Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (15)
- Internet Law (12)
- Intellectual Property Law (11)
- Communications Law (8)
- Science and Technology Law (7)
-
- Comparative and Foreign Law (5)
- Criminal Law (4)
- Dispute Resolution and Arbitration (4)
- Economics (4)
- International Law (4)
- Law and Economics (4)
- Law and Society (4)
- Social and Behavioral Sciences (4)
- Conflict of Laws (3)
- Consumer Protection Law (3)
- Criminal Procedure (3)
- Energy and Utilities Law (3)
- International Trade Law (3)
- Jurisdiction (3)
- Public Law and Legal Theory (3)
- Administrative Law (2)
- Antitrust and Trade Regulation (2)
- Business Organizations Law (2)
- Civil Rights and Discrimination (2)
- Contracts (2)
- Courts (2)
- Environmental Law (2)
- Human Rights Law (2)
- Judges (2)
- Institution
- Publication
- Publication Type
Articles 1 - 21 of 21
Full-Text Articles in Law
The Misery Of Mitra: Considering Criminal Punishment For Computer Crimes, James T. Tsai
The Misery Of Mitra: Considering Criminal Punishment For Computer Crimes, James T. Tsai
ExpressO
This paper analyzes the policies and philosophy of punishment for computer crimes under the post-Sept. 11th regime. I argue that the judicial discourse represented in Mitra represents a willingness to use the Computer Fraud and Abuse Act to go after defendants that cause trouble with critical infrastructures, the so-called “domestic terrorist.” This is manifested in the levels of punishments for such offenses and calls into question whether the traditional theories of punishment are applicable. I argue that as a policy, it makes good sense but the hazy definitions of terrorism may present problems for its success, and instead an approach …
Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy
Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy
ExpressO
17 USC Section 1201(a)(1) prohibits circumventing a technological protection measure (TPM) that effectively controls access to a copyrighted work. In the name of mitigating the innocent casualties of this new ban, Congress constructed a triennial rulemaking, administered by the Register of Copyrights, to determine temporary exemptions. This paper considers the legislative history of this rulemaking, and it reports the results of a systematic content analysis of its 2000 and 2003 proceedings.
Inspired by the literature on political agendas, policymaking institutions, venue shifting, and theories of delegation, we conclude that the legislative motivations for Section 1201 were laundered through international treaties, …
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
ExpressO
This is a discussion of the legal and economic ramifications of password theft.
Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler
Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler
ExpressO
The Digital Age has spawned major legal battles over the fundamental principles of intellectual property law and antitrust law. These diverse struggles can best be analyzed using the basic norm of "value added" from neo-classical normative economics. This analysis suggests that current intellectual property doctirnes provide excessive protection and current antitrust doctrines remain awkward in dealing with the cross-market leveraging of monopoly power in the presence of "natural monopolies" created by network effects.
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
ExpressO
No abstract provided.
Contracts Concluded By Electronic Agents - Comparative Analysis Of American And Polish Legal Systems, Aleksandra M. Jurewicz
Contracts Concluded By Electronic Agents - Comparative Analysis Of American And Polish Legal Systems, Aleksandra M. Jurewicz
ExpressO
This article analyzes the US and Polish law on contract formation by electronic agents. It persents the main similarities and differences in the approaches of common and civil legal systems. Finally, it discusses changes in legal theories in Poland that had to be made in order to comply with standards of electronic commerce.
Cybersecurity, Identity Theft, And The Limits Of Tort Liability, Vincent R. Johnson
Cybersecurity, Identity Theft, And The Limits Of Tort Liability, Vincent R. Johnson
ExpressO
This article considers to what extent database possessors (such as credit card companies and universities) can be held liable for harm caused to data subjects (such as consumers, applicants, and alumni) when information relating to those persons is hacked or otherwise subject to improper access. Addressing common-law and statutory sources (including new legislation in 17 states) the article clearly differentiates the duty to safeguard data from the duty to notify data subjects that the security of their information has been breached. By analogy to the “medical-monitoring damages” which some states award in toxic-exposure cases, the article argues that “security-monitoring damages” …
Creative Commons And The New Intermediaries, Michael W. Carroll
Creative Commons And The New Intermediaries, Michael W. Carroll
Working Paper Series
This symposium contribution examines the disintermediating and reintermediating roles played by Creative Commons licenses on the Internet. Creative Commons licenses act as a disintermediating force because they enable end-to-end transactions in copyrighted works. The licenses have reintermediating force by enabling new services and new online communities to form around content licensed under a Creative Commons license. Intermediaries focused on the copyright dimension have begun to appear online as search engines, archives, libraries, publishers, community organizers, and educators. Moreover, the growth of machine-readable copyright licenses and the new intermediaries that they enable is part of a larger movement toward a Semantic …
From International Law To Law And Globalization, Paul Schiff Berman
From International Law To Law And Globalization, Paul Schiff Berman
ExpressO
International law’s traditional emphasis on state practice has long been questioned, as scholars have paid increasing attention to other important – though sometimes inchoate – processes of international norm development. Yet, the more recent focus on transnational law, governmental and non-governmental networks, and judicial influence and cooperation across borders, while a step in the right direction, still seems insufficient to describe the complexities of law in an era of globalization. Accordingly, it is becoming clear that “international law” is itself an overly constraining rubric and that we need an expanded framework, one that situates cross-border norm development at the intersection …
Towards A Cosmopolitan Vision Of Conflict Of Laws: Redefining Governmental Interests In A Global Era, Paul Schiff Berman
Towards A Cosmopolitan Vision Of Conflict Of Laws: Redefining Governmental Interests In A Global Era, Paul Schiff Berman
ExpressO
