconfigurations.


Discriminatory Housing Advertisements On-Line: Lessons From Craigslist, Rigel C. Oliveri Jan 2010

Discriminatory Housing Advertisements On-Line: Lessons From Craigslist, Rigel C. Oliveri

Faculty Publications

The Fair Housing Act makes it illegal to publish discriminatory housing advertisements. This has long been applied to newspapers, which have effectively screened all discriminatory housing ads from sight. However, in 1996 Congress created a loophole when it immunized website operators from liability for the content posted to their sites by third parties. Without publisher liability, websites have no incentive to screen out discriminatory housing ads. The result is that such ads are proliferating in cyberspace.While this situation is problematic from a fair housing standpoint, it presents a valuable opportunity. For the first time in a generation discriminatory housing advertisements …


Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman Jan 2010

Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman

Faculty Publications

This Essay explains why Wikipedia will not be able to maintain a credible website while simultaneously letting anyone freely edit it. To date, Wikipedia editors have successfully defended against malicious attacks from spammers and vandals, but as editors turn over, Wikipedia will need to recruit replacements. However, Wikipedia will have difficulty with this recruiting task due to its limited incentives for participation. Faced with a potential labor squeeze, Wikipedia will choose to restrict users’ ability to contribute to the site as a way of preserving site credibility. Wikipedia’s specific configuration choices make it an interesting test case to evaluate the …


Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky Jan 2009

Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky

Faculty Publications

This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …


Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman Apr 2007

Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman

Faculty Publications

This article further demonstrates that state common law exceptions to the employment-at-will doctrine are not providing significant redress to employees fired or otherwise disciplined for blogging.


Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali Jan 2007

Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali

Faculty Publications

Three employees of Mphasis, a business process outsourcing ("BPO") firm, which runs call center services for Citibank's U.S. customers in Bangalore, India, were arrested for allegedly siphoning $350,000 from the accounts of Citibank's U.S. customers. These employees used their positions, which provided them access to Citibank customers, to induce four customers into giving out the personal identification numbers to their accounts, allowing the employees to illegally siphon funds out of those accounts. Outsourcing is a growing trend among budgetconscious U.S. companies and institutions. Information being outsourced includes personal data and confidential proprietary information. For example, Unisys Corporation, a company that …


Creative Sanctions For Online Investment Fraud, Jayne W. Barnard Jan 2007

Creative Sanctions For Online Investment Fraud, Jayne W. Barnard

Faculty Publications

No abstract provided.


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …


Co-Blogging Law, Eric Goldman Jan 2006

Co-Blogging Law, Eric Goldman

Faculty Publications

Abstract: Bloggers often work collaboratively with other bloggers, a phenomenon I call "co-blogging. " The decision to co-blog may seem casual, but it can have significant and unexpected legal consequences forthe co-bloggers. This essay looks at some of these consequences under partnership law, employment law, and copyright law and explains how each of these legal doctrines can lead to counterintuitive results. The essay then discusses some recommendations to mitigate the harshness of these results.