Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Computer Law

Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett Dec 2014

Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett

John Ehrett

This Essay evaluates the dimensions of courts’ current interpretive dilemma, and subsequently sketches a possible framework for extending traditional statutory interpretation principles into this new domain. Throughout the analysis, the Essay describes the process of attaching cognizable linguistic referents to emoticons and emojis throughout as symbolical reification, and proposes a normative way forward for those tasked with deriving meaning from emoji-laden communications.


Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt Feb 2012

Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt

Professor Katina Michael

Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


The Virtual Construction Of Legality: 'Griefing' & Normative Order In Second Life, Eric M. Fink Dec 2010

The Virtual Construction Of Legality: 'Griefing' & Normative Order In Second Life, Eric M. Fink

Eric M Fink

This article examines the construction of legality in a virtual world, seeking to under-stand how informal social order emerges as residents construct meaning around interpersonal conflicts and interact on the basis of such meaning. ‘Griefing’, a form of disruptive behavior common to virtual worlds, provides a lens through which to investigate emergent social norms and boundaries in the virtual world of Second Life. Identifying and distinguishing rhetorical frames in Second Life residents’ understandings of and responses to griefing, the study aims to elucidate the social meaning of griefing and its place in the construction and maintenance of social order.