Open Access. Powered by Scholars. Published by Universities.®

First Amendment Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in First Amendment

Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell Jun 2019

Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell

Journal of the National Association of Administrative Law Judiciary

This article argues that one of the ways to appropriately fight online human trafficking is through governmental regulation of the Dark Web. Specifically, this article argues that a new Attaching Criminal Dark Web Statute is the best method to combat human trafficking because it can incentivize prosecutors to use current human trafficking statutes to prosecute traffickers. This proposal can deter traffickers from enslaving people. Additionally, this article shows the evolution of online human trafficking laws, investigation, and prosecution (Section II); demonstrates why current and proposed laws do not effectively address the online human trafficking issue (Sections III and IV); introduces …


The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano Apr 2019

The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano

Pace Law Review

The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to …


When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman Jan 2019

When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman

Pepperdine Law Review

In the electronic age, the internet—and—social media specifically, can be a tool for good but, abused and unchecked, can lead to great harm. Terrorist organizations utilize social media as a means of recruiting and training new members, urging them to action, and creating public terror. These platforms serve as the catalyst for equipping the growing number of “lone wolf” attackers taking action across the United States. Under civil liability provisions created under JASTA and the ATA, material supporters of terrorism can be held liable for their actions, and with the key role social media sites now play in supporting terrorism, …


The Trouble With Tinker: An Examination Of Student Free Speech Rights In The Digital Age, Allison N. Sweeney Jan 2019

The Trouble With Tinker: An Examination Of Student Free Speech Rights In The Digital Age, Allison N. Sweeney

Fordham Intellectual Property, Media and Entertainment Law Journal

The boundaries of the schoolyard were once clearly delineated by the physical grounds of the school. In those days, it was relatively easy to determine what sort of student behavior fell within an educator’s purview, and what lay beyond the school’s control. Technological developments have all but erased these confines and extended the boundaries of the school environment somewhat infinitely, as the internet and social media allow students to interact seemingly everywhere and at all times. As these physical boundaries of the schoolyard have disappeared, so too has the certainty with which an educator might supervise a student’s behavior.

Because …