Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Network Architecture (2)
- Network Neutrality (2)
- Wireless Networks (2)
- Access to Media Test (1)
- Amazon Kindle (1)
-
- Amazon.com (1)
- Application Design (1)
- Censorship (1)
- China (1)
- Citizens United v. Federal Election Commission (1)
- Computer Fraud and Abuse Act (1)
- Congestion Control (1)
- Consumer Rights Legislation (1)
- Corporate Complicity (1)
- Corporations (1)
- Data Privacy (1)
- Defamation (1)
- E-Books (1)
- End Note (1)
- End-to-End Argument (1)
- Essentiality of Access (1)
- Fair Trade Practices (1)
- Free Speech Rights (1)
- Gawronski v. Amazon.com (1)
- Gertz v. Robert Welch (1)
- Globalization (1)
- Great Firewall (1)
- ICP (1)
- ISP (1)
- Information Security (1)
Articles 1 - 10 of 10
Full-Text Articles in Law
How Elevation Of Corporate Free Speech Rights Affects Legality Of Network Neutrality, Barbara A. Cherry
How Elevation Of Corporate Free Speech Rights Affects Legality Of Network Neutrality, Barbara A. Cherry
Federal Communications Law Journal
In Citizens United v. Federal Election Commission (2010), the U.S. Supreme Court overruled a century of precedent to hold that corporations must be treated identically to natural persons with regard to political speech. This Article describes how the Court's decision is a radical departure from history that mirrors the FCC's flawed analysis in its classification of broadband Internet access services as an information service with no separable telecommunications component subject to common carriage regulation. Overall, the combinatorial effect of Citizens United and the FCC's classification of broadband access service as an information service is to elevate the constitutional free speech …
It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml
It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml
Federal Communications Law Journal
The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …
The End-To-End Argument And Application Design: The Role Of Trust, David D. Clark, Marjory S. Blumenthal
The End-To-End Argument And Application Design: The Role Of Trust, David D. Clark, Marjory S. Blumenthal
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
Policy debates about the evolution of the Internet show varying degrees of understanding about the underlying technology. A fundamental principle of the design of the Internet, from the early 1980s, is the so-called "end-to-end argument" articulated in a seminal technical paper. Intended to provide guidance for what kind of capability is built into a network as opposed to the devices that use the network, the end-to-end argument has been invoked in …
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
Wireless Efficiency Versus Net Neutrality, Charles L. Jackson
Wireless Efficiency Versus Net Neutrality, Charles L. Jackson
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
This Article first addresses congestion and congestion control in the Internet. It shows how congestion control has always depended upon altruistic behavior by end users. Equipment failures, malicious acts, or abandonment of altruistic behavior can lead to severe congestion within the Internet. Consumers benefit when network operators are able to control such congestion. One tool for controlling such congestion is giving higher priority to some applications, such as telephone calls, and …
The Internet Ecosystem: The Potential For Discrimination, Dick Grunwald
The Internet Ecosystem: The Potential For Discrimination, Dick Grunwald
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
This Article explores how the emerging Internet architecture of "cloud computing," content distribution networks, private peering and data-center services can simultaneously foster a perception of "unfair" network access while at the same time enabling significant competition for services, content, and innovation. A key enabler of these changes is the emergence of technologies that lower the barrier for entry in developing and deploying new services. Another is the design of successful Internet …
Spectrum Miscreants, Vigilantes, And Kangaroo Courts: The Return Of The Wireless Wars, Christian Sandvig
Spectrum Miscreants, Vigilantes, And Kangaroo Courts: The Return Of The Wireless Wars, Christian Sandvig
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
It is axiomatic that government licensing is a foundational requirement for the use of the electromagnetic spectrum. Yet in some bands there is no licensing requirement, providing an empirical site that can be used to examine wireless coexistence without licenses. This Article draws on ethnographic work with wireless Internet Service Providers to report on the extralegal means that are used to share or allocate spectrum in these license exempt bands. Operators …
Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders
Restraining Amazon.Com's Orwellian Potential: The Computer Fraud And Abuse Act As Consumer Rights Legislation, Alicia C. Sanders
Federal Communications Law Journal
In 2009, Amazon.com decided to correct a potential copyright violation by deleting e-books by George Orwell and Ayn Rand from the Kindles of users who had already purchased the offending texts. Two of those users, Justin Gawronski and Antoine Bruguier, claimed that Amazon.com had violated the Computer Fraud and Abuse Act (CFAA) by accessing their Kindles without authorization. The plaintiffs also relied on other causes of action, including breach of contract and trespass to chattels. Although the dispute quickly settled, the Gawronski lawsuit remains a useful case study that shows why the CFAA is a useful protection for consumers. Recently, …
Access To Media All A-Twitter: Revisiting Gertz And The Access To Media Test In The Age Of Social Networking, Ann E. O'Connor
Access To Media All A-Twitter: Revisiting Gertz And The Access To Media Test In The Age Of Social Networking, Ann E. O'Connor
Federal Communications Law Journal
Plaintiffs' access to media has long been a factor in defamation cases, enabling courts to determine whether that plaintiff is a public figure who must meet the actual malice standard, or whether that plaintiff is a private figure worthy of greater protection from defamation. This component of the public-private distinction can no longer be applied with clear precision, given the advent of social networking and today's world of widespread media access. In light of the massive changes that have taken place in the media world, the access to media test must be revisited and appropriately retailored to avoid an inappropriate …