Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Internet

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 68

Full-Text Articles in Law

Virtual Intermediaries Ii - Canadian Solutions (Drop Shipments) Compared With Us, Japanese & Eu Approaches, Richard Thompson Ainsworth Dec 2009

Virtual Intermediaries Ii - Canadian Solutions (Drop Shipments) Compared With Us, Japanese & Eu Approaches, Richard Thompson Ainsworth

Faculty Scholarship

Virtual travel agents are opportunistic internet-based travel agents. They are intermediary businesses that create mutually beneficial three-party transactions that secure accommodations for a traveler that: (a) meet the basic needs of the traveler (at a discount), (b) fills vacant room for accommodation retailers with guests that pay below market, but above standard costs, and (c) profit from the extra cash, the margin in the transaction.

The virtual intermediary’s eye is always on the discount and the cash flow. One of the things that catches their attention are the accommodation taxes which they collect from the traveler in advance and remit …


The Riaa’S Troubling Solution To File- Sharing , Genan Zilkha Dec 2009

The Riaa’S Troubling Solution To File- Sharing , Genan Zilkha

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo Dec 2009

The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo

All Faculty Scholarship

This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …


Protect The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technological World, Francis S. Monterosso Nov 2009

Protect The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technological World, Francis S. Monterosso

Francis S Monterosso

This Note untangles courts’ problems with the prosecution of child pornography defendants and aims to redirect attention to the social impact associated with these crimes. First, Part I provides an introduction to the Note and discusses the background of the Child Pornography Prevention Act. Secondly, Part II sets forth the evolution of the CPPA and its goals and shortcomings. Next, Part III further explains the development of child pornography prosecutions in the United States through two cases that illustrate the government’s desire to prosecute child pornography defendants.

Moreover, Part IV explains the difficulties courts have encountered in the prosecution of …


Survey Of The Law Of Cyberspace: Introduction, Juliet Moringiello Oct 2009

Survey Of The Law Of Cyberspace: Introduction, Juliet Moringiello

Juliet M Moringiello

No abstract provided.


Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds Oct 2009

Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds

William L. Reynolds

No abstract provided.


Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds Oct 2009

Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds

Juliet M. Moringiello

No abstract provided.


Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds Oct 2009

Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds

William L. Reynolds

No abstract provided.


Revisiting Beccaria's Vision: The Enlightenment, America's Death Penalty, And The Abolition Movement, John Bessler Oct 2009

Revisiting Beccaria's Vision: The Enlightenment, America's Death Penalty, And The Abolition Movement, John Bessler

All Faculty Scholarship

In 1764, Cesare Beccaria, a 26-year-old Italian criminologist, penned On Crimes and Punishments. That treatise spoke out against torture and made the first comprehensive argument against state-sanctioned executions. As we near the 250th anniversary of its publication, law professor John Bessler provides a comprehensive review of the abolition movement from before Beccaria's time to the present. Bessler reviews Beccaria's substantial influence on Enlightenment thinkers and on America's Founding Fathers in particular. The Article also provides an extensive review of Eighth Amendment jurisprudence and then contrasts it with the trend in international law towards the death penalty's abolition. It then discusses …


A Look Backwards: An Open Letter To The Arkansas Bar, Phillip Carroll Oct 2009

A Look Backwards: An Open Letter To The Arkansas Bar, Phillip Carroll

University of Arkansas at Little Rock Law Review

No abstract provided.


Does It Really Suck?: The Impact Of Cutting-Edge Marketing Tactics On Internet Trademark Law And Gripe Site Domain Name Disputes, Mindy P. Fox Oct 2009

Does It Really Suck?: The Impact Of Cutting-Edge Marketing Tactics On Internet Trademark Law And Gripe Site Domain Name Disputes, Mindy P. Fox

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Hack Your Blog (Lightning Talk), Laura Quilter Sep 2009

Hack Your Blog (Lightning Talk), Laura Quilter

Laura Quilter

A short 101-level lightning talk on "hacking your blog" for Software Freedom Day, Boston, 2009.


The Networked Electorate: The Internet And The Quiet Democratic Revolution In Malaysia And Singapore, Hang Wu Tang Sep 2009

The Networked Electorate: The Internet And The Quiet Democratic Revolution In Malaysia And Singapore, Hang Wu Tang

Research Collection Yong Pung How School Of Law

This paper is intended to be a contribution to the literature on claims of the democratising effect of the Internet. The paper begins by setting out the arguments and also critiques of claims of the democratising power of the Internet. In order to test the validity of these arguments, the author will undertake a comparative study of the impact of the Internet on recent general elections in Malaysia and Singapore. The study will demonstrate that in the case of Singapore, the Internet has merely exerted some pressure on the pre-existing laws and state-imposed norms governing free speech; in contrast, in …


Tucker Lecture, Law And Media Symposium, Erwin Chemerinsky Sep 2009

Tucker Lecture, Law And Media Symposium, Erwin Chemerinsky

Washington and Lee Law Review

No abstract provided.


Thwack!! Take That, User-Generated Content!: Marvel Enterprises, Inc. V. Ncsoft Corp., Carl M. Szabo Aug 2009

Thwack!! Take That, User-Generated Content!: Marvel Enterprises, Inc. V. Ncsoft Corp., Carl M. Szabo

Carl M Szabo

Dear Madam or Sir: As seen in the attached note, I am to make two contributions. First, I address the issue of copyright liability of websites for infringement by the website users. A constant struggle as old as the constitution itself, the issue of copyright protection now makes its way into the virtual world of the internet. While the issue of copyright liability has been seen in hundreds of comments and notes from courts and attorneys alike, the issue of copyright liability on the internet remains an open question that if not addressed could endanger the protection afforded to authors …


P2p 'System Caching' – The Copyright Dilemma, Assaf Jacob, Zoe Argento Aug 2009

P2p 'System Caching' – The Copyright Dilemma, Assaf Jacob, Zoe Argento

Assaf Jacob

This paper explores the legal ramifications of the prevalent Internet Service Provider practice of providing caching services to P2P network users. First, the paper describes the P2P industry, its benefits and drawbacks. Then the paper discusses several caching techniques that can be implemented, and indeed are implemented, by ISPs around the globe. These practices allow ISPs to provide clients with better services but, by the same token, expose them to copyright infringement suits by third parties. The article will discuss how copyright law should consider the costs and benefits to the public of P2P caching practices, especially in the application …


Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable Aug 2009

Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable

Kelly Gable

No abstract provided.


Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable Aug 2009

Cyber Apocalypse Now: Securing The Internet Against Cyberterrorism And Using Universal Jurisdiction As A Deterrent, Kelly Gable

Kelly Gable

No abstract provided.


E-Voting And Forensics: Prying Open The Black Box, Candice Hoke, Matt Bishop, Mark Graff, Sean Peisert, David Jefferson Aug 2009

E-Voting And Forensics: Prying Open The Black Box, Candice Hoke, Matt Bishop, Mark Graff, Sean Peisert, David Jefferson

S. Candice Hoke

Over the past six years, the nation has moved rapidly from punch cards and levers to electronic voting systems. These new systems have occasionally presented election officials with puzzling technical irregularities. The national experience has included unexpected and unexplained incidents in each phase of the election process: preparations, balloting, tabulation, and reporting results. Quick technical or managerial assessment can often identify the cause of the problem, leading to a simple and effective solution. But other times, the cause and scope of anomalies cannot be determined. In this paper, we describe the application of a model of forensics to the types …


E-Voting And Forensics: Prying Open The Black Box, Candice Hoke, Sean Peisert, Matt Bishop, Mark Graff, David Jefferson Aug 2009

E-Voting And Forensics: Prying Open The Black Box, Candice Hoke, Sean Peisert, Matt Bishop, Mark Graff, David Jefferson

Law Faculty Articles and Essays

Over the past six years, the nation has moved rapidly from punch cards and levers to electronic voting systems. These new systems have occasionally presented election officials with puzzling technical irregularities. The national experience has included unexpected and unexplained incidents in each phase of the election process: preparations, balloting, tabulation, and reporting results. Quick technical or managerial assessment can often identify the cause of the problem, leading to a simple and effective solution. But other times, the cause and scope of anomalies cannot be determined. In this paper, we describe the application of a model of forensics to the types …


Meaningful Mortgage Reform, Jake Werrett Jul 2009

Meaningful Mortgage Reform, Jake Werrett

Jake Werrett

Should six-year-old children be able to access “the largest pornography store in history?” They can. Should eleven be the average age that a child first views pornography? It is. Should children between the ages of twelve and seventeen represent the largest group of pornography consumers? They do. It is puzzling how a quintessentially adult activity has increasingly edged-out Saturday morning cartoons, homework, piano lessons, and T-ball games. Perhaps social consensus is that teenagers are best served by searching out porn 150 billion times a year. But, I doubt it.

Juxtaposing limitations on children's exposure to speech in the real-world versus …


Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin Jul 2009

Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin

University of Michigan Journal of Law Reform

Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as …


The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie Jun 2009

The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie

John M Ivancie Jr.

This paper revolves around the novel use of the federal Computer Fraud and Abuse Act to prosecute a Missouri woman, who, with her high-school-aged daughter, and a teenage employee created a fake MySpace.com account to get information about, and harass the daughter’s teen-aged friend. This harassment eventually led to that young girls suicide. No local law was broken by the trio’s actions, and thus, there was nothing local law-enforcement authorities could do. Federal prosecutors in California did respond and charged the mother under the Computer Fraud and Abuse Act, a Federal anti-hacking statute. The way prosecutors used the statute is …


Warshak: A Test Case For The Intersection Of Law Enforcement And Cyber Security, Michael C. Mcnerney Jun 2009

Warshak: A Test Case For The Intersection Of Law Enforcement And Cyber Security, Michael C. Mcnerney

Michael C McNerney

Often times, the lines between criminal investigations and intelligence activities can become blurred. How far can a government agency go in gathering electronic information on an American citizen suspected of a crime? What implications are there for Americans suspected of terrorist activities? The American people want their government to have the tools to keep them safe but they also want to be free from unreasonable searches and seizures. There are many difficult questions but very little settled law on the subject. Although only a small piece of the puzzle, a recent decision by the Sixth Circuit in a case called …


The Critique Of Negative Knowledge And Unfair Competition In Taiwan, Sheng-Chen Tseng Jun 2009

The Critique Of Negative Knowledge And Unfair Competition In Taiwan, Sheng-Chen Tseng

Sheng-Chen Tseng

Trade secret cases pose special problems distinct from other intellectual property lawsuits because alleged trade secrets are rarely defined in advance of litigation. Perhaps the strangest theory of trade secret law is the concept of negative know-how, a theory under which an employee who resigns and joins a different business can be liable for not repeating the mistakes and failures of his or her former employer. The boundaries of the negative knowledge concepts have not been well articulated in the case law. This article first reviews the Taiwan (ROC) Statutes and theories, especially in Fair Trade Law. There is a …


Discussion Of Trade Secrets Protection Posed By Computerization, Sheng-Chen Tseng Jun 2009

Discussion Of Trade Secrets Protection Posed By Computerization, Sheng-Chen Tseng

Sheng-Chen Tseng

The amendment of Taiwan Trade Secret Act has not been implemented for economic espionage crimes and new types of technologies. Thus this paper indicates the suggestion for legislation after analysis of United States laws and Taiwan status quo. The purpose of the trade secret protection is to maintain industrial ethics and order in competition, encourage the invention and innovation of technologies. Taiwan has regarded the trade secret as a part of the intellectual property. The TRIP Agreement has a great influence on the Taiwan legislation, and other foreign precedents are also taken as the important reference for the Taiwan legislation. …


40 Sites In 40 Minutes, Geoff Sharp Jun 2009

40 Sites In 40 Minutes, Geoff Sharp

Geoff Sharp

The best of free mediation resources on the world wide web


Beyond Free Speech: Novel Approaches To Hate On The Internet In The United States, Jessica S. Henry Jun 2009

Beyond Free Speech: Novel Approaches To Hate On The Internet In The United States, Jessica S. Henry

Department of Justice Studies Faculty Scholarship and Creative Works

Hate on the Internet presents a unique problem in the United States. The First Amendment to the Constitution protects speech, even that which is hateful and offensive. Although the First Amendment is not without limitation and, indeed, although there have been a small number of successful prosecutions of individuals who disseminated hate speech over the Internet, web-based hate continues to receive broad First Amendment protections. Some non-governmental organizations in the United States, such as the Anti-Defamation League (ADL) and the Southern Poverty Law Center, have adopted innovative approaches to hate on the Internet. For instance, the ADL tracks and monitors …


The Legal Scholarship Of Blogs, Geoff Sharp Jun 2009

The Legal Scholarship Of Blogs, Geoff Sharp

Geoff Sharp

If you’ve ever felt the need to share your opinions with the world, then blogs just may provide you with the global audience you’ve been longing for. Geoff Sharp surfs the wave of the future and finds out the skinny on blawging.


The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth Jun 2009

The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth

Federal Communications Law Journal

In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.

This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …