Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 151 - 176 of 176

Full-Text Articles in Computer Law

Seventeen Famous Economists Weigh In On Copyright: The Role Of Theory, Empirics, And Network Effects, Stan Liebowitz, Stephen Margolis Sep 2004

Seventeen Famous Economists Weigh In On Copyright: The Role Of Theory, Empirics, And Network Effects, Stan Liebowitz, Stephen Margolis

ExpressO

The case of Eldred v. Ashcroft, which sought to have the Copyright Term Extension Act (CTEA, aka Sonny Bono Copyright Act) declared unconstitutional, was recently decided by the Supreme Court. A remarkable group of seventeen economists including five Noble laureates, representing a wide spectrum of opinion in economics, submitted an amicus curie brief in support of Eldred. The economists condemned CTEA on the grounds that the revenues earned during the extension are so heavily discounted that they have almost no value, while the extended protection of aged works creates immediate monopoly deadweight losses and increases the costs of creating new …


Virtual Markets For Virtual Goods: The Mirror Image Of Digital Copyright?, Peter D. Eckersley Sep 2004

Virtual Markets For Virtual Goods: The Mirror Image Of Digital Copyright?, Peter D. Eckersley

ExpressO

The Internet and Copyright Law are particularly ill-suited to each other. One is designed to give as much information as possible to everyone who wants it; the other allows authors, artists and publishers to earn money by restricting the distribution of works made out of information. The beneficiaries of copyright law are lobbying for the re-design of computers and the Internet to instate "content control" and "digital rights management" (DRM). These technologies are intended to make copyright workable again by re-imposing limits on access to information goods, but they carry high direct and indirect social costs.

One alternative, which has …


Will Video Kill The Radio Star? Visual Learning And The Use Of Display Technology In The Law School Classroom, Fred Galves Sep 2004

Will Video Kill The Radio Star? Visual Learning And The Use Of Display Technology In The Law School Classroom, Fred Galves

ExpressO

No abstract provided.


Cyberspace Cartography: The Case Of On-Line Territorial Privacy, Daniel Benoliel Aug 2004

Cyberspace Cartography: The Case Of On-Line Territorial Privacy, Daniel Benoliel

ExpressO

Territorial privacy, one of the central categories of privacy protection, involves setting limit boundaries on intrusion into an explicit space or locale. Initially, the Restatement (Second) of Torts, which defined the privacy tort of intrusion, as applied by courts, most notably designated two classes of excluded areas: “private” places in which the individual can expect to be free from intrusion, and “non-private” places, in which the individual does not have a recognized expectation of privacy. In the physical world, courts ultimately held almost uniformly that the tort of intrusion could not occur in a public place or in a place …


The First Amendment, The Public-Private Distinction, And Nongovernmental Suppression Of Wartime Political Debate, Gregory P. Magarian Jul 2004

The First Amendment, The Public-Private Distinction, And Nongovernmental Suppression Of Wartime Political Debate, Gregory P. Magarian

Working Paper Series

This article proposes a major expansion in the scope of First Amendment law and offers a fresh way of understanding the public-private distinction. It contends that the Supreme Court should invoke the First Amendment to enjoin nongovernmental behavior that substantially impedes public political debate during times of war and national emergency. As the article explains, the present campaign against international terrorism has seen employers, property owners, and media corporations restrict political discussion more frequently and aggressively than the government has. If political debate is the most important object of First Amendment protection – which the article contends it is – …


Essay, Digital Bowdlerizing: Removing The Naughty Bytes, Llewellyn Joseph Gibbons May 2004

Essay, Digital Bowdlerizing: Removing The Naughty Bytes, Llewellyn Joseph Gibbons

ExpressO

Unlike Dr. Bowdler, who republished the works of Shakespeare with the naughty bits removed, the modern digital Bowdlerizer deletes offensive content from digital works in a variety of ways. This Essay will analyze the technologies used by the modern Bowdlerizer to determine when, if, and which technologies make copies in violation of the copyright owner’s § 106(1) right to control reproduction or make derivative copies of a preexisting work that may infringe the copyright owner’s 17 U.S.C. § 106(2) right to authorize the creation of derivative works. These technologies not only support militant prudery, but they also may add new …


A Distance Education Primer: Lessons From My Life As A Dot.Edu Entrepreneur, Linda C. Fentiman Apr 2004

A Distance Education Primer: Lessons From My Life As A Dot.Edu Entrepreneur, Linda C. Fentiman

ExpressO

No abstract provided.


