Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet

SelectedWorks

Discipline
Publication Year
Publication
File Type

Articles 1 - 30 of 91

Full-Text Articles in Law

Why Confronting The Internet’S Dark Side?, Raphael Cohen-Almagor Oct 2015

Why Confronting The Internet’S Dark Side?, Raphael Cohen-Almagor

raphael cohen-almagor

Raphael Cohen-Almagor, the author of Confronting the Internet's Dark Side, explains his motivation for exploring the dangerous side of the world wide web. This new book is the first comprehensive book on social responsibility on the Internet.


Copyrightability Of Music Compilations And Playlists: Original And Creative Works Of Authorship?, Marc Fritzsche Sep 2015

Copyrightability Of Music Compilations And Playlists: Original And Creative Works Of Authorship?, Marc Fritzsche

Marc Fritzsche

With the digitalization of music and the increasing popularity of online streaming services, people can conveniently create their own playlists and music compilations at will and share them worldwide. Imagine a world in which any selection and arrangement of songs, whether made by you, a DJ, a radio station, or a record label, is protected under the regime of Copyright Law. The result would be a vast amount of copyright infringements when a playlist or compilation gets mimicked by others. Thus far, only the High Court in London, UK, was confronted with this problem, but the parties settled, leaving the …


Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


Confronting The Internet's Dark Side: Moral And Social Responsibility On The Free Highway, Raphael Cohen-Almagor Jul 2015

Confronting The Internet's Dark Side: Moral And Social Responsibility On The Free Highway, Raphael Cohen-Almagor

raphael cohen-almagor

This book focuses on the tension between Free Speech fundamentalism and Social Responsibility at the individual, corporate, and nation-state level. It brings an international perspective to the central topics (child pornography, hate speech, suicidal and homicidal enablers, cybercrime and terrorism). The central philosophical argument of this book is the Promotional Approach, which the author sees as a kind of Golden Mean between Ronald Dworkin and Joseph Raz. The book utilizes the Aristotelian doctrine of the mean to endorse the kind of practical wisdom required to make choices between freedom and security, unlimited license and moral responsibility. It argues that this …


Must The States Discriminate Against Their Own Producers Under The Dormant Commerce Clause?, David M. Driesen Feb 2015

Must The States Discriminate Against Their Own Producers Under The Dormant Commerce Clause?, David M. Driesen

David M Driesen

This article works out the implications of an insight mentioned, but not developed thoroughly, in the literature on free trade law: A polity that regulates its own producers without regulating outside producers serving that polity discriminates against its own producers. This gives rise to a question, should laws serving free trade values require polities to discriminate against their own producers? The dormant Commerce Clause’s extraterritoriality doctrine—which prohibits regulating wholly outside the enacting state’s borders—seems to require discrimination against the enacting state’s producers. Federal courts have recently used this doctrine to strike down state laws addressing climate disruption and regulating the …


Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively Jan 2015

Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively

Jesse D Lively

This Comment argues that the Supreme Court of Virginia should first reverse the Virginia Court of Appeal’s decision when it hears the Yelp case later this year. Secondly, the court hold that the Virginia statute for identifying persons communicating anonymously over the Internet violates the First Amendment's required showing of merit on both law and facts before a subpoena duces tecum to identify an anonymous speaker can be enforced. Lastly, it should adopt a new “unveiling standard” similar to the standards used in either Dendrite or Cahill. Part II examines the jurisprudential history of identifying anonymous Internet speakers in defamation …


Analysis Of Freedom Of Information For Its Effect On Society, Considering The Arab Spring, Paul D. Callister, Kimberlee C. Everson Jan 2015

Analysis Of Freedom Of Information For Its Effect On Society, Considering The Arab Spring, Paul D. Callister, Kimberlee C. Everson

Paul D. Callister

2011, the year of the Arab Spring, presents a unique opportunity to look back and study how the relative freedom and development of information environments affect stability in nations throughout the Middle East and world. Such study raises interesting questions about whether freedom of information and speech are ultimately stabilizing influences for society in terms of loyalty, violence and political unrest—questions all the more important as societies face the onslaught of the internet, mobile devices and cell phones. Are non-democratic regimes “better off” by monopolizing and controlling the flow of information over new information channels? Are democratic societies, particularly developing …


