Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Internet Law

Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan Jan 2023

Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan

Canadian Journal of Law and Technology

It is a common claim that law is always catching up with technology. This is not entirely fair. The European Union’s General Data Protection Regulation1 (GDPR) could be viewed as a case of technology having to catch up to the law. That said, clearly there are challenges in law and in the legal profession, both in terms of how the law can adapt to changes in the digital world and the disruption of the legal profession. On the former point, there are perhaps three broad schools of thought: existing law is sufficient for adapting to new technological challenges, as it …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton Jan 2019

Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton

Articles

In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson Aug 2017

The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Interpretation Catalysts In Cyberspace, Rebecca Ingber Jun 2017

Interpretation Catalysts In Cyberspace, Rebecca Ingber

Faculty Scholarship

The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …


War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste Jan 2017

War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste

Canadian Journal of Law and Technology

No abstract provided.


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds Apr 2009

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds

William L. Reynolds

In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.


Understanding The New Virtualist Paradigm, Jonathon Penney Jan 2009

Understanding The New Virtualist Paradigm, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …


Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds Jan 2009

Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

In this survey, we review electronic contracting cases decided between June 15, 2008 and June 15, 2009. During that period we found that there was not much action on the formation by click-wrap and browse-wrap front. We have previously observed that the law of electronic contracts has matured, and the fact that there have not been any decisions on whether click-wrap and browse-wrap are effective ways of forming contracts reflects that observation. This year brought us three modification cases, two cases in which a party alleged that it was not bound to the offered terms because an unauthorized party agreed …


States, Markets, And Gatekeepers: Public-Private Regulatory Regimes In An Era Of Economic Globalization, Christopher M. Bruner Jan 2008

States, Markets, And Gatekeepers: Public-Private Regulatory Regimes In An Era Of Economic Globalization, Christopher M. Bruner

Michigan Journal of International Law

This Article illuminates the spectrum of international economic regimes through discussion of an under-theorized regulatory structure in which traditional distinctions between State and market, public and private power, hard and soft law, and international and domestic policy realms, essentially collapse-the "public-private gatekeeper."


Electronic Surveillance At The Virtual Border, Susan Freiwald Dec 2007

Electronic Surveillance At The Virtual Border, Susan Freiwald

Susan Freiwald

A virtual border divides people into two groups: those subject to the Fourth Amendment’s protections when the U.S. government conducts surveillance of their communications and those who are not. The distinction derives from a separation in powers: inside the virtual border, U.S. citizens and others enjoy the extensive oversight of the judiciary of executive branch surveillance. Judges review such surveillance before, during, and after it transpires. Foreign persons subject to surveillance in foreign countries fall within the executive branch’s’ foreign affairs function. However, the virtual border does not exactly match the physical border of the United States. Some people inside …


Cyberspace As/And Space, Julie E. Cohen Jan 2007

Cyberspace As/And Space, Julie E. Cohen

Georgetown Law Faculty Publications and Other Works

The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for the ongoing production of networked space more generally. It argues, first, that adherents of the cyberspace metaphor have been insufficiently sensitive to the ways in which theories of cyberspace as space themselves function as acts of social construction. Specifically, the leading theories all have deployed the metaphoric construct of cyberspace to situate cyberspace, explicitly or implicitly, as separate space. This denies all …


Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck Jan 2005

Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck

Articles & Chapters

Trust is the foundation of society for without trust, we cannot cooperate. Trust, in turn, depends upon secure, reliable, and persistent identity. Cyberspace is thought to challenge our ability to build trust because the medium undermines the connection between online pseudonym and offline identity. We have no assurances of who stands behind an online avatar; it may be one person, it may be more, it may be a computer. The legal debate to date has focused exclusively on the question of how to maintain real world identity in cyberspace. But new "social software" technology that enables communities from eBay to …


Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy May 2004

Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy

San Diego International Law Journal

The debate over whether cyberspace can or should be regulated is essentially dead. This is the conclusion being taught in law schools today. The battle between Judge Frank Easterbrook and Professor Lawrence Lessig over "laws" and "horses", infamous among cyberspace legal scholars, became irrelevant when geographically-based governments began regulating Internet related activities. However, debate over how the Internet should be regulated continues. One way of framing this debate is in terms of deciding how to regulate behavior in cyberspace. Professor Lessig postulated four kinds of constraints regulate behavior: (1) social norms, (2) markets, (3) law, and (4) architecture. This comment …


Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald Dec 2003

Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald

Susan Freiwald

This Article explores those features of electronic surveillance that have made it challenging to regulate effectively. In balancing interests, lawmakers must create a workable law for an exceedingly complex topic, rein in law enforcement agents without crippling them, and draw a line between prohibited and permitted conduct despite society's ambivalence about surveillance. This Article demonstrates that lawmakers met those challenges when they regulated traditional wiretapping, but they have failed to meet them in the online context. It argues that the law should extend the significant restrictions on wiretapping to online surveillance, just as judges did in the case of video …


Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald Dec 2000

Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald

Susan Freiwald

Almost every day brings reports that Congress is considering new cyberspace-targeted laws and the courts are deciding novel cyberspace legal questions. These developments lend urgency to the question of whether a particular cyberspace legal change should come through operation of new statutes, judicial decisions, or the free market. If we can develop sophisticated analytical methods to evaluate institutional competence in cyberspace, we can vastly improve the development of cyberspace law and public policy.

Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation promotes just such an approach. By describing and extending a recently proposed model of comparative …


Zoning Speech On The Internet: A Legal And Technical Model, Lawrence Lessig, Paul Resnick Nov 1999

Zoning Speech On The Internet: A Legal And Technical Model, Lawrence Lessig, Paul Resnick

Michigan Law Review

Speech, it is said, divides into three sorts - (1) speech that everyone has a right to (political speech, speech about public affairs); (2) speech that no one has a right to (obscene speech, child porn); and (3) speech that some have a right to but others do not (in the United States, Ginsberg speech, or speech that is "harmful to minors," to which adults have a right but kids do not). Speech-protective regimes, on this view, are those where category (1) speech predominates; speech-repressive regimes are those where categories (2) and (3) prevail. This divide has meaning for speech …


Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson Jan 1998

Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson

Ira Steven Nathenson

This Article addresses 'spamdexing,' namely, the practice of stuffing invisible keywords into webpages in order to try to get more favorable listings with search engines. For instance, some website owners will stuff the trademarks of competitors into a webpage’s code, particularly by using 'meta tags,' indexing keywords that can be hidden in a webpage’s source code. Although meta tags are not typically viewed by users, the code can be read by search engines, with the result that webpages may be improperly boosted in search engine rankings. Such practices can confuse the public and have also spurred trademark lawsuits. But the …