Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Internet (4)
- Sex trafficking (4)
- Sexual exploitation (4)
- Prostitution (3)
- Child sexual abuse (2)
-
- Human rights (2)
- Pornography (2)
- Privacy (2)
- Violence against women (2)
- AML (1)
- Acquired distinctiveness (1)
- Agenda (1)
- Backpage.com (1)
- Bearer instruments (1)
- Biometrics (1)
- Bitcoins (1)
- Block chain (1)
- Boundaries (1)
- Boundary Objects (1)
- Broadcast guidelines (1)
- Broadcasting (1)
- Cable (1)
- Campus (1)
- Civil liberties (1)
- Commercial sex acts (1)
- Common pool resources (1)
- Common pools (1)
- Commons (1)
- Communication law (1)
- Communications Decency Act (1)
- Publication
- Publication Type
Articles 1 - 16 of 16
Full-Text Articles in Internet Law
An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo
An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo
All Faculty Scholarship
Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by the courts …
The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow
The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow
All Faculty Scholarship
Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.
Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman
Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins
It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon
Maintaining Individual Liability In Aml And Cybersecurity At New York's Financial Institutions, Harry Dixon
Penn State Journal of Law & International Affairs
No abstract provided.
The Unresolved Legality Of Online Gambling In Singapore, Siyuan Chen
The Unresolved Legality Of Online Gambling In Singapore, Siyuan Chen
Siyuan CHEN
This article addresses what appears to be a hitherto (legislatively and judicially) unresolved issue in a country where gambling is an established sub-culture – the legality of online gambling. The existing legislation does not provide direct answers, and as a result, the courts have not been given the opportunity to answer the question directly either. The police have previously made a few statements to the press and the media, but what should we make of them? While placing bets with unauthorised bookies (including those who operate their own website or use others’ websites) is clearly outlawed, leaving the offender with …
Professor Breaks Ground With Journal On Sexual Violence And Exploitation, Joseph Essig, Donna M. Hughes Dr.
Professor Breaks Ground With Journal On Sexual Violence And Exploitation, Joseph Essig, Donna M. Hughes Dr.
Donna M. Hughes
Defining Biometrics: Toward A Transnational Ethic Of Personal Information, Nicola Morrow
Defining Biometrics: Toward A Transnational Ethic Of Personal Information, Nicola Morrow
International Studies Honors Projects
Innovations in biotechnology, computer science, and engineering throughout the late 20th and early 21st centuries dramatically expanded possible modes of data-based surveillance and personal identification. More specifically, new technologies facilitated enormous growth in the biometrics sector. The response to the explosion of biometric technologies was two-fold. While intelligence agencies, militaries, and multinational corporations embraced new opportunities to fortify and expand security measures, many individuals objected to what they perceived as serious threats to privacy and bodily autonomy. These reactions spurred both further technological innovation, and a simultaneous proliferation of hastily drafted policies, laws, and regulations governing the collection, …
Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael
Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs
How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs
Catholic University Journal of Law and Technology
This comment asserts that there is a need for an update to the multifactor test considered by courts in determining the strength of a trademark. Traditional factors include the expenses an entity can afford to pay in advertising, but do not give any weight to the presence of the entity on social media to reach its target consumer group.
Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland
Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland
Catholic University Journal of Law and Technology
No abstract provided.
Internet Safe Harbors And The Transformation Of Copyright Law, Matthew Sag
Internet Safe Harbors And The Transformation Of Copyright Law, Matthew Sag
Faculty Articles
This Article explores the potential displacement of substantive copyright law in the increasingly important online environment. In 1998, Congress enacted a system of intermediary safe harbors as part of the Digital Millennium Copyright Act (DMCA). The internet safe harbors and the associated system of notice-and-takedown fundamentally changed the incentives of platforms, users, and rightsholders in relation to claims of copyright infringement. These different incentives interact to yield a functional balance of copyright online that diverges markedly from the experience of copyright law in traditional media environments. More recently, private agreements between rightsholders and large commercial internet platforms have been made …
Ip Things As Boundary Objects: The Case Of The Copyright Work, Michael J. Madison
Ip Things As Boundary Objects: The Case Of The Copyright Work, Michael J. Madison
Articles
My goal is to explore the meanings and functions of the objects of intellectual property: the work of authorship (or copyright work) in copyright, the invention in patent, and the mark and the sign in trademark. This paper takes up the example of the copyright work.
It is usually argued that the central challenge in understanding the work is to develop a sensible method for appreciating its boundaries. Those boundaries, conventionally understood as the metaphorical "metes and bounds" of the work, might be established by deferring to the intention of the author, or by searching for authorship (creativity or originality) …
Governing Medical Knowledge Commons - Introduction And Chapter 1, Katherine J. Strandburg, Brett M. Frischmann, Michael J. Madison
Governing Medical Knowledge Commons - Introduction And Chapter 1, Katherine J. Strandburg, Brett M. Frischmann, Michael J. Madison
Book Chapters
Governing Medical Knowledge Commons makes three claims: first, evidence matters to innovation policymaking; second, evidence shows that self-governing knowledge commons support effective innovation without prioritizing traditional intellectual property rights; and third, knowledge commons can succeed in the critical fields of medicine and health. The editors' knowledge commons framework adapts Elinor Ostrom's groundbreaking research on natural resource commons to the distinctive attributes of knowledge and information, providing a systematic means for accumulating evidence about how knowledge commons succeed. The editors' previous volume, Governing Knowledge Commons, demonstrated the framework's power through case studies in a diverse range of areas. Governing Medical Knowledge …
Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll
Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll
Georgetown Law Faculty Publications and Other Works
In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.
Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write …