Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (16)
- First Amendment (9)
- Science and Technology Law (8)
- Constitutional Law (7)
- Privacy Law (7)
-
- Communications Law (6)
- Intellectual Property Law (6)
- Law and Society (6)
- Social and Behavioral Sciences (5)
- Commercial Law (4)
- Computer Law (4)
- Jurisdiction (4)
- Civil Law (3)
- Comparative and Foreign Law (3)
- Legislation (3)
- State and Local Government Law (3)
- Administrative Law (2)
- Arts and Humanities (2)
- Civil Procedure (2)
- Criminal Law (2)
- Criminal Procedure (2)
- Criminology (2)
- Fourth Amendment (2)
- International Law (2)
- Jurisprudence (2)
- Legal Profession (2)
- Legal Writing and Research (2)
- Library and Information Science (2)
- National Security Law (2)
- Institution
-
- University of Michigan Law School (4)
- American University Washington College of Law (3)
- New York Law School (3)
- Roger Williams University (3)
- SJ Quinney College of Law, University of Utah (2)
-
- Seattle University School of Law (2)
- St. John's University School of Law (2)
- University of Nebraska - Lincoln (2)
- University of Richmond (2)
- Boston University School of Law (1)
- Case Western Reserve University School of Law (1)
- Cleveland State University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Nova Southeastern University (1)
- Pepperdine University (1)
- Saint Louis University School of Law (1)
- San Jose State University (1)
- Southern Methodist University (1)
- St. Mary's University (1)
- The Catholic University of America, Columbus School of Law (1)
- US Army War College (1)
- University at Buffalo School of Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Baltimore Law (1)
- University of Georgia School of Law (1)
- University of Maine School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Pennsylvania Carey Law School (1)
- University of San Diego (1)
- Washington University in St. Louis (1)
- Publication
-
- Articles in Law Reviews & Other Academic Journals (3)
- Faculty Publications (3)
- NYLS Law Review (3)
- Faculty Scholarship (2)
- Library Philosophy and Practice (e-journal) (2)
-
- Michigan Law Review (2)
- Seattle University Law Review (2)
- University of Richmond Law Review (2)
- Utah Law Faculty Scholarship (2)
- All Faculty Scholarship (1)
- Articles (1)
- Buffalo Law Review (1)
- Catholic University Law Review (1)
- Cleveland State Law Review (1)
- Faculty Journal Articles and Book Chapters (1)
- Georgia Journal of International & Comparative Law (1)
- Journal of Law, Technology, & the Internet (1)
- Law Library Newsletters/Blog (1)
- Law School Blogs (1)
- Life of the Law School (1993- ) (1)
- Maine Law Review (1)
- Michigan Law Review Online (1)
- Pepperdine Law Review (1)
- Review of law sciences (1)
- SLU Law Journal Online (1)
- San Diego International Law Journal (1)
- Scholarly Works (1)
- Scholarship@WashULaw (1)
- St. John's Law Review (1)
- St. Mary's Law Journal (1)
- Publication Type
Articles 1 - 30 of 45
Full-Text Articles in Law
Analysis Of Terminological Concept Of Information Technologies In Domestic And Foreign Literature, A.R. Davronov
Analysis Of Terminological Concept Of Information Technologies In Domestic And Foreign Literature, A.R. Davronov
Review of law sciences
In this article, the conceptual and terminological apparatus of information technologies in domestic and foreign literature has been studied and the concept of “Information technologies” has been analyzed using a comparative method. In addition, proposals are made to improve legislation in the field of information technology.
The First Amendment In The Second Gilded Age, Jack M. Balkin
The First Amendment In The Second Gilded Age, Jack M. Balkin
Buffalo Law Review
How do we pay for the digital public sphere? In the Second Gilded Age, the answer is primarily through digital surveillance and through finding ever new ways to make money out of personal data. Digital capitalism in the Second Gilded Age features an implicit bargain: a seemingly unlimited freedom to speak in exchange for the right to surveil and manipulate end users.To protect freedom of speech in the Second Gilded Age we must distinguish the values of free speech from the judicially created doctrines of the First Amendment. That is because the practical freedom to speak online depends on a …
Social Media Warriors: Leveraging A New Battlespace, Buddhika B. Jayamaha, Jahara Matisek
Social Media Warriors: Leveraging A New Battlespace, Buddhika B. Jayamaha, Jahara Matisek
The US Army War College Quarterly: Parameters
No abstract provided.
Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem
Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem
Library Philosophy and Practice (e-journal)
In this paper, we explore the socio-economic effects of internet use at the community information centres (CICs) on livelihoods in three regions of Ghana. Sustainable livelihood framework was used as a lens to understand the phenomena being studied. Primary and secondary data collection methods were used. Three CICs in three regions were purposively selected and qualitative research method was adopted for the study. The data were analysed using Nvivo. The findings showed that sending email information was largely the reason why people used the Internet. We found that through the Internet, people learn, develop new business ideas and expand the …
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Life of the Law School (1993- )
No abstract provided.
The Continuing Battle Over Net Neutrality, Mike Crawford
The Continuing Battle Over Net Neutrality, Mike Crawford
SLU Law Journal Online
In this article, Mike Crawford discusses how net neutrality continues to be a heated debate about who has the right and ability to create laws that will impact the way information on the Internet is viewed.
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Faculty Publications
Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …
Territorialization Of The Internet Domain Name System, Marketa Trimble
Territorialization Of The Internet Domain Name System, Marketa Trimble
Pepperdine Law Review
Territorialization of the internet—the linking of the internet to physical geography—is a growing trend. Internet users have become accustomed to the conveniences of localized advertising, have enjoyed location-based services, and have witnessed an increasing use of geolocation and geoblocking tools by service and content providers who—for various reasons— either allow or block access to internet content based on users’ physical locations. This article analyzes whether, and if so how, the trend toward territorialization has affected the internet Domain Name System (DNS). As a hallmark of cyberspace governance that aimed to be detached from the territorially-partitioned governance of the physical world, …
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
San Diego International Law Journal
This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.
"Distinctive Sounds": A Critique Of The Transformative Fair Use Test In Practice And The Need For A New Music Fair Use Exception, Kristin Bateman
"Distinctive Sounds": A Critique Of The Transformative Fair Use Test In Practice And The Need For A New Music Fair Use Exception, Kristin Bateman
Seattle University Law Review
The Constitution gives Congress the power “[t]o promote the Progress of Science and useful Arts,” resulting in our modern regime of patent, trademark, and copyright law. Over time, however, this artistic tradition of copying has collided with more modern concepts of intellectual property rights, especially copyright protections. The advent of the internet as well as state-of-the-art recording and mixing software has vastly increased opportunities to copy, remix, sample, parody, and otherwise alter the work of other artists, particularly musicians. More than twenty years after Campbell v. Acuff-Rose Music, transformative fair use has become the predominant test courts have used to …
The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati
The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati
Library Philosophy and Practice (e-journal)
Globalization has influenced many human life scopes with a variety of tools, which the cyberspace playing the most role. Although both cyberspace and globalization have had many benefits to human life, both as a tool and as a process, they have been able to assist offenders to bring crime into the cyberspace without any trouble. Therefore, today criminologists discuss the globalized world of crime. Although, the processes of homogenization and globalization have been precious to human beings, should not be overlooked. In this article, the author has tried to explain the cybercrime in the age of globalization, with an emphasis …
From Storefront To Dashboard: The Use Of The Americans With Disabilities Act To Govern Websites, Kelby S. Carlson
From Storefront To Dashboard: The Use Of The Americans With Disabilities Act To Govern Websites, Kelby S. Carlson
Catholic University Law Review
The question of the effects of technological change on the interpretation of statutes is a complicated one. Particularly for statutes that govern a broad range of issues, the advent of new technology can precipitate re-examination of the rationale behind, and nature of, the relevant law. The Americans with Disabilities Act was enacted, in part, to give Americans with disabilities greater access to public space, allowing them to enjoy the advantages such access offers on an equal footing with the able-bodied. The adoption of digital technology across society and, in particular, the widespread ubiquity of the internet now raise questions about …
Rwu First Amendment Blog: David A. Logan's Blog: Infowars Goes To War With The First Amendment 08-15-2018, David A. Logan
Rwu First Amendment Blog: David A. Logan's Blog: Infowars Goes To War With The First Amendment 08-15-2018, David A. Logan
Law School Blogs
No abstract provided.
