Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

An Uphill Battle: The Difficulty Of Deterring And Detecting Perpetrators Of Internet Stock Fraud, Byron D. Hittle Dec 2001

An Uphill Battle: The Difficulty Of Deterring And Detecting Perpetrators Of Internet Stock Fraud, Byron D. Hittle

Federal Communications Law Journal

This Note argues that because of the limited resources of the SEC, the demanding requirements to prove misrepresentation, the current lack of cooperation between federal and state securities regulators, and a perverse admiration for fraud masterminds, illegal stock price manipulators will continue to profit from unsuspecting investors. Various measures to curb Internet fraud, however, are currently being pondered by industry experts. Among the most effective and realistic are, in order: increasing investor education and awareness, increasing the SEC's "firepower," increasing penalties and jail time for offenders, furthering coordination of federal and state efforts, and creating a "seal of approval" for …


Does Internet Gambling Strengthen The U.S. Economy? Don't Bet On It, Ryan D. Hammer Dec 2001

Does Internet Gambling Strengthen The U.S. Economy? Don't Bet On It, Ryan D. Hammer

Federal Communications Law Journal

Commercial gambling in the United States is a mammoth industry. In the past few decades, the United States developed from a country with few gambling options to one permitting some form of legalized gambling in almost every state. Presently, a new wave of technology affects this industry. Legislators and regulators must deal with the phenomenon of Internet gambling. This Note asserts that Internet gambling must be curbed to lessen its negative impact on the American economy. Many state and local governments are dependent on tax revenues associated with traditional forms of gambling. Internet gambling not only deprives the economy of …


The Best Laid Plans: How Unrestrained Arbitration Decisions Have Corrupted The Uniform Domain Name Dispute Resolution Policy, Ian L. Stewart May 2001

The Best Laid Plans: How Unrestrained Arbitration Decisions Have Corrupted The Uniform Domain Name Dispute Resolution Policy, Ian L. Stewart

Federal Communications Law Journal

In the rapidly changing Internet age, a sound dispute resolution policy is needed to address conflict where traditional rights intersect emerging technologies. This Note examines how unfettered arbitration decisions, even those made with the best of intentions, can corrupt a good dispute resolution policy, as is the case with the Uniform Domain Name Dispute Resolution Policy. The Note provides background information on ICANN, domain disputes regarding cybersquatting and reverse domain hijacking, and the Policy. It then explains how ICANN’s dispute resolution providers’ expansive decisions have weakened the Policy by removing the internal limitations that made it strong and effective. Finally, …


Slow And Steady Does Not Always Win The Race: The Nuremberg Files Web Site And What It Should Teach Us About Incitement And The Internet, Nadine E. Mcspadden Apr 2001

Slow And Steady Does Not Always Win The Race: The Nuremberg Files Web Site And What It Should Teach Us About Incitement And The Internet, Nadine E. Mcspadden

Indiana Law Journal

No abstract provided.


Filth, Filtering, And The First Amendment: Ruminations On Public Libraries’ Use Of Internet Filtering Software, Bernard W. Bell Mar 2001

Filth, Filtering, And The First Amendment: Ruminations On Public Libraries’ Use Of Internet Filtering Software, Bernard W. Bell

Federal Communications Law Journal

Traditionally, whenever the government has sought to regulate speech, analysis of its action focused on conventional issues, such as the type of forum involved, whether the government acted in a regulatory or a proprietary role, and whether the regulation could be defined as a prior restraint. With the advent of the Internet and the opportunity for the widespread dissemination of viewpoints, however, new issues have arisen. This Article focuses on the complex questions public libraries face when filtering material, usually of a sexually explicit nature, from the public using filtering software. This Article contends that public libraries require a unique …


Is Isp-Bound Traffic Local Or Interstate?, Thomas W. Bonnett Mar 2001

Is Isp-Bound Traffic Local Or Interstate?, Thomas W. Bonnett

Federal Communications Law Journal

The shape of communications policy has been influenced by the jurisdictional tension between federal and state agencies and by the interplay between rival telecommunication providers. From the outset, the publicly switched telephone network (“PSTN”) was monopolistic and dually regulated by federal and state agencies. In recent years, facilitated by the Telecommunications Act of 1996, vast competition in the local exchange market has developed between incumbent carriers and competitive carriers. This Article provides an overview of this competition and analyzes the dual regulation of the PSTN. In addition, this Article discusses the dispute between incumbents and competitive carriers as to whether …


Taking Account Of The World As It Will Be: The Shifting Course Of U.S. Encryption Policy, Tricia E. Black Mar 2001

Taking Account Of The World As It Will Be: The Shifting Course Of U.S. Encryption Policy, Tricia E. Black

Federal Communications Law Journal

Encryption, understood on a basic level as the process of scrambling information to disguise its content, has been a topic of intense debate over the past decade because of Internet growth and well-founded concerns about online security. The encryption debate centers on striking an appropriate balance between national security concerns and the potential prosperity of the high-tech industry. The Clinton Administration played an important role in relaxing U.S. encryption policy. This Note argues that the dramatic shift in encryption policy resulted from a recognition of how the world will be in the digital age, and that strong, unregulated encryption technology …