Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Duke Law (12)
- New York Law School (11)
- Selected Works (10)
- BLR (8)
- Seattle University School of Law (6)
-
- University of Michigan Law School (6)
- SelectedWorks (5)
- American University Washington College of Law (4)
- Boston University School of Law (4)
- Maurer School of Law: Indiana University (4)
- Pepperdine University (4)
- Cleveland State University (3)
- University of Georgia School of Law (3)
- University of Richmond (3)
- Loyola Marymount University and Loyola Law School (2)
- Northwestern Pritzker School of Law (2)
- Pace University (2)
- Penn State Dickinson Law (2)
- University of Baltimore Law (2)
- University of Miami Law School (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of New Hampshire (2)
- University of Pennsylvania Carey Law School (2)
- Brooklyn Law School (1)
- Central Washington University (1)
- Chicago-Kent College of Law (1)
- City University of New York (CUNY) (1)
- Schulich School of Law, Dalhousie University (1)
- St. Mary's University (1)
- The Catholic University of America, Columbus School of Law (1)
- Publication Year
- Publication
-
- Duke Law & Technology Review (12)
- NYLS Law Review (11)
- ExpressO (8)
- Seattle University Law Review (5)
- All Faculty Scholarship (4)
-
- Faculty Scholarship (4)
- Articles in Law Reviews & Other Academic Journals (3)
- Cleveland State Law Review (3)
- Indiana Journal of Global Legal Studies (3)
- Dickinson Law Review (2017-Present) (2)
- James Grimmelmann (2)
- Jorge R Roig (2)
- LLM Theses and Essays (2)
- Law Faculty Scholarship (2)
- Loyola of Los Angeles Law Review (2)
- Michigan Law Review (2)
- Michigan Telecommunications & Technology Law Review (2)
- Northwestern Journal of International Law & Business (2)
- Pepperdine Law Review (2)
- University of Miami Business Law Review (2)
- University of Richmond Law Review (2)
- All Master's Theses (1)
- Allyson Haynes Stuart (1)
- Articles by Maurer Faculty (1)
- Books (1)
- Brooklyn Journal of International Law (1)
- Canadian Journal of Law and Technology (1)
- Catholic University Law Review (1)
- Chicago-Kent Law Review (1)
- Donald J. Kochan (1)
- Publication Type
Articles 1 - 30 of 112
Full-Text Articles in Computer Law
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
University of Miami Business Law Review
But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
The Five Internet Rights, Nicholas J. Nugent
The Five Internet Rights, Nicholas J. Nugent
Washington Law Review
Since the dawn of the commercial internet, content moderation has operated under an implicit social contract that website operators could accept or reject users and content as they saw fit, but users in turn could self-publish their views on their own websites if no one else would have them. However, as online service providers and activists have become ever more innovative and aggressive in their efforts to deplatform controversial speakers, content moderation has progressively moved down into the core infrastructure of the internet, targeting critical resources, such as networks, domain names, and IP addresses, on which all websites depend. These …
Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi
Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Faculty Scholarship
Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.
In this short Essay, we propose a model for legislating data loyalty. Our …
Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson
Seattle University Law Review SUpra
No abstract provided.
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
Seattle University Law Review
As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …
Barlow's Legacy, Cory Doctorow
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle
The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle
Duke Law & Technology Review
No abstract provided.
Is The Internet Over?! (Again?), James Boyle
Is The Internet Over?! (Again?), James Boyle
Duke Law & Technology Review
No abstract provided.
Inventing The Future: Barlow And Beyond, Cindy Cohn
Inventing The Future: Barlow And Beyond, Cindy Cohn
Duke Law & Technology Review
No abstract provided.
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Duke Law & Technology Review
No abstract provided.
A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson
A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson
Duke Law & Technology Review
No abstract provided.
Revisiting Barlow's Misplaced Optimism, Benjamin Edelman
Revisiting Barlow's Misplaced Optimism, Benjamin Edelman
Duke Law & Technology Review
No abstract provided.
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Duke Law & Technology Review
No abstract provided.
John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain
John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain
Duke Law & Technology Review
No abstract provided.
What Didn’T Happen: An Essay In Speculation, Peter Jaszi
What Didn’T Happen: An Essay In Speculation, Peter Jaszi
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow
The Past And Future Of The Internet: A Symposium For John Perry Barlow
Duke Law & Technology Review
No abstract provided.
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Seattle University Law Review
Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Seattle University Law Review
The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …
The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano
The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano
Pace Law Review
The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to …
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
From Innovation To Abuse: Does The Internet Still Need Section 230 Immunity?, Benjamin Volpe
Catholic University Law Review
In 1996, Congress passed the Communications Decency Act to allow the screening of offensive material from the internet, while preserving the continued development of the internet economy without burdensome regulation. However, for years, online intermediaries have successfully used the Act as a shield from liability when third parties use their online services to commit tortious or criminal acts. This Comment argues that a wholly-unregulated internet is no longer necessary to preserve the once-fledgling internet economy. After evaluating various approaches to intermediary liability, this Comment also argues that Congress should take a more comprehensive look at consumer protection online and establish …
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
San Diego International Law Journal
This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.
United States V. Ammons, Rebecca Ruffer
Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky
Maine Law Review
Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to …
Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott
Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott
University of Richmond Law Review
The purpose of this article is to explore the threats posed by
cybersecurity breaches, outline the steps taken by the government
to address those threats in the private sector economy, and
call attention to the ultimate solution, which will most certainly
spur private businesses to create a more secure cyber environment
for the American people-a Connie Francis-styled cyber civil
action lawsuit.
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
All Faculty Scholarship
This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …