Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 40
Full-Text Articles in Computer Law
Modularity Theory And Internet Regulation, Christopher S. Yoo
Modularity Theory And Internet Regulation, Christopher S. Yoo
All Faculty Scholarship
Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.
The literature on innovation indicates that modules should be determined by the nature of …
Toward A New Language Of Legal Drafting, Matthew Roach
Toward A New Language Of Legal Drafting, Matthew Roach
Matthew Roach
Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
Richard Warner
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
All Faculty Scholarship
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
Sean Brian
No abstract provided.
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Rob Frieden
The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
All Faculty Scholarship
Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Henry H. Perritt, Jr.
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
New Models And Conflicts In The Interconnection And Delivery, Rob Frieden
New Models And Conflicts In The Interconnection And Delivery, Rob Frieden
Rob Frieden
As the Internet has evolved and diversified, interconnection terms and conditions have changed between Internet Service Providers (“ISPs”). These carriers experiment with alternatives to conventional models that classify interconnection as either peering or transiting. The former typically involves interconnection between high capacity carriers whose transoceanic traffic volumes generally match thereby eliminating the need for a transfer of funds. Historically smaller carriers have paid transit fees to larger Tier-1 ISPs for the opportunity to secure upstream links throughout the Internet cloud. With the growing availability of bandwidth intensive, video content carried via the Internet, traffic volume disparities have increased between ISPs. …
Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden
Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden
Rob Frieden
The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any distribution format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a particular channel and in a single presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian
Vahagn Amirian
No abstract provided.
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
All Faculty Scholarship
When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Lawrence J. Trautman Sr.
In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Jorge R Roig
Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar
Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar
Reuven Ashtar
This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …
Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden
Rationales For And Against Fcc Involvement In Resolving Internet Service Provider Interconnection Disputes, Rob M. Frieden
Rob Frieden
Internet Service Providers (“ISPs”) provide end users with access to and from the Internet cloud. In addition to providing the first and last mile carriage of traffic, ISPs secure upstream access to sources of content via other ISPs typically on a paid (transit), or barter (peering) basis. Because a single ISP operates in two separate segments of traffic routing, both the terms and conditions of network interconnection and the degree of marketplace competition can vary greatly. In this double-sided market, ISPs typically have many transit and peering opportunities upstream to content providers, but downstream end users may have a limited …
Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo
Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo
All Faculty Scholarship
In The Master Switch, Tim Wu argues that four leading communications industries have historically followed a single pattern that he calls “the Cycle.” Because Wu’s argument is almost entirely historical, the cogency of its claims and the force of its policy recommendations depends entirely on the accuracy and completeness of its treatment of the historical record. Specifically, he believes that industries begin as open, only to be transformed into closed systems by a great corporate mogul until some new form of ingenuity restarts the Cycle anew. Interestingly, even taken at face value, many of the episodes described in the …
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Rob Frieden
Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …
Internet 3.0: Identifying Problems And Solutions To The Network Neutrality Debate , Robert M. Frieden
Internet 3.0: Identifying Problems And Solutions To The Network Neutrality Debate , Robert M. Frieden
ExpressO
What Internet Service Providers (“ISPs”) can and cannot do to diversify services lies at the core of the debate over network neutrality. In prior generations ISPs had little incentive or technological capability to deviate from plain vanilla best efforts routing for content providers and from standard “all you can eat” subscription terms for consumer access to the World Wide Web. The next generation Internet has the technological capability and ISPs have the commercial motivation to offer “better than best efforts” routing and premium services for both content providers and consumers seeking higher quality of service and more reliable traffic delivery. …
Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias
Surfing Past The Pall Of Orthodoxy: Why The First Amendment Virtually Guarantees Online Law School Graduates Will Breach The Aba Accreditation Barrier, Nicholas C. Dranias
ExpressO
The impact of the constitutional dilemma created by the ABA’s aversion to Internet schooling is widespread. Currently, 18 states and 2 U.S. territories restrict bar exam eligibility to graduates of ABA-accredited law schools. Additionally, 29 states and 1 U.S. territory restrict admission to practice on motion to graduates of ABA-accredited law schools.
Although numerous lawsuits have been filed in ultimately failed efforts to strike down bar admission rules that restrict eligibility to graduates of ABA-accredited law schools, none has challenged the ABA-accreditation requirement based on the First Amendment’s prohibition on media discrimination. This Article makes that case.
Despite accelerating technological …
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden
Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden
ExpressO
Recent double digit billion dollar mergers of telecommunications firms consolidate both market share and market leadership by incumbent operators such as Verizon. These companies seek to exploit technological and market convergence by offering a triple play package of wired and wireless telephone service, video and Internet access. As well they need to develop new profit centers to compensate for declining revenues and market shares in traditional services such as wireline telephony.
While incumbent telecommunications operators have pursued new market opportunities, these ventures have not abandoned core management philosophies, operating assumptions and business strategies. Longstanding strategies for recovering investments, using a …
Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs
Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs
ExpressO
The rapid development of the Internet has necessitated an update to Federal telecommunications laws. Recent Congressional efforts to enact such an update, however, have spawned a fiery debate over a somewhat nebulous concept: network neutrality. The debate concerns the way that Internet access providers handle the data traffic being sent over their networks. These providers would like the option to offer some of their customers, web site hosting companies and similar entities, additional services that would essentially result in these customers’ content loading faster, more reliably, or more securely than others not receiving such priority treatment. Yet, this proposed “diversity” …
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
ExpressO
This paper calls for mandated “network neutrality,” the principle that broadband service providers (BSPs) should generally treat all nondestructive data equally. Without such a mandate, BSPs will likely begin charging content providers for the right to send data at the fastest speeds available. The present frequency with which BSPs block some data entirely will also likely increase.
Neutral networks are preferable for two key reasons. First, they spawn innovation, as illustrated by the explosive online innovation to date. Second, neutral networks better distribute communication power, promoting First Amendment values. Extant and likely future acts of discrimination erode both goals. The …
Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy
Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy
ExpressO
17 USC Section 1201(a)(1) prohibits circumventing a technological protection measure (TPM) that effectively controls access to a copyrighted work. In the name of mitigating the innocent casualties of this new ban, Congress constructed a triennial rulemaking, administered by the Register of Copyrights, to determine temporary exemptions. This paper considers the legislative history of this rulemaking, and it reports the results of a systematic content analysis of its 2000 and 2003 proceedings.
Inspired by the literature on political agendas, policymaking institutions, venue shifting, and theories of delegation, we conclude that the legislative motivations for Section 1201 were laundered through international treaties, …
Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler
Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler
ExpressO
The Digital Age has spawned major legal battles over the fundamental principles of intellectual property law and antitrust law. These diverse struggles can best be analyzed using the basic norm of "value added" from neo-classical normative economics. This analysis suggests that current intellectual property doctirnes provide excessive protection and current antitrust doctrines remain awkward in dealing with the cross-market leveraging of monopoly power in the presence of "natural monopolies" created by network effects.