Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 58 of 58

Full-Text Articles in Computer Law

Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding Feb 2006

Choice In Government Software Procurement: A Winning Combination, Mclean Sieverding

ExpressO

Governments are such significant purchasers of IT products and services that their purchasing decisions have a substantial impact on the world’s IT marketplace. This fact calls into question the wisdom of decisions by a few policymakers (on national, state, and local levels) around the world that have sought to require that governmental procurement officials give varying degrees of preference to open source software (OSS) when evaluating competing software solutions, claiming, among other things, that such preferences are justified because OSS is cheaper and more interoperable than proprietary software and needs government handicapping in order to enter the market to compete …


The Misery Of Mitra: Considering Criminal Punishment For Computer Crimes, James T. Tsai Nov 2005

The Misery Of Mitra: Considering Criminal Punishment For Computer Crimes, James T. Tsai

ExpressO

This paper analyzes the policies and philosophy of punishment for computer crimes under the post-Sept. 11th regime. I argue that the judicial discourse represented in Mitra represents a willingness to use the Computer Fraud and Abuse Act to go after defendants that cause trouble with critical infrastructures, the so-called “domestic terrorist.” This is manifested in the levels of punishments for such offenses and calls into question whether the traditional theories of punishment are applicable. I argue that as a policy, it makes good sense but the hazy definitions of terrorism may present problems for its success, and instead an approach …


Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy Nov 2005

Catch 1201: A Legislative History And Content Analysis Of The Dmca Exemption Proceedings, Bill D. Herman, Oscar H. Gandy

ExpressO

17 USC Section 1201(a)(1) prohibits circumventing a technological protection measure (TPM) that effectively controls access to a copyrighted work. In the name of mitigating the innocent casualties of this new ban, Congress constructed a triennial rulemaking, administered by the Register of Copyrights, to determine temporary exemptions. This paper considers the legislative history of this rulemaking, and it reports the results of a systematic content analysis of its 2000 and 2003 proceedings.

Inspired by the literature on political agendas, policymaking institutions, venue shifting, and theories of delegation, we conclude that the legislative motivations for Section 1201 were laundered through international treaties, …


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Nov 2005

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

ExpressO

This is a discussion of the legal and economic ramifications of password theft.


Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler Oct 2005

Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler

ExpressO

The Digital Age has spawned major legal battles over the fundamental principles of intellectual property law and antitrust law. These diverse struggles can best be analyzed using the basic norm of "value added" from neo-classical normative economics. This analysis suggests that current intellectual property doctirnes provide excessive protection and current antitrust doctrines remain awkward in dealing with the cross-market leveraging of monopoly power in the presence of "natural monopolies" created by network effects.


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


Contracts Concluded By Electronic Agents - Comparative Analysis Of American And Polish Legal Systems, Aleksandra M. Jurewicz Aug 2005

Contracts Concluded By Electronic Agents - Comparative Analysis Of American And Polish Legal Systems, Aleksandra M. Jurewicz

ExpressO

This article analyzes the US and Polish law on contract formation by electronic agents. It persents the main similarities and differences in the approaches of common and civil legal systems. Finally, it discusses changes in legal theories in Poland that had to be made in order to comply with standards of electronic commerce.


From International Law To Law And Globalization, Paul Schiff Berman Jul 2005

From International Law To Law And Globalization, Paul Schiff Berman

ExpressO

International law’s traditional emphasis on state practice has long been questioned, as scholars have paid increasing attention to other important – though sometimes inchoate – processes of international norm development. Yet, the more recent focus on transnational law, governmental and non-governmental networks, and judicial influence and cooperation across borders, while a step in the right direction, still seems insufficient to describe the complexities of law in an era of globalization. Accordingly, it is becoming clear that “international law” is itself an overly constraining rubric and that we need an expanded framework, one that situates cross-border norm development at the intersection …


Towards A Cosmopolitan Vision Of Conflict Of Laws: Redefining Governmental Interests In A Global Era, Paul Schiff Berman Jul 2005

Towards A Cosmopolitan Vision Of Conflict Of Laws: Redefining Governmental Interests In A Global Era, Paul Schiff Berman

ExpressO

It has now been ten years since the idea of global online communication first entered the popular consciousness. And while the internet has undoubtedly opened up new worlds of interaction and cooperation across borders, this increased transnational activity has also at times inspired parochialism, at least among the legislatures and courts of nation-states around the globe. Thus, we have seen a slew of national laws and court decisions purporting to regulate a wide variety of online activities, from gambling to chat rooms to auction sites, and seeking to enforce territorially based rules regarding trademarks, contractual relations, privacy norms, “indecent” content, …


Thieves In Cyberspace: Examining Music Piracy And Copyright Law Deficiencies In Russia As It Enters The Digital Age, Michael F. Mertens Jul 2005

Thieves In Cyberspace: Examining Music Piracy And Copyright Law Deficiencies In Russia As It Enters The Digital Age, Michael F. Mertens

ExpressO

The article discusses broadly the music piracy problem in Russia, the current state of Russia’s copyright laws, and how its laws and problems compare to the U.S. and the rest of the world. In particular, the article focuses on music piracy through the Internet and how it has exploded in Russia. One of the websites I target is the infamous Allofmp3.com, which has attracted a large amount of U.S. attention in recent times by consumers as well as lawmakers. The article analyzes the legislative and enforcement deficiencies in Russia that led to the enormous problem with traditional music piracy and …


‘Code’ And The Slow Erosion Of Privacy, Ronald Leenes, Bert-Jaap Koops May 2005

‘Code’ And The Slow Erosion Of Privacy, Ronald Leenes, Bert-Jaap Koops

ExpressO

The notion of software code replacing legal code as a mechanism to control human behavior – ‘code as law’ – is often illustrated with examples in intellectual property and freedom of speech. This article examines the neglected issue of the impact of ‘code as law’ on privacy. To what extent is privacy-related ‘code’ being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects …


A Model For Emergency Service Of Voip Through Certification And Labeling, Patrick S. Ryan, Tom Lookabaugh, Douglas Sicker May 2005

A Model For Emergency Service Of Voip Through Certification And Labeling, Patrick S. Ryan, Tom Lookabaugh, Douglas Sicker

ExpressO

Voice over Internet Protocol (VoIP) will transform many aspects of traditional telephony service, including the technology, the business models, and the regulatory constructs that govern such service. Perhaps not unexpectedly, this transformation is generating a host of technical, business, social, and policy problems. In attempting to respond to these problems, the Federal Communications Commission (FCC) could mandate obligations or specific solutions to VoIP policy issues; however, it is instead looking first to industry initiatives focused on the key functionality that users have come to expect of telecommunications services. High among this list of desired functionality is user access to emergency …


The Drm Dilemma: Re-Aligning Rights Under The Digital Millennium Copyright Act, Jacqueline D. Lipton May 2005

The Drm Dilemma: Re-Aligning Rights Under The Digital Millennium Copyright Act, Jacqueline D. Lipton

ExpressO

The Digital Millennium Copyright Act (‘DMCA’) prevents unauthorized copying and distribution of digital copyright works by regulating devices that can be used to circumvent Digital Rights Management (‘DRM’) measures that are used to restrict access to those works. A significant problem is that those devices, like many new technologies, have the potential to be used for both socially harmful and socially beneficial purposes. There is no obvious way for Congress to regulate circumvention devices to prevent the social harms, while at the same time facilitating the social benefits they might provide. Recent judicial interpretations of the DMCA have unsurprisingly erred …


An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann Apr 2005

An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann

ExpressO

In this article, Professor Frischmann combines a number of current debates across many disciplinary lines, all of which examine from different perspectives whether certain resources should be managed through a regime of private property or through a regime of open access. Frischmann develops and applies a theory that demonstrates there are strong economic arguments for managing and sustaining openly accessible infrastructure. The approach he takes differs from conventional analyses in that he focuses extensively on demand-side considerations and fully explores how infrastructure resources generate value for consumers and society. As a result, the theory brings into focus the social value …


Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn Mar 2005

Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn

ExpressO

This article undertakes a normative and empirical legal inquiry into the manner information security vulnerabilities are being addressed through law and in the marketplace. Specifically, this article questions the current legislative paradigm for information security regulation by presenting a critique grounded in information security and cryptography theory. Consequently, this article advocates shifting our regulatory approach to a process-based security paradigm that focuses on improving security of our system as a whole. Finally, this article argues that in order to accomplish this shift with least disruption to current legal and economic processes, expanding an existing set of well-functioning legal structures is …


The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi Nov 2004

The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi

George Mason University School of Law Working Papers Series

One of the most controversial theoretical issues of our time is the governance of cybersecurity. Computer security experts, national security experts, and policy analysts have all struggled to bring meaningful analysis to cybersecurity; however, the discipline of law & economics has yet to be fully applied to the issue. This introduction presents work by leading national scholars who examine this complex national security challenge from a law and economics perspective. The focus spans from a discussion of pure market solutions to public-private issue analysis, providing a valuable basis for policy considerations concerning the appropriate governmental role on the issue of …


Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz Nov 2004

Thinking Outside The Pandora's Box: Why The Dmca Is Unconstitutional Under Article I §8 Of The U.S. Constitution, Joshua L. Schwartz

ExpressO

No abstract provided.


Seventeen Famous Economists Weigh In On Copyright: The Role Of Theory, Empirics, And Network Effects, Stan Liebowitz, Stephen Margolis Sep 2004

Seventeen Famous Economists Weigh In On Copyright: The Role Of Theory, Empirics, And Network Effects, Stan Liebowitz, Stephen Margolis

ExpressO

The case of Eldred v. Ashcroft, which sought to have the Copyright Term Extension Act (CTEA, aka Sonny Bono Copyright Act) declared unconstitutional, was recently decided by the Supreme Court. A remarkable group of seventeen economists including five Noble laureates, representing a wide spectrum of opinion in economics, submitted an amicus curie brief in support of Eldred. The economists condemned CTEA on the grounds that the revenues earned during the extension are so heavily discounted that they have almost no value, while the extended protection of aged works creates immediate monopoly deadweight losses and increases the costs of creating new …


Virtual Markets For Virtual Goods: The Mirror Image Of Digital Copyright?, Peter D. Eckersley Sep 2004

Virtual Markets For Virtual Goods: The Mirror Image Of Digital Copyright?, Peter D. Eckersley

ExpressO

The Internet and Copyright Law are particularly ill-suited to each other. One is designed to give as much information as possible to everyone who wants it; the other allows authors, artists and publishers to earn money by restricting the distribution of works made out of information. The beneficiaries of copyright law are lobbying for the re-design of computers and the Internet to instate "content control" and "digital rights management" (DRM). These technologies are intended to make copyright workable again by re-imposing limits on access to information goods, but they carry high direct and indirect social costs.

One alternative, which has …


Will Video Kill The Radio Star? Visual Learning And The Use Of Display Technology In The Law School Classroom, Fred Galves Sep 2004

Will Video Kill The Radio Star? Visual Learning And The Use Of Display Technology In The Law School Classroom, Fred Galves

ExpressO

No abstract provided.


Cyberspace Cartography: The Case Of On-Line Territorial Privacy, Daniel Benoliel Aug 2004

Cyberspace Cartography: The Case Of On-Line Territorial Privacy, Daniel Benoliel

ExpressO

Territorial privacy, one of the central categories of privacy protection, involves setting limit boundaries on intrusion into an explicit space or locale. Initially, the Restatement (Second) of Torts, which defined the privacy tort of intrusion, as applied by courts, most notably designated two classes of excluded areas: “private” places in which the individual can expect to be free from intrusion, and “non-private” places, in which the individual does not have a recognized expectation of privacy. In the physical world, courts ultimately held almost uniformly that the tort of intrusion could not occur in a public place or in a place …


Essay, Digital Bowdlerizing: Removing The Naughty Bytes, Llewellyn Joseph Gibbons May 2004

Essay, Digital Bowdlerizing: Removing The Naughty Bytes, Llewellyn Joseph Gibbons

