Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Law

The Virtual Law School, 2.0, A. Michael Froomkin Jan 2021

The Virtual Law School, 2.0, A. Michael Froomkin

Articles

Just over twenty years ago I gave a talk to the AALS called The Virtual Law School? Or, How the Internet Will De-skill the Professoriate, and Turn Your Law School Into a Conference Center. I came to the subject because I had been working on internet law, learning about virtual worlds and e-commerce, and about the power of one-to-many communications, and it struck me that a lot of what I had learned applied to education in general and to legal education in particular.
It didn't happen. Or at least, it has not happened yet. In this essay I want …


Exploring The Esports Approach Of America's Three Major Leagues, Peter A. Carfagna Apr 2020

Exploring The Esports Approach Of America's Three Major Leagues, Peter A. Carfagna

Articles

No abstract provided.


Media Literacy Beyond The National Security Frame, Lili Levi Jan 2020

Media Literacy Beyond The National Security Frame, Lili Levi

Articles

No abstract provided.


Antitrust In Digital Markets, John M. Newman Jan 2019

Antitrust In Digital Markets, John M. Newman

Articles

Antitrust law has largely failed to address the challenges posed by digital markets. At the turn of the millennium, the antitrust enterprise engaged in intense debate over whether antitrust doctrine, much of it developed during a bygone era of smokestack industries, could or should evolve to address digital markets. Eventually, a consensus emerged: although the basic doctrine is supple enough to apply to new technologies, courts and enforcers should adopt a defendant-friendly, hands-off approach.

But this pro-defendant position is deeply- and dangerously- flawed. Economic theory, empirical research, and extant judicial and regulatory authority all contradict the prevailing views regarding power, …


Beyond Norms: Using International Economic Tools To Deter Malicious State-Sponsored Cyber Activities, Kathleen Claussen Jan 2018

Beyond Norms: Using International Economic Tools To Deter Malicious State-Sponsored Cyber Activities, Kathleen Claussen

Articles

In thinking about strategy and doctrine for cyberspace, one cannot ignore either the cyber domain's interaction with other domains or the applicability of existing legal tools to address cyberspace issues. This Comment focuses on the latter and argues that any discussion regarding deterrence and a playbook for consequences for cyber incidents by state actors ought necessarily to include a careful examination of existing plays, particularly where those incidents have an economic component as many do. Focusing on multilateral institutions, regional and bilateral trade and investment agreements, and unilateral tariff and non-tariff trade and investment tools, this Comment maintains that current …


Justice Beyond Dispute, Mary Anne Franks Jan 2018

Justice Beyond Dispute, Mary Anne Franks

Articles

No abstract provided.


"Revenge Porn" Reform: A View From The Front Lines, Mary Anne Franks Jan 2017

"Revenge Porn" Reform: A View From The Front Lines, Mary Anne Franks

Articles

The legal and social landscape of "revenge porn" has changed dramatically in the last few years. Before 2013, only three states criminalized the unauthorized disclosure of sexually explicit images of adults and few people had ever heard the ternm "revenge porn." As of July 2017, thirty-eight states and Washington, D.C. had criminalized the conduct; federal criminal legislation on the issue had been introduced in Congress; Google, Facebook, and Twitter had banned nonconsensual pornography from their platforms; and the term "revenge porn" had been added to the Merriam- Webster Dictionary. I have had the privilege of playing a role in many …


The Desert Of The Unreal: Inequality In Virtual And Augmented Reality, Mary Anne Franks Jan 2017

The Desert Of The Unreal: Inequality In Virtual And Augmented Reality, Mary Anne Franks

Articles

The world we live in is structured by inequality: of gender, race, class, sexual orientation, disability, and more. Virtual and augmented reality technologies hold out the promise of a more perfect world, one that offers us more stimulation, more connection, more freedom, more equality than the "real" world. But for such technologies to be truly innovative, they must move us beyond our current limitations and prejudices. When existing inequalities are unacknowledged and unaddressed in the "real" world, they tend to be replicated and augmented in virtual realities. We make new worlds based on who we are and what we do …


Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi Jan 2014

Journalism Standards And "The Dark Arts": The U.K.'S Leveson Inquiry And The U.S. Media In The Age Of Surveillance, Lili Levi

Articles

No abstract provided.


Unwilling Avatars: Idealism And Discrimination In Cyberspace, Mary Anne Franks Jan 2011

Unwilling Avatars: Idealism And Discrimination In Cyberspace, Mary Anne Franks

Articles

No abstract provided.


Almost Free: An Analysis Of Icann's 'Affirmation Of Commitments', A. Michael Froomkin Jan 2011

Almost Free: An Analysis Of Icann's 'Affirmation Of Commitments', A. Michael Froomkin

Articles

No abstract provided.


Government Data Breaches, A. Michael Froomkin Jan 2009

Government Data Breaches, A. Michael Froomkin

Articles

No abstract provided.


Property And Probable Cause: The Fourth Amendment's Principled Protection Of Privacy, Ricardo J. Bascuas Jan 2008

Property And Probable Cause: The Fourth Amendment's Principled Protection Of Privacy, Ricardo J. Bascuas

Articles

No abstract provided.


Commentary: Time To Hug A Bureaucrat, A. Michael Froomkin Jan 2003

Commentary: Time To Hug A Bureaucrat, A. Michael Froomkin

Articles

No abstract provided.


Icann And Antitrust, A. Michael Froomkin Jan 2003

Icann And Antitrust, A. Michael Froomkin

Articles

National identification ("ID") cards appear increasingly inevitable. National ID cards have the potential to be repressive and privacy destroying, but it is also possible to design a system that captures more benefits than costs. Because the United States currently lacks a single, reliable credential, private businesses have trouble authenticating their customers and matching data among distributed databases. This Article argues that the desire for reliable ID creates a window of opportunity for the federal government to strike a bargain: offer private businesses the use of a reliable credential in the form of a national ID card, on the condition that …


Habermas@Discourse.Net: Toward A Critical Theory Of Cyberspace, A. Michael Froomkin Jan 2003

Habermas@Discourse.Net: Toward A Critical Theory Of Cyberspace, A. Michael Froomkin

Articles

No abstract provided.


Form And Substance In Cyberspace, A. Michael Froomkin Jan 2002

Form And Substance In Cyberspace, A. Michael Froomkin

Articles

In this Response to the preceding article by Joe Sims and Cynthia Bauerly, A. Michael Froomkin defends his earlier critique of ICANN. This Response first summarizes the arguments in Wrong Turn In Cyberspace, which explained why ICANN lacks procedural and substantive legitimacy. This Response focuses on how the U.S. government continues to assert control over the domain name system, and how this control violates the APA, the nondelegation doctrine as articulated by the Supreme Court in Carter Coal, and public policy. Professor Froomkin then proposes that ICANN's role be more narrowly focused away from policy making towards true …


Wrong Turn In Cyberspace: Using Icann To Route Around The Apa And The Constitution, A. Michael Froomkin Jan 2000

Wrong Turn In Cyberspace: Using Icann To Route Around The Apa And The Constitution, A. Michael Froomkin

Articles

The Internet relies on an underlying centralized hierarchy built into the domain name system (DNS) to control the routing for the vast majority of Internet traffic. At its heart is a single data file, known as the "root." Control of the root provides singular power in cyberspace.

This Article first describes how the United States government found itself in control of the root. It then describes how, in an attempt to meet concerns that the United States could so dominate an Internet chokepoint, the U.S. Department of Commerce (DoC) summoned into being the Internet Corporation for Assigned Names and Numbers …


The Constitution And Encryption Regulation: Do We Need A "New Privacy"?, A. Michael Froomkin Jan 1999

The Constitution And Encryption Regulation: Do We Need A "New Privacy"?, A. Michael Froomkin

Articles

No abstract provided.


Of Governments And Governance, A. Michael Froomkin Jan 1999

Of Governments And Governance, A. Michael Froomkin

Articles

The Magaziner Report focuses on achieving short-term goals without giving sufficient consideration to long-term consequences affecting the structure of Internet governance and democracy in general. This overly pragmatic approach creates a paradoxical climate: overly-friendly to government intervention (in e-commerce regulation) while also overly willing to defer to privatized governance structures (in other areas). As the recent World Intellectual Property Organization ("WIPO") domain name/trademark process demonstrates, certain Internet governance processes raise several questions, not least discerning whether such processes include adequate notice and consultation. More traditional democratic processes, such as legislation and regulation, have routinized means of giving affected parties notice …


The Empire Strikes Back, A. Michael Froomkin Jan 1998

The Empire Strikes Back, A. Michael Froomkin

Articles

No abstract provided.


Article 2b As Legal Software For Electronic Contracting-Operating System Or Trojan Horse?, A. Michael Froomkin Jan 1998

Article 2b As Legal Software For Electronic Contracting-Operating System Or Trojan Horse?, A. Michael Froomkin

Articles

The proposed draft of Article 2B of the Uniform Commercial Code can be thought of as akin to a complex computer software suite which seeks to dominate a market by offering all things to all people. The author suggests, however, that Article 2B's electronic contracting rules interoperate poorly with existing digital signature laws, and with some forms of electronic commerce. The author also questions whether Article 2B is the proper means to enact controversial rules that ordinarily would make consumers liable for fraudulent uses of their digital signatures by third parties. After considering Article 2B's potential interaction with existing digital …


Flood Control On The Information Ocean: Living With Anonymity, Digital Cash, And Distributed Databases, A. Michael Froomkin Jan 1996

Flood Control On The Information Ocean: Living With Anonymity, Digital Cash, And Distributed Databases, A. Michael Froomkin

Articles

No abstract provided.


It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow", A. Michael Froomkin Jan 1996

It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow", A. Michael Froomkin

Articles

No abstract provided.