Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (29)
- International Law (25)
- Intellectual Property Law (21)
- Science and Technology Law (20)
- Communications Law (12)
-
- Privacy Law (12)
- First Amendment (10)
- National Security Law (10)
- Constitutional Law (9)
- Military, War, and Peace (8)
- Law and Society (6)
- Commercial Law (5)
- Criminal Law (5)
- Social and Behavioral Sciences (5)
- Consumer Protection Law (4)
- Jurisdiction (4)
- Legal Writing and Research (4)
- Civil Rights and Discrimination (3)
- Comparative and Foreign Law (3)
- Human Rights Law (3)
- Law and Economics (3)
- Antitrust and Trade Regulation (2)
- Business Organizations Law (2)
- Communication (2)
- Computer Engineering (2)
- Contracts (2)
- Engineering (2)
- International Humanitarian Law (2)
- Institution
-
- Selected Works (10)
- Maurer School of Law: Indiana University (9)
- Duke Law (8)
- Schulich School of Law, Dalhousie University (5)
- Vanderbilt University Law School (5)
-
- Boston University School of Law (4)
- University of Michigan Law School (4)
- University of New Hampshire (4)
- University of Richmond (4)
- New York Law School (3)
- Pepperdine University (3)
- Seattle University School of Law (3)
- SelectedWorks (3)
- University of Baltimore Law (3)
- American University Washington College of Law (2)
- Northwestern Pritzker School of Law (2)
- Singapore Management University (2)
- University of Florida Levin College of Law (2)
- University of Georgia School of Law (2)
- University of Maryland Francis King Carey School of Law (2)
- University of Pittsburgh School of Law (2)
- University of San Diego (2)
- Florida A&M University College of Law (1)
- Georgetown University Law Center (1)
- Penn State Dickinson Law (1)
- The University of Akron (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- U.S. Naval War College (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Colorado Law School (1)
- Publication Year
- Publication
-
- Duke Law & Technology Review (8)
- Faculty Scholarship (5)
- Federal Communications Law Journal (5)
- Law Faculty Scholarship (4)
- All Faculty Scholarship (3)
-
- Articles (3)
- Articles & Chapters (3)
- Articles, Book Chapters, & Popular Press (3)
- Seattle University Law Review (3)
- Susan Freiwald (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- American University International Law Review (2)
- Articles by Maurer Faculty (2)
- Canadian Journal of Law and Technology (2)
- Faculty Publications (2)
- Indiana Journal of Global Legal Studies (2)
- Law Faculty Publications (2)
- Michigan Law Review (2)
- Northwestern Journal of International Law & Business (2)
- Pepperdine Law Review (2)
- Research Collection Yong Pung How School Of Law (2)
- Richmond Journal of Law & Technology (2)
- San Diego International Law Journal (2)
- UF Law Faculty Publications (2)
- Warren Bartholomew Chik (2)
- Akron Law Review (1)
- Dickinson Law Review (2017-Present) (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Georgia Journal of International & Comparative Law (1)
- Germán M. Teruel Lozano (1)
- Publication Type
- File Type
Articles 31 - 60 of 100
Full-Text Articles in Internet Law
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Shlomit Yanisky-Ravid Professor of Law
Increasingly, there has been a focus on creating democratic standards and procedures in order to best facilitate open exchange of information and communication online—a goal that fits neatly within the feminist aim to democratize content creation and community. Collaborative websites, such as blogs, social networks, and, as focused on in this Article, Wikipedia, represent both a Cyberspace community entirely outside the strictures of the traditional (intellectual) proprietary paradigm and one that professes to truly embody the philosophy of a completely open, free, and democratic resource for all. In theory, collaborative websites are the solution that social activists, Intellectual Property opponents …
Last Writes? Re-Assesing The Law Review In The Age Of Cyberspace, Bernard J. Hibbitts
Last Writes? Re-Assesing The Law Review In The Age Of Cyberspace, Bernard J. Hibbitts
Akron Law Review
The full-text version of this article1 offers a comprehensive re-assessment of the law review from the perspective of the present age of cyberspace. Such a re-assessment is best begun with an investigation of the academic and technological conditions that initially joined to generate the genre. The standard story setting out the origin of the American law review runs as follows: in 1887, a group of enterprising Harvard law students, backed by visionary faculty and supportive Harvard alumni, commenced publication of a student-edited legal periodical (the Harvard Law Review) which soon became the model for many others. The story is factually …
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
Occasional Papers Series
Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …
Addressing Cyber Harassment: An Overview Of Hate Crimes In Cyberspace, Danielle K. Citron
Addressing Cyber Harassment: An Overview Of Hate Crimes In Cyberspace, Danielle K. Citron
Faculty Scholarship
This short piece will take a step back and give an overhead view of the problem of cyber harassment and the destructive impact it can have on victims’ lives. Then, it will address about what the law can do to combat online harassment and how a legal agenda can be reconciled with the First Amendment. Finally, it will turn to recent changes in social media companies’ treatment of online abuse and what that might mean for our system of free expression.
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
Georgia Journal of International & Comparative Law
No abstract provided.
How Much Spam Can Can-Spam Can?: Evaluating The Effectiveness Of The Can-Spam Act In The Wake Of White Buffalo Ventures V. University Of Texas, Fay Katayama
Touro Law Review
No abstract provided.
Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li
Jeffrey Li
Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …
Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin
Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
What Happens To Our Facebook Accounts When We Die?: Probate Versus Policy And The Fate Of Social-Media Assets Postmortem, Kristina Sherry
What Happens To Our Facebook Accounts When We Die?: Probate Versus Policy And The Fate Of Social-Media Assets Postmortem, Kristina Sherry
Pepperdine Law Review
More than 580,000 Facebook users in the U.S. will die this year, raising numerous legal questions as to the disposition of their Facebook pages and similar “digital assets” left in a state of legal limbo. While access to and ownership of decedents’ email accounts has been philosophized for nearly a decade, this Comment focuses on the additional legal uncertainties posed by “digital death” in the more amorphous realm of “social media.” Part II explores the implications of digital death by conceptualizing digital assets and surveying the underlying legal principles of contractual policies, probate, property, and privacy concerns. Part III surveys …
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
San Diego International Law Journal
The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …
Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza
Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza
University of Arkansas at Little Rock Law Review
A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.
After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …
Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik
Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik
Warren Bartholomew Chik
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …
Harassment Through Digital Media: A Cross-Jurisdictional Comparative Analysis On The Law On Cyberstalking, Warren B. Chik
Harassment Through Digital Media: A Cross-Jurisdictional Comparative Analysis On The Law On Cyberstalking, Warren B. Chik
Warren Bartholomew Chik
The cyber world is an extension of the real world. It is another dimension where we can work, study and play. But people also tend to lose their inhibitions on the Internet, often while keeping their anonymity. Because of the perceived and real freedoms in the digital environment, people are emboldened to act in ways that they may not normally do in the real world. One recent phenomenon that is steadily becoming a problem in every country with a high level of electronic connectivity is the act of cyberstalking. The electronic medium is an important factor due to its very …
'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik
'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik
Warren Bartholomew CHIK
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble
Scholarly Works
Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location—a territorial partitioning of the Internet. One of these attempts, for example, is the recent Stop Online Piracy Act (“SOPA”) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of erecting borders in cyberspace, focuses on …
Cybercrime, Ronald C. Griffin
Cybercrime, Ronald C. Griffin
Journal Publications
This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.
Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton
Cyberspace, Exceptionalism, And Innocent Copyright Infringement, Jacqueline D. Lipton
Vanderbilt Journal of Entertainment & Technology Law
Direct copyright infringement attracts strict liability. However, as a theoretical matter, it is not necessarily clear why. Legislatures and courts have typically imposed strict liability where: (a) a defendant has notice of a plaintiff's rights, particularly where those rights involve a property interest; (b) a mens rea requirement on the part of the defendant would create an untenable burden on the plaintiff; (c) it is easier for the defendant to avoid harming the plaintiff than it is for the plaintiff to avoid the harm; or, (d) it is more administratively or economically efficient for the defendant to bear the risk …
Public Forum 2.0, Lyrissa Barnett Lidsky
Public Forum 2.0, Lyrissa Barnett Lidsky
UF Law Faculty Publications
Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …
La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano
La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano
Germán M. Teruel Lozano
Master's thesis about freedom of speech in Internet and the constitutional guarantees in the control of websides content.
A Portrait Of The Internet As A Young Man, Ann Bartow
A Portrait Of The Internet As A Young Man, Ann Bartow
Michigan Law Review
In brief, the core theory of Jonathan Zittrain's 2008 book The Future of the Internet-And How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be "We have to regulate the Internet to preserve its open, unregulated nature." Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes maximum stability, …
‘Customary Internet-Ional Law’: Creating A Body Of Customary Law For Cyberspace. Part 2: Applying Custom As Law To The Internet Infrastructure, Warren B. Chik
‘Customary Internet-Ional Law’: Creating A Body Of Customary Law For Cyberspace. Part 2: Applying Custom As Law To The Internet Infrastructure, Warren B. Chik
Research Collection Yong Pung How School Of Law
The shift in socio-economic transactions from real space to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 2 of this article, I will construct the customary rules to Internet law-making that are applicable …
A Portrait Of The Internet As A Young Man, Ann Bartow
A Portrait Of The Internet As A Young Man, Ann Bartow
Law Faculty Scholarship
In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be “We have to regulate the Internet to preserve its open, unregulated nature.” Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes …
'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik
'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik
Research Collection Yong Pung How School Of Law
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …
Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington
Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington
Matthew Hoisington
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via cyberspace strains traditional definitions of the use of force. In order to clearly delineate the rights of the parties involved, including the right to self-defense, the international community must come to some consensus on the meaning of cyberwarfare within the existing jus ad bellum paradigm. After examining the shortcomings inherent in classifying cyberattacks according to classical notions of kinetic warfare, …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds
William L. Reynolds
In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky
Faculty Publications
This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …
Understanding The New Virtualist Paradigm, Jonathon Penney
Understanding The New Virtualist Paradigm, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …
Privacy And The New Virtualism, Jonathon Penney
Privacy And The New Virtualism, Jonathon Penney
Articles, Book Chapters, & Popular Press
First generation cyberlaw scholars were deeply influenced by the uniqueness of cyberspace, and believed its technology and scope meant it could not be controlled by any government. Few still ascribe to this utopian vision. However, there is now a growing body of second generation cyberlaw scholarship that speaks not only to the differential character of cyberspace, but also analyzes legal norms within virtual spaces while drawing connections to our experience in real space. I call this the New Virtualism. Situated within this emerging scholarship, this article offers a new approach to privacy in virtual spaces by drawing on what Orin …
Understanding The New Virtualist Paradigm, Jonathon Penney
Understanding The New Virtualist Paradigm, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky
UF Law Faculty Publications
This Article examines the evolution of the law governing libel suits against anonymous "John Doe" defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire, and other nonfactual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …