Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (174)
- Intellectual Property Law (125)
- Science and Technology Law (124)
- Privacy Law (122)
- International Law (96)
-
- Constitutional Law (94)
- Contracts (92)
- Law and Politics (91)
- Human Rights Law (89)
- Law and Economics (89)
- Supreme Court of the United States (87)
- Business Organizations Law (86)
- State and Local Government Law (86)
- Banking and Finance Law (85)
- Administrative Law (84)
- Civil Law (84)
- Conflict of Laws (84)
- Government Contracts (84)
- Legislation (84)
- Organizations Law (83)
- International Trade Law (82)
- Tax Law (82)
- Taxation-Federal (81)
- Taxation-Federal Estate and Gift (81)
- Taxation-Transnational (81)
- Criminal Law (80)
- Oil, Gas, and Mineral Law (80)
- Transportation Law (80)
- Institution
-
- Seattle University School of Law (44)
- Universitas Indonesia (40)
- Schulich School of Law, Dalhousie University (19)
- University of Washington School of Law (18)
- DePaul University (17)
-
- Southern Methodist University (17)
- The Catholic University of America, Columbus School of Law (13)
- Pepperdine University (10)
- Brooklyn Law School (8)
- American University Washington College of Law (7)
- William & Mary Law School (6)
- Osgoode Hall Law School of York University (5)
- Texas A&M University School of Law (5)
- Brigham Young University Law School (4)
- Duquesne University (4)
- Maurer School of Law: Indiana University (4)
- Fordham Law School (3)
- Marquette University Law School (3)
- Northwestern Pritzker School of Law (3)
- The University of Akron (3)
- University of Georgia School of Law (3)
- University of Michigan Law School (3)
- Association of Arab Universities (2)
- National Law School of India University (2)
- St. John's University School of Law (2)
- University of Colorado Law School (2)
- University of Miami Law School (2)
- University of Richmond (2)
- Boston University School of Law (1)
- Columbia Law School (1)
- Keyword
-
- Technology (17)
- Privacy (14)
- Social media (12)
- Artificial intelligence (10)
- Internet (10)
-
- AI (9)
- Section 230 (9)
- Blockchain (7)
- Communications Decency Act (7)
- Cybersecurity (7)
- Cryptocurrency (6)
- Algorithmic management (5)
- Law (5)
- Social Media (5)
- Content moderation (4)
- Data privacy (4)
- Facebook (4)
- First Amendment (4)
- Innovation (4)
- Intellectual Property (4)
- Misinformation (4)
- NFTs (4)
- National security (4)
- Regulation (4)
- Algorithms (3)
- Artificial Intelligence (3)
- Bitcoin (3)
- Copyright (3)
- Cryptocurrencies (3)
- Data (3)
- Publication
-
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (39)
- Seattle University Law Review (33)
- Canadian Journal of Law and Technology (19)
- SMU Science and Technology Law Review (17)
- Catholic University Journal of Law and Technology (13)
-
- DePaul Business & Commercial Law Journal (11)
- Seattle Journal of Technology, Environmental & Innovation Law (11)
- Washington Journal of Law, Technology & Arts (11)
- Faculty Scholarship (8)
- Articles & Book Chapters (5)
- Brooklyn Journal of International Law (5)
- Joint PIJIP/TLS Research Paper Series (5)
- DePaul Journal of Art, Technology & Intellectual Property Law (4)
- Duquesne Law Review (4)
- Akron Law Review (3)
- Fordham Law Review (3)
- Northwestern Journal of Technology and Intellectual Property (3)
- Pepperdine Dispute Resolution Law Journal (3)
- Pepperdine Law Review (3)
- Popular Media (3)
- The Journal of Business, Entrepreneurship & the Law (3)
- American University National Security Law Brief (2)
- Articles (2)
- Articles by Maurer Faculty (2)
- BYU Law Review (2)
- Brigham Young University Journal of Public Law (2)
- Brooklyn Law Review (2)
- Court Briefs (2)
- DePaul Magazine (2)
- Faculty Publications (2)
- Publication Type
Articles 1 - 30 of 277
Full-Text Articles in Internet Law
Trademark Infringement: The Likelihood Of Confusion Of Nfts In The Us And Eu, Sara Sachs
Trademark Infringement: The Likelihood Of Confusion Of Nfts In The Us And Eu, Sara Sachs
Brooklyn Journal of International Law
The immutability of non-fungible tokens has made it an invaluable tool for asset ownership and authentication across a variety of industries. With the proliferation of NFTs comes the need to protect trademarks and prevent consumer confusion in the digital age. This Note explores the existing legal framework for trademark law in the United States and European Union. This Note argues for a new trademark standard that reflects the interconnected nature of a global digital society.
