Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (38)
- Computer Law (19)
- Intellectual Property Law (17)
- Science and Technology Law (12)
- Constitutional Law (9)
-
- International Law (9)
- First Amendment (8)
- Privacy Law (8)
- Law and Society (6)
- National Security Law (6)
- Social and Behavioral Sciences (5)
- Communications Law (4)
- Commercial Law (3)
- Comparative and Foreign Law (3)
- Consumer Protection Law (3)
- Military, War, and Peace (3)
- Property Law and Real Estate (3)
- Arts and Humanities (2)
- Business (2)
- Business Organizations Law (2)
- Communication (2)
- Computer Sciences (2)
- Courts (2)
- International Trade Law (2)
- Law and Economics (2)
- Law and Philosophy (2)
- Law and Politics (2)
- Legal History (2)
- Legal Writing and Research (2)
- Institution
-
- Maurer School of Law: Indiana University (7)
- Boston University School of Law (6)
- George Washington University Law School (6)
- University of New Hampshire (6)
- University of Maryland Francis King Carey School of Law (5)
-
- Duke Law (3)
- Georgetown University Law Center (3)
- New York Law School (3)
- Schulich School of Law, Dalhousie University (3)
- The University of Akron (3)
- University of Baltimore Law (3)
- University of Richmond (3)
- Florida A&M University College of Law (2)
- Singapore Management University (2)
- University of Florida Levin College of Law (2)
- University of Georgia School of Law (2)
- University of Missouri School of Law (2)
- University of Pittsburgh School of Law (2)
- University of South Carolina (2)
- University of Washington School of Law (2)
- American University Washington College of Law (1)
- Case Western Reserve University School of Law (1)
- Cornell University Law School (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University College of Law (1)
- Mitchell Hamline School of Law (1)
- Saint Louis University School of Law (1)
- St. John's University School of Law (1)
- St. Mary's University (1)
- University of Colorado Law School (1)
- Publication Year
- Publication
-
- Faculty Scholarship (14)
- Articles by Maurer Faculty (7)
- Faculty Publications (7)
- GW Law Faculty Publications & Other Works (6)
- Law Faculty Scholarship (6)
-
- All Faculty Scholarship (5)
- Articles (5)
- Akron Law Faculty Publications (3)
- Articles & Chapters (3)
- Articles, Book Chapters, & Popular Press (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Law Faculty Publications (3)
- Scholarly Works (3)
- Journal Publications (2)
- Publications (2)
- Research Collection Yong Pung How School Of Law (2)
- UF Law Faculty Publications (2)
- Articles in Law Reviews & Other Academic Journals (1)
- Continuing Legal Education Materials (1)
- Cornell Law School Inter-University Graduate Student Conference Papers (1)
- Faculty Articles (1)
- Homeland Security Publications (1)
- Library Philosophy and Practice (e-journal) (1)
- Occasional Papers Series (1)
- Sturm College of Law: Faculty Scholarship (1)
Articles 1 - 30 of 84
Full-Text Articles in Law
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Articles
Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …
Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius
Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius
Homeland Security Publications
No abstract provided.
Revolt Against The U.S. Hegemony: Judicial Divergence In Cyberspace, Dongsheng Zang
Revolt Against The U.S. Hegemony: Judicial Divergence In Cyberspace, Dongsheng Zang
Articles
This Article contributes to our understanding of the current state of cyber law. The global perspective demonstrates an almost uniform response to the U.S. law in cyberspace from all of America's major trading partners. In the past, comparative studies tended to focus on a single jurisdiction-typically, the European Union-and compared it with the United States. This approach, informative as it was, significantly understated the gravity of the differences between that jurisdiction and the United States. Fundamentally, it was based on an American-centric outlook with primary interests in building convergence models. In cyberspace, however, this is simply not helpful. In recent …
“The Virus Of Liberty”: John Perry Barlow, Internet Law, And Grateful Dead Studies, Joseph A. Tomain
“The Virus Of Liberty”: John Perry Barlow, Internet Law, And Grateful Dead Studies, Joseph A. Tomain
Articles by Maurer Faculty
In 2019, the Duke Law and Technology Review published a special issue titled, "The Past and Future of the Internet: A Symposium for John Perry Barlow." This essay examines the legal scholarship in the Barlow symposium and frames it in the interdisciplinary terms of Grateful Dead studies. Part I focuses on the two Barlow essays that formed the basis of the symposium. Part II connects issues raised by the Barlow symposium to Grateful Dead studies. The essay concludes that Barlow's legacy should inspire others to engage both the cultural and political paths with “groundless hope,” because protecting the “inexplicable pleasures …
Metaphors Of International Law, Harlan G. Cohen
Metaphors Of International Law, Harlan G. Cohen
Scholarly Works
This chapter explores international law in search of its hidden and not-so-hidden metaphors. In so doing, it discovers a world inhabited by states, where rules are mined or picked when ripe, where trade keeps boats forever afloat on rising tides. But is also unveils a world in which voices are silenced, inequality is ignored, and hands are washed of responsibility.
International law is built on metaphors. Metaphors provide a language to describe and convey the law’s operation, help international lawyers identify legal subjects and categorize situations in doctrinal categories, and provide normative justifications for the law. Exploring their operation at …
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Articles
In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
"Writing at the dawn of the digital era, John Perry Barlow proclaimed cyberspace to be a new domain of pure freedom. Addressing the nations of the world, he cautioned that their laws, which were “based on matter,” simply did not speak to conduct in the new virtual realm. As both Barlow and the cyberlaw scholars who took up his call recognized, that was not so much a statement of fact as it was an exercise in deliberate utopianism. But it has proved prescient in a way that they certainly did not intend. The “laws” that increasingly have no meaning in …
The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati
The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati
Library Philosophy and Practice (e-journal)
Globalization has influenced many human life scopes with a variety of tools, which the cyberspace playing the most role. Although both cyberspace and globalization have had many benefits to human life, both as a tool and as a process, they have been able to assist offenders to bring crime into the cyberspace without any trouble. Therefore, today criminologists discuss the globalized world of crime. Although, the processes of homogenization and globalization have been precious to human beings, should not be overlooked. In this article, the author has tried to explain the cybercrime in the age of globalization, with an emphasis …
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Faculty Scholarship
To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …
International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof
International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof
Law Faculty Publications
States are not being held accountable for the vast majority of their harmful cyberoperations, largely because classifications created in physical space do not map well onto the cyber domain. Most injurious and invasive cyberoperations are not cybercrimes and do not constitute cyberwarfare, nor are states extending existing definitions of wrongful acts permitting countermeasures to cyberoperations (possibly to avoid creating precedent restricting their own activities). Absent an appropriate label, victim states have few effective and nonescalatory responsive options, and the harms associated with these incidents lie where they fall.
This Article draws on tort law and international law principles to construct …
Sovereignty In The Age Of Cyber, Gary Corn
Sovereignty In The Age Of Cyber, Gary Corn
Articles in Law Reviews & Other Academic Journals
International law is a foundational pillar of the modern international order, and its applicability to both state and nonstate cyber activities is, by now, beyond question. However, owing to the unique and rapidly evolving nature of cyberspace, its ubiquitous interconnectivity, its lack of segregation between the private and public sectors, and its incompatibility with traditional concepts of geography, there are difficult and unresolved questions about exactly how international law applies to this domain. Chief among these is the question of the exact role that the principle of sovereignty plays in regulating states' cyber activities.
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Faculty Scholarship
The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …
Who Runs The Internet?, Anupam Chander
Who Runs The Internet?, Anupam Chander
Georgetown Law Faculty Publications and Other Works
There is no single answer to the question of who runs the Internet. Is it the United States, often seen as the hegemon of the Internet, home to so many of the world’s leading Internet enterprises? Is it China, which erects a “Great Firewall” to assert control over the portion of the Internet available in China? Is it the European Union, which extends its power globally through its data protection regime, designating countries as “adequate” or (implicitly) “inadequate” to receive its data? Is it ICANN, the California not-for-profit organization that controls how Internet addresses are allocated? Is it the World …
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
Occasional Papers Series
Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …
A Primer On Higher Education In The 21st Century: The University As A Whole And Contributions Made By Law Schools, Ronald Griffin
A Primer On Higher Education In The 21st Century: The University As A Whole And Contributions Made By Law Schools, Ronald Griffin
Journal Publications
Citizens live within their unit's belief systems and superstitions. Truth is derived from family narratives, stories spun by old friends, outbursts from neighbours, barbers, religious figures, and priests. Certainty and comfort come from living in these spaces. But there is a wider world out there with characters doing things that conflict with routine. Higher education illuminates this realm. Legal education predicts what authorities will do about their antics and, while this is a laudable undertaking in the abstract, legal education should do more. It should arm the next generation with tools to cope with cultural ruptures, social confusion, dislocations, avatars, …
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Articles by Maurer Faculty
Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …
Communication In Cyberspace, Nancy Leong, Joanne Morando
Communication In Cyberspace, Nancy Leong, Joanne Morando
Sturm College of Law: Faculty Scholarship
This Article examines a problem in cybercrime law that is both persistent and pervasive. What counts as “communication” on the Internet? Defining the term is particularly important for crimes such as cyberstalking, cyberharassment, and cyberbullying, where most statutes require a showing that the alleged perpetrator “communicated” with the victim or impose a similar requirement through slightly different language.
This Article takes up the important task of defining communication. As a foundation to our discussion, we provide the first comprehensive survey of state statutes and case law relating to cyberstalking, cyberharassment, and cyberbullying. We then examine the realities of the way …
Addressing Cyber Harassment: An Overview Of Hate Crimes In Cyberspace, Danielle K. Citron
Addressing Cyber Harassment: An Overview Of Hate Crimes In Cyberspace, Danielle K. Citron
Faculty Scholarship
This short piece will take a step back and give an overhead view of the problem of cyber harassment and the destructive impact it can have on victims’ lives. Then, it will address about what the law can do to combat online harassment and how a legal agenda can be reconciled with the First Amendment. Finally, it will turn to recent changes in social media companies’ treatment of online abuse and what that might mean for our system of free expression.
Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton
Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton
Akron Law Faculty Publications
In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns ‘hillaryclinton.com’, the more generic ‘hillary.com’ is registered to a software firm, Hillary Software, Inc. What about ‘hillary2008.com’? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …
Repairing Online Reputation: A New Multi-Modal Regulatory Approach, Jacqueline D. Lipton
Repairing Online Reputation: A New Multi-Modal Regulatory Approach, Jacqueline D. Lipton
Akron Law Faculty Publications
In today’s interconnected digital society, high profile examples of online abuses abound. Cyberbullies launch attacks on the less powerful, often significantly damaging victims’ reputations. Outside of reputational damage, online harassment, bullying and stalking has led to severe emotional distress, loss of employment, physical assault and even death. Recent scholarship has identified this phenomenon but has done little more than note that current laws are ineffective in combating abusive online behaviors. This article moves the debate forward both by suggesting specific reforms to criminal and tort laws and, more importantly, by situating those reforms within a new multi-modal framework for combating …
Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton
Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton
Akron Law Faculty Publications
When the Oscar™-winning actress Julia Roberts fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual’s persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …
Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler
Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Faculty Scholarship
This article discusses the intellectual property issues from "meatspace" to online services and the Internet. It further explores intellectual property issues from the Internet to the Cloud. Finally, it discusses the implications of cloud computing for trade secret protection.
Cybercrime, Ronald C. Griffin
Cybercrime, Ronald C. Griffin
Journal Publications
This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.
Sexual Harassment 2.0, Mary Anne Franks
Sexual Harassment 2.0, Mary Anne Franks
Articles
Sexual harassment is a complex and evolving practice. The rise of sexual discrimination in cyberspace is only one of the most recent and most striking examples of the phenomenon's increasing complexity. Sexual harassment law, however, has not kept pace with this evolution. Discrimination law has not been adequately "updated" to address new and amplified practices of sex discrimination. Its two principal limitations are (1) it treats only sexual harassment that occurs in certain protected settings (e.g. the workplace or school) as actionable and (2) it assumes that both the activity and the resulting harm of sexual harassment occur in the …
Cyber Security And The Government/ Private Sector Connection, Jeffrey F. Addicott
Cyber Security And The Government/ Private Sector Connection, Jeffrey F. Addicott
Faculty Articles
The United States does not possess a sufficient cyber security framework. Over eighty-five percent of the critical infrastructure in the United States is controlled by private industry. The greatest concern is an intentional cyber attack against electronic control systems that regulate thousands of interconnected computers, routers, and switches. The centralized computer networks controlling the U.S. infrastructure presents tempting targets.
Generally, there are four types of cyber attacks. First, the most common, is service disruption—which aims to flood the target computer with data packets or connection requests, thereby making it unavailable to the user. The second type is designed to capture …
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble
Scholarly Works
Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location—a territorial partitioning of the Internet. One of these attempts, for example, is the recent Stop Online Piracy Act (“SOPA”) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of erecting borders in cyberspace, focuses on …
Name Calling On The Internet: The Problems Faced By Victims Of Defamatory Content In Cyberspace, Sarudzai Chitsa
Name Calling On The Internet: The Problems Faced By Victims Of Defamatory Content In Cyberspace, Sarudzai Chitsa
Cornell Law School Inter-University Graduate Student Conference Papers
In the past decade or so, internet libel has become one of the hot topics in internet law. Internationally, courts have dealt with an enormous amount of cases brought by both the suppliers and consumers of the internet services. Although the advent of the World Wide Web has come with many legal problems; this paper will only focus at the problems that are being faced by the victims of defamatory speech on the internet in trying to seek compensation through the courts. These problems include, inter alia, the reluctance of the courts in unmasking the identity of the authors of …
Public Forum 2.0, Lyrissa Lidsky
Public Forum 2.0, Lyrissa Lidsky
Faculty Publications
Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …
Public Forum 2.0, Lyrissa Barnett Lidsky
Public Forum 2.0, Lyrissa Barnett Lidsky
UF Law Faculty Publications
Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …