Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (7)
- Internet Law (6)
- Intellectual Property Law (5)
- Human Rights Law (4)
- Communications Law (3)
-
- Contracts (3)
- Geographic Information Sciences (3)
- Geography (3)
- Law and Economics (3)
- Library and Information Science (3)
- Social and Behavioral Sciences (3)
- Accounting Law (2)
- Banking and Finance Law (2)
- Commercial Law (2)
- Consumer Protection Law (2)
- Dispute Resolution and Arbitration (2)
- Law and Society (2)
- Legal Writing and Research (2)
- Property Law and Real Estate (2)
- Tax Law (2)
- Administrative Law (1)
- Arts and Humanities (1)
- Business (1)
- Business and Corporate Communications (1)
- Civil Rights and Discrimination (1)
- Constitutional Law (1)
- Contemporary Art (1)
- Criminal Law (1)
- Keyword
-
- Computer Law (3)
- Copyright (2)
- Digital Divide (2)
- Information Infrastructure (2)
- Law (2)
-
- Law and Economics (2)
- Law and Technology (2)
- Privacy (2)
- Privacy & Technologies (2)
- Administrative Law (1)
- Advertisements (1)
- Art (1)
- Bridging the Divide (1)
- Call blocking (1)
- Call recording (1)
- Carrier (1)
- Civil Rights (1)
- Creative Commons (1)
- Criminal Law and Procedure (1)
- Cyber-colonialism (1)
- Cyberlaw (1)
- Digital Ethics (1)
- Digital divide disempowers (1)
- E-commerce (1)
- Electronic commerce (1)
- Ethics (1)
- Ethics driven design (1)
- FCC (1)
- Fair Housing Law (1)
- Fair housing (1)
- Publication
- File Type
Articles 1 - 15 of 15
Full-Text Articles in Computer Law
Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill
Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill
Michael Katz
The Federal Communications Commission, taking note of AT&T's complaint, has written to Google with questions about its call blocking. But the implications for our privacy of software-managed call services like Google Voice are a much greater threat to consumers, and that's where the FCC should direct its energy - immediately.
Facebook And Risks To De-Contextualization Of Information, Franck Dumortier
Facebook And Risks To De-Contextualization Of Information, Franck Dumortier
Franck Dumortier
No abstract provided.
Digital Divide Older People And Online Legal Advice, Subhajit Basu, Joe Duffy, Helen Davey
Digital Divide Older People And Online Legal Advice, Subhajit Basu, Joe Duffy, Helen Davey
Subhajit Basu
Many older people are not aware where and when advice is available. Furthermore they may be unaware that advice is needed
The Mechanical License And The Origins Of Regulatory Copyright, Joseph Liu
The Mechanical License And The Origins Of Regulatory Copyright, Joseph Liu
Joseph P. Liu
Digital Ethics In Bridging Digital Divide, Subhajit Basu
Digital Ethics In Bridging Digital Divide, Subhajit Basu
Subhajit Basu
Our information society is creating parallel systems: one for those with income, education and literacy connections, giving plentiful information at low cost and high speed: the other are those without connections, blocked by high barriers of time, cost and uncertainty and dependent upon outdated information. Hence it can be expressed the DD is nothing but a reflection of social divide. The question is what is the best strategy to construct an information society that is ethically sound? Most people have the views that ICT and underlying ideologies are neutral. This Technology has become so much naturalized that it can no …
Fhaa & The Internet: The Prospects For Self-Regulation, Tim Iglesias
Fhaa & The Internet: The Prospects For Self-Regulation, Tim Iglesias
Tim Iglesias
This presentation argues that the internet offers both great promise and possible peril for anti-discrimination in housing. The potential for self-regulation is mixed but ultimately weak. The presentation concludes with a call for federal regulatory reform.
Pervasive Location Tracking: A Privacy Protection Perspective, Harlan Onsrud
Pervasive Location Tracking: A Privacy Protection Perspective, Harlan Onsrud
Harlan J Onsrud
A laudable goal of ubiquitous computing is to enhance our day-to-day living by invisibly embedding sensors and computing platforms in our stationary and mobile surroundings. Sensors being developed and deployed within distributed computing networks include those able to see (ranging from automated detection of light to identification of specific individuals and objects), hear (detection of specific sounds to transcribing language), smell (detection of specific gases), feel (detection of specific motions, temperature, humidity, etc) and communicate. Sensors in and on our bodies will communicate through our phones, cars, offices, homes, transportation infrastructure, and with objects along our travel paths. Numerous visions …
The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi
The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi
Mark F. Grady
One of the most controversial theoretical issues of our time is the governance of cybersecurity. Computer security experts, national security experts, and policy analysts have all struggled to bring meaningful analysis to cybersecurity; however, the discipline of law & economics has yet to be fully applied to the issue. This introduction presents work by leading national scholars who examine this complex national security challenge from a law and economics perspective. The focus spans from a discussion of pure market solutions to public-private issue analysis, providing a valuable basis for policy considerations concerning the appropriate governmental role on the issue of …
Creative Commons Licensing And Non-Creative Geographic Data, Harlan Onsrud
Creative Commons Licensing And Non-Creative Geographic Data, Harlan Onsrud
Harlan J Onsrud
Why does the scientific community need a simple method for letting each of us know that we are allowed legally to build on the work and data products of each other without asking permission? Does merely following the traditional practices of science and giving credit now make me a lawbreaker? What's the problem, how did we get here and what's the solution? Why does the solution for creative works not apply to geographic and other utilitarian data and databases? This presentation addresses these questions and approaches for arriving at solutions.
Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti
Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti
Robert Sprague
This article explores the developing phenomenon of the ongoing collection and dissemination of personal identifying information (PII): first, explaining the nature and form of PII, including the consequences of its collection; second, exploring one of the greatest threats associated with data collection - unauthorized disclosure due to data breaches, including an overview of state and federal legislative reactions to the threats of data breaches and identity theft; third, discussing common law and constitutional privacy protections regarding the collection of personal information, revealing that United States privacy laws provide very little protection to individuals; and fourth, examining current practices by online …
Liability For Spatial Data Quality, Harlan Onsrud
Liability For Spatial Data Quality, Harlan Onsrud
Harlan J Onsrud
Liability in data, products, and services related to geographic information systems, spatial data infrastructure, location based services and web mapping services, is complicated by the complexities and uncertainties in liability for information system products and services generally, as well as by legal theory uncertainties surrounding liability for maps. Each application of geospatial technologies to a specific use may require integration of different types of data from multiple sources, assessment of attributes, adherence to accuracy and fitness-for-use requirements, and selection from among different analytical processing methods. All of these actions may be fraught with possible misjudgments and errors. A variety of …
The Effectiveness Of Acceptances Communicated By Electronic Means, Or - Does The Postal Acceptance Rule Apply To Email?-, Eliza Mik
Eliza Mik
No abstract provided.
Internet Killed The Copyright Law: Perfect 10 V. Google And The Devastating Impact On The Exclusiive Right To Display, Deborah B. Morse
Internet Killed The Copyright Law: Perfect 10 V. Google And The Devastating Impact On The Exclusiive Right To Display, Deborah B. Morse
Deborah Brightman Morse
Never has the dissonance between copyright and innovation been so extreme. The Internet provides enormous economic growth due to the strength of e-commerce, and affords an avenue for creativity and the wide dissemination of information. Nevertheless, the Internet has become a plague on copyright law. The advent of the digital medium has made the unlawful reproduction, distribution, and display of copyrighted works essentially effortless. The law has been unable to keep pace with the rapid advance of technology. For the past decade, Congress has been actively attempting to draft comprehensible legislation in an effort to afford copyright owners more protection …
¿Por Qué Blawgueamos? Breve Análisis Económico De Los Blogs Jurídicos (Blawgs) Y De La Blogósfera, Maximiliano Marzetti
¿Por Qué Blawgueamos? Breve Análisis Económico De Los Blogs Jurídicos (Blawgs) Y De La Blogósfera, Maximiliano Marzetti
Maximiliano Marzetti
BREVE ANÁLISIS ECONÓMICO DE LOS BLOGS JURÍDICOS (BLAWGS) Y DE LA BLOGÓSFERA.
Facebook And Risks Of “De-Contextualization” Of Information, Franck Dumortier
Facebook And Risks Of “De-Contextualization” Of Information, Franck Dumortier
Franck Dumortier
Participation in online social networking sites (hereafter “OSNS”) has dramatically increased in recent years. Services such as the well known Facebook and Myspace but also Frienster, WAYN, Bebo, Google’s Orkut and many others have millions of registered active users and are continuously growing. The most common model of such sites is based on the presentation of the participants’ profiles and the visualisation of their network of relations to others. Also, OSNS connect participants’ profiles to their public identities, using real names and other real-world identification signs (like pictures, videos, e-mail addresses, etc.) in order to enable interaction and communication between …