Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (18)
- Communications Law (9)
- Intellectual Property Law (9)
- Science and Technology Law (9)
- Social and Behavioral Sciences (8)
-
- Computer Law (6)
- Administrative Law (4)
- Contracts (4)
- Entertainment, Arts, and Sports Law (4)
- First Amendment (4)
- Law and Society (4)
- Privacy Law (4)
- Criminal Law (3)
- Dispute Resolution and Arbitration (3)
- Election Law (3)
- Human Rights Law (3)
- Law and Politics (3)
- Litigation (3)
- Science and Technology Studies (3)
- Civil Rights and Discrimination (2)
- Communication (2)
- Communication Technology and New Media (2)
- Computer Engineering (2)
- Computer and Systems Architecture (2)
- Constitutional Law (2)
- Digital Communications and Networking (2)
- Engineering (2)
- International Law (2)
- International and Area Studies (2)
- Institution
-
- Selected Works (12)
- SelectedWorks (12)
- University of Michigan Law School (6)
- Fordham Law School (5)
- University of Florida Levin College of Law (3)
-
- Cleveland State University (2)
- Drexel University Thomas R. Kline School of Law (2)
- New York Law School (2)
- University of Missouri School of Law (2)
- University of Pennsylvania Carey Law School (2)
- American University Washington College of Law (1)
- Boston University School of Law (1)
- Chicago-Kent College of Law (1)
- Cornell University Law School (1)
- Florida A&M University College of Law (1)
- Marquette University Law School (1)
- Maurer School of Law: Indiana University (1)
- Montclair State University (1)
- Northwestern Pritzker School of Law (1)
- Pace University (1)
- Singapore Management University (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Baltimore Law (1)
- University of Massachusetts Amherst (1)
- University of Pittsburgh School of Law (1)
- University of Richmond (1)
- University of San Diego (1)
- Vanderbilt University Law School (1)
- Washington and Lee University School of Law (1)
- West Virginia University (1)
- Publication
-
- All Faculty Scholarship (3)
- Fordham Law Review (3)
- Michigan Telecommunications & Technology Law Review (3)
- William L. Reynolds (3)
- Articles & Chapters (2)
-
- Fordham Intellectual Property, Media and Entertainment Law Journal (2)
- Geoff Sharp (2)
- Kelly Gable (2)
- Michigan Law Review (2)
- Molly K. Land (2)
- Sheng-Chen Tseng (2)
- UF Law Faculty Publications (2)
- Articles (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Assaf Jacob (1)
- Carl M Szabo (1)
- Catherine Ross Dunham (1)
- Chicago-Kent Law Review (1)
- Deborah Brightman Morse (1)
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Elizabeth A Rowe (1)
- Faculty Publications (1)
- Faculty Scholarship (1)
- Federal Communications Law Journal (1)
- Francis S Monterosso (1)
- Jacqueline D Lipton (1)
- Jake Werrett (1)
- James Grimmelmann (1)
- John M Ivancie Jr. (1)
- Publication Type
Articles 1 - 30 of 68
Full-Text Articles in Law
Virtual Intermediaries Ii - Canadian Solutions (Drop Shipments) Compared With Us, Japanese & Eu Approaches, Richard Thompson Ainsworth
Virtual Intermediaries Ii - Canadian Solutions (Drop Shipments) Compared With Us, Japanese & Eu Approaches, Richard Thompson Ainsworth
Faculty Scholarship
Virtual travel agents are opportunistic internet-based travel agents. They are intermediary businesses that create mutually beneficial three-party transactions that secure accommodations for a traveler that: (a) meet the basic needs of the traveler (at a discount), (b) fills vacant room for accommodation retailers with guests that pay below market, but above standard costs, and (c) profit from the extra cash, the margin in the transaction.
The virtual intermediary’s eye is always on the discount and the cash flow. One of the things that catches their attention are the accommodation taxes which they collect from the traveler in advance and remit …
The Riaa’S Troubling Solution To File- Sharing , Genan Zilkha
The Riaa’S Troubling Solution To File- Sharing , Genan Zilkha
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo
The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo
All Faculty Scholarship
This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …
Protect The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technological World, Francis S. Monterosso
Protect The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technological World, Francis S. Monterosso
Francis S Monterosso
This Note untangles courts’ problems with the prosecution of child pornography defendants and aims to redirect attention to the social impact associated with these crimes. First, Part I provides an introduction to the Note and discusses the background of the Child Pornography Prevention Act. Secondly, Part II sets forth the evolution of the CPPA and its goals and shortcomings. Next, Part III further explains the development of child pornography prosecutions in the United States through two cases that illustrate the government’s desire to prosecute child pornography defendants.
Moreover, Part IV explains the difficulties courts have encountered in the prosecution of …
Survey Of The Law Of Cyberspace: Introduction, Juliet Moringiello
Survey Of The Law Of Cyberspace: Introduction, Juliet Moringiello
Juliet M Moringiello
No abstract provided.
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
William L. Reynolds
No abstract provided.
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
Juliet M. Moringiello
No abstract provided.
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
William L. Reynolds
No abstract provided.
Revisiting Beccaria's Vision: The Enlightenment, America's Death Penalty, And The Abolition Movement, John Bessler
Revisiting Beccaria's Vision: The Enlightenment, America's Death Penalty, And The Abolition Movement, John Bessler
All Faculty Scholarship
In 1764, Cesare Beccaria, a 26-year-old Italian criminologist, penned On Crimes and Punishments. That treatise spoke out against torture and made the first comprehensive argument against state-sanctioned executions. As we near the 250th anniversary of its publication, law professor John Bessler provides a comprehensive review of the abolition movement from before Beccaria's time to the present. Bessler reviews Beccaria's substantial influence on Enlightenment thinkers and on America's Founding Fathers in particular. The Article also provides an extensive review of Eighth Amendment jurisprudence and then contrasts it with the trend in international law towards the death penalty's abolition. It then discusses …
A Look Backwards: An Open Letter To The Arkansas Bar, Phillip Carroll
A Look Backwards: An Open Letter To The Arkansas Bar, Phillip Carroll
University of Arkansas at Little Rock Law Review
No abstract provided.
Does It Really Suck?: The Impact Of Cutting-Edge Marketing Tactics On Internet Trademark Law And Gripe Site Domain Name Disputes, Mindy P. Fox
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Hack Your Blog (Lightning Talk), Laura Quilter
Hack Your Blog (Lightning Talk), Laura Quilter
Laura Quilter
A short 101-level lightning talk on "hacking your blog" for Software Freedom Day, Boston, 2009.
The Networked Electorate: The Internet And The Quiet Democratic Revolution In Malaysia And Singapore, Hang Wu Tang
The Networked Electorate: The Internet And The Quiet Democratic Revolution In Malaysia And Singapore, Hang Wu Tang
Research Collection Yong Pung How School Of Law
This paper is intended to be a contribution to the literature on claims of the democratising effect of the Internet. The paper begins by setting out the arguments and also critiques of claims of the democratising power of the Internet. In order to test the validity of these arguments, the author will undertake a comparative study of the impact of the Internet on recent general elections in Malaysia and Singapore. The study will demonstrate that in the case of Singapore, the Internet has merely exerted some pressure on the pre-existing laws and state-imposed norms governing free speech; in contrast, in …
Tucker Lecture, Law And Media Symposium, Erwin Chemerinsky
Tucker Lecture, Law And Media Symposium, Erwin Chemerinsky
Washington and Lee Law Review
No abstract provided.