ExpressO

Unlike Dr. Bowdler, who republished the works of Shakespeare with the naughty bits removed, the modern digital Bowdlerizer deletes offensive content from digital works in a variety of ways. This Essay will analyze the technologies used by the modern Bowdlerizer to determine when, if, and which technologies make copies in violation of the copyright owner’s § 106(1) right to control reproduction or make derivative copies of a preexisting work that may infringe the copyright owner’s 17 U.S.C. § 106(2) right to authorize the creation of derivative works. These technologies not only support militant prudery, but they also may add new …


A Distance Education Primer: Lessons From My Life As A Dot.Edu Entrepreneur, Linda C. Fentiman Apr 2004

A Distance Education Primer: Lessons From My Life As A Dot.Edu Entrepreneur, Linda C. Fentiman

ExpressO

No abstract provided.


The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig Feb 2004

The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig

ExpressO

After years of legal maneuvering and courtroom skirmishes, the lines in the war between copyright holders and online copyright infringers have been clearly drawn. This conflict, which is poised to erupt in courts across the country, began decades ago with the birth of the Internet, which gave rise to a previously unparalleled opportunity for the dissemination, sharing, and enjoyment of every conceivable form of human expression. In addition to the benefits it has provided, the Internet also has given rise to copyright infringement on a global scale through the unauthorized posting and sharing of digital files. After years of unsuccessfully …


A Gradual Shift In U.S. Privacy Laws Towards A Comprehensive Regime , Kamaal R. Zaidi Oct 2003

A Gradual Shift In U.S. Privacy Laws Towards A Comprehensive Regime , Kamaal R. Zaidi

ExpressO

This paper examines the current trends in a predominantly sectoral U.S. privacy regime that appears to be becoming more comprehensive in nature with respect to data privacy protection. This trend has been greatly attributed to the European Union's comprehensive position on data privacy protection. This paper investigates the growth in U.S. data privacy protection in relation to federal and state legislative history, federal administrative procedures, and private industry efforts. This shift from sectoral to comprehensive regimes is significant in the backdrop of U.S-EU trade relations.


Technological Protection Measures In The United States, The European Union And Germany - How Much Fair Use Do We Need In The "Digital World"?, Wencke Baesler Aug 2003

Technological Protection Measures In The United States, The European Union And Germany - How Much Fair Use Do We Need In The "Digital World"?, Wencke Baesler

ExpressO

This article analyzes the different approaches of the United States and the European Union in the EU Copyright Directive towards the protection of technological protection measures against circumvention. The European and German laws have a radically different approach to fair use that heretofore has not been satisfactorily examined. It is a basic principle of copyright law in the European countries not to provide for a broad fair use exception, but to enumerate specific uses that are excluded from the copyright owner’s right to intervene. However, mostly payment of a reasonable compensation is required. This system is preserved in the recently …


Toward A Criminal Law For Cyberspace: Distributed Security, Susan Brenner Aug 2003

Toward A Criminal Law For Cyberspace: Distributed Security, Susan Brenner

ExpressO

The article analyzes the structure and evolution of the current, traditional model of law enforcement and explains why this model is not an effective means of addressing computer-facilitated criminal activity. It begins by analyzing the operation of rules in collective systems composed of biological or artificial entities; it explains that every such system utilizes basic, constitutive rules to maintain both internal and external order. The article explains that intelligence has a profound effect upon a system’s ability to maintain internal order. Intelligence creates the capacity for deviant behavior, i.e., the refusal to abide by constitutive rules, and this requires the …


Monopoly Power In The Electronic Information Industry: Why, And So What?, Curt A. Hessler Jul 2003

Monopoly Power In The Electronic Information Industry: Why, And So What?, Curt A. Hessler

ExpressO

This "law and economics" article diagnoses why monopoly power infects so many markets in the electronic media, communications, and information technology industries (collectively the "Industry"),and recommends changes to prevailing intellectual property and antitrust doctrines to remedy this problem.

The analysis focuses on a single "norm" -- the maximization of economic value, as defined by standard welfare economic theory. Identifying three distinct functions that operate throughout this otherwise diverse Industry -- authoring, publishing, and distribution -- the article notes that two economic peculiarities characterize most Industry markets: the technical feasibility of "non-rivalrous use" of digitized information products, and the frequent "creative …