It has now been ten years since the idea of global online communication first entered the popular consciousness. And while the internet has undoubtedly opened up new worlds of interaction and cooperation across borders, this increased transnational activity has also at times inspired parochialism, at least among the legislatures and courts of nation-states around the globe. Thus, we have seen a slew of national laws and court decisions purporting to regulate a wide variety of online activities, from gambling to chat rooms to auction sites, and seeking to enforce territorially based rules regarding trademarks, contractual relations, privacy norms, “indecent” content, …
Thieves In Cyberspace: Examining Music Piracy And Copyright Law Deficiencies In Russia As It Enters The Digital Age, Michael F. Mertens
Thieves In Cyberspace: Examining Music Piracy And Copyright Law Deficiencies In Russia As It Enters The Digital Age, Michael F. Mertens
ExpressO
The article discusses broadly the music piracy problem in Russia, the current state of Russia’s copyright laws, and how its laws and problems compare to the U.S. and the rest of the world. In particular, the article focuses on music piracy through the Internet and how it has exploded in Russia. One of the websites I target is the infamous Allofmp3.com, which has attracted a large amount of U.S. attention in recent times by consumers as well as lawmakers. The article analyzes the legislative and enforcement deficiencies in Russia that led to the enormous problem with traditional music piracy and …
‘Code’ And The Slow Erosion Of Privacy, Ronald Leenes, Bert-Jaap Koops
‘Code’ And The Slow Erosion Of Privacy, Ronald Leenes, Bert-Jaap Koops
ExpressO
The notion of software code replacing legal code as a mechanism to control human behavior – ‘code as law’ – is often illustrated with examples in intellectual property and freedom of speech. This article examines the neglected issue of the impact of ‘code as law’ on privacy. To what extent is privacy-related ‘code’ being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects …
A Model For Emergency Service Of Voip Through Certification And Labeling, Patrick S. Ryan, Tom Lookabaugh, Douglas Sicker
A Model For Emergency Service Of Voip Through Certification And Labeling, Patrick S. Ryan, Tom Lookabaugh, Douglas Sicker
ExpressO
Voice over Internet Protocol (VoIP) will transform many aspects of traditional telephony service, including the technology, the business models, and the regulatory constructs that govern such service. Perhaps not unexpectedly, this transformation is generating a host of technical, business, social, and policy problems. In attempting to respond to these problems, the Federal Communications Commission (FCC) could mandate obligations or specific solutions to VoIP policy issues; however, it is instead looking first to industry initiatives focused on the key functionality that users have come to expect of telecommunications services. High among this list of desired functionality is user access to emergency …
The Drm Dilemma: Re-Aligning Rights Under The Digital Millennium Copyright Act, Jacqueline D. Lipton
The Drm Dilemma: Re-Aligning Rights Under The Digital Millennium Copyright Act, Jacqueline D. Lipton
ExpressO
The Digital Millennium Copyright Act (‘DMCA’) prevents unauthorized copying and distribution of digital copyright works by regulating devices that can be used to circumvent Digital Rights Management (‘DRM’) measures that are used to restrict access to those works. A significant problem is that those devices, like many new technologies, have the potential to be used for both socially harmful and socially beneficial purposes. There is no obvious way for Congress to regulate circumvention devices to prevent the social harms, while at the same time facilitating the social benefits they might provide. Recent judicial interpretations of the DMCA have unsurprisingly erred …
An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann
An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann
ExpressO
In this article, Professor Frischmann combines a number of current debates across many disciplinary lines, all of which examine from different perspectives whether certain resources should be managed through a regime of private property or through a regime of open access. Frischmann develops and applies a theory that demonstrates there are strong economic arguments for managing and sustaining openly accessible infrastructure. The approach he takes differs from conventional analyses in that he focuses extensively on demand-side considerations and fully explores how infrastructure resources generate value for consumers and society. As a result, the theory brings into focus the social value …
Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn
Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn
ExpressO
This article undertakes a normative and empirical legal inquiry into the manner information security vulnerabilities are being addressed through law and in the marketplace. Specifically, this article questions the current legislative paradigm for information security regulation by presenting a critique grounded in information security and cryptography theory. Consequently, this article advocates shifting our regulatory approach to a process-based security paradigm that focuses on improving security of our system as a whole. Finally, this article argues that in order to accomplish this shift with least disruption to current legal and economic processes, expanding an existing set of well-functioning legal structures is …
The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland
The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland
H. Brian Holland
No abstract provided.
Tempest In A Teapot Or Tidal Wave? Cybersquatting Remedies Run Amok, H. Brian Holland
Tempest In A Teapot Or Tidal Wave? Cybersquatting Remedies Run Amok, H. Brian Holland
H. Brian Holland
No abstract provided.
Playing Hide And Seek: How To Protect Virtual Pornographers And Actual Children On The Internet, Audrey Rogers
Playing Hide And Seek: How To Protect Virtual Pornographers And Actual Children On The Internet, Audrey Rogers
Elisabeth Haub School of Law Faculty Publications
This Article considers the Supreme Court's suggestion and recommends a mechanism to regulate the virtual pornography market in a manner that balances the rights of virtual pornographers with the prosecution of actual child pornographers. Part II traces the events leading up to the Free Speech decision, commencing with the enactment of the Child Pornography Prevention Act of 1996 (CPPA). Part III discusses the Free Speech opinion and the post-Free Speech cases. Part IV examines the PROTECT Act--the legislative response to the Supreme Court's decision. Part V concludes that regulation of the virtual pornography industry is the most effective method of …
The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland
The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland
H. Brian Holland
No abstract provided.
Tempest In A Teapot Or Tidal Wave? Cybersquatting Remedies Run Amok, H. Brian Holland
Tempest In A Teapot Or Tidal Wave? Cybersquatting Remedies Run Amok, H. Brian Holland
H. Brian Holland
No abstract provided.