Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (15)
- Science and Technology Law (14)
- Communications Law (11)
- Constitutional Law (11)
- Intellectual Property Law (9)
-
- First Amendment (8)
- Human Rights Law (8)
- Law and Society (8)
- Jurisprudence (7)
- Commercial Law (6)
- Public Law and Legal Theory (6)
- Civil Rights and Discrimination (5)
- Contracts (5)
- Criminal Law (5)
- Social and Behavioral Sciences (5)
- Entertainment, Arts, and Sports Law (4)
- Privacy Law (4)
- Administrative Law (3)
- Business (3)
- Legal History (3)
- Communication (2)
- Communication Technology and New Media (2)
- Consumer Protection Law (2)
- Economics (2)
- International Law (2)
- Law and Economics (2)
- Law and Politics (2)
- Legal Studies (2)
- Institution
- Publication Year
- Publication
-
- James Grimmelmann (3)
- Lyrissa Barnett Lidsky (3)
- Danielle Keats Citron (2)
- David Barnhizer (2)
- Frank A. Pasquale (2)
-
- Germán M. Teruel Lozano (2)
- Ira Steven Nathenson (2)
- Jorge R Roig (2)
- Laura Quilter (2)
- Susan Freiwald (2)
- Wayne R. Barnes (2)
- Aaron K. Perzanowski (1)
- Adam A Marshall (1)
- Adam Thierer (1)
- Allyson Haynes Stuart (1)
- Conor Francis Linehan (1)
- Cynthia R. Farina (1)
- Donald J. Kochan (1)
- Giancarlo Francesco Frosio (1)
- Glynn Lunney (1)
- Gregory M Dickinson (1)
- Ivo Teixeira Gico Jr. (1)
- John Copeland Nagle (1)
- Jonathan Zittrain (1)
- Julia Lee (1)
- Juliet M Moringiello (1)
- Konstantinos Stylianou (1)
- Laura A. Heymann (1)
- Lee Kovarsky (1)
- Lorrie F Cranor (1)
- File Type
Articles 1 - 30 of 59
Full-Text Articles in Internet Law
Congress, The Internet, And The Intractable Pornography Problem: The Child Online Protection Act Of 1998, Timothy Zick
Congress, The Internet, And The Intractable Pornography Problem: The Child Online Protection Act Of 1998, Timothy Zick
Timothy Zick
No abstract provided.
The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann
The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann
Laura A. Heymann
No abstract provided.
Pornography As Pollution, John C. Nagle
Pornography As Pollution, John C. Nagle
John Copeland Nagle
Pornography is often compared to pollution. But little effort has been made to consider what it means to describe pornography as a pollution problem, even as many legal scholars have concluded that the law has failed to control internet pornography. Opponents of pornography maintain passionate convictions about how sexually-explicit materials harm both those who are exposed to them and the broader cultural environment. Viewers of pornography may generally hold less fervent beliefs, but champions of free speech and of a free internet object to anti-pornography regulations with strong convictions of their own. The challenge is how to address the widespread …
Public Forum 2.0, Lyrissa Barnett Lidsky
Public Forum 2.0, Lyrissa Barnett Lidsky
Lyrissa Barnett Lidsky
Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …
Trust And Social Commerce, Julia Y. Lee
Trust And Social Commerce, Julia Y. Lee
Julia Lee
Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace. The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Lorrie F Cranor
We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …
Why Confronting The Internet’S Dark Side?, Raphael Cohen-Almagor
Why Confronting The Internet’S Dark Side?, Raphael Cohen-Almagor
raphael cohen-almagor
Raphael Cohen-Almagor, the author of Confronting the Internet's Dark Side, explains his motivation for exploring the dangerous side of the world wide web. This new book is the first comprehensive book on social responsibility on the Internet.
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Giancarlo Francesco Frosio
In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Shlomit Yanisky-Ravid Professor of Law
Increasingly, there has been a focus on creating democratic standards and procedures in order to best facilitate open exchange of information and communication online—a goal that fits neatly within the feminist aim to democratize content creation and community. Collaborative websites, such as blogs, social networks, and, as focused on in this Article, Wikipedia, represent both a Cyberspace community entirely outside the strictures of the traditional (intellectual) proprietary paradigm and one that professes to truly embody the philosophy of a completely open, free, and democratic resource for all. In theory, collaborative websites are the solution that social activists, Intellectual Property opponents …
E-Obviousness, Glynn S. Lunney Jr.
E-Obviousness, Glynn S. Lunney Jr.
Glynn Lunney
As patents expand into e-commerce and methods of doing business more generally, both the uncertainty and the risk of unjustified market power that the present approach generates suggest a need to rethink our approach to nonobviousness. If courts fail to enforce the nonobviousness requirement and allow an individual to obtain a patent for simply implementing existing methods of doing business through a computer, even where only trivial technical difficulties are presented, entire e-markets might be handed over to patent holders with no concomitant public benefit. If courts attempt to enforce the nonobviousness requirement, but leave undefined the extent of the …
Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes
Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes
Wayne R. Barnes
The spyware epidemic has reached new heights on the Internet. Computer users are increasingly burdened with programs they did not knowingly or consciously install, which place strains on their computers' performance, and which also trigger annoying "pop-up" advertisements of products or services which have been determined to match the users' preferences. The users' purported preferences are determined, in turn, by the software continuously monitoring every move the consumer makes as she "surfs the Internet." The public overwhelmingly disapproves of spyware which is surreptitiously placed on computers in this manner, and also largely disapproves of the pop-up advertising paradigm. As a …
Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes
Rethinking Spyware: Questioning The Propriety Of Contractual Consent To Online Surveillance, Wayne R. Barnes
Wayne R. Barnes
The spyware epidemic has reached new heights on the Internet. Computer users are increasingly burdened with programs they did not knowingly or consciously install, which place strains on their computers' performance, and which also trigger annoying "pop-up" advertisements of products or services which have been determined to match the users' preferences. The users' purported preferences are determined, in turn, by the software continuously monitoring every move the consumer makes as she "surfs the Internet." The public overwhelmingly disapproves of spyware which is surreptitiously placed on computers in this manner, and also largely disapproves of the pop-up advertising paradigm. As a …
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Cynthia R. Farina
This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
Lyrissa Barnett Lidsky
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker, even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
Silencing John Doe: Defamation & Discourse In Cyberspace, Lyrissa Barnett Lidsky
Silencing John Doe: Defamation & Discourse In Cyberspace, Lyrissa Barnett Lidsky
Lyrissa Barnett Lidsky
John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons-some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat these suits …
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
Adam Thierer
This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …
Fcc Commenting Workshop, Laura Quilter
Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall
Infusing The Meaning Of “Cruel And Unusual” Through The Digital Public Sphere: How The Internet Can Change The Debate On The Morality Of Capital Punishment, Adam A. Marshall
Adam A Marshall
In this paper, I suggest new strategies that abolitionists should adopt in the debate over the morality of the death penalty. As the Eighth Amendment “draw[s] its meaning from the evolving standards of decency that mark the progress of a maturing society”, advocates for abolishing the death penalty should develop strategies based on the moral theories of Adam Smith to leverage the power of the internet and ensure all citizens feel the effects of the death penalty in order to stimulate debate over its morality. By examining these concepts through the case of Troy Davis, we can see how the …
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Tejas N. Narechania
For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.
Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …
The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello
The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello
William L. Reynolds
This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …
Aereo's Errors, Ira Steven Nathenson
Aereo's Errors, Ira Steven Nathenson
Ira Steven Nathenson
This article scrutinizes the many troubling errors made by the United States Supreme Court in its decision in American Broadcasting Companies, Inc. v. Aereo, Inc. Aereo’s streaming television service allowed subscribers to watch broadcast television on a computer, tablet, or smartphone without requiring them to be directly connected to cable, satellite, or a local antenna. Aereo’s system was designed to comply with existing copyright law by using thousands of antennas, each of which was designated for only one subscriber at a time. Aereo was sued for copyright infringement by a number of leading television broadcasters. The United States Supreme Court, …
Anonymous Speech On The Internet: Why Current Efforts By States To Regulate Anonymous Speech Fail Constitutional Scrutiny, And How Courts Should Protect First Amendment Rights, Conor Francis Linehan
Anonymous Speech On The Internet: Why Current Efforts By States To Regulate Anonymous Speech Fail Constitutional Scrutiny, And How Courts Should Protect First Amendment Rights, Conor Francis Linehan
Conor Francis Linehan
The legislatures in New York and Illinois have attempted to regulate the speech of individuals on the Internet and threaten to void their anonymity. The legislatures are trying to reach the actionable or harmful speech that often shows up on websites like Reddit.com. However, the bills have reached too far, and encompass much speech that is absolutely protected. This note argues that the right of anonymous speech on the Internet should be protected from government encroachment, and the proper way to protect the interests of individuals who are the subject of libelous or damaging speech should be through a re-working …
Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer
Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer
David Barnhizer
None of us can claim the quality of original insight achieved by Alexis de Tocqueville in his early 19th Century classic Democracy in America in his observation that the “soft” repression of democracy was unlike that in any other political form. It is impossible to deny that we in the US, the United Kingdom and Western Europe are experiencing just such a “gentle” drift of the kind that Tocqueville describes, losing our democratic integrity amid an increasingly “pretend” democracy. He explained: “[T]he supreme power [of government] then extends its arm over the whole community. It covers the surface of society …
A Methodological Proposal For A National Survey Of Data Protection In E-Government In Mexico, Teresa M. G. Da Cunha Lopes
A Methodological Proposal For A National Survey Of Data Protection In E-Government In Mexico, Teresa M. G. Da Cunha Lopes
Teresa M. G. Da Cunha Lopes
The present research paper is an attempt to study the aspects related to e-government and data protection in Mexico, and at the same time, in view of the lack of empirical data presents a methodological proposal for the urgent implementation of a national survey. We focus in the protection of personal data used by public administrators to provide public services.
Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia
Surveillance Law Through Cyberlaw's Lens, Patricia L. Bellia
Patricia L. Bellia
The continuing controversy over the surveillance-related provisions of the USA Patriot Act highlights the depth of Americans' concern about internet privacy. Although calls to limit the government's surveillance powers strike a chord with the public, the legal framework governing surveillance activities is highly technical and poorly understood. The Patriot Act's sunset date provides Congress with an opportunity to revisit that framework.
This Article seeks to contribute to the debate over the appropriate scope of internet surveillance in two ways. First, the Article explores the intricacies of the constitutional and statutory frameworks governing electronic surveillance, and particularly surveillance to acquire electronic …
Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm
Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm
James Grimmelmann
No abstract provided.
Rankings, Reductionism, And Responsibility , Frank Pasquale
Rankings, Reductionism, And Responsibility , Frank Pasquale
Frank A. Pasquale
After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale
Frank A. Pasquale
Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this article, we make the case for some regulation of the ability of search engines to manipulate and structure their results. We demonstrate that the First Amendment, properly understood, does not prohibit such regulation. Nor will such interventions inevitably lead to the disclosure of important trade secrets. After setting forth normative foundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalized search may …
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Allyson Haynes Stuart
This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.