Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 19 of 19

Full-Text Articles in Internet Law

Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky Dec 2017

Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky

Maine Law Review

Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to …


Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden Nov 2017

Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden

Akron Law Review

In proposing a new rule under the First Amendment to adjudicate anonymous Cyberbullying cases, this Article first reviews and summarizes the First Amendment precedents governing regulation of speech by minors and student speech in the school environment. Second, it reviews and discusses the prevalence of minors’ online harassment or Cyberbullying, including pre-litigation disputes reported in the press. Third, it reviews and summarizes the First Amendment precedents governing the “unmasking” of anonymous speakers. Finally, the Cyberbully Unmasking Test is proposed and applied.


Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon Sep 2017

Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon

Oklahoma Journal of Law and Technology

No abstract provided.


E-Commerce And The Americans With Disabilities Act: Failing To Extend The Ada To The Internet In Access Now V. Southwest Airlines, Emily Short Sep 2017

E-Commerce And The Americans With Disabilities Act: Failing To Extend The Ada To The Internet In Access Now V. Southwest Airlines, Emily Short

Oklahoma Journal of Law and Technology

No abstract provided.


Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner Sep 2017

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner

Oklahoma Journal of Law and Technology

No abstract provided.


Censorship On The Internet: Who Should Make The Rules, Joe Zopolsky Sep 2017

Censorship On The Internet: Who Should Make The Rules, Joe Zopolsky

Oklahoma Journal of Law and Technology

No abstract provided.


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe Sep 2017

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington Sep 2017

Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington

Oklahoma Journal of Law and Technology

No abstract provided.


Three Chords And The Truth: Analyzing Copyright Infringement Claims Against Guitar Tablature Websites, Krist Caldwell Sep 2017

Three Chords And The Truth: Analyzing Copyright Infringement Claims Against Guitar Tablature Websites, Krist Caldwell

Oklahoma Journal of Law and Technology

No abstract provided.


Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman Jul 2017

Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins Jul 2017

It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford Jun 2017

Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford

University of Michigan Journal of Law Reform

No company, just like no nation, is an island in cyberspace; the actions of actors from hacktivists to nation-states have the potential to impact the bottom line, along with the human rights of consumers and the public writ large. To help meet the multifaceted challenges replete in a rapidly globalizing world—and owing to the relative lack of binding international law to regulate both cybersecurity and the impact of business on human rights—companies are reconceptualizing what constitutes “due diligence.” This Article takes lessons from both the cybersecurity and human rights due diligence contexts to determine areas for cross-pollination in an effort …


Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler Jun 2017

Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler

University of Michigan Journal of Law Reform

While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Keynote Address: The Digital Forevermore, Thomas J. Ridge Mar 2017

Keynote Address: The Digital Forevermore, Thomas J. Ridge

University of Richmond Law Review

No abstract provided.


The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams Mar 2017

The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams

University of Richmond Law Review

No abstract provided.


Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott Mar 2017

Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott

University of Richmond Law Review

The purpose of this article is to explore the threats posed by

cybersecurity breaches, outline the steps taken by the government

to address those threats in the private sector economy, and

call attention to the ultimate solution, which will most certainly

spur private businesses to create a more secure cyber environment

for the American people-a Connie Francis-styled cyber civil

action lawsuit.


Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael Mar 2017

Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.