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


Countering Hate On The Internet, Raphael Cohen-Almagor Sep 2014

Countering Hate On The Internet, Raphael Cohen-Almagor

raphael cohen-almagor

Hate speech is designed to threaten certain groups publicly and act as propaganda for offline organizations. Hate groups use websites to share ideology and propaganda, to link to similar sites and to recruit new converts, advocate violence and to threat others. The aim of this paper is to analyse the ways hate mongers are utilizing the Internet, and to ask what can be done to counter their activities. The paper discusses the targets of hate on the Internet and offers practical proposals to address this increasing problem and fight against it.


Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania Mar 2014

Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania

Tejas N. Narechania

For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.

Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …


Aereo's Errors, Ira Steven Nathenson Jan 2014

Aereo's Errors, Ira Steven Nathenson

Ira Steven Nathenson

This article scrutinizes the many troubling errors made by the United States Supreme Court in its decision in American Broadcasting Companies, Inc. v. Aereo, Inc. Aereo’s streaming television service allowed subscribers to watch broadcast television on a computer, tablet, or smartphone without requiring them to be directly connected to cable, satellite, or a local antenna. Aereo’s system was designed to comply with existing copyright law by using thousands of antennas, each of which was designated for only one subscriber at a time. Aereo was sued for copyright infringement by a number of leading television broadcasters. The United States Supreme Court, …


Anonymous Speech On The Internet: Why Current Efforts By States To Regulate Anonymous Speech Fail Constitutional Scrutiny, And How Courts Should Protect First Amendment Rights, Conor Francis Linehan Jan 2014

Anonymous Speech On The Internet: Why Current Efforts By States To Regulate Anonymous Speech Fail Constitutional Scrutiny, And How Courts Should Protect First Amendment Rights, Conor Francis Linehan

Conor Francis Linehan

The legislatures in New York and Illinois have attempted to regulate the speech of individuals on the Internet and threaten to void their anonymity. The legislatures are trying to reach the actionable or harmful speech that often shows up on websites like Reddit.com. However, the bills have reached too far, and encompass much speech that is absolutely protected. This note argues that the right of anonymous speech on the Internet should be protected from government encroachment, and the proper way to protect the interests of individuals who are the subject of libelous or damaging speech should be through a re-working …


Copyright Tussle And Search Engines, Anoop Kumar Yadav Mar 2013

Copyright Tussle And Search Engines, Anoop Kumar Yadav

anoop kumar yadav

The Intellectual Property Laws (I.P. Laws) have, to a great extent, proved to be successful in nipping the copyright infringement in its bud. The I.P. Laws provide umbrella jurisprudence, which seek to protect the creativity of the authors. But despite that, it has been widely observed that the I.P. Laws have failed to cover other aspects of the intellectual property. For example, the liability of the search engines for the copyright infringement has remained out of the ambit of the I.P. Laws. The paper is focused on drawback of the Information Technology laws in various nations. Further, it also suggests …


Super-Intermediaries, Code, Human Rights, Ira Nathenson Jan 2013

Super-Intermediaries, Code, Human Rights, Ira Nathenson

Ira Steven Nathenson

We live in an age of intermediated network communications. Although the internet includes many intermediaries, some stand heads and shoulders above the rest. This article examines some of the responsibilities of “Super-Intermediaries” such as YouTube, Twitter, and Facebook, intermediaries that have tremendous power over their users’ human rights. After considering the controversy arising from the incendiary YouTube video Innocence of Muslims, the article suggests that Super-Intermediaries face a difficult and likely impossible mission of fully servicing the broad tapestry of human rights contained in the International Bill of Human Rights. The article further considers how intermediary content-control procedures focus too …


Compiling Online Legal Information In Transitional States: Challenges And Opportunities, Brian D. Anderson Jan 2013

Compiling Online Legal Information In Transitional States: Challenges And Opportunities, Brian D. Anderson

Brian D Anderson

In transitional states, especially those developing systems of democratic governance, the creation of online, reliable, and accessible legal information systems is a critical component of good governance. When these databases are created, however, there are significant challenges that may arise to achieving a working and sustainable database. Once created, additional opportunities exist for creating better content, educating users, and enhancing the rule of law through open access to laws. This article will address some of the particular challenges and opportunities presented to transitional states when creating an online legal information system, specifically those involving political and social issues from gaining …


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


Managing Content In Virtual Environments: From Music To Machinima, Tamiko R. Franklin Sep 2012

Managing Content In Virtual Environments: From Music To Machinima, Tamiko R. Franklin

Tamiko R Franklin

Developing an effective rights management strategy in virtual environments requires a close review of current case law especially with respect to ongoing clarifications of mentioned statutory provisions under copyright laws. It is also helpful to be aware of the peculiarities that involve copyright protected content created for use in virtual spaces such as issues involving publication and making available across multiple jurisdictions. There are differences in international systems of protection that affect the intellectual property rights in content; particularly so if the content in question is a work of visual art like a photograph or digital representation of a painting, …


The Cloud: Boundless Digital Potential Or Enclosure 3.0?, David Lametti Jun 2012

The Cloud: Boundless Digital Potential Or Enclosure 3.0?, David Lametti

David Lametti

The Cloud presents enormous potential for users to have access to facilities such as vast data storage and infinite computing capacity. Yet the Cloud, taken from the perspective of the average user, does have a dark side. I agree with a number of writers and the concerns that they raise about privacy and personal autonomy on the internet and the Cloud. However, I wish to voice concern over another change. From the perspective of users, the Cloud might also reduce the range of user possibilities for robust interaction with the internet/Cloud in a manner which then prevents users from participating …


Go To Our Website For More (Of The Same): Reassessing Federal Policy Towards Newspapers Mergers And Cross Media Ownership And The Harm To Localism, Diversity And The Public Interest, Jason Zenor Apr 2012

Go To Our Website For More (Of The Same): Reassessing Federal Policy Towards Newspapers Mergers And Cross Media Ownership And The Harm To Localism, Diversity And The Public Interest, Jason Zenor

Jason Zenor

Newspapers are workhorse of local news industry and this information is important in order to have an informed citizenry. But, the conventional wisdom is that newspapers are an endangered species and that something drastic needs to be done if this form of media is going to survive. Many proactive solutions have been forwarded such as charging for online content, using tablet and smartphone technology to publish newspapers and making newspapers more assessable to younger and more diverse generations. Another more conceding solution is to allow for greater relaxation on newspapers mergers and cross media ownership rules. But, this solution would …


“Technopanics, Threat Inflation, And The Danger Of An Information Technology Precautionary Principle”, Adam Thierer Mar 2012

“Technopanics, Threat Inflation, And The Danger Of An Information Technology Precautionary Principle”, Adam Thierer

Adam Thierer

Fear is an extremely powerful motivational force. In public policy debates, appeals to fear are often used in an attempt to sway opinion or bolster the case for action. Such appeals are used to convince citizens that threats to individual or social wellbeing may be avoided only if specific steps are taken. Often these steps take the form of anticipatory regulation based on the precautionary principle.

Such “fear appeal arguments” are frequently on display in the Internet policy arena and often take the form of a full-blown “moral panic” or “technopanic.” These panics are intense public, political, and academic responses …


Seeking Digital Redemption: The Future Of Forgiveness In The Internet Age, Meg Leta Ambrose Mar 2012

Seeking Digital Redemption: The Future Of Forgiveness In The Internet Age, Meg Leta Ambrose

Meg Leta Ambrose

The Right to be Forgotten, a controversial privacy right that allows users to make information about themselves less accessible after a period of time, is hailed as a pillar of information privacy in some countries while condemned as censorship in others. Psychological and behavioral research indicates that one’s capacity to forget features of the past - or remember them in a different way - is deeply connected to his or her power to forgive others and move on, which in turn, has dramatic impacts on well-being. Second chances and the reinvention of self are deeply intertwined with American history and …


Law Of The Intermediated Information Exchange, Jacqueline Lipton Feb 2012

Law Of The Intermediated Information Exchange, Jacqueline Lipton

Jacqueline D Lipton

When Wikipedia, Google and other online service providers staged a ‘blackout protest’ against the Stop Online Piracy Act in January 2012, their actions inadvertently emphasized a fundamental truth that is often missed about the nature of cyberlaw. In attempts to address what is unique about the field, commentators have failed to appreciate that the field could – and should – be reconceputalized as a law of the global intermediated information exchange. Such a conception would provide a set of organizing principles that are lacking in existing scholarship. Nothing happens online that does not involve one or more intermediaries – the …


