Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2009

Discipline
Keyword
Publication
File Type

Articles 1 - 15 of 15

Full-Text Articles in Computer Law

Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill Nov 2009

Privacy Concern In Google Voice Call Recording, Michael Katz, James Tuthill

Michael Katz

The Federal Communications Commission, taking note of AT&T's complaint, has written to Google with questions about its call blocking. But the implications for our privacy of software-managed call services like Google Voice are a much greater threat to consumers, and that's where the FCC should direct its energy - immediately.


Facebook And Risks To De-Contextualization Of Information, Franck Dumortier Jun 2009

Facebook And Risks To De-Contextualization Of Information, Franck Dumortier

Franck Dumortier

No abstract provided.


Digital Divide Older People And Online Legal Advice, Subhajit Basu, Joe Duffy, Helen Davey Jun 2009

Digital Divide Older People And Online Legal Advice, Subhajit Basu, Joe Duffy, Helen Davey

Subhajit Basu

Many older people are not aware where and when advice is available. Furthermore they may be unaware that advice is needed


The Mechanical License And The Origins Of Regulatory Copyright, Joseph Liu Apr 2009

The Mechanical License And The Origins Of Regulatory Copyright, Joseph Liu

Joseph P. Liu

Analyzing the first compulsory license in U.S. copyright law, and arguing that it served as a template for a more "regulatory" approach to copyright law.


Digital Ethics In Bridging Digital Divide, Subhajit Basu Apr 2009

Digital Ethics In Bridging Digital Divide, Subhajit Basu

Subhajit Basu

Our information society is creating parallel systems: one for those with income, education and literacy connections, giving plentiful information at low cost and high speed: the other are those without connections, blocked by high barriers of time, cost and uncertainty and dependent upon outdated information. Hence it can be expressed the DD is nothing but a reflection of social divide. The question is what is the best strategy to construct an information society that is ethically sound? Most people have the views that ICT and underlying ideologies are neutral. This Technology has become so much naturalized that it can no …


Fhaa & The Internet: The Prospects For Self-Regulation, Tim Iglesias Apr 2009

Fhaa & The Internet: The Prospects For Self-Regulation, Tim Iglesias

Tim Iglesias

This presentation argues that the internet offers both great promise and possible peril for anti-discrimination in housing. The potential for self-regulation is mixed but ultimately weak. The presentation concludes with a call for federal regulatory reform.


Pervasive Location Tracking: A Privacy Protection Perspective, Harlan Onsrud Mar 2009

Pervasive Location Tracking: A Privacy Protection Perspective, Harlan Onsrud

Harlan J Onsrud

A laudable goal of ubiquitous computing is to enhance our day-to-day living by invisibly embedding sensors and computing platforms in our stationary and mobile surroundings. Sensors being developed and deployed within distributed computing networks include those able to see (ranging from automated detection of light to identification of specific individuals and objects), hear (detection of specific sounds to transcribing language), smell (detection of specific gases), feel (detection of specific motions, temperature, humidity, etc) and communicate. Sensors in and on our bodies will communicate through our phones, cars, offices, homes, transportation infrastructure, and with objects along our travel paths. Numerous visions …


The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi Mar 2009

The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi

Mark F. Grady

One of the most controversial theoretical issues of our time is the governance of cybersecurity. Computer security experts, national security experts, and policy analysts have all struggled to bring meaningful analysis to cybersecurity; however, the discipline of law & economics has yet to be fully applied to the issue. This introduction presents work by leading national scholars who examine this complex national security challenge from a law and economics perspective. The focus spans from a discussion of pure market solutions to public-private issue analysis, providing a valuable basis for policy considerations concerning the appropriate governmental role on the issue of …


Creative Commons Licensing And Non-Creative Geographic Data, Harlan Onsrud Jan 2009

Creative Commons Licensing And Non-Creative Geographic Data, Harlan Onsrud

Harlan J Onsrud

Why does the scientific community need a simple method for letting each of us know that we are allowed legally to build on the work and data products of each other without asking permission? Does merely following the traditional practices of science and giving credit now make me a lawbreaker? What's the problem, how did we get here and what's the solution? Why does the solution for creative works not apply to geographic and other utilitarian data and databases? This presentation addresses these questions and approaches for arriving at solutions.


Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti Dec 2008

Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti

Robert Sprague

This article explores the developing phenomenon of the ongoing collection and dissemination of personal identifying information (PII): first, explaining the nature and form of PII, including the consequences of its collection; second, exploring one of the greatest threats associated with data collection - unauthorized disclosure due to data breaches, including an overview of state and federal legislative reactions to the threats of data breaches and identity theft; third, discussing common law and constitutional privacy protections regarding the collection of personal information, revealing that United States privacy laws provide very little protection to individuals; and fourth, examining current practices by online …


Liability For Spatial Data Quality, Harlan Onsrud Dec 2008

Liability For Spatial Data Quality, Harlan Onsrud

Harlan J Onsrud

Liability in data, products, and services related to geographic information systems, spatial data infrastructure, location based services and web mapping services, is complicated by the complexities and uncertainties in liability for information system products and services generally, as well as by legal theory uncertainties surrounding liability for maps. Each application of geospatial technologies to a specific use may require integration of different types of data from multiple sources, assessment of attributes, adherence to accuracy and fitness-for-use requirements, and selection from among different analytical processing methods. All of these actions may be fraught with possible misjudgments and errors. A variety of …


The Effectiveness Of Acceptances Communicated By Electronic Means, Or - Does The Postal Acceptance Rule Apply To Email?-, Eliza Mik Dec 2008

The Effectiveness Of Acceptances Communicated By Electronic Means, Or - Does The Postal Acceptance Rule Apply To Email?-, Eliza Mik

Eliza Mik

No abstract provided.


Internet Killed The Copyright Law: Perfect 10 V. Google And The Devastating Impact On The Exclusiive Right To Display, Deborah B. Morse Dec 2008

Internet Killed The Copyright Law: Perfect 10 V. Google And The Devastating Impact On The Exclusiive Right To Display, Deborah B. Morse

Deborah Brightman Morse

Never has the dissonance between copyright and innovation been so extreme. The Internet provides enormous economic growth due to the strength of e-commerce, and affords an avenue for creativity and the wide dissemination of information. Nevertheless, the Internet has become a plague on copyright law. The advent of the digital medium has made the unlawful reproduction, distribution, and display of copyrighted works essentially effortless. The law has been unable to keep pace with the rapid advance of technology. For the past decade, Congress has been actively attempting to draft comprehensible legislation in an effort to afford copyright owners more protection …


¿Por Qué Blawgueamos? Breve Análisis Económico De Los Blogs Jurídicos (Blawgs) Y De La Blogósfera, Maximiliano Marzetti Dec 2008

¿Por Qué Blawgueamos? Breve Análisis Económico De Los Blogs Jurídicos (Blawgs) Y De La Blogósfera, Maximiliano Marzetti

Maximiliano Marzetti

BREVE ANÁLISIS ECONÓMICO DE LOS BLOGS JURÍDICOS (BLAWGS) Y DE LA BLOGÓSFERA.


Facebook And Risks Of “De-Contextualization” Of Information, Franck Dumortier Dec 2008

Facebook And Risks Of “De-Contextualization” Of Information, Franck Dumortier

Franck Dumortier

Participation in online social networking sites (hereafter “OSNS”) has dramatically increased in recent years. Services such as the well known Facebook and Myspace but also Frienster, WAYN, Bebo, Google’s Orkut and many others have millions of registered active users and are continuously growing. The most common model of such sites is based on the presentation of the participants’ profiles and the visualisation of their network of relations to others. Also, OSNS connect participants’ profiles to their public identities, using real names and other real-world identification signs (like pictures, videos, e-mail addresses, etc.) in order to enable interaction and communication between …