The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig Feb 2004

The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig

ExpressO

After years of legal maneuvering and courtroom skirmishes, the lines in the war between copyright holders and online copyright infringers have been clearly drawn. This conflict, which is poised to erupt in courts across the country, began decades ago with the birth of the Internet, which gave rise to a previously unparalleled opportunity for the dissemination, sharing, and enjoyment of every conceivable form of human expression. In addition to the benefits it has provided, the Internet also has given rise to copyright infringement on a global scale through the unauthorized posting and sharing of digital files. After years of unsuccessfully …


A Gradual Shift In U.S. Privacy Laws Towards A Comprehensive Regime , Kamaal R. Zaidi Oct 2003

A Gradual Shift In U.S. Privacy Laws Towards A Comprehensive Regime , Kamaal R. Zaidi

ExpressO

This paper examines the current trends in a predominantly sectoral U.S. privacy regime that appears to be becoming more comprehensive in nature with respect to data privacy protection. This trend has been greatly attributed to the European Union's comprehensive position on data privacy protection. This paper investigates the growth in U.S. data privacy protection in relation to federal and state legislative history, federal administrative procedures, and private industry efforts. This shift from sectoral to comprehensive regimes is significant in the backdrop of U.S-EU trade relations.


Whose Music Is It Anyway?: How We Came To View Musical Expression As A Form Of Property -- Part I, Michael W. Carroll Sep 2003

Whose Music Is It Anyway?: How We Came To View Musical Expression As A Form Of Property -- Part I, Michael W. Carroll

Working Paper Series

Many participants in the music industry consider unauthorized downloading of music files over the Internet to be “theft” of their “property.” Many Internet users who exchange music files reject that characterization. Prompted by this dispute, this Article explores how those who create and distribute music first came to look upon music as their property and when in Western history the law first supported this view. By analyzing the economic and legal structures governing musicmaking in Western Europe from the classical period in Greece through the Renaissance, the Article shows that the law first granted some exclusive rights in the Middle …


Technological Protection Measures In The United States, The European Union And Germany - How Much Fair Use Do We Need In The "Digital World"?, Wencke Baesler Aug 2003

Technological Protection Measures In The United States, The European Union And Germany - How Much Fair Use Do We Need In The "Digital World"?, Wencke Baesler

ExpressO

This article analyzes the different approaches of the United States and the European Union in the EU Copyright Directive towards the protection of technological protection measures against circumvention. The European and German laws have a radically different approach to fair use that heretofore has not been satisfactorily examined. It is a basic principle of copyright law in the European countries not to provide for a broad fair use exception, but to enumerate specific uses that are excluded from the copyright owner’s right to intervene. However, mostly payment of a reasonable compensation is required. This system is preserved in the recently …


Toward A Criminal Law For Cyberspace: Distributed Security, Susan Brenner Aug 2003

Toward A Criminal Law For Cyberspace: Distributed Security, Susan Brenner

ExpressO

The article analyzes the structure and evolution of the current, traditional model of law enforcement and explains why this model is not an effective means of addressing computer-facilitated criminal activity. It begins by analyzing the operation of rules in collective systems composed of biological or artificial entities; it explains that every such system utilizes basic, constitutive rules to maintain both internal and external order. The article explains that intelligence has a profound effect upon a system’s ability to maintain internal order. Intelligence creates the capacity for deviant behavior, i.e., the refusal to abide by constitutive rules, and this requires the …


Monopoly Power In The Electronic Information Industry: Why, And So What?, Curt A. Hessler Jul 2003

Monopoly Power In The Electronic Information Industry: Why, And So What?, Curt A. Hessler

ExpressO

This "law and economics" article diagnoses why monopoly power infects so many markets in the electronic media, communications, and information technology industries (collectively the "Industry"),and recommends changes to prevailing intellectual property and antitrust doctrines to remedy this problem.

