Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (48)
- Intellectual Property Law (19)
- Science and Technology Law (15)
- Privacy Law (14)
- Social and Behavioral Sciences (10)
-
- Computer Law (9)
- First Amendment (9)
- Communications Law (7)
- Legal Education (7)
- Constitutional Law (6)
- Law and Society (6)
- International Law (5)
- National Security Law (5)
- Business Organizations Law (4)
- Contracts (4)
- Economics (4)
- Fourth Amendment (4)
- Administrative Law (3)
- Criminal Law (3)
- Legal Writing and Research (3)
- Political Science (3)
- American Politics (2)
- Behavioral Economics (2)
- Commercial Law (2)
- Communication (2)
- Communication Technology and New Media (2)
- Comparative and Foreign Law (2)
- Conflict of Laws (2)
- Consumer Protection Law (2)
- Institution
-
- Selected Works (14)
- The University of Akron (9)
- University of Michigan Law School (8)
- SelectedWorks (7)
- Fordham Law School (3)
-
- Loyola Marymount University and Loyola Law School (3)
- Pace University (3)
- Roger Williams University (3)
- Maurer School of Law: Indiana University (2)
- New York Law School (2)
- The Catholic University of America, Columbus School of Law (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- University of Baltimore Law (2)
- Washington University in St. Louis (2)
- William & Mary Law School (2)
- American University Washington College of Law (1)
- California Western School of Law (1)
- City University of New York (CUNY) (1)
- Cleveland State University (1)
- Louisiana State University Law Center (1)
- Montclair State University (1)
- Nova Southeastern University (1)
- Ohio Northern University (1)
- Old Dominion University (1)
- Penn State Law (1)
- St. John's University School of Law (1)
- The University of Notre Dame Australia (1)
- University at Albany, State University of New York (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Denver (1)
- Publication
-
- Akron Law Review (9)
- Fordham Intellectual Property, Media and Entertainment Law Journal (3)
- All Faculty Scholarship (2)
- Articles (2)
- Articles & Chapters (2)
-
- Articles by Maurer Faculty (2)
- Life of the Law School (1993- ) (2)
- Loyola of Los Angeles Law Review (2)
- Michigan Journal of International Law (2)
- Michigan Telecommunications & Technology Law Review (2)
- Pace Law Review (2)
- Patricia L. Bellia (2)
- Scholarship@WashULaw (2)
- Touro Law Review (2)
- University of Michigan Journal of Law Reform (2)
- Wayne R. Barnes (2)
- William & Mary Law Review (2)
- raphael cohen-almagor (2)
- Articles in Law Reviews & Other Academic Journals (1)
- Catherine J. Lanctot (1)
- Catholic University Journal of Law and Technology (1)
- Catholic University Law Review (1)
- College of Law Faculty Scholarship (1)
- Cynthia R. Farina (1)
- David E. Sorkin (1)
- David M Driesen (1)
- Department of Political Science and Law Faculty Scholarship and Creative Works (1)
- Electronic Thesis and Dissertation Repository (1)
- Faculty Publications (1)
- Faculty Scholarship (1)
- Publication Type
- File Type
Articles 61 - 90 of 90
Full-Text Articles in Law
Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney
Can You Diagnose Me Now? A Proposal To Modify The Fda’S Regulation Of Smartphone Mobile Health Applications With A Pre-Market Notification And Application Database Program, Stephen Mcinerney
University of Michigan Journal of Law Reform
Advances in mobile technology continually create new possibilities for the future of medical care. Yet these changes have also created concerns about patient safety. Under the Food, Drug, and Cosmetic Act, the Food and Drug Administration (FDA) has the authority to regulate a broad spectrum of products beyond traditional medical devices like stethoscopes or pacemakers. The regulatory question is not if the FDA has the statutory authority to regulate health-related software, but rather how it will exercise its regulatory authority. In September 2013, the FDA published Final Guidance on Mobile Medical Applications; in it, the Agency limited its oversight to …
Redefining Attention (And Revamping The Legal Profession?) For The Digital Generation, Lauren A. Newell
Redefining Attention (And Revamping The Legal Profession?) For The Digital Generation, Lauren A. Newell
Law Faculty Scholarship
With computers, text messages, Facebook, cell phones, smartphones, tablets, iPods, and other information and communication technologies (“ICTs”) constantly competing for our attention, we live in an age of perpetual distraction. Educators have long speculated that constant exposure to ICTs is eroding our ability to stay focused, and recent research supports these speculations. This raises particularly troubling implications for the practice of law, in which being able to pay sustained attention to the task at hand is crucial.