How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada
How (Not) To Deal With The Bubble Effect In Cyberspace: The Case Of The Eu And Digital Services Act, João Tornada
Brooklyn Journal of International Law
Deliberative democracies are based on an ideal process of speech and dialogue that fosters an “uninhibited, robust, and wide-open” public discourse sphere. In cyberspace, social networks and search engine platforms largely operate with recommender systems that tailor content according to the users' interests and online behavior (“profiling”), thus segregating them from different points of view (“bubble effect”). While this personalization of content is particularly efficient to promote commercial goods and services, when it comes to information of common interest, especially on political matters, it undermines consensus-building dialogue and threatens democratic ideals. The theory of a free “marketplace of ideas” justifies …
Enough Excuses On Drug Importation: A New Transnational Paradigm For Fda Regulation And Lower Us Drug Prices, Gabriel Levitt
Enough Excuses On Drug Importation: A New Transnational Paradigm For Fda Regulation And Lower Us Drug Prices, Gabriel Levitt
Brooklyn Journal of International Law
The US Food and Drug Administration (FDA), which enforces drug safety laws, asserts that under most circumstances the importation of prescription drugs is illegal. Yet because of high drug prices in the United States, over the past couple of decades, tens of millions of Americans have imported prescription drugs for personal use. For many, this was their only way to afford them. A unique array of federal laws, regulations, and policies, including the de facto decriminalization of the practice of personal drug importation, have in effect permitted personal drug importation. The same exceptions, however, are not available for commercial drug …
Hidden Contracts, Shmuel I. Becher, Uri Benoliel
Hidden Contracts, Shmuel I. Becher, Uri Benoliel
BYU Law Review
Transparency is a promising means for enhancing democratic values, countering corruption, and reducing power abuse. Nonetheless, the potential of transparency in the domain of consumer contracts is untapped. This Article suggests utilizing the power of transparency to increase consumer access to justice, better distribute technological gains between businesses and consumers, and deter sellers from breaching their consumer contracts while exploiting consumers’ inferior position.
In doing so, this Article focuses on what we dub “Hidden Contracts.” Part I conceptualizes the idea of hidden contracts. It first defines hidden contracts as consumer form contracts that firms unilaterally modify and subsequently remove from …
Byte A Carrot For Change: Uprooting Problems In Data Privacy Regulations, Sarah Terry
Byte A Carrot For Change: Uprooting Problems In Data Privacy Regulations, Sarah Terry
BYU Law Review
There is a growing gap between technology advancement and a lagging regulatory system. This is particularly problematic in consumer data privacy regulating. Companies hold collected consumer data and determine its use largely without accountability. As a result, ethical questions that carry society-shaping impact are answered in-house, under the influence of groupthink, and are withheld from anyone else weighing in.
This Note poses a solution that would address multiple data privacy regulation issues. Namely, an incentive approach would help even out the information-imbalanced system. Incentives are used as tools throughout intellectual property law to foster commercial progress, discourage trade secrets, and …
Section 230 As Civil Rights Statute, Enrique Armijo
Section 230 As Civil Rights Statute, Enrique Armijo
University of Cincinnati Law Review
Many of our most pressing discussions about justice, progress, and civil rights have moved online. Activists advocating for social change no longer need to be in the same physical space to connect with others who share their challenges and aspirations. But the convergence of mobility, connectivity, and technology is not the only reason why. Thanks to Section 230 of the Communications Decency Act’s (“Section 230”) immunity for online platforms, websites, and their hosts, speakers can engage in speech about protest, equality, and dissent without fear of collateral censorship from governments, authorities, and others in power who hope to silence them. …
Large Language Models: Ai's Legal Revolution, Adam Allen Bent
Large Language Models: Ai's Legal Revolution, Adam Allen Bent
Pace Law Review
This article contemplates and advocates for the use of Artificial Intelligence (“AI”) through Large Language Models (“LLM”) in legal practice. The author ultimately addresses the need to orient LMMs within varying legal contexts including academia, private practice, as well as the U.S. court system. Additionally, the author emphasizes the inevitability of AI and LLM systems infiltrating legal practice, and the reality that the industry must acknowledge and accept these systems to regulate and to provide better while still ethical legal services. Large Language Models: AI’s Legal Revolution, begins by walking the reader through the history of technological innovation of AI, …
The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta
The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta
Indian Journal of Law and Technology
In course of this paper, the authors have soght to examine the extent to which technology based on artificial intelligence (AI) have made inroads into the banking and financial sectors of a developing economy like India. The paper begins with providing a contextual background to the adoption of such technology in the global financial arena. It then proceeds to identify and categorise the forms of AI currently being used in the Indian financial sector and also considers the different channels of operation where such technology is in vogue. The advantages of using such technology and the future goals for integrating …
Bringing Shadow Libraries Out Of Legal Shadows: An Opportunity For The Delhi High Court, Rahul Bajaj, Anchal Bhateja
Bringing Shadow Libraries Out Of Legal Shadows: An Opportunity For The Delhi High Court, Rahul Bajaj, Anchal Bhateja
Indian Journal of Law and Technology
At the heart of the copyright bargain is the need to strike a balance between fostering creativity, by incentivizing producers of intellectual property and promoting the interests of the public at large. These two are often in tension with each other. Some cases bring this tension into sharp focus. The ongoing litigation in the Delhi high Court, on the legality of shadow libraries - Libgen and Sci Hub - is one such case. The case has seminal importance for ensuring that the right to education is duly respected and fulfilled.
In this paper, we argue that this litigation offers the …
A New Right Is The Wrong Tactic: Bring Legal Actions Against States For Internet Shutdowns Instead Of Working Towards A Human Right To The Internet (Part 2), Jay T. Conrad
Seattle Journal of Technology, Environmental & Innovation Law
This Article is the second of a two-part series about an increasingly prevalent threat to human rights: State-sanctioned Internet shutdowns. Part 1 detailed Internet shutdown tactics and potential human rights violations that could result from a shutdown. Now, Part 2 addresses the deficiencies of advocating for Internet access to be a recognized human right as a means of combatting shutdowns. Despite the popularity of this proposed solution, the harms of Internet shutdowns are better addressed through traditional legal avenues, such as bringing claims against the sanctioning state.
Part 1 can be found in The Seattle Journal of Technology, Environmental & …
Assessing The Potential Involutionary Effects Of New Copyright Laws: A Techno-Legal Analysis Based On The Impact Of Web 3.0 On Copyright Protection, Alvin Hung
Seattle Journal of Technology, Environmental & Innovation Law
As Internet technology evolves, legal professionals and academics must stay current and adapt to these inevitable technological changes. This article investigates the extensive influence of the latest version of the World Wide Web (the Web)—Web 3.0—on copyright laws based on a techno-legal analysis that considers the opportunities and challenges of this new technology. The principal version of copyright laws, the Digital Millennium Copyright Act (DMCA), was enacted in 1998 during the Web 1.0 era, signifying an impending need for appropriate updates in the new Web 3.0 era. This article traces the historical development of U.S. copyright laws by positing it …
The Immutable Blockchain Confronts The Unstoppable Gdpr, Bisma Shoaib
The Immutable Blockchain Confronts The Unstoppable Gdpr, Bisma Shoaib
Seattle Journal of Technology, Environmental & Innovation Law
The notion that privacy is dispensable and should be sacrificed in exchange for internet access is misguided. In fact, privacy laws are flourishing, highlighting the significance of safeguarding personal information in the digital age. It is crucial to recognize that privacy is not merely a luxury, but a fundamental right that should be upheld, even in the context of online activities. In the ever-evolving landscape of technology, the collision between privacy and innovation becomes increasingly apparent. This paper delves into the intriguing convergence of the General Data Protection Regulation (GDPR) and blockchain technology, unraveling pivotal issues that arise from this …
A Public Technology Option, Hannah Bloch-Wehba
A Public Technology Option, Hannah Bloch-Wehba
Faculty Scholarship
Private technology increasingly underpins public governance. But the state’s growing reliance on private firms to provide a variety of complex technological products and services for public purposes brings significant costs for transparency: new forms of governance are becoming less visible and less amenable to democratic control. Transparency obligations initially designed for public agencies are a poor fit for private vendors that adhere to a very different set of expectations.
Aligning the use of technology in public governance with democratic values calls for rethinking, and in some cases abandoning, the legal structures and doctrinal commitments that insulate private vendors from meaningful …
Trademarks In An Algorithmic World, Christine Haight Farley
Trademarks In An Algorithmic World, Christine Haight Farley
Washington Law Review
According to the sole normative foundation for trademark protection—“search costs” theory—trademarks transmit useful information to consumers, enabling an efficient marketplace. The marketplace, however, is in the midst of a fundamental change. Increasingly, retail is virtual, marketing is data-driven, and purchasing decisions are automated by AI. Predictive analytics are changing how consumers shop. Search costs theory no longer accurately describes the function of trademarks in this marketplace. Consumers now have numerous digital alternatives to trademarks that more efficiently provide them with increasingly accurate product information. Just as store shelves are disappearing from consumers’ retail experience, so are trademarks disappearing from their …
After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge
After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge
Faculty Scholarship
Bitcoin and the other cryptocurrencies spawned by the innovation of blockchain programming have exploded in prominence, both in gains of massive market value and in dramatic market losses, the latter most notably seen in connection with the failure of the FTX cryptocurrency exchange in November 2022. After years of investment and speculation, however, something crucial has faded: the original use case for Bitcoin as a system of payment. Can cryptocurrency-as-a-payment-system be saved, or are day traders and speculators the actual cryptocurrency future? This article suggests that cryptocurrency has been hobbled by a lack of foundational commercial and consumer-protection law that …
Either The Law Will Govern Ai, Or Ai Will Govern The Law, Margaret Hu
Either The Law Will Govern Ai, Or Ai Will Govern The Law, Margaret Hu
Popular Media
No abstract provided.
Caging The Bored Ape: How The Ftc's Expanded Anti-Monopoly Authority Can Tame "Nfts" For Web 3.0, J. Scott Colesanti
Caging The Bored Ape: How The Ftc's Expanded Anti-Monopoly Authority Can Tame "Nfts" For Web 3.0, J. Scott Colesanti
William & Mary Business Law Review
Non-Fungible Tokens, or “NFTs,” ballooned into a 40-billion-dollar industry in under a decade. Their creators include artists, corporations, entrepreneurs, fraudsters—and even Donald Trump. While NFT owners and traders could be any of us, the parties running the marketplaces are hidden. NFT regulators have yet to be identified. Most alarmingly, the dominant NFT marketplaces are dangerously centralized. Accordingly, the publicized tales of exorbitant or manipulated NFT prices and frequent related scams abound. Meanwhile cryptocurrency—the technology enabling the life of an NFT—remains beset with, at best, theoretical models for effective regulation a full generation after its emergence.
To propose a rational start …
Full Issue: Fall 2023
DePaul Magazine
In DePaul Magazine's fall 2023, President Robert L. Manuel unveils his Designing DePaul road map to position the university for monumental impact. We also highlight an innovative program that merges law and tech, an initiative centering humanities in collaborative, community-based interactions, and the ascendance of soprano Janai Brugger (SOM '05) on the international opera stage.
Link Tank
DePaul Magazine
A new JD certificate program in information technology, cybersecurity and data privacy provides DePaul University students with proficiency in both law and tech.
Leveraging Technology To Promote Access To Justice, Amy Emerson
Leveraging Technology To Promote Access To Justice, Amy Emerson
Faculty Publications
No abstract provided.