The analysis focuses on a single "norm" -- the maximization of economic value, as defined by standard welfare economic theory. Identifying three distinct functions that operate throughout this otherwise diverse Industry -- authoring, publishing, and distribution -- the article notes that two economic peculiarities characterize most Industry markets: the technical feasibility of "non-rivalrous use" of digitized information products, and the frequent "creative …


O Princípio Da Eficiência E O Software Livre, Ivo T. Gico Dec 2001

O Princípio Da Eficiência E O Software Livre, Ivo T. Gico

Ivo Teixeira Gico Jr.

O presente artigo visa a incitar o debate acerca da adoção do software livre pela Administração Pública em respeito ao princípio da efetividade, inscrito no art. 37 da Constituição Federal.

This article goal is to encourage discussion about the adoption of free software by the government regarding the principle of effectiveness included in Art. 37 of the Federal Constitution.


O Documento Eletrônico Como Meio De Prova No Brasil, Ivo T. Gico Dec 2000

O Documento Eletrônico Como Meio De Prova No Brasil, Ivo T. Gico

Ivo Teixeira Gico Jr.

Discute-se, no presente artigo, a validade do documento eletrônico como meio hábil de prova, a necessidade de inovação no ordenamento jurídico, bem como o livre convencimento do magistrado. It is discussed in this paper, the validity of the electronic document as valid evidence, analyzing, among other things, the issue of the necessity of a physical media for the document and the judge's liberty to decide.


Gender And Privacy In Cyberspace, Anita L. Allen May 2000

Gender And Privacy In Cyberspace, Anita L. Allen

All Faculty Scholarship

No abstract provided.


Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen Jan 2000

Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen

All Faculty Scholarship

No abstract provided.


O Arquivo Eletrônico Como Meio De Prova, Ivo T. Gico Dec 1999

O Arquivo Eletrônico Como Meio De Prova, Ivo T. Gico

Ivo Teixeira Gico Jr.

Discute-se, no presente artigo, a validade do documento eletrônico como meio hábil de prova, analisando-se, entre outros elementos, a questão do suporte físico para o documento, bem como o livre convencimento do magistrado.

It is discussed in this paper, the validity of the electronic document as valid evidence, analyzing, among other things, the issue of the necessity of a physical media for the document and the judge's liberty to decide.


Discrimination In The Laws Of Information Warfare, Mark R. Shulman Jan 1999

Discrimination In The Laws Of Information Warfare, Mark R. Shulman

Elisabeth Haub School of Law Faculty Publications

No abstract provided.


Withdrawal Of The Reference: Rights, Rules, And Remedies For Unwelcomed Web-Linking, Walter Effross Jan 1998

Withdrawal Of The Reference: Rights, Rules, And Remedies For Unwelcomed Web-Linking, Walter Effross

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Computer Crimes Now On The Books: What Do We Do From Here? (Symposium), Henry H. Perritt Jr. Mar 1997

Computer Crimes Now On The Books: What Do We Do From Here? (Symposium), Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.


High-Tech Heroes, Virtual Villians, And Jacked-In Justice: Visions Of Law And Lawyers In Cyberpunk Science Fiction, Walter Effross Jan 1997

High-Tech Heroes, Virtual Villians, And Jacked-In Justice: Visions Of Law And Lawyers In Cyberpunk Science Fiction, Walter Effross

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Piracy, Privacy, And Privitization: Fictional And Legal Approaches To The Electronic Future Of Cash, Walter Effross Jan 1997

Piracy, Privacy, And Privitization: Fictional And Legal Approaches To The Electronic Future Of Cash, Walter Effross

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Putting The Cards Before The Purse: Distinctions, Differences, And Dilemmas In The Regulation Of Stored Value Card Systems, Walter Effross Jan 1997

Putting The Cards Before The Purse: Distinctions, Differences, And Dilemmas In The Regulation Of Stored Value Card Systems, Walter Effross

Articles in Law Reviews & Other Academic Journals

No abstract provided.


A Puzzle Even The Codebreakers Have Trouble Solving: A Clash Of Interests Over The Electronic Encryption Standard, Sean Flynn Jan 1995

A Puzzle Even The Codebreakers Have Trouble Solving: A Clash Of Interests Over The Electronic Encryption Standard, Sean Flynn

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Assaying Computer Associates V. Altai: How Will The Golden Nugget Test Pan Out, Walter Effross Jan 1993

Assaying Computer Associates V. Altai: How Will The Golden Nugget Test Pan Out, Walter Effross

Articles in Law Reviews & Other Academic Journals

No abstract provided.