Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Consumer Protection Law (12)
- Computer Law (11)
- Internet Law (9)
- Science and Technology Law (9)
- Intellectual Property Law (8)
-
- Business Organizations Law (6)
- Comparative and Foreign Law (6)
- Law and Society (6)
- Administrative Law (5)
- Antitrust and Trade Regulation (5)
- Commercial Law (5)
- Contracts (5)
- Criminal Law (5)
- Economics (5)
- Entertainment, Arts, and Sports Law (5)
- International Law (5)
- Law and Economics (5)
- Public Law and Legal Theory (5)
- Social and Behavioral Sciences (5)
- Accounting Law (4)
- Civil Law (4)
- Conflict of Laws (4)
- Constitutional Law (4)
- Courts (4)
- Criminal Procedure (4)
- Dispute Resolution and Arbitration (4)
- Energy and Utilities Law (4)
- Human Rights Law (4)
- Institution
- Publication
- Publication Type
- File Type
Articles 1 - 13 of 13
Full-Text Articles in Communications Law
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
Sean Brian
No abstract provided.
Cracking The Cable Conundrum: Government Regulation Of A La Carte Models In The Cable Industry, Jade Brewster
Cracking The Cable Conundrum: Government Regulation Of A La Carte Models In The Cable Industry, Jade Brewster
Jade Brewster
This Article examines the practice of cable bundling, a term describing how cable providers offer channels in “packages” of channels rather than allowing consumers to buy channels individually. These cable bundles have been criticized by politicians, academics, and the public alike, many of whom believe cable bundling simultaneously increases the price of cable and forces consumers to pay for programming they neither want nor use. Politicians have responded to these criticisms by advocating for legislation requiring cable companies to offer a la carte pricing options, in which customers can pick and choose individual channels. But evidence that an a la …
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
Consumers As Marketers: An Analysis Of The Facebook “Like” Feature As An Endorsement, Chang Zhou
Consumers As Marketers: An Analysis Of The Facebook “Like” Feature As An Endorsement, Chang Zhou
Chang Zhou
No abstract provided.
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Lawrence J. Trautman Sr.
In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs
Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs
ExpressO
The rapid development of the Internet has necessitated an update to Federal telecommunications laws. Recent Congressional efforts to enact such an update, however, have spawned a fiery debate over a somewhat nebulous concept: network neutrality. The debate concerns the way that Internet access providers handle the data traffic being sent over their networks. These providers would like the option to offer some of their customers, web site hosting companies and similar entities, additional services that would essentially result in these customers’ content loading faster, more reliably, or more securely than others not receiving such priority treatment. Yet, this proposed “diversity” …
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
ExpressO
No abstract provided.
A Model For Emergency Service Of Voip Through Certification And Labeling, Patrick S. Ryan, Tom Lookabaugh, Douglas Sicker
A Model For Emergency Service Of Voip Through Certification And Labeling, Patrick S. Ryan, Tom Lookabaugh, Douglas Sicker
ExpressO
Voice over Internet Protocol (VoIP) will transform many aspects of traditional telephony service, including the technology, the business models, and the regulatory constructs that govern such service. Perhaps not unexpectedly, this transformation is generating a host of technical, business, social, and policy problems. In attempting to respond to these problems, the Federal Communications Commission (FCC) could mandate obligations or specific solutions to VoIP policy issues; however, it is instead looking first to industry initiatives focused on the key functionality that users have come to expect of telecommunications services. High among this list of desired functionality is user access to emergency …
Essay, Digital Bowdlerizing: Removing The Naughty Bytes, Llewellyn Joseph Gibbons
Essay, Digital Bowdlerizing: Removing The Naughty Bytes, Llewellyn Joseph Gibbons
ExpressO
Unlike Dr. Bowdler, who republished the works of Shakespeare with the naughty bits removed, the modern digital Bowdlerizer deletes offensive content from digital works in a variety of ways. This Essay will analyze the technologies used by the modern Bowdlerizer to determine when, if, and which technologies make copies in violation of the copyright owner’s § 106(1) right to control reproduction or make derivative copies of a preexisting work that may infringe the copyright owner’s 17 U.S.C. § 106(2) right to authorize the creation of derivative works. These technologies not only support militant prudery, but they also may add new …
Introduction To Symposium On Integrating New Economic Learning With Antitrust Doctrine, Jonathan Baker
Introduction To Symposium On Integrating New Economic Learning With Antitrust Doctrine, Jonathan Baker
Articles in Law Reviews & Other Academic Journals
No abstract provided.