“Take Your Pictures, Leave Your (Digital) Footprints”: Increasing Privacy Protections For Children On Social Media, Kodie Mcginley
“Take Your Pictures, Leave Your (Digital) Footprints”: Increasing Privacy Protections For Children On Social Media, Kodie Mcginley
Golden Gate University Law Review
As the digital sphere becomes more prevalent in people’s lives, Congress has tried to keep up. First created in 1998, the Children’s Online Privacy Protection Act (COPPA) requires operators of websites directed at children to obtain consent from parents before collecting any personal information from children. COPPA also requires that operators take reasonable measures to protect the confidentiality of any personal information collected about children. Although COPPA has helped regulate online spaces, its focus is on regulating websites that collect personal information directly from children. This focus leaves a gap in the law that ignores personal data shared on social …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Updating The Berne Convention For The Internet Age: Un-Blurring The Line Between United States And Foreign Copyrighted Works, Ethan Schow
Brigham Young University Journal of Public Law
John Naughton, notable journalist and academic, has asserted that “[common sense] should also revolt at the idea that doctrines about copyright that were shaped in a pre-Internet age should apply to a post-Internet one.” And yet, in crucial aspects of international law, this is the situation in which the world finds itself today. The Berne Convention for the Protection of Literary and Artistic Works (the “Berne Convention” or the “Convention”) is one of the most important multinational agreements concerned with copyright law, but it has not been amended since September 28, 1979. Although the internet technically existed in an early …
Cryptocurrency Concerns, Crimes, And Legal Consequences, Madeline Connolly
Cryptocurrency Concerns, Crimes, And Legal Consequences, Madeline Connolly
Akron Law Review
This note addresses the current issues with the law and digital currencies, federal agencies’ current classifications of cryptocurrencies, problems with those classifications, and solutions to better regulate, classify, and prosecute virtual-currency crimes. The history of digital currencies, the history of criminal activity involving money, and how the creation and widespread use of cryptocurrencies has allowed criminals to find new ways to hide money that make it difficult for law enforcement to catch will be discussed. The article analyzes current and past cases involving different courts’ interpretations and prosecution of cryptocurrencies and concludes by offering solutions to the potential issues of …
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Akron Law Review
This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …
Security In The Digital Age, Michael Gentithes
Security In The Digital Age, Michael Gentithes
Akron Law Review
Rapidly evolving technology allows governments and businesses to elevate our collective well-being in ways we could not have imagined just decades ago. Data is now a resource that governments and businesses alike can mine to address the world’s needs with greater efficiency, accuracy, and flexibility. But evolving technology and advanced data analytics also come with risk. New digital capabilities also create new means for nefarious actors to infiltrate the complex technological systems at the heart of nearly all of our daily activities. Just as new digital tools emerge to offer unique goods and services, new tools allow wrongdoers to invade …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
The Eyes Beyond The Screen: Digital Media Policy And Child Health, Yahia Al-Qudah
The Eyes Beyond The Screen: Digital Media Policy And Child Health, Yahia Al-Qudah
Research Symposium
Background: Modern communication technology and digital media have provided society with a foundation for instant messaging. Pictures, videos, and texts connect individuals with families, friends, and the world. Consequently, digital media has accelerated exposure to risk in which children and adolescents are most vulnerable. This project’s objective is to 1) congregate and highlight current knowledge about the impact of digital media on child health, and 2) underline deficiencies in related laws and regulations as well as offer solutions in digital media policy.
Methods: A systematic literature review was conducted through the JAMA Pediatrics database with keywords such as “digital media,” …
Instigator And Proxy Liability In The Context Of Information Operations, Carolyn Sharp
Instigator And Proxy Liability In The Context Of Information Operations, Carolyn Sharp
Brigham Young University Journal of Public Law
No abstract provided.
Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl
Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl
Marquette Law Review
It has been more than a quarter century since Congress enacted twin safe harbor provisions to help protect and encourage the growth of a nascent internet by removing some liability and regulatory uncertainty. Today, there are calls for a similar safe harbor provision for blockchain, the technology behind cryptocurrencies and smart contracts. What lessons have we learned from the implementation of the internet safe harbor provisions, Section 230 of the Communications Decency Act, and Section 512 of the Digital Millennium Copyright Act? This Article charts the history of those provisions and their judicial construction over the decades. It also examines …