Thwack!! Take That, User-Generated Content!: Marvel Enterprises, Inc. V. Ncsoft Corp., Carl M. Szabo
Thwack!! Take That, User-Generated Content!: Marvel Enterprises, Inc. V. Ncsoft Corp., Carl M. Szabo
Carl M Szabo
Dear Madam or Sir: As seen in the attached note, I am to make two contributions. First, I address the issue of copyright liability of websites for infringement by the website users. A constant struggle as old as the constitution itself, the issue of copyright protection now makes its way into the virtual world of the internet. While the issue of copyright liability has been seen in hundreds of comments and notes from courts and attorneys alike, the issue of copyright liability on the internet remains an open question that if not addressed could endanger the protection afforded to authors …
P2p 'System Caching' – The Copyright Dilemma, Assaf Jacob, Zoe Argento
P2p 'System Caching' – The Copyright Dilemma, Assaf Jacob, Zoe Argento
Assaf Jacob
This paper explores the legal ramifications of the prevalent Internet Service Provider practice of providing caching services to P2P network users. First, the paper describes the P2P industry, its benefits and drawbacks. Then the paper discusses several caching techniques that can be implemented, and indeed are implemented, by ISPs around the globe. These practices allow ISPs to provide clients with better services but, by the same token, expose them to copyright infringement suits by third parties. The article will discuss how copyright law should consider the costs and benefits to the public of P2P caching practices, especially in the application …
Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable
Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable
Kelly Gable
No abstract provided.
Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable
Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable
Kelly Gable
No abstract provided.
E-Voting And Forensics: Prying Open The Black Box, Candice Hoke, Matt Bishop, Mark Graff, Sean Peisert, David Jefferson
E-Voting And Forensics: Prying Open The Black Box, Candice Hoke, Matt Bishop, Mark Graff, Sean Peisert, David Jefferson
S. Candice Hoke
Over the past six years, the nation has moved rapidly from punch cards and levers to electronic voting systems. These new systems have occasionally presented election officials with puzzling technical irregularities. The national experience has included unexpected and unexplained incidents in each phase of the election process: preparations, balloting, tabulation, and reporting results. Quick technical or managerial assessment can often identify the cause of the problem, leading to a simple and effective solution. But other times, the cause and scope of anomalies cannot be determined. In this paper, we describe the application of a model of forensics to the types …
E-Voting And Forensics: Prying Open The Black Box, Candice Hoke, Sean Peisert, Matt Bishop, Mark Graff, David Jefferson
E-Voting And Forensics: Prying Open The Black Box, Candice Hoke, Sean Peisert, Matt Bishop, Mark Graff, David Jefferson
Law Faculty Articles and Essays
Over the past six years, the nation has moved rapidly from punch cards and levers to electronic voting systems. These new systems have occasionally presented election officials with puzzling technical irregularities. The national experience has included unexpected and unexplained incidents in each phase of the election process: preparations, balloting, tabulation, and reporting results. Quick technical or managerial assessment can often identify the cause of the problem, leading to a simple and effective solution. But other times, the cause and scope of anomalies cannot be determined. In this paper, we describe the application of a model of forensics to the types …
Meaningful Mortgage Reform, Jake Werrett
Meaningful Mortgage Reform, Jake Werrett
Jake Werrett
Should six-year-old children be able to access “the largest pornography store in history?” They can. Should eleven be the average age that a child first views pornography? It is. Should children between the ages of twelve and seventeen represent the largest group of pornography consumers? They do. It is puzzling how a quintessentially adult activity has increasingly edged-out Saturday morning cartoons, homework, piano lessons, and T-ball games. Perhaps social consensus is that teenagers are best served by searching out porn 150 billion times a year. But, I doubt it.
Juxtaposing limitations on children's exposure to speech in the real-world versus …
Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin
Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin
University of Michigan Journal of Law Reform
Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as …
The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie
John M Ivancie Jr.
This paper revolves around the novel use of the federal Computer Fraud and Abuse Act to prosecute a Missouri woman, who, with her high-school-aged daughter, and a teenage employee created a fake MySpace.com account to get information about, and harass the daughter’s teen-aged friend. This harassment eventually led to that young girls suicide. No local law was broken by the trio’s actions, and thus, there was nothing local law-enforcement authorities could do. Federal prosecutors in California did respond and charged the mother under the Computer Fraud and Abuse Act, a Federal anti-hacking statute. The way prosecutors used the statute is …
Warshak: A Test Case For The Intersection Of Law Enforcement And Cyber Security, Michael C. Mcnerney
Warshak: A Test Case For The Intersection Of Law Enforcement And Cyber Security, Michael C. Mcnerney
Michael C McNerney
Often times, the lines between criminal investigations and intelligence activities can become blurred. How far can a government agency go in gathering electronic information on an American citizen suspected of a crime? What implications are there for Americans suspected of terrorist activities? The American people want their government to have the tools to keep them safe but they also want to be free from unreasonable searches and seizures. There are many difficult questions but very little settled law on the subject. Although only a small piece of the puzzle, a recent decision by the Sixth Circuit in a case called …
The Critique Of Negative Knowledge And Unfair Competition In Taiwan, Sheng-Chen Tseng
The Critique Of Negative Knowledge And Unfair Competition In Taiwan, Sheng-Chen Tseng
Sheng-Chen Tseng
Trade secret cases pose special problems distinct from other intellectual property lawsuits because alleged trade secrets are rarely defined in advance of litigation. Perhaps the strangest theory of trade secret law is the concept of negative know-how, a theory under which an employee who resigns and joins a different business can be liable for not repeating the mistakes and failures of his or her former employer. The boundaries of the negative knowledge concepts have not been well articulated in the case law. This article first reviews the Taiwan (ROC) Statutes and theories, especially in Fair Trade Law. There is a …
Discussion Of Trade Secrets Protection Posed By Computerization, Sheng-Chen Tseng
Discussion Of Trade Secrets Protection Posed By Computerization, Sheng-Chen Tseng
Sheng-Chen Tseng
The amendment of Taiwan Trade Secret Act has not been implemented for economic espionage crimes and new types of technologies. Thus this paper indicates the suggestion for legislation after analysis of United States laws and Taiwan status quo. The purpose of the trade secret protection is to maintain industrial ethics and order in competition, encourage the invention and innovation of technologies. Taiwan has regarded the trade secret as a part of the intellectual property. The TRIP Agreement has a great influence on the Taiwan legislation, and other foreign precedents are also taken as the important reference for the Taiwan legislation. …
40 Sites In 40 Minutes, Geoff Sharp
40 Sites In 40 Minutes, Geoff Sharp
Geoff Sharp
The best of free mediation resources on the world wide web
Beyond Free Speech: Novel Approaches To Hate On The Internet In The United States, Jessica S. Henry
Beyond Free Speech: Novel Approaches To Hate On The Internet In The United States, Jessica S. Henry
Department of Justice Studies Faculty Scholarship and Creative Works
Hate on the Internet presents a unique problem in the United States. The First Amendment to the Constitution protects speech, even that which is hateful and offensive. Although the First Amendment is not without limitation and, indeed, although there have been a small number of successful prosecutions of individuals who disseminated hate speech over the Internet, web-based hate continues to receive broad First Amendment protections. Some non-governmental organizations in the United States, such as the Anti-Defamation League (ADL) and the Southern Poverty Law Center, have adopted innovative approaches to hate on the Internet. For instance, the ADL tracks and monitors …
The Legal Scholarship Of Blogs, Geoff Sharp
The Legal Scholarship Of Blogs, Geoff Sharp
Geoff Sharp
If you’ve ever felt the need to share your opinions with the world, then blogs just may provide you with the global audience you’ve been longing for. Geoff Sharp surfs the wave of the future and finds out the skinny on blawging.
The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth
The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth
Federal Communications Law Journal
In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.
This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …