Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Air gaps (1)
- American Broadcasting Cos. v. Aereo (1)
- Attribution (1)
- Bandwidth (1)
- Broadcasting Rights (1)
-
- Civil Rights (1)
- Cloud computing (1)
- Communications & computer law (1)
- Congestion management (1)
- Contractibility (1)
- Copyright Infringement (1)
- Critical infrastructure (1)
- Cyber-law (1)
- Cyberattack (1)
- Cybersecurity (1)
- Cyberwar (1)
- Digital World (1)
- Digital warfare (1)
- E-commerce (1)
- Gatekeeper (1)
- Geneva Convention (1)
- Government regulation (1)
- Inc. (134 S. Ct. 2498 (2014)) (1)
- Independent Group of Experts (IGE) (1)
- Intercarrier compensation (1)
- Interconnection (1)
- International humanitarian law (1)
- Internet (1)
- Internet Broadcasting (1)
- Jus ad bellum (1)
Articles 1 - 5 of 5
Full-Text Articles in Communications Law
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo
All Faculty Scholarship
The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo
A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo
All Faculty Scholarship
Policymakers have long invoked the concept of a “terminating access monopoly” to inform communications policy. Roughly speaking, the concept holds that a consumer-facing network provider, no matter how small or how subject to retail competition, generally possesses monopoly power vis-à-vis third-party senders of communications traffic to its customers. Regulators and advocates have routinely cited that concern to justify regulatory intervention in a variety of contexts where the regulated party may or may not have possessed market power in any relevant retail market.
Despite the centrality of the terminating access monopoly to modern communications policy, there is surprisingly little academic literature …
Abc V. Aereo And The Humble Judge, James Y. Stern
Abc V. Aereo And The Humble Judge, James Y. Stern
Faculty Publications
No abstract provided.
The Internet Grows Up?, Neil M. Richards
The Internet Grows Up?, Neil M. Richards
Scholarship@WashULaw
Danielle Citron’s Hate Crimes in Cyberspace is one of the most important publications to date in the emerging fields of privacy and cyberlaw. In her thoughtful and insightful book, Citron explains the uneven playing field and frequently shocking acts of abuse that women face online, and demonstrates practical steps that we can take to remedy the problem of online hate through law, education, and the development of better, more inclusive norms. Other contributors to this Symposium have examined these contributions in great detail, pointing out important nuances of Citron’s argument, urging her in at least one case to be even …