Right To Information Identity, Elad Oreg Jan 2012

Right To Information Identity, Elad Oreg

Elad Oreg

Inspired by the famous Warren&Brandeis conceptualization of the "right to privacy", this article tries to answer a different modern conceptual lacuna and present the argument for the need to conceptualize and recognize a new, independent legal principle of a "right to information-identity". This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. What was happening regarding privacy in the late 19th century happens now with identity. Changes in technology and social standards make the very notion of identity increasingly fluid, …


Patent Litigation And The Internet, John R. Allison, Emerson H. Tiller, Samantha Zyontz Jan 2012

Patent Litigation And The Internet, John R. Allison, Emerson H. Tiller, Samantha Zyontz

John R. Allison

Using both univariate comparisons and multiple regression techniques, we find that: (1) Internet patents and their two subtypes, broad Internet business models and narrower Internet business techniques, were litigated at a far higher rate than other (non-Internet patents, or NIPs)—they were between 7.5 and 9.5 times more likely to end up in infringement litigation, depending on the model we used. (2) Within the category of Internet patents, those on business models were litigated at a significantly higher rate than those on business techniques. (3) Across both Internet patents and NIPs, patents issued to small entities, especially individuals and small businesses, …


2 Standards 1 Cup: How Geotargeting Will End The Battle Between National And Local Obscenity Standards, Joseph Mason Kjar Jan 2012

2 Standards 1 Cup: How Geotargeting Will End The Battle Between National And Local Obscenity Standards, Joseph Mason Kjar

J. Mason Kjar

The First Amendment guarantees the right to free speech—but that protection is not absolute. Some speech is banned outright, such as child pornography. Other speech is nearly fully protected, such as erotic speech. Caught in the middle of the two is obscene speech, which can be owned in the privacy of one’s home, but cannot be disseminated publicly.

The line between obscenity and eroticism is hard to pinpoint, and varies from community to community. In general, the process of analyzing whether a work is obscene includes asking whether the content violates the community standards of the local geographic area where …


Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden Oct 2011

Rationales For And Against Regulatory Involvement In Resolving Internet Interconnection Disputes, Rob Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content telecommunications carriers typically a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited choice of ISP …


Website Proprietorship Liability, Design And Two Regrettable Online Norms:, Nancy Kim Aug 2011

Website Proprietorship Liability, Design And Two Regrettable Online Norms:, Nancy Kim

Nancy Kim

Two regrettable norms have emerged online: the posting of content about others without their consent; and impulsive postings with little or no regard to their long term consequences. Website operators can either encourage or discourage these regrettable norms and influence their consequences through the design of their website and by the fostering of norms and codes of conduct. Unfortunately, section 230 of the Communications Decency Act as interpreted by courts provides websites with broad immunity. In a prior Article, I argued that a proprietorship standard should be imposed upon websites which would require them to take reasonable measures to prevent …


Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden Jul 2011

Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content via other ISPs typically on a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, both the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited …


Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden Jul 2011

Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden

Rob Frieden

Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content via other ISPs typically on a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, both the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited …


Loving The Cyber Bomb? The Dangers Of Threat Inflation In Cybersecurity Policy, Jerry Brito, Tate Watkins May 2011

Loving The Cyber Bomb? The Dangers Of Threat Inflation In Cybersecurity Policy, Jerry Brito, Tate Watkins

Jerry Brito

Over the past two years there has been a steady drumbeat of alarmist rhetoric coming out of Washington about potential catastrophic cyber threats. For example, at a Senate Armed Services Committee hearing last year, Chairman Carl Levin said that “cyberweapons and cyberattacks potentially can be devastating, approaching weapons of mass destruction in their effects.” Proposed responses include increased federal spending on cybersecurity and the regulation of private network security practices.

The rhetoric of “cyber doom” employed by proponents of increased federal intervention, however, lacks clear evidence of a serious threat that can be verified by the public. As a result, …