Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (18)
- Constitutional Law (9)
- First Amendment (6)
- Intellectual Property Law (6)
- Science and Technology Law (5)
-
- Communications Law (3)
- Torts (3)
- Labor and Employment Law (2)
- Privacy Law (2)
- Artificial Intelligence and Robotics (1)
- Civil Rights and Discrimination (1)
- Commercial Law (1)
- Computer Law (1)
- Computer Sciences (1)
- Consumer Protection Law (1)
- Courts (1)
- Criminal Procedure (1)
- Criminology (1)
- Dispute Resolution and Arbitration (1)
- Evidence (1)
- Family Law (1)
- Jurisdiction (1)
- Land Use Law (1)
- Marketing Law (1)
- Physical Sciences and Mathematics (1)
- Property Law and Real Estate (1)
- Social Control, Law, Crime, and Deviance (1)
- Social and Behavioral Sciences (1)
- Sociology (1)
Articles 1 - 30 of 35
Full-Text Articles in Law
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Faculty Publications
Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …
A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys
A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys
Faculty Publications
No abstract provided.
The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick
The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick
Faculty Publications
Private online platforms have an increasingly essential role in free speech and participation in democratic culture. But while it might appear that any internet user can publish freely and instantly online, many platforms actively curate the content posted by their users. How and why these platforms operate to moderate speech is largely opaque.
This Article provides the first analysis of what these platforms are actually doing to moderate online speech under a regulatory and First Amendment framework. Drawing from original interviews, archived materials, and internal documents, this Article describes how three major online platforms — Facebook, Twitter, and YouTube — …
Empowering Consumers Through Online Dispute Resolution, Amy J. Schmitz
Empowering Consumers Through Online Dispute Resolution, Amy J. Schmitz
Faculty Publications
We transact online every day, hoping that no problems will occur. However, our purchases are not always perfect: goods may not arrive; products may be faulty; expectations may go unmet. When this occurs, we are often left frustrated, with no means for seeking redress. Phone calls to customer service are generally unappealing and ineffective, and traditional face-to-face or judicial processes for asserting claims are impractical after weighing costs against likely recovery. This is especially true when seeking redress requires travel, or for crossborder claims involving jurisdictional complexities. This situation has created a need for online dispute resolution (“ODR”), which brings …
A New Taxonomy For Online Harms, Kate Klonick
A New Taxonomy For Online Harms, Kate Klonick
Faculty Publications
(Excerpt)
Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …
Trial By Google: Judicial Notice In The Information Age, Jeffrey Bellin, Andrew Guthrie Ferguson
Trial By Google: Judicial Notice In The Information Age, Jeffrey Bellin, Andrew Guthrie Ferguson
Faculty Publications
This Article presents a theory of judicial notice for the information age. It argues that the ease of accessing factual data on the Internet allows judges and litigants to expand the use of judicial notice in ways that raise significant concerns about admissibility, reliability, and fair process. State and federal courts are already applying the surprisingly pliant judicial notice rules to bring websites ranging from Google Maps to Wikipedia into the courtroom, and these decisions will only increase in frequency in coming years. This rapidly emerging judicial phenomenon is notable for its ad hoc and conclusory nature—attributes that have the …
The Implications Of Excluding State Crimes From 47 U.S.C. §230’S Immunity, Eric Goldman
The Implications Of Excluding State Crimes From 47 U.S.C. §230’S Immunity, Eric Goldman
Faculty Publications
In June 2013, the State Attorneys General signaled their intent to ask Congress to amend 47 U.S.C. 230, the federal law that says websites aren't liable for third party content. The State AGs want to exclude state criminal prosecutions from the immunity. This essay explains the problems such an amendment would create for the Internet user-generated content community.
Technology Drives The Law: A Foreword To Trends And Issues In Techology & The Law, Ralph D. Clifford
Technology Drives The Law: A Foreword To Trends And Issues In Techology & The Law, Ralph D. Clifford
Faculty Publications
Technology has always been a motivating force of change in the law. The creation of new machines and development of novel methods of achieving goals force the law to adapt with new and responsive rules. This is particularly true whenever a new technology transforms society. Whether it is increasing industrialization or computerization, pre-existing legal concepts rarely survive the transition unaltered - new prescriptions are announced while old ones disappear.