Research also indicates that the brains of today’s young people, the “Digital Generation,” may function differently than the brains of their elders because …
Cyberbullying - When Does A School Authority's Liability In Tort End?, Robert Pelletier, Boris Handal, Jessica Khalil, Tryon Francis
Cyberbullying - When Does A School Authority's Liability In Tort End?, Robert Pelletier, Boris Handal, Jessica Khalil, Tryon Francis
Law Papers and Journal Articles
Cyberbullying in schools is increasing on an alarming rate. The development of the Internet and smartphone technology have increased the potential scope of a school authority’s duty of care for its students. A question frequently asked by educators is “Where does a school authority’s duty of care end in the interconnected, 24/7 world of the Internet?” This paper argues that a duty of care will be owed where the school is in a school/student relationship with its students. That relationship can exist outside the school gates and outside of school hours.
There are no decisions of senior appellate courts that …
Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively
Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively
Jesse D Lively
This Comment argues that the Supreme Court of Virginia should first reverse the Virginia Court of Appeal’s decision when it hears the Yelp case later this year. Secondly, the court hold that the Virginia statute for identifying persons communicating anonymously over the Internet violates the First Amendment's required showing of merit on both law and facts before a subpoena duces tecum to identify an anonymous speaker can be enforced. Lastly, it should adopt a new “unveiling standard” similar to the standards used in either Dendrite or Cahill. Part II examines the jurisprudential history of identifying anonymous Internet speakers in defamation …
Analysis Of Freedom Of Information For Its Effect On Society, Considering The Arab Spring, Paul D. Callister, Kimberlee C. Everson
Analysis Of Freedom Of Information For Its Effect On Society, Considering The Arab Spring, Paul D. Callister, Kimberlee C. Everson
Paul D. Callister
2011, the year of the Arab Spring, presents a unique opportunity to look back and study how the relative freedom and development of information environments affect stability in nations throughout the Middle East and world. Such study raises interesting questions about whether freedom of information and speech are ultimately stabilizing influences for society in terms of loyalty, violence and political unrest—questions all the more important as societies face the onslaught of the internet, mobile devices and cell phones. Are non-democratic regimes “better off” by monopolizing and controlling the flow of information over new information channels? Are democratic societies, particularly developing …
Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart
Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart
University of Michigan Journal of Law Reform
In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …
The 95 Theses: Legal Research In The Internet Age, Amy E. Sloan
The 95 Theses: Legal Research In The Internet Age, Amy E. Sloan
All Faculty Scholarship
No abstract provided.
Care And Feeding Of Privacy Policies And Keeping The Big Data Monster At Bay: Legal Concerns In Healthcare In The Age Of The Internet Of Things, Christina Scelsi
Care And Feeding Of Privacy Policies And Keeping The Big Data Monster At Bay: Legal Concerns In Healthcare In The Age Of The Internet Of Things, Christina Scelsi
Nova Law Review
Recent inventions and business methods call attention to
the next step which must be taken for the protection of the person,
and for securing to the individual . . . the right to be let alone. . .
Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian
Dear Yahoo: A Comment On In Re Yahoo Mail Litigation, Nareen Melkonian
Loyola of Los Angeles Law Review
No abstract provided.
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, Nancy Kim, D.A. Jeremy Telman
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, Nancy Kim, D.A. Jeremy Telman
Faculty Scholarship
Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …
Trust And Social Commerce, Julia Y. Lee
Trust And Social Commerce, Julia Y. Lee
Journal Articles
Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace.
The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …
Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher
Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher
University of Richmond Law Review
No abstract provided.
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Articles by Maurer Faculty
Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
When Is Hacking Ethical?, Sharif Rezazadehsaber
When Is Hacking Ethical?, Sharif Rezazadehsaber
Legacy Theses & Dissertations (2009 - 2024)
This thesis examines situations in which computer hacking might be considered ethical. It addresses fundamental questions regarding the motivation and consequences of ethical hacking. The paper is organized into three sections. The first section discusses the history of hackers, classifies them according to their motivational background. The second part of the paper comprehensively describes the features of the ethical or “white hat” hacker group, and explores the positive and negative behaviors of ethical hackers in relation to their ethical principles. In the final section of the paper, I discuss hacktivist groups, their unique ideologies, and the risks they face, including …
Googling Down The Cost Of Low Sanctions, Gregory Dolin
Googling Down The Cost Of Low Sanctions, Gregory Dolin
All Faculty Scholarship
This brief solicited response addresses Prof. Irina Manta's article "The High Cost of Low Sanctions," which appeared in 66 Florida Law Review 157 (2014). Prof. Manta argued argues that to the extent the substantive law is unjust, low sanctions, in the long run, potentially create more problems and are more likely to perpetuate injustice than high sanctions would. She demonstrates that the general theory is applicable to the world of copyright, and then explains why as of late, the public has become more aware of and more resistant to the imposition of additional sanctions. In Professor Manta's view, the reason …
Let's Reinvent The Wheel: The Internet As A Means Of Interstate Commerce In United States V. Kieffer, Valeria G. Luster
Let's Reinvent The Wheel: The Internet As A Means Of Interstate Commerce In United States V. Kieffer, Valeria G. Luster
Oklahoma Law Review
No abstract provided.
Integrating The Internet, Brad Areheart
Integrating The Internet, Brad Areheart
College of Law Faculty Scholarship
This Article argues that the paradigmatic right of people with disabilities “to live in the world” naturally encompasses the right “to live in the Internet.” It further argues that the Internet is rightly understood as a place of public accommodation under antidiscrimination law. Because public accommodations are indispensable to integration, civil rights advocates have long argued that marginalized groups must have equal access to the physical institutions that enable one to learn, socialize, transact business, find jobs, and attend school. The Web now provides all of these opportunities and more, but people with disabilities are unable to traverse vast stretches …
The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble
The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble
Scholarly Works
From the early days of the Internet, commentators have warned that it would be impossible for those who act on the Internet (“Internet actors”) to comply with the copyright laws of all Internet-connected countries if the national copyright laws of all those countries were to apply simultaneously to Internet activity. A multiplicity of applicable copyright laws seems plausible at least when the Internet activity is ubiquitous — i.e., unrestricted by geoblocking or by other means — given the territoriality principle that governs international copyright law and the choice-of-law rules that countries typically use for copyright infringements.
This Article posits that …
From Anonymity To Identification, A. Michael Froomkin
From Anonymity To Identification, A. Michael Froomkin
Articles
This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …
Authors, Online, Daniel J. Gervais
Authors, Online, Daniel J. Gervais
Vanderbilt Law School Faculty Publications
The fate of professional creators is a major cultural issue. While specific copyright rules are obviously contingent and should be adapted to the new realities of online distribution and easy reuse, professional authorship remains necessary. I also believe that to be a professional author, creators need time, which, in turn, does require some form of payment. We need healthy financial flows to allow professional authors to make a decent, market-based living. This requires a move away from one-size-fits-all copyright and the resulting "tug of norms" that requires a shift of the entire policy package to the benefit of one category …
The Internet Grows Up?, Neil M. Richards
The Internet Grows Up?, Neil M. Richards
Scholarship@WashULaw
Danielle Citron’s Hate Crimes in Cyberspace is one of the most important publications to date in the emerging fields of privacy and cyberlaw. In her thoughtful and insightful book, Citron explains the uneven playing field and frequently shocking acts of abuse that women face online, and demonstrates practical steps that we can take to remedy the problem of online hate through law, education, and the development of better, more inclusive norms. Other contributors to this Symposium have examined these contributions in great detail, pointing out important nuances of Citron’s argument, urging her in at least one case to be even …
Digital Laws Evolve, Neil M. Richards
Digital Laws Evolve, Neil M. Richards
Scholarship@WashULaw
The essay from Wired Magazine (UK)'s special volume, "The Wired World in 2015," argues that although digital laws have lagged behind technological advances, they are starting to catch up, and this trend will continue in 2015. When it comes to privacy and technology, the law is catching up all over the world.
Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman
Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman
Articles & Chapters
Cyberharassment devastates its victims. Anxiety, panic attacks, and fear are common effects; post-traumatic stress disorder, anorexia and bulimia, and clinical depression are common diagnoses. Targets of online hate and abuse have gone into hiding, changed schools, and quit jobs to prevent further abuse. Some lives are devastated in adolescence and are never able to recover. Some lives come to tragic, premature ends. Danielle Keats Citron not only teases out these effects in her masterful work, Hate Crimes in Cyberspace; she also makes the profound conclusion that these personal effects are part of a larger social cancer that breeds sexism, subjugation, …
Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman
Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman
Articles & Chapters
This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.”
The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy …
Communication In Cyberspace, Nancy Leong, Joanne Morando
Communication In Cyberspace, Nancy Leong, Joanne Morando
Sturm College of Law: Faculty Scholarship
This Article examines a problem in cybercrime law that is both persistent and pervasive. What counts as “communication” on the Internet? Defining the term is particularly important for crimes such as cyberstalking, cyberharassment, and cyberbullying, where most statutes require a showing that the alleged perpetrator “communicated” with the victim or impose a similar requirement through slightly different language.
This Article takes up the important task of defining communication. As a foundation to our discussion, we provide the first comprehensive survey of state statutes and case law relating to cyberstalking, cyberharassment, and cyberbullying. We then examine the realities of the way …
A New Taxonomy For Online Harms, Kate Klonick
A New Taxonomy For Online Harms, Kate Klonick
Faculty Publications
(Excerpt)
Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …
Internet Freedom With Teeth, Charles Duan
Internet Freedom With Teeth, Charles Duan
Articles in Law Reviews & Other Academic Journals
"You make the very salient statement that we shouldn't lose sight of the fact that this is a case about teeth. Well, Markman was a case about dry cleaning. But nobody thinks of Markman as standing for anything about dry cleaning."
So went what was Chief Judge Prost's perhaps most striking question to the attorney for the International Trade Commission at oral argument in ClearCorrect Operating, LLC v. International Trade Commission, which is the focus of Professor Sapna Kumar's recent article Regulating Digital Trade. Yet this is what remains so fascinating about ClearCorrect: an administrative agency decision about idiosyncratic facts …
Becoming A Competent 21st Century Legal Ethics Professor: Everything You Always Wanted To Know About Technology (But Were Afraid To Ask), Catherine Lanctot
Becoming A Competent 21st Century Legal Ethics Professor: Everything You Always Wanted To Know About Technology (But Were Afraid To Ask), Catherine Lanctot
Catherine J. Lanctot
This Article provides a roadmap for rebooting the legal ethics curriculum. It describes how to revise a traditional legal ethics class to respond to twenty-first century law practice, and provides a detailed overview of the landscape of technological issues currently affecting the practice of law, including many cautionary tales of lawyers who ignored their ethical responsibilities.
We have finally hit the tipping point with respect to the use of technology within the legal profession, as bar regulators have begun to warn attorneys that they may no longer plead ignorance of technological advances if such ignorance harms the interests of their …