Combating Fake News In Social Media: U.S. And German Legal Approaches, Ryan Kraski
Combating Fake News In Social Media: U.S. And German Legal Approaches, Ryan Kraski
St. John's Law Review
(Excerpt)
When asking how fake news in social media can be combated under U.S. and German law, one must first take the systems’ most fundamental differences into consideration. U.S. law is characterized by its federal structure, the interaction of state laws often with the federal, U.S. Constitution, usage of pretrial discovery, as well as the role of juries in calculating damages. In contrast, Germany, as a civil law system, is characterized by its usage of separate legal actions to acquire information, lack of pretrial discovery, and broader array of available remedies, none of which allow for punitive damages. Through a …
Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton
Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton
Seattle University Law Review
Section 230 of the Communications Decency Act (CDA) was enacted following the controversial decision in Stratton Oakmont, Inc. v. Prodigy Servs. Co., where an interactive computer service provider was held liable for a libelous message posted by a user on one of its financial message boards. The court determined that the service provider was a “publisher” of the libelous message for the purposes of state law because it had engaged in screening and moderating of other objectionable posts on its message boards but failed to remove the libelous message in question. Because the service provider voluntarily self-policed some of the …
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
A Status Update For Texas Voir Dire: Advocating For Pre-Trial Internet Investigation Of Prospective Jurors, Luke A. Harle
St. Mary's Law Journal
The Internet provides trial attorneys an additional tool to investigate the backgrounds of prospective jurors during voir dire. Online searches of a person’s name and social media accounts can reveal information that could be used as grounds for a challenge for cause or to facilitate intelligent use of peremptory strikes. Texas lawmakers have not yet provided any official guidance as to whether attorneys can investigate prospective jurors online or how they might do so, should it be allowed. Texas’s current voir dire structure, judicial opinions, and ethics opinions, together, support the notion that Texas trial attorneys should be given opportunities …
The Future Of Law And Mobility, Daniel A. Crane
The Future Of Law And Mobility, Daniel A. Crane
Articles
With the launch of the new Journal of Law and Mobility, the University of Michigan is recognizing the transformative impact of new transportation and mobility technologies, from cars, to trucks, to pedestrians, to drones. The coming transition towards intelligent, automated, and connected mobility systems will transform not only the way people and goods move about, but also the way human safety, privacy, and security are protected, cities are organized, machines and people are connected, and the public and private spheres are defined.
Against Notice And Choice: The Manifest Failure Of The Proceduralist Paradigm To Protect Privacy Online (Or Anywhere Else), John A. Rothchild
Against Notice And Choice: The Manifest Failure Of The Proceduralist Paradigm To Protect Privacy Online (Or Anywhere Else), John A. Rothchild
Cleveland State Law Review
Notice and choice are the foundational principles underlying the regulation of privacy in online transactions and in most other situations in which individuals interact with the government and commercial interests. These principles mean that before collecting personally identifiable information (PII) from an individual, the collector must provide the individual with a disclosure (notice) of what PII it proposes to collect and how it proposes to use that information. That knowledge enables the individual to make a rational decision (choice) about whether to allow that collection of information, generally by declining to enter into the transaction or, in some situations, by …
Cybersecurity And The Rights Of The Internet User In France, Jennifer Cross
Cybersecurity And The Rights Of The Internet User In France, Jennifer Cross
Georgia Journal of International & Comparative Law
No abstract provided.
Utility Law—All Hands On Deck: Bringing Broadband Home To Rural Arkansas, Amie Alexander
Utility Law—All Hands On Deck: Bringing Broadband Home To Rural Arkansas, Amie Alexander
University of Arkansas at Little Rock Law Review
No abstract provided.
Law Library Blog (April 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (April 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys
A Legal Perspective On The Trials And Tribulations Of Ai: How Artificial Intelligence, The Internet Of Things, Smart Contracts, And Other Technologies Will Affect The Law, Iria Giuffrida, Fredric Lederer, Nicolas Vermeys
Faculty Publications
No abstract provided.
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Faculty Scholarship
To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …
Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George
Utah Law Faculty Scholarship
This article examines the emergence and evolution of selected ranking and reporting frameworks in the expanding realm of business and human rights advocacy. It explores how indicators in the form of rankings and reports evaluating the conduct of transnational corporate actors can serve as regulatory tools with potential to bridge a global governance gap that often places human rights at risk. This article examines the relationship of transnational corporations in the Internet communications technology sector (ICT sector) to human rights and the risks presented to the right to freedom of expression and the right to privacy when ICT sector companies …
Inciting Terrorism On The Internet: The Limits Of Tolerating Intolerance, Amos N. Guiora
Inciting Terrorism On The Internet: The Limits Of Tolerating Intolerance, Amos N. Guiora
Utah Law Faculty Scholarship
The Internet is a limitless platform for information and data sharing. It is, in addition, however, a low-cost, high-speed dissemination mechanism that facilitates the spreading of hate speech, including violent and virtual threats. Indictment and prosecution for social media posts that transgress from opinion to incitable hate speech are appropriate in limited circumstances. Several real-world examples discussed here help to explore when limitations on Internet-based hate speech are appropriate.
In October 2015, twenty thousand Israelis joined a civil lawsuit filed against Facebook in the Supreme Court for the State of New York. Led by the civil rights organization Shurat HaDin, …
Minimum Virtual Contacts: A Framework For Specific Jurisdiction In Cyberspace, Adam R. Kleven
Minimum Virtual Contacts: A Framework For Specific Jurisdiction In Cyberspace, Adam R. Kleven
Michigan Law Review
As the ubiquity and importance of the internet continue to grow, courts will address more cases involving online activity. In doing so, courts will confront the threshold issue of whether a defendant can be subject to specific personal jurisdiction. The Supreme Court, however, has yet to speak to this internet-jurisdiction issue. Current precedent, when strictly applied to the internet, yields fundamentally unfair results when addressing specific jurisdiction. To better achieve the fairness aim of due process, this must change. This Note argues that, in internet tort cases, the “express aiming” requirement should be discarded from the jurisdictional analysis and that …
A Unifying Approach To Nexus Under The Dormant Commerce Clause, Adam B. Thimmesch
A Unifying Approach To Nexus Under The Dormant Commerce Clause, Adam B. Thimmesch
Michigan Law Review Online
The Supreme Court has long debated the existence and scope of its power to restrict state regulation under the so-called negative or dormant Commerce Clause. The Court took a broad view of that power in the late 1800s, but it has refined and restricted its role over time. One area where the Court has continued to wield considerable power, however, has been in the context of state taxes. Specifically, the Court has continued to restrict states' power to compel out-of-state vendors to collect their sales and use taxes based on a physical-presence "nexus" rule. That rule dates back to the …
Personal Jurisdiction And The Web, Joseph S. Burns, Richard A. Bales
Personal Jurisdiction And The Web, Joseph S. Burns, Richard A. Bales
Maine Law Review
Courts have struggled in determining precisely when a defendant should be subject to suit in a particular forum based on his or her Web activity. Although most jurisdictions have applied some form of the “minimum contacts” test, the test has been applied inconsistently. A new standard is needed to resolve personal jurisdiction disputes arising out of Web activity. This Article examines the ways in which modern courts have attempted to resolve personal jurisdiction issues based on Web activity, as well as the inconsistencies that have resulted from the inherent difficulty in conceptualizing the Web.
Reining In A 'Renegade' Court: Tc Heartland And The Eastern District Of Texas, Jonas Anderson
Reining In A 'Renegade' Court: Tc Heartland And The Eastern District Of Texas, Jonas Anderson
Articles in Law Reviews & Other Academic Journals
In TC Heartland v. Kraft Foods Group Brands, the Supreme Court tightened the venue requirement for patent cases, making it more difficult for a plaintiff to demonstrate that a district court has venue over a defendant. Many commentators, however, view TC Heartland as merely a “reshuffling” of the district courts that receive patent cases. Whereas before the case, a large percentage of patent cases were filed in the Eastern District of Texas, now, after TC Heartland, various other U.S. district courts (principally, the District of Delaware) have experienced an increase in patent infringement filings. Some commentators are unconvinced that this …
"Beyond The New Economy: The Other Technology Revolution" From The Entrepreneur’S Intellectual Property & Business Handbook, Jon Garon
Faculty Scholarship
This article is part of a series of book excerpts from The Entrepreneur’s Intellectual Property & Business Handbook, which provides the business, strategy, and legal reference guide for start-ups and small businesses. While the book refers to the Internet as perhaps the most significant technological change in the 21st century, computer technology, microbiology, and many other fields have undergone similar explosions in innovation.