Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Cyberspace

Discipline
Institution
Publication Year
Publication

Articles 31 - 60 of 84

Full-Text Articles in Law

‘Customary Internet-Ional Law’: Creating A Body Of Customary Law For Cyberspace. Part 2: Applying Custom As Law To The Internet Infrastructure, Warren B. Chik Mar 2010

‘Customary Internet-Ional Law’: Creating A Body Of Customary Law For Cyberspace. Part 2: Applying Custom As Law To The Internet Infrastructure, Warren B. Chik

Research Collection Yong Pung How School Of Law

The shift in socio-economic transactions from real space to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 2 of this article, I will construct the customary rules to Internet law-making that are applicable …


A Portrait Of The Internet As A Young Man, Ann Bartow Jan 2010

A Portrait Of The Internet As A Young Man, Ann Bartow

Law Faculty Scholarship

In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be “We have to regulate the Internet to preserve its open, unregulated nature.” Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes …


The Global Dimensions Of Virtual Work, Miriam A. Cherry Jan 2010

The Global Dimensions Of Virtual Work, Miriam A. Cherry

Faculty Publications

(Excerpt)

Recently, unusual “factories” have appeared in Third World countries; these factories do not manufacture goods, but instead feature computer workers, typing and clicking away, playing video games, collecting coins and swords, and fighting monsters. Known as “gold farmers,” these workers are paid to harvest virtual treasures for online gamers in the developed world. First World gamers want to advance quickly within their online role-paying games of choice and, tired of the repetitive tasks necessary to build a high-level character, would prefer to pay others to do the work. As a result, gold farming operations have appeared in many countries …


'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik Jan 2010

'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik

Research Collection Yong Pung How School Of Law

The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …


Cyberspace Is Outside The Schoolhouse Gate: Offensive, Online Student Speech Receives First Amendment Protection, Joseph A. Tomain Jan 2010

Cyberspace Is Outside The Schoolhouse Gate: Offensive, Online Student Speech Receives First Amendment Protection, Joseph A. Tomain

Articles by Maurer Faculty

Normative and doctrinal analysis shows that schools do not possess jurisdiction over offensive online student speech, at least when it does not cause a substantial disruption of the school environment. This article is a timely analysis on the limits of school jurisdiction over offensive online student speech.

On February 4, 2010, two different Third Circuit panels issued opinions reaching opposite conclusions on whether schools may punish students based on online speech created by students when they are off-campus. The Third Circuit vacated both decisions and is considering these cases in a consolidated en banc appeal. Another case addressing the same …


Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky Jan 2009

Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky

Faculty Publications

This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …


Towards A Cyberspace Legal Regime In The Twenty-First Century: Considerations For American Cyber-Warriors, Charles J. Dunlap Jr. Jan 2009

Towards A Cyberspace Legal Regime In The Twenty-First Century: Considerations For American Cyber-Warriors, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Privacy And The New Virtualism, Jonathon Penney Jan 2009

Privacy And The New Virtualism, Jonathon Penney

Articles, Book Chapters, & Popular Press

First generation cyberlaw scholars were deeply influenced by the uniqueness of cyberspace, and believed its technology and scope meant it could not be controlled by any government. Few still ascribe to this utopian vision. However, there is now a growing body of second generation cyberlaw scholarship that speaks not only to the differential character of cyberspace, but also analyzes legal norms within virtual spaces while drawing connections to our experience in real space. I call this the New Virtualism. Situated within this emerging scholarship, this article offers a new approach to privacy in virtual spaces by drawing on what Orin …


Understanding The New Virtualist Paradigm, Jonathon Penney Jan 2009

Understanding The New Virtualist Paradigm, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …


Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky Jan 2009

Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky

UF Law Faculty Publications

This Article examines the evolution of the law governing libel suits against anonymous "John Doe" defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire, and other nonfactual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …


Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds Jan 2009

Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

In this survey, we review electronic contracting cases decided between June 15, 2008 and June 15, 2009. During that period we found that there was not much action on the formation by click-wrap and browse-wrap front. We have previously observed that the law of electronic contracts has matured, and the fact that there have not been any decisions on whether click-wrap and browse-wrap are effective ways of forming contracts reflects that observation. This year brought us three modification cases, two cases in which a party alleged that it was not bound to the offered terms because an unauthorized party agreed …


Understanding The New Virtualist Paradigm, Jonathon Penney Jan 2009

Understanding The New Virtualist Paradigm, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds Jan 2008

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

In this survey, we discuss electronic contracting cases decided between July 1, 2007 and June 30, 2008. In addition to cases adding to the literature on the enforceability of online contracts, this survey includes cases discussing modification of online contracts, incorporation by reference, and unconscionability. We conclude that our common law is developing nicely to address the issues presented by internet contracting.


Pornography, Coercion, And Copyright Law 2.0, Ann Bartow Jan 2008

Pornography, Coercion, And Copyright Law 2.0, Ann Bartow

Law Faculty Scholarship

The lack of regulation of the production of pornography in the United States leaves pornography performers exposed to substantial risks. Producers of pornography typically respond to attempts to regulate pornography as infringements upon free speech. At the same time, large corporations involved in the production and sale of pornography rely on copyright law's complex regulatory framework to protect their pornographic content from copying and unauthorized distribution. Web 2.0 also facilitates the production and distribution of pornography by individuals. These user-generators produce their own pornography, often looking to monetize their productions themselves via advertising revenues and subscription models. Much like their …


Net Neutrality, Free Speech, And Democracy In The Internet Age, Dawn C. Nunziato Jan 2008

Net Neutrality, Free Speech, And Democracy In The Internet Age, Dawn C. Nunziato

GW Law Faculty Publications & Other Works

Professor Nunziato's book explains why the growth of the Internet as the most open forum for free expression in history is now threatened by the privatization of the Internet, the gatekeeper control over expression exercised by a handful of corporate owners, and their power to censor what we say and read online. She sets forth how we got to this place and what must be done about it to guarantee meaningful free speech rights in the Internet age.


The Questionable Use Of Custom In Intellectual Property, Jennifer E. Rothman Dec 2007

The Questionable Use Of Custom In Intellectual Property, Jennifer E. Rothman

All Faculty Scholarship

The treatment of customary practices has been widely debated in many areas of the law, but there has been virtually no discussion of how custom is and should be treated in the context of intellectual property (IP). Nevertheless, customs have a profound impact on both de facto and de jure IP law. The unarticulated incorporation of custom threatens to swallow up IP law, and replace it with industry-led IP regimes that give the public and other creators more limited rights to access and use intellectual property than were envisioned by the Constitution and Congress. This article presents a powerful critique …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds Jan 2007

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.


In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Jan 2007

In Sickness, Health And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

Faculty Publications

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Cyberspace As/And Space, Julie E. Cohen Jan 2007

Cyberspace As/And Space, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for the ongoing production of networked space more generally. It argues, first, that adherents of the cyberspace metaphor have been insufficiently sensitive to the ways in which theories of cyberspace as space themselves function as acts of social construction. Specifically, the leading theories all have deployed the metaphoric construct of cyberspace to situate cyberspace, explicitly or implicitly, as separate space. This denies all …


Property Rules, Liability Rules, And Immunity: An Application To Cyberspace, Keith N. Hylton Jan 2007

Property Rules, Liability Rules, And Immunity: An Application To Cyberspace, Keith N. Hylton

Faculty Scholarship

This Article sets out a theory of torts and cyberspace wrongs. My goal is to provide a sparse theoretical account of tort law and apply it to cyberspace torts, both negligent and intentional. I approach this goal by applying the framework of property rules and liability rules to cyberspace torts. That framework suggests that trespass doctrine is appropriate in instances of cyber invasions of private information resources, such as the breaking of codes to access private information on the web. However, trespass doctrine should play no role in cyber-invasions of public information resources, such as the sending of spam email. …