Incendiary Speech And Social Media, Lyrissa Lidsky
Incendiary Speech And Social Media, Lyrissa Lidsky
Faculty Publications
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
Public Forum 2.0, Lyrissa Lidsky
Public Forum 2.0, Lyrissa Lidsky
Faculty Publications
Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …
Not In My Atlantic Yards: Examining Netroots’ Role In Eminent Domain Reform, Kate Klonick
Not In My Atlantic Yards: Examining Netroots’ Role In Eminent Domain Reform, Kate Klonick
Faculty Publications
(Excerpt)
Since the Supreme Court's decision in Kelo v. City of New London, which expanded the state's power to condemn private property and transfer it to other private owners under the Fifth Amendment, there have been significant calls to curb the power of eminent domain through statutory reform. Scholars and jurists in favor of eminent domain reform have asserted that legislation is needed to protect private property rights against the rising tide of state power, with many arguing that such reform should incorporate a public approval process into land use decisions. Those opposed to eminent-domain reform argue that empowering …
Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow
Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow
Faculty Publications
Courts have created a burden of proof in copyright that chills protected speech. The doctrine of fair use purports to ensure that copyright law does not trample rights of speakers whose expression employs copyrighted material. Yet those speakers face a burden of proof that weighs heavily in the fair use analysis, where factual inquiries are often subjective and speculative. Failure to satisfy the burden means severe penalties, which prospect quickly chills the free exercise of speech that constitutes a fair use. The fair-use burden of proof is repugnant to the fair use purpose. Today, copyright holders are exploiting the burden …
Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman
Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman
Faculty Publications
This Essay explains why Wikipedia will not be able to maintain a credible website while simultaneously letting anyone freely edit it. To date, Wikipedia editors have successfully defended against malicious attacks from spammers and vandals, but as editors turn over, Wikipedia will need to recruit replacements. However, Wikipedia will have difficulty with this recruiting task due to its limited incentives for participation. Faced with a potential labor squeeze, Wikipedia will choose to restrict users’ ability to contribute to the site as a way of preserving site credibility. Wikipedia’s specific configuration choices make it an interesting test case to evaluate the …
That Guy's A Batterer!: A Scarlet Letter Approach To Domestic Violence In The Information Age, Elaine M. Chiu
That Guy's A Batterer!: A Scarlet Letter Approach To Domestic Violence In The Information Age, Elaine M. Chiu
Faculty Publications
(Excerpt)
We have all seen the ads and heard the jingles. Some of us may have even visited the websites. "Come meet your soul mate, come meet your future spouse, come find true love, at Match.com, at eHarmony.com, at Yahoo." Internet dating is a booming business. In 2005, an estimated sixteen million Americans spent more than $245 million looking for love on the Internet. Approximately ten-million Americans are current online daters. In addition to these digital matchmakers, social networking sites like Facebook and MySpace and You Tube offer amazing online communities where folks can advertise their best features. Then, there …
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky
Faculty Publications
This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …
Fifteen Minutes Of Infamy: Privileged Reporting And The Problem Of Perpetual Reputational Harm, Richard J. Peltz-Steele
Fifteen Minutes Of Infamy: Privileged Reporting And The Problem Of Perpetual Reputational Harm, Richard J. Peltz-Steele
Faculty Publications
This Article provides an overview of the labyrinth of media tort defenses, specifically the four privileges – fair comment, fair report, neutral reportage, and wire service – that come into play when the media republish defamatory content about criminal suspects and defendants without specific intent to injure. The Article then discusses these privileges in light of a hypothetical case involving a highly publicized crime and an indicted suspect, against whom charges are later dropped, but who suffers perpetual reputational harm from the out-of-context republication online of news related to his indictment. The Article demonstrates how the four privileges would operate …
Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman
Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman
Faculty Publications
This article further demonstrates that state common law exceptions to the employment-at-will doctrine are not providing significant redress to employees fired or otherwise disciplined for blogging.
A Copyright Conundrum: Protecting Email Privacy, Ned Snow
A Copyright Conundrum: Protecting Email Privacy, Ned Snow
Faculty Publications
The practice of email forwarding deprives email senders of privacy. Expression meant for only a specific recipient often finds its way into myriad inboxes or onto a public website, exposed for all to see. Simply by clicking the "forward" button, email recipients routinely strip email senders of expressive privacy. The common law condemns such conduct. Beginning over two-hundred-fifty years ago, courts recognized that authors of personal correspondence hold property rights in their expression. Under common-law copyright, authors held a right to control whether their correspondence was published to third parties. This common-law protection of private expression was nearly absolute, immune …
In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
Faculty Publications
The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …
Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman
Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman
Faculty Publications
In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …
Accessing The Internet Through The Neighbor's Wireless Internet Connection: Physical Trespass In Virtual Reality, Ned Snow
Faculty Publications
As wireless computer networks are becoming commonplace, so also is the practice of accessing the Internet through another's wireless network. The practice raises a simple question of law: Does accessing a wireless network, without express authorization, violate the property rights of the network operator? This Article argues that it does. A neighbor who intentionally accesses the Internet through a network operator's connection appears to trespass on physical property of the operator - the operator's router. Recent Internet jurisprudence suggests that the electronic signals that the neighbor sends through the router are sufficient to find trespassory physical contact. The same jurisprudence …
Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer
Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer
Faculty Publications
Courts have been evaluating the issue of personal jurisdiction based on Internet or "network-mediated" contacts for some time. The U.S. Supreme Court has remained silent on this issue, permitting the federal appeals courts to develop standards for determining when personal jurisdiction based on network-mediated contacts is appropriate. Unfortunately, the circuit approaches-which emphasize a Web site's "interactivity" and "target audience" -are flawed because they are premised on an outdated view of Internet activity as uncontrollably ubiquitous. This view has led courts to depart from traditional jurisdictional analysis and impose elevated and misguided jurisdictional standards. This article argues that courts should reinstitute …
Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron K. Perzanowski
Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron K. Perzanowski
Faculty Publications
This Article reexamines the First Amendment protections provided by the public figure doctrine. It suggests that the doctrine is rooted in a set of out-dated assumptions regarding the media landscape and, as a result, has failed to adapt in a manner that accounts for our changing communications environment.
The public figure doctrine, which imposes the more rigorous actual malice standard of fault on defamation plaintiffs who enjoy greater access to mass media, was constructed in an era defined by one-to-many communications media. Newspapers, broadcasters, and traditional publishers exhausted the Court's understanding of the means of communicating with mass audiences. As …
The Constitutional Failing Of The Anticybersquatting Act, Ned Snow
The Constitutional Failing Of The Anticybersquatting Act, Ned Snow
Faculty Publications
Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …
A Symposium Précis, Thomas E. Baker
A Symposium Précis, Thomas E. Baker
Faculty Publications
This article is an introduction to and overview of the Drake University Law School symposium The Constitution and the Internet, held in February of 2001. It highlights important issues including the Constitution and the Internet, civil liberty and the application of a 200 year old document to the modern age of rapidly changing technology.
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Faculty Publications
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
Electronic Billboards Along The Information Superhighway: Liability Under The Lanham Act For Using Trademarks To Key Internet Banner Ads, Christine Galbraith Davik
Electronic Billboards Along The Information Superhighway: Liability Under The Lanham Act For Using Trademarks To Key Internet Banner Ads, Christine Galbraith Davik
Faculty Publications
With almost one billion web pages on the Internet today, a search engine is a necessity at times. But search engines are also for-profit ventures and the financial success of these sites hinges on advertising revenue. One of the ways in which these sites generate income is by selling “keywords” to advertisers. Although there has been only one judicial decision – Playboy Enterprises, Inc. v. Netscape Communications – involving banner ads keyed to trademarks, it will undoubtedly not be the last. This article argues that despite the invisible nature of this unauthorized trademark use, the common practice of keying a …
Media Law & Ethics Enter The 21st Century, Introduction To Symposium, Richard J. Peltz-Steele
Media Law & Ethics Enter The 21st Century, Introduction To Symposium, Richard J. Peltz-Steele
Faculty Publications
We stand now on the verge of the twenty-first century: an artificial construct yes, but a culturally significant time nonetheless. We are the world the Hutchins Commission foresaw: the world of nations seeking understanding, seeking destiny. We will not predict the future with perfect accuracy, though we will try, because that is out nature. In our effort, we must be mindful that the questions we are asking are not new; they have been asked before and will be asked again. But let us see what we have to say about them today.
Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman
Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman
Faculty Publications
Co-brand agreements are what I do. I am the self-titled "King of CoBrands," as this is what I've been doing with my life.
So, let's talk a little about co-branding agreements and about why they might matter. First let's define our terms.
Now, where there used to be one site, the provider site, there will be two sites, the provider site and co-branded site, which contains the branding of the portal, but contains all the same functionality, or similar functionality, as is in the provider's site.
Then the portal will drive traffic to this co-branding site, for purposes that we'll …
Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky
Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky
Faculty Publications
John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons — some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat …