Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (81)
- Science and Technology Law (60)
- Intellectual Property Law (58)
- Computer Sciences (39)
- Physical Sciences and Mathematics (39)
-
- Information Security (37)
- Social and Behavioral Sciences (35)
- Privacy Law (31)
- Computer Engineering (26)
- Engineering (26)
- Legal Studies (26)
- Electrical and Computer Engineering (25)
- Forensic Science and Technology (25)
- Communications Law (12)
- Consumer Protection Law (12)
- Contracts (11)
- Law and Economics (11)
- Law and Society (11)
- Antitrust and Trade Regulation (10)
- International Law (10)
- Legislation (10)
- Comparative and Foreign Law (9)
- Constitutional Law (9)
- Health Law and Policy (9)
- Legal Writing and Research (9)
- Property Law and Real Estate (8)
- Tax Law (8)
- Administrative Law (7)
- Institution
-
- Embry-Riddle Aeronautical University (38)
- BLR (24)
- UIC School of Law (21)
- Schulich School of Law, Dalhousie University (14)
- Cleveland State University (10)
-
- University of Richmond (6)
- Santa Clara Law (5)
- Selected Works (4)
- SelectedWorks (4)
- Villanova University Charles Widger School of Law (4)
- Boston University School of Law (3)
- Maurer School of Law: Indiana University (2)
- University of Baltimore Law (2)
- University of New Hampshire (2)
- University of Pennsylvania Carey Law School (2)
- University of Pittsburgh School of Law (2)
- Columbia Law School (1)
- Cornell University Law School (1)
- Pace University (1)
- University of Colorado Law School (1)
- University of Georgia School of Law (1)
- University of Maine School of Law (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of Oklahoma College of Law (1)
- University of Washington School of Law (1)
- Keyword
-
- Computer Law (24)
- Law and Technology (21)
- Internet (17)
- Intellectual Property Law (16)
- Science and Technology (15)
-
- Consumer Protection Law (7)
- Contracts (7)
- International Law (7)
- Constitutional Law (6)
- Copyright (6)
- Commercial Law (5)
- Communications Law (5)
- Comparative and Foreign Law (5)
- General Law (5)
- Google (5)
- Intellectual property (5)
- Law and Economics (5)
- Law and Society (5)
- Legislation (5)
- Administrative Law (4)
- Antitrust (4)
- Criminal Law and Procedure (4)
- E-commerce (4)
- Economics (4)
- Government Contracts (4)
- International Trade (4)
- Politics (4)
- Privacy (4)
- Public Law and Legal Theory (4)
- Adwords (3)
- Publication
-
- Journal of Digital Forensics, Security and Law (31)
- ExpressO (24)
- UIC John Marshall Journal of Information Technology & Privacy Law (16)
- Canadian Journal of Law and Technology (14)
- Cleveland State Law Review (10)
-
- Annual ADFSL Conference on Digital Forensics, Security and Law (6)
- Richmond Journal of Law & Technology (6)
- Faculty Scholarship (4)
- Rosetta Stone v. Google (Joint Appendix) (4)
- Villanova Law Review (4)
- All Faculty Scholarship (3)
- Articles (3)
- UIC Review of Intellectual Property Law (3)
- Bruno L. Costantini García (2)
- Faculty Publications (2)
- Joseph P. Liu (2)
- Publications (2)
- The University of New Hampshire Law Review (2)
- Alfred C. Yen (1)
- Andres Guadamuz (1)
- Articles by Maurer Faculty (1)
- Books (1)
- Cornell Law Faculty Publications (1)
- Donald J. Kochan (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Federal Communications Law Journal (1)
- Franck Dumortier (1)
- Oklahoma Law Review (1)
- Scholarly Works (1)
- UIC Law Open Access Faculty Scholarship (1)
- Publication Type
- File Type
Articles 1 - 30 of 153
Full-Text Articles in Computer Law
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
Federal Communications Law Journal
This Article calls for mandated "network neutrality," which would require broadband service providers to treat all nondestructive data equitably. The Author argues that neutral networks are preferable because they better foster online innovation and provide a more equitable distribution of the power to communicate. Without mandated network neutrality, providers in highly concentrated regional broadband markets will likely begin charging content providers for the right to send data to end users at the fastest speeds available. The Author demonstrates that regional broadband competition and forthcoming transmission technologies are unlikely to prevent broadband discrimination, ad hoc regulation under current statutory authority is …
The Five Indicia Of Virtual Property, Charles Blazer
The Five Indicia Of Virtual Property, Charles Blazer
The University of New Hampshire Law Review
[Excerpt] “Many Americans use “it” every day. Although it is intangible, it may be worth thousands of dollars. Because we can both control it and prevent other people from controlling it, we assume, without much thought, that we own it. Sometimes we pay someone a monthly fee to hold it for us. Sometimes, simply by using it, we increase its value. When we finish using it, we often sell it.