Law And Society Approaches To Cyberspace, Paul Schiff Berman Jan 2007

Law And Society Approaches To Cyberspace, Paul Schiff Berman

GW Law Faculty Publications & Other Works

This is the introductory essay to an edited collection titled Law and Society Approaches to Cyberspace and published by Ashgate Publishing. Accordingly, the essay first considers what qualifies as a law and society approach to any particular subject. Then, I address questions about what it means to study cyberspace, surveying some of the academic literature on the subject and identifying three distinct waves of scholarship about the Internet since the mid 1990s. I also discuss some of the major theoretical fault lines that have emerged during this period. Finally, the essay summarizes each of the contributions to the volume, which …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Jan 2006

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.


From St. Ives To Cyberspace: The Modern Distortion Of The Medieval ‘Law Merchant’, Stephen E. Sachs Jan 2006

From St. Ives To Cyberspace: The Modern Distortion Of The Medieval ‘Law Merchant’, Stephen E. Sachs

Faculty Scholarship

Modern advocates of corporate self-regulation have drawn unlikely inspiration from the Middle Ages. On the traditional view of history, medieval merchants who wandered from fair to fair were not governed by domestic laws, but by their own lex mercatoria, or "law merchant. " This law, which uniformly regulated commerce across Europe, was supposedly produced by an autonomous merchant class, interpreted in private courts, and enforced through private sanctions rather than state coercion. Contemporary writers have treated global corporations as descendants of these itinerant traders, urging them to replace conflicting national laws with a transnational law of their own creation. The …


Cybertrespass And Trespass To Documents, Kevin Emerson Collins Jan 2006

Cybertrespass And Trespass To Documents, Kevin Emerson Collins

Articles by Maurer Faculty

No abstract provided.


Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler Jan 2006

Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler

Publications

This document is Dr. Kessler's review of Digital Crime and Forensic Science in Cyberspace, by P. Kanellis, E. Kiountouzis, N. Kolokotronis, and D. Martakos. Idea Group Publishing, 2006. ISBN: 1-59140-873-3.


Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya Jan 2006

Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya

Publications

No abstract provided.


Does Power Grow Out Of The Barrel Of A Modem? Some Thoughts On Jack Goldsmith And Tim Wu's 'Who Controls The Internet?', Glenn Harlan Reynolds Jan 2006

Does Power Grow Out Of The Barrel Of A Modem? Some Thoughts On Jack Goldsmith And Tim Wu's 'Who Controls The Internet?', Glenn Harlan Reynolds

Scholarly Works

This review of Jack Goldsmith and Tim Wu's Who Controls the Internet? Illusions of a Borderless World, notes that Goldsmith and Wu are correct in concluding that events in recent years undercut cyber-utopian theories of an Internet that is beyond the reach of national sovereignty. It argues, however, that the failure to achieve such goals does not mean that the Internet is unimportant as a source of expanded freedom and power on the part of ordinary people, and suggests that this trend of individual empowerment is likely to continue.


Accessing The Internet Through The Neighbor's Wireless Internet Connection: Physical Trespass In Virtual Reality, Ned Snow Jan 2006

Accessing The Internet Through The Neighbor's Wireless Internet Connection: Physical Trespass In Virtual Reality, Ned Snow

Faculty Publications

As wireless computer networks are becoming commonplace, so also is the practice of accessing the Internet through another's wireless network. The practice raises a simple question of law: Does accessing a wireless network, without express authorization, violate the property rights of the network operator? This Article argues that it does. A neighbor who intentionally accesses the Internet through a network operator's connection appears to trespass on physical property of the operator - the operator's router. Recent Internet jurisprudence suggests that the electronic signals that the neighbor sends through the router are sufficient to find trespassory physical contact. The same jurisprudence …


The Constitutional Failing Of The Anticybersquatting Act, Ned Snow Jan 2005

The Constitutional Failing Of The Anticybersquatting Act, Ned Snow

Faculty Publications

Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …