Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cybersecurity (2)
- Privacy (2)
- 516 U.S. 233 (1)
- AG Colomer (1)
- Advertising function (1)
-
- Anais-anais (1)
- Arsenal Football Club plc v. Reed (1)
- Article 3(9) (1)
- Article 5(1) (1)
- Article 72 (1)
- Article 73 (1)
- Article 75 (1)
- Berne Convention for the Protection of Literary and Artistic Works (1)
- Broadband Markets (1)
- Censorship (1)
- China (1)
- Chinese Copyright Law (1)
- Chinese copyright law (1)
- Class Licence Scheme (1)
- Copyright (1)
- Corporate Complicity (1)
- Critical Infrastructure (1)
- Cyber-vandalism (1)
- Cyberattacks (1)
- Cyberspace (1)
- Data Protection (1)
- Definition of Critical Infrastructure (1)
- Digital Geneva Convention (1)
- Dilution provision (1)
- Discursive Stewardship (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Internet Law
Defining Critical Infrastructure For A Global Application, Colleen M. Newbill
Defining Critical Infrastructure For A Global Application, Colleen M. Newbill
Indiana Journal of Global Legal Studies
A Google search for the phrase "critical infrastructure" turns up 189 million results in little more than a half second: ''global critical infrastructure" has 151 million results; and "definition of critical infrastructure" yields 71.5 million results. The list of what industries and sectors fall under the critical infrastructure designation expands as time progresses and technology develops. As the threat of cyberattacks increases and this frontier of terrorism continues to emerge, attacks on critical infrastructure are high on the list of concerns and the need for protective measures imperative. The focus on protecting critical infrastructure does not stop at the borders …
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Indiana Journal of Global Legal Studies
To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.
A Picture's Worth: The Future Of Copyright Protection Of User-Generated Images On Social Media, Elizabeth Tao
A Picture's Worth: The Future Of Copyright Protection Of User-Generated Images On Social Media, Elizabeth Tao
Indiana Journal of Global Legal Studies
In the current digital age, the internet is teeming with personal websites and social media posts. As more people around the world are becoming and staying connected to the internet, more stories and photos are sharing over social networking sites each second. Social media presents a ubiquitous platform to share one's life with others, but this accessibility comes at a price. This Note examines the history and present state of copyright law, within the framework of photography, to highlight the gaps within these laws as applied to personal works of art, like personal photographs, posted to social media sites. Social …
A Study On The Safe Harbor Rules For Online File Hosting Service Providers Under Copyright Law In China, Shi Xu
Maurer Theses and Dissertations
Today both the U.S. and China are plagued with copyright infringement, particularly infringement involving online file sharing via file hosting services. The safe harbor rules in the U.S. Digital Millennium Copyright Act (here after “DMCA”) §512(c) provide a certain amount of protection for contributory infringers, such as file hosting service providers, as long as certain conditions are met. Although China has borrowed extensively from DMCA §512(c) in setting up its own safe harbor rules, their content and standard of review remain unclear, leading to inconsistencies in judgments. In this circumstance, this thesis tries to analysis each element of the safe …
The Expansion Of Trademark Rights In Europe, Irina Pak
The Expansion Of Trademark Rights In Europe, Irina Pak
IP Theory
No abstract provided.
Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying
Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying
IP Theory
No abstract provided.
It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml
It’S A Mad, Mad Internet: Globalization And The Challenges Presented By Internet Censorship, Jessica E. Bauml
Federal Communications Law Journal
The advent of the Internet has brought tremendous technological advancements and growth to the world. However, it has also become a source of conflict, particularly when different countries attempt to regulate this very ubiquitous and amorphous medium. The most notable controversy has arisen in China home to the world's most advanced system of Internet censorship, which levies harsh penalties on those who violate the country's strict censorship laws. China's "Great Firewall" has raised many eyebrows and is garnishing substantial criticism in response to the human rights abuses that result from the jailing and reported torture of Chinese dissidents. Yet the …
Network Neutrality Between False Positives And False Negatives: Introducing A European Approach To American Broadband Markets, Jasper P. Sluijs
Network Neutrality Between False Positives And False Negatives: Introducing A European Approach To American Broadband Markets, Jasper P. Sluijs
Federal Communications Law Journal
Network neutrality has become a contentious issue both in Europe and the United States. Regulators on both sides of the Atlantic face digital divides in their society, and are confronted with potentially conflicting policy goals-to incentivize private investment in next-generation broadband while maintaining "neutral" and competitive broadband networks.
This Article compares nascent American and European network neutrality policy in terms of regulatory error costs. Emerging markets, such as broadband, are more likely to be affected by regulatory errors, and these errors have graver consequences in emerging markets than in regular markets. U.S. telecommunications policy traditionally has advanced a trial-and-error approach …
To Net Or Not To Net: Singapore’S Regulation Of The Internet, Sarah B. Hogan
To Net Or Not To Net: Singapore’S Regulation Of The Internet, Sarah B. Hogan
Federal Communications Law Journal
Internet access has become almost commonplace, as has the unfettered exchange of ideas through cyberspace. Several nations, Singapore among them, have attempted to control their citizens’ Internet access in order to preserve and protect a desired national culture. A brief overview of the technological means of Internet censorship reveals a hidden truth: If Singapore truly wishes to become the technological giant of the East, the government will have to sacrifice its desire to control Internet content.
Freedom Of Information And The Eu Data Protection Directive, James R. Maxeiner
Freedom Of Information And The Eu Data Protection Directive, James R. Maxeiner
Federal Communications Law Journal
Because of advancements in information technology, the tension between protection of privacy and freedom of information has intensified. In the United States this tension is addressed with sector specific laws, like the Fair Credit Reporting Act. Conversely, in Europe, data protection laws of general applicability have existed for two decades. Recently, the Council of Ministers adopted a Common Position in a data protection directive.
The Author analyzes specific provisions of the Directive, primarily focusing on the provisions that address the tension between the right of privacy and the free flow of information within the European Union. Ultimately, the Directive strikes …