“It” is virtual property, and it may take the form of an email address, a website, a bidding agent, a video game character, or any number of other intangible, digital …
Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan
Vol. Ix, Tab 41 - Ex. J - Hagan Deposition From Cng (Google Managing Counsel - Trademarks), Rose Hagan
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Biometrics, Certified Software Solutions, And The Japanese Consumption Tax: A Proposal For The Tax Commission, Richard Thompson Ainsworth
Biometrics, Certified Software Solutions, And The Japanese Consumption Tax: A Proposal For The Tax Commission, Richard Thompson Ainsworth
Faculty Scholarship
Significant change is anticipated in the Japanese Consumption Tax. The Japanese Tax Commission is recommending that the rate should double, multiple rates should be employed, and the "bookkeeping method" of accounting should be abandoned in favor of the European "invoice method."
The Tax Commission faces a tax policy dilemma. The aging population drives the need for a tax increase (making the Consumption Tax an obvious target for revenue enhancement) at exactly the same time the population is shrinking in overall size, thereby reducing the number of working-consumers who can pay the higher tax.
These are dramatic changes for the Japanese …
Are Browse-Wrap Agreements All They Are Wrapped Up To Be? , Ian A. Rambarran
Are Browse-Wrap Agreements All They Are Wrapped Up To Be? , Ian A. Rambarran
ExpressO
Electronic agreements continue to fortify their presence in the digital commercial marketplace. Whether used to sell goods or services, or simply to define relationships, standardized electronic agreements have appeared in abundance in business-to-business or business-to-consumer transactions. Standardized electronic agreements, like their physical counterparts, offer the ability to address multiple concerns in a simple, efficient fashion. Although electronic contracts and electronic signatures have been accepted and promoted by federal and state governments, many fundamental aspects of contract law have been left for the courts to wrestle with when disputes arise.
Today, there are essentially two types of standardized electronic agreements—the click-through …
Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer
Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer
All Faculty Scholarship
The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …
Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens
Finding Common Ground In The World Of Electronic Contracts: The Consistency Of Legal Reasoning In Clickwrap Cases, Robert L. Dickens
ExpressO
Electronic contractual arrangements have raised complex legal issues unprecedented in the law. Technology s impact on traditional contract law doctrines is readily apparent in the dilemmas generated by recent developments in computer software, hardware, and Internet transactions. In such transactions, sellers have increasingly begun utilizing “clickwrap” agreements, whereby standard terms and conditions are displayed on the computer screen when the user attempts to access the seller’s services. Not surprisingly, the enforceability of clickwrap terms, which are often not known to the user until after payment, has become a subject of much debate in the courts. Because many of the clickwrap …
Copyright And Breathing Space, Joseph Liu
Copyright And Breathing Space, Joseph Liu
Joseph P. Liu
Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García
Ley Federal Del Procedimiento Contencioso Administrativo., Bruno L. Costantini García
Bruno L. Costantini García
Ponencia sobre la Ley Federal del Procedimiento Contencioso Administrativo, impartida por Bruno L. Costantini García.
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
The Legal Framework Surrounding Digital Rights Management Technologies, Joseph Liu
The Legal Framework Surrounding Digital Rights Management Technologies, Joseph Liu
Joseph P. Liu
Decoding Cyberproperty, Francis G. Lastowka
Decoding Cyberproperty, Francis G. Lastowka
ExpressO
This article examines recent developments in both the doctrine and theory of legal cyberproperty rights. The first part of this article looks primarily at two seminal cases that might be considered bookends to the story of cyberproperty: Thrifty-Tel, Inc. v. Bezenek and Intel v. Hamidi. The second part of this article challenges two assumptions that act as theoretical and rhetorical engines driving arguments for cyberproperty. The first is the assumption that legal prohibitions against interactions with privately owned computing machinery are analogous, from a standpoint of law and policy, to traditional rights of exclusion from the use of or entry …
Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang
Vol. Ix, Tab 41 - Ex. 21 - Email From Lena Huang (Rosetta Online Marketing), Lena Huang
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden
Network Neutrality Or Bias?--Handicapping The Odds For A Tiered And Branded Internet, Robert M. Frieden
ExpressO
Recent double digit billion dollar mergers of telecommunications firms consolidate both market share and market leadership by incumbent operators such as Verizon. These companies seek to exploit technological and market convergence by offering a triple play package of wired and wireless telephone service, video and Internet access. As well they need to develop new profit centers to compensate for declining revenues and market shares in traditional services such as wireline telephony.
While incumbent telecommunications operators have pursued new market opportunities, these ventures have not abandoned core management philosophies, operating assumptions and business strategies. Longstanding strategies for recovering investments, using a …
Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs
Unwarranted Fears Mask The Benefits Of Network Diversity: An Argument Against Mandating Network Neutrality, Elvis Stumbergs
ExpressO
The rapid development of the Internet has necessitated an update to Federal telecommunications laws. Recent Congressional efforts to enact such an update, however, have spawned a fiery debate over a somewhat nebulous concept: network neutrality. The debate concerns the way that Internet access providers handle the data traffic being sent over their networks. These providers would like the option to offer some of their customers, web site hosting companies and similar entities, additional services that would essentially result in these customers’ content loading faster, more reliably, or more securely than others not receiving such priority treatment. Yet, this proposed “diversity” …
What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley
What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley
The University of New Hampshire Law Review
Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …
Scientific Expertise In Policymaking: The Case For Open Review And Patent Reform, Beth Simone Noveck
Scientific Expertise In Policymaking: The Case For Open Review And Patent Reform, Beth Simone Noveck
ExpressO
The Energy Research Advisory Board, the group of external scientific advisors that provided impartial expert advice to the Secretary of Energy since 1978, was disbanded this May. The Administration, like its predecessors, regularly replaces experts on agency advisory panels with ideologues and political allies. We are at the nadir of a historical progression since World War II away from trust in and use of scientific expertise in policymaking. This shift however, has not been countered with greater public participation. Instead, administrative law and theory have developed a model of the managerial administrative authority. The "expertocratic" agency relies on internal expertise …
Access To Knowledge As A Bridge Over The Troubled Waters Of Copyright Fair Use -- From Jefferson To Mandela To Google, Douglas L. Rogers
Access To Knowledge As A Bridge Over The Troubled Waters Of Copyright Fair Use -- From Jefferson To Mandela To Google, Douglas L. Rogers
ExpressO
The copyright fair use doctrine is a key to increasing access to knowledge and decreasing the digital divide between information-rich and information-poor countries. Publishers have sued Google for copyright infringement for scanning the copyrighted books of the publishers into a digital database, so Google users can search the database for certain words to determine what books contain words of interest to the user. The Google litigation, however, is only a small piece of the larger access to knowledge puzzle. The larger issue is access to the books themselves, translated into the native languages of citizens of developing countries. Yet copyright …
Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali
Data Privacy, Data Piracy: Can India Provide Adequate Protection For Electronically Transferred Data?, Vinita Bali
ExpressO
As the wave of outsourcing to India swells, there is growing concern about the inadequacies of the India legal system in protecting data being transferred to it from other nations for the purpose of processing. India has a smattering of laws that scantily address the issue of data privacy. Under pressure from the business processing industry in India, as well as from the European Union and other nations, it is but a matter of time before India adopts a slate of laws that address the issue of data protection. Once these laws are enacted, the main issue that remains is …
Technoconsen(T)Sus, Andrea M. Matwyshyn
Technoconsen(T)Sus, Andrea M. Matwyshyn
ExpressO
Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …
In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
ExpressO
The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …
Biometrics: Solving The Regressivity Of Vats And Rsts With 'Smart Card' Technology, Richard Thompson Ainsworth
Biometrics: Solving The Regressivity Of Vats And Rsts With 'Smart Card' Technology, Richard Thompson Ainsworth
Faculty Scholarship
Biometric identifiers embedded in national identity cards puts a formerly impossible goal of consumption taxation within the grasp of policymakers for the first time. Never before has it been possible to design a broad-based, single rate consumption tax that is truly progressive.
No consumption tax has ever had all three of the critical attributes of a progressive consumption tax: a broad base, a single rate, and measured relief for those in greatest need. Although economists have urged that a broad base and a single rate be pursued over progressivity, most consumption taxes instead seek progressivity at the expense of both …
The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer
The Crtc's Enforcement Of Canada's Broadcast Legislation: 'Concern', 'Serious Concern' And 'Grave Concern', Monica Auer
Canadian Journal of Law and Technology
This paper describes results from a quantitative study of the enforcement by the Canadian Radio-television and Telecommunications Commission (CRTC or Commission) over the last several decades of Canada’s broadcasting legislation and its own regulations. Established by Parliament in 1968, the CRTC is a quasi-judicial regulatory agency that administers Canada’s Broad- casting Act, 1991 as well as the nation’s telecommunications legislation. Parliament has accorded the CRTC a broad range of discretionary powers over broadcast licensees, from granting, denying or revoking licences, to issuing mandatory orders. It is one of many federal regulatory agencies that administer and enforce Parliament’s legislation.
Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds
Step In The Wrong Direction: The Impact Of The Legislative Protection Of Technological Protection Measures On Fair Dealing And Freedom Of Expression, Graham Reynolds
Canadian Journal of Law and Technology
This paper will investigate whether legislation granting protection to TPMs infringes the freedom of expression (s. 2(b)) guarantee as contained in the Canadian Charter of Rights and Freedoms. This paper will proceed in five parts. Part I will discuss Bill C-60 and the legislative protection of TPMs in Canada. Part II will discuss the effect of TPMs on fair dealing. Part III will analyze whether the freedom of expression guarantee can be used to challenge provisions in the Copyright Act. Part IV will evaluate whether amendments to the Copyright Act granting protection to TPMs are consistent with the freedom of …