Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (112)
- Intellectual Property Law (45)
- Science and Technology Law (42)
- Communications Law (34)
- Privacy Law (22)
-
- International Law (21)
- First Amendment (18)
- Law and Society (17)
- Social and Behavioral Sciences (17)
- Constitutional Law (12)
- Computer Engineering (11)
- Engineering (11)
- Public Law and Legal Theory (10)
- Commercial Law (9)
- Communication (8)
- Communication Technology and New Media (8)
- Criminal Law (8)
- Gaming Law (8)
- Consumer Protection Law (7)
- Entertainment, Arts, and Sports Law (7)
- Law and Economics (7)
- Legislation (7)
- Torts (7)
- Administrative Law (6)
- Business Organizations Law (6)
- Comparative and Foreign Law (6)
- Digital Communications and Networking (6)
- European Law (6)
- Institution
-
- Maurer School of Law: Indiana University (17)
- Selected Works (16)
- Duke Law (13)
- New York Law School (11)
- BLR (9)
-
- Seattle University School of Law (8)
- University of Michigan Law School (7)
- Pepperdine University (6)
- SelectedWorks (6)
- University of Pennsylvania Carey Law School (6)
- American University Washington College of Law (5)
- Boston University School of Law (5)
- University of Georgia School of Law (5)
- Cleveland State University (4)
- Pace University (4)
- University of New Hampshire (4)
- University of Richmond (4)
- Villanova University Charles Widger School of Law (4)
- Embry-Riddle Aeronautical University (3)
- Roger Williams University (3)
- University of Baltimore Law (3)
- University of Florida Levin College of Law (3)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (3)
- Cornell University Law School (2)
- Florida International University College of Law (2)
- Loyola Marymount University and Loyola Law School (2)
- Northwestern Pritzker School of Law (2)
- Penn State Dickinson Law (2)
- University of Miami Law School (2)
- University of San Diego (2)
- Publication Year
- Publication
-
- Duke Law & Technology Review (13)
- NYLS Law Review (11)
- All Faculty Scholarship (9)
- ExpressO (9)
- Indiana Journal of Global Legal Studies (9)
-
- Articles by Maurer Faculty (8)
- Seattle University Law Review (7)
- Faculty Scholarship (6)
- Articles in Law Reviews & Other Academic Journals (4)
- Pepperdine Law Review (4)
- Villanova Law Review (4)
- Cleveland State Law Review (3)
- Elisabeth Haub School of Law Faculty Publications (3)
- Elizabeth A Rowe (3)
- Journal of Digital Forensics, Security and Law (3)
- Life of the Law School (1993- ) (3)
- UF Law Faculty Publications (3)
- Articles (2)
- Dickinson Law Review (2017-Present) (2)
- Georgia Journal of International & Comparative Law (2)
- James Grimmelmann (2)
- Jorge R Roig (2)
- LLM Theses and Essays (2)
- Law Faculty Scholarship (2)
- Loyola of Los Angeles Law Review (2)
- Michigan Law Review (2)
- Michigan Telecommunications & Technology Law Review (2)
- Northwestern Journal of International Law & Business (2)
- The University of New Hampshire Law Review (2)
- University of Miami Business Law Review (2)
- Publication Type
- File Type
Articles 1 - 30 of 181
Full-Text Articles in Computer Law
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
University of Miami Business Law Review
But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
The Five Internet Rights, Nicholas J. Nugent
The Five Internet Rights, Nicholas J. Nugent
Washington Law Review
Since the dawn of the commercial internet, content moderation has operated under an implicit social contract that website operators could accept or reject users and content as they saw fit, but users in turn could self-publish their views on their own websites if no one else would have them. However, as online service providers and activists have become ever more innovative and aggressive in their efforts to deplatform controversial speakers, content moderation has progressively moved down into the core infrastructure of the internet, targeting critical resources, such as networks, domain names, and IP addresses, on which all websites depend. These …
Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi
Content Governance In The Shadows: How Telcos & Other Internet Infrastructure Companies "Moderate" Online Content, Prem M. Trivedi
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
The New Bailments, Danielle D'Onfro
The New Bailments, Danielle D'Onfro
Scholarship@WashULaw
The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Faculty Scholarship
Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.
In this short Essay, we propose a model for legislating data loyalty. Our …
Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson
Seattle University Law Review SUpra
No abstract provided.
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
A Copy Of A Copy Of A Copy: Internet Mimesis And The Copyrightability Of Memes, Elena Elmerinda Scialabba
A Copy Of A Copy Of A Copy: Internet Mimesis And The Copyrightability Of Memes, Elena Elmerinda Scialabba
Duke Law & Technology Review
No abstract provided.
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
Seattle University Law Review
As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …
The Four Horsemen Of The Internet Apocalypse: The Relevation Of State Net Neutrality Laws, Zachary P.T. Lundgren
The Four Horsemen Of The Internet Apocalypse: The Relevation Of State Net Neutrality Laws, Zachary P.T. Lundgren
Georgia Law Review
In 2018, on the heels of intense debate and
widespread media campaigns, the FCC repealed its
2015 regulations protecting net neutrality. The repeal
continued to stoke controversy after it was announced,
facing congressional and legal challenges almost
immediately. The most interesting response, however,
has been the passage of state net neutrality laws in
California, Oregon, Vermont, and Washington. The first
of their kind, these four laws largely purport to reinstate
the 2015 net neutrality rules within state lines.
Rather than take sides in the net neutrality debate,
this Note focuses on these novel state laws and,
principally, whether they will …
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
What Didn’T Happen: An Essay In Speculation, Peter Jaszi
What Didn’T Happen: An Essay In Speculation, Peter Jaszi
Duke Law & Technology Review
No abstract provided.
Revisiting Barlow's Misplaced Optimism, Benjamin Edelman
Revisiting Barlow's Misplaced Optimism, Benjamin Edelman
Duke Law & Technology Review
No abstract provided.
Is The Internet Over?! (Again?), James Boyle
Is The Internet Over?! (Again?), James Boyle
Duke Law & Technology Review
No abstract provided.
Barlow's Legacy, Cory Doctorow
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle
The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle
Duke Law & Technology Review
No abstract provided.
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Duke Law & Technology Review
No abstract provided.
John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain
John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain
Duke Law & Technology Review
No abstract provided.
A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson
A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson
Duke Law & Technology Review
No abstract provided.
Inventing The Future: Barlow And Beyond, Cindy Cohn
Inventing The Future: Barlow And Beyond, Cindy Cohn
Duke Law & Technology Review
No abstract provided.
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow
The Past And Future Of The Internet: A Symposium For John Perry Barlow
Duke Law & Technology Review
No abstract provided.
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Seattle University Law Review
The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Seattle University Law Review
Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …
The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano
The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano
Pace Law Review
The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to …
Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan
Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan
Articles in Law Reviews & Other Academic Journals
You connect to the Internet via your Wi-Fi access point. You surf the Web using a browser and send emails through your email server. You probably use some USB peripherals-say a mouse, keyboard, or printer. Maybe you even watch cable or broadcast television.
Under current case law, each of those computer systems and devices may very well be copyright-infringing contraband. This is through no fault of your own-you need not be pirating music or streaming illegal movies to infringe a copyright. The infringement simply exists, hard-wired within each of those devices and many more that you use, a result of …
Full Transparency: A Case Against The Collection Of Internet Information In Trump-Era American Immigration, Thomas P. Campbell
Full Transparency: A Case Against The Collection Of Internet Information In Trump-Era American Immigration, Thomas P. Campbell
FIU Law Review
No abstract provided.