Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (117)
- Science and Technology Law (95)
- Intellectual Property Law (77)
- Communications Law (56)
- Law and Society (33)
-
- Consumer Protection Law (29)
- International Law (27)
- Law and Economics (24)
- Entertainment, Arts, and Sports Law (23)
- Commercial Law (22)
- Contracts (21)
- Constitutional Law (20)
- Administrative Law (19)
- Comparative and Foreign Law (19)
- Criminal Law (17)
- Social and Behavioral Sciences (17)
- Public Law and Legal Theory (15)
- Criminal Procedure (14)
- Antitrust and Trade Regulation (13)
- Economics (13)
- First Amendment (12)
- Business Organizations Law (11)
- International Trade Law (11)
- Legislation (11)
- Jurisdiction (10)
- Jurisprudence (10)
- State and Local Government Law (10)
- Civil Rights and Discrimination (9)
- Institution
- Publication Year
- Publication
-
- ExpressO (57)
- All Faculty Scholarship (10)
- Rob Frieden (9)
- Articles in Law Reviews & Other Academic Journals (6)
- Jonathan I. Ezor (5)
-
- Lawrence J. Trautman Sr. (5)
- Scott Shackelford (4)
- Working Paper Series (4)
- Angela Goodrum (3)
- Ivo Teixeira Gico Jr. (3)
- Articles, Book Chapters, & Popular Press (2)
- Jorge R Roig (2)
- Konstantinos Stylianou (2)
- Kyle Langvardt (2)
- Ran Bi (2)
- Richard Warner (2)
- Robert Sprague (2)
- Sharon K. Sandeen (2)
- The University of Cincinnati Intellectual Property and Computer Law Journal (2)
- Vincent J Roth Esq (2)
- A. Michael Froomkin (1)
- Adam Lamparello (1)
- Ahad Syed (1)
- Akiva A Miller (1)
- Allison L Tungate (1)
- Allyson Haynes Stuart (1)
- Andrew J Daddono (1)
- Andrew Leahey (1)
- Bill D. Herman (1)
- Chang Zhou (1)
- Publication Type
Articles 151 - 176 of 176
Full-Text Articles in Computer Law
Seventeen Famous Economists Weigh In On Copyright: The Role Of Theory, Empirics, And Network Effects, Stan Liebowitz, Stephen Margolis
Seventeen Famous Economists Weigh In On Copyright: The Role Of Theory, Empirics, And Network Effects, Stan Liebowitz, Stephen Margolis
ExpressO
The case of Eldred v. Ashcroft, which sought to have the Copyright Term Extension Act (CTEA, aka Sonny Bono Copyright Act) declared unconstitutional, was recently decided by the Supreme Court. A remarkable group of seventeen economists including five Noble laureates, representing a wide spectrum of opinion in economics, submitted an amicus curie brief in support of Eldred. The economists condemned CTEA on the grounds that the revenues earned during the extension are so heavily discounted that they have almost no value, while the extended protection of aged works creates immediate monopoly deadweight losses and increases the costs of creating new …
Virtual Markets For Virtual Goods: The Mirror Image Of Digital Copyright?, Peter D. Eckersley
Virtual Markets For Virtual Goods: The Mirror Image Of Digital Copyright?, Peter D. Eckersley
ExpressO
The Internet and Copyright Law are particularly ill-suited to each other. One is designed to give as much information as possible to everyone who wants it; the other allows authors, artists and publishers to earn money by restricting the distribution of works made out of information. The beneficiaries of copyright law are lobbying for the re-design of computers and the Internet to instate "content control" and "digital rights management" (DRM). These technologies are intended to make copyright workable again by re-imposing limits on access to information goods, but they carry high direct and indirect social costs.
One alternative, which has …
Will Video Kill The Radio Star? Visual Learning And The Use Of Display Technology In The Law School Classroom, Fred Galves
Will Video Kill The Radio Star? Visual Learning And The Use Of Display Technology In The Law School Classroom, Fred Galves
ExpressO
No abstract provided.
Cyberspace Cartography: The Case Of On-Line Territorial Privacy, Daniel Benoliel
Cyberspace Cartography: The Case Of On-Line Territorial Privacy, Daniel Benoliel
ExpressO
Territorial privacy, one of the central categories of privacy protection, involves setting limit boundaries on intrusion into an explicit space or locale. Initially, the Restatement (Second) of Torts, which defined the privacy tort of intrusion, as applied by courts, most notably designated two classes of excluded areas: “private” places in which the individual can expect to be free from intrusion, and “non-private” places, in which the individual does not have a recognized expectation of privacy. In the physical world, courts ultimately held almost uniformly that the tort of intrusion could not occur in a public place or in a place …
The First Amendment, The Public-Private Distinction, And Nongovernmental Suppression Of Wartime Political Debate, Gregory P. Magarian
The First Amendment, The Public-Private Distinction, And Nongovernmental Suppression Of Wartime Political Debate, Gregory P. Magarian
Working Paper Series
This article proposes a major expansion in the scope of First Amendment law and offers a fresh way of understanding the public-private distinction. It contends that the Supreme Court should invoke the First Amendment to enjoin nongovernmental behavior that substantially impedes public political debate during times of war and national emergency. As the article explains, the present campaign against international terrorism has seen employers, property owners, and media corporations restrict political discussion more frequently and aggressively than the government has. If political debate is the most important object of First Amendment protection – which the article contends it is – …
Essay, Digital Bowdlerizing: Removing The Naughty Bytes, Llewellyn Joseph Gibbons
Essay, Digital Bowdlerizing: Removing The Naughty Bytes, Llewellyn Joseph Gibbons
ExpressO
Unlike Dr. Bowdler, who republished the works of Shakespeare with the naughty bits removed, the modern digital Bowdlerizer deletes offensive content from digital works in a variety of ways. This Essay will analyze the technologies used by the modern Bowdlerizer to determine when, if, and which technologies make copies in violation of the copyright owner’s § 106(1) right to control reproduction or make derivative copies of a preexisting work that may infringe the copyright owner’s 17 U.S.C. § 106(2) right to authorize the creation of derivative works. These technologies not only support militant prudery, but they also may add new …
A Distance Education Primer: Lessons From My Life As A Dot.Edu Entrepreneur, Linda C. Fentiman
A Distance Education Primer: Lessons From My Life As A Dot.Edu Entrepreneur, Linda C. Fentiman
ExpressO
No abstract provided.
The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig
The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig
ExpressO
After years of legal maneuvering and courtroom skirmishes, the lines in the war between copyright holders and online copyright infringers have been clearly drawn. This conflict, which is poised to erupt in courts across the country, began decades ago with the birth of the Internet, which gave rise to a previously unparalleled opportunity for the dissemination, sharing, and enjoyment of every conceivable form of human expression. In addition to the benefits it has provided, the Internet also has given rise to copyright infringement on a global scale through the unauthorized posting and sharing of digital files. After years of unsuccessfully …
A Gradual Shift In U.S. Privacy Laws Towards A Comprehensive Regime , Kamaal R. Zaidi
A Gradual Shift In U.S. Privacy Laws Towards A Comprehensive Regime , Kamaal R. Zaidi
ExpressO
This paper examines the current trends in a predominantly sectoral U.S. privacy regime that appears to be becoming more comprehensive in nature with respect to data privacy protection. This trend has been greatly attributed to the European Union's comprehensive position on data privacy protection. This paper investigates the growth in U.S. data privacy protection in relation to federal and state legislative history, federal administrative procedures, and private industry efforts. This shift from sectoral to comprehensive regimes is significant in the backdrop of U.S-EU trade relations.
Whose Music Is It Anyway?: How We Came To View Musical Expression As A Form Of Property -- Part I, Michael W. Carroll
Whose Music Is It Anyway?: How We Came To View Musical Expression As A Form Of Property -- Part I, Michael W. Carroll
Working Paper Series
Many participants in the music industry consider unauthorized downloading of music files over the Internet to be “theft” of their “property.” Many Internet users who exchange music files reject that characterization. Prompted by this dispute, this Article explores how those who create and distribute music first came to look upon music as their property and when in Western history the law first supported this view. By analyzing the economic and legal structures governing musicmaking in Western Europe from the classical period in Greece through the Renaissance, the Article shows that the law first granted some exclusive rights in the Middle …
Technological Protection Measures In The United States, The European Union And Germany - How Much Fair Use Do We Need In The "Digital World"?, Wencke Baesler
Technological Protection Measures In The United States, The European Union And Germany - How Much Fair Use Do We Need In The "Digital World"?, Wencke Baesler
ExpressO
This article analyzes the different approaches of the United States and the European Union in the EU Copyright Directive towards the protection of technological protection measures against circumvention. The European and German laws have a radically different approach to fair use that heretofore has not been satisfactorily examined. It is a basic principle of copyright law in the European countries not to provide for a broad fair use exception, but to enumerate specific uses that are excluded from the copyright owner’s right to intervene. However, mostly payment of a reasonable compensation is required. This system is preserved in the recently …
Toward A Criminal Law For Cyberspace: Distributed Security, Susan Brenner
Toward A Criminal Law For Cyberspace: Distributed Security, Susan Brenner
ExpressO
The article analyzes the structure and evolution of the current, traditional model of law enforcement and explains why this model is not an effective means of addressing computer-facilitated criminal activity. It begins by analyzing the operation of rules in collective systems composed of biological or artificial entities; it explains that every such system utilizes basic, constitutive rules to maintain both internal and external order. The article explains that intelligence has a profound effect upon a system’s ability to maintain internal order. Intelligence creates the capacity for deviant behavior, i.e., the refusal to abide by constitutive rules, and this requires the …
Monopoly Power In The Electronic Information Industry: Why, And So What?, Curt A. Hessler
Monopoly Power In The Electronic Information Industry: Why, And So What?, Curt A. Hessler
ExpressO
This "law and economics" article diagnoses why monopoly power infects so many markets in the electronic media, communications, and information technology industries (collectively the "Industry"),and recommends changes to prevailing intellectual property and antitrust doctrines to remedy this problem.
The analysis focuses on a single "norm" -- the maximization of economic value, as defined by standard welfare economic theory. Identifying three distinct functions that operate throughout this otherwise diverse Industry -- authoring, publishing, and distribution -- the article notes that two economic peculiarities characterize most Industry markets: the technical feasibility of "non-rivalrous use" of digitized information products, and the frequent "creative …
O Princípio Da Eficiência E O Software Livre, Ivo T. Gico
O Princípio Da Eficiência E O Software Livre, Ivo T. Gico
Ivo Teixeira Gico Jr.
O presente artigo visa a incitar o debate acerca da adoção do software livre pela Administração Pública em respeito ao princípio da efetividade, inscrito no art. 37 da Constituição Federal.
This article goal is to encourage discussion about the adoption of free software by the government regarding the principle of effectiveness included in Art. 37 of the Federal Constitution.
O Documento Eletrônico Como Meio De Prova No Brasil, Ivo T. Gico
O Documento Eletrônico Como Meio De Prova No Brasil, Ivo T. Gico
Ivo Teixeira Gico Jr.
Discute-se, no presente artigo, a validade do documento eletrônico como meio hábil de prova, a necessidade de inovação no ordenamento jurídico, bem como o livre convencimento do magistrado. It is discussed in this paper, the validity of the electronic document as valid evidence, analyzing, among other things, the issue of the necessity of a physical media for the document and the judge's liberty to decide.
Gender And Privacy In Cyberspace, Anita L. Allen
Gender And Privacy In Cyberspace, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen
Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen
All Faculty Scholarship
No abstract provided.
O Arquivo Eletrônico Como Meio De Prova, Ivo T. Gico
O Arquivo Eletrônico Como Meio De Prova, Ivo T. Gico
Ivo Teixeira Gico Jr.
Discute-se, no presente artigo, a validade do documento eletrônico como meio hábil de prova, analisando-se, entre outros elementos, a questão do suporte físico para o documento, bem como o livre convencimento do magistrado.
It is discussed in this paper, the validity of the electronic document as valid evidence, analyzing, among other things, the issue of the necessity of a physical media for the document and the judge's liberty to decide.
Discrimination In The Laws Of Information Warfare, Mark R. Shulman
Discrimination In The Laws Of Information Warfare, Mark R. Shulman
Elisabeth Haub School of Law Faculty Publications
No abstract provided.
Withdrawal Of The Reference: Rights, Rules, And Remedies For Unwelcomed Web-Linking, Walter Effross
Withdrawal Of The Reference: Rights, Rules, And Remedies For Unwelcomed Web-Linking, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Computer Crimes Now On The Books: What Do We Do From Here? (Symposium), Henry H. Perritt Jr.
Computer Crimes Now On The Books: What Do We Do From Here? (Symposium), Henry H. Perritt Jr.
All Faculty Scholarship
No abstract provided.
High-Tech Heroes, Virtual Villians, And Jacked-In Justice: Visions Of Law And Lawyers In Cyberpunk Science Fiction, Walter Effross
High-Tech Heroes, Virtual Villians, And Jacked-In Justice: Visions Of Law And Lawyers In Cyberpunk Science Fiction, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Piracy, Privacy, And Privitization: Fictional And Legal Approaches To The Electronic Future Of Cash, Walter Effross
Piracy, Privacy, And Privitization: Fictional And Legal Approaches To The Electronic Future Of Cash, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Putting The Cards Before The Purse: Distinctions, Differences, And Dilemmas In The Regulation Of Stored Value Card Systems, Walter Effross
Putting The Cards Before The Purse: Distinctions, Differences, And Dilemmas In The Regulation Of Stored Value Card Systems, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
A Puzzle Even The Codebreakers Have Trouble Solving: A Clash Of Interests Over The Electronic Encryption Standard, Sean Flynn
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Assaying Computer Associates V. Altai: How Will The Golden Nugget Test Pan Out, Walter Effross
Assaying Computer Associates V. Altai: How Will The Golden Nugget Test Pan Out, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.