Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Constitutional Law (9)
- Privacy Law (9)
- First Amendment (8)
- Human Rights Law (5)
- Law and Politics (5)
-
- Communications Law (4)
- Computer Law (4)
- Criminal Law (4)
- Inequality and Stratification (4)
- Law and Society (4)
- Social Control, Law, Crime, and Deviance (4)
- Social and Behavioral Sciences (4)
- Sociology (4)
- Civic and Community Engagement (3)
- Communication (3)
- Communication Technology and New Media (3)
- Community-Based Learning (3)
- Community-Based Research (3)
- Legal Remedies (3)
- Legislation (3)
- National Security Law (3)
- Science and Technology Law (3)
- Social Influence and Political Communication (3)
- Broadcast and Video Studies (2)
- Civil Rights and Discrimination (2)
- Criminal Procedure (2)
- Criminology (2)
- Fourth Amendment (2)
- Institution
-
- University of Oklahoma College of Law (7)
- University of Michigan Law School (6)
- University of Rhode Island (4)
- University of Richmond (3)
- Schulich School of Law, Dalhousie University (2)
-
- Central Washington University (1)
- Southern Methodist University (1)
- The University of Akron (1)
- University of Georgia School of Law (1)
- University of Maine School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Pennsylvania Carey Law School (1)
- William & Mary Law School (1)
- Publication
- Publication Type
Articles 1 - 30 of 30
Full-Text Articles in Internet Law
Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky
Maine Law Review
Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to …
Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden
Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden
Akron Law Review
In proposing a new rule under the First Amendment to adjudicate anonymous Cyberbullying cases, this Article first reviews and summarizes the First Amendment precedents governing regulation of speech by minors and student speech in the school environment. Second, it reviews and discusses the prevalence of minors’ online harassment or Cyberbullying, including pre-litigation disputes reported in the press. Third, it reviews and summarizes the First Amendment precedents governing the “unmasking” of anonymous speakers. Finally, the Cyberbully Unmasking Test is proposed and applied.
The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann
The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann
Popular Media
No abstract provided.
Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon
Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon
Oklahoma Journal of Law and Technology
No abstract provided.
E-Commerce And The Americans With Disabilities Act: Failing To Extend The Ada To The Internet In Access Now V. Southwest Airlines, Emily Short
Oklahoma Journal of Law and Technology
No abstract provided.
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Oklahoma Journal of Law and Technology
No abstract provided.
Censorship On The Internet: Who Should Make The Rules, Joe Zopolsky
Censorship On The Internet: Who Should Make The Rules, Joe Zopolsky
Oklahoma Journal of Law and Technology
No abstract provided.
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Oklahoma Journal of Law and Technology
No abstract provided.
Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington
Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington
Oklahoma Journal of Law and Technology
No abstract provided.
Three Chords And The Truth: Analyzing Copyright Infringement Claims Against Guitar Tablature Websites, Krist Caldwell
Three Chords And The Truth: Analyzing Copyright Infringement Claims Against Guitar Tablature Websites, Krist Caldwell
Oklahoma Journal of Law and Technology
No abstract provided.
Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman
Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins
It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford
Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford
University of Michigan Journal of Law Reform
No company, just like no nation, is an island in cyberspace; the actions of actors from hacktivists to nation-states have the potential to impact the bottom line, along with the human rights of consumers and the public writ large. To help meet the multifaceted challenges replete in a rapidly globalizing world—and owing to the relative lack of binding international law to regulate both cybersecurity and the impact of business on human rights—companies are reconceptualizing what constitutes “due diligence.” This Article takes lessons from both the cybersecurity and human rights due diligence contexts to determine areas for cross-pollination in an effort …
Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler
University of Michigan Journal of Law Reform
While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
University of Michigan Journal of Law Reform
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.
Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott
Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott
Articles
Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions toward …
Keynote Address: The Digital Forevermore, Thomas J. Ridge
Keynote Address: The Digital Forevermore, Thomas J. Ridge
University of Richmond Law Review
No abstract provided.
The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams
The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams
University of Richmond Law Review
No abstract provided.
Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott
Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott
University of Richmond Law Review
The purpose of this article is to explore the threats posed by
cybersecurity breaches, outline the steps taken by the government
to address those threats in the private sector economy, and
call attention to the ultimate solution, which will most certainly
spur private businesses to create a more secure cyber environment
for the American people-a Connie Francis-styled cyber civil
action lawsuit.
Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael
Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Source, Character And Taxable Presence In A Digital World: International Taxation Of Online Advertising, Assaf Prussak
Source, Character And Taxable Presence In A Digital World: International Taxation Of Online Advertising, Assaf Prussak
SJD Dissertations
The purpose of this dissertation is to examine the application of the U.S. and international tax rules and norms to income derived from online advertising, to consider the challenges and problems that arise when these rules are applied to such a purely-digital type of income, to propose an alternative framework for the taxation of online advertising, and to discuss the legislative measures adopted by various countries in an attempt to tax this type of income (and other income derived from digital-based activities).
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
All Faculty Scholarship
This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …
Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble
Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble
Boyd Briefs / Road Scholars
Professor Marketa Trimble appeared on a panel at the Law, Borders, and Speech Conference hosted by The Center for Internet and Society at Stanford Law School on October 24, 2016. The session defined and discussed geoblocking and its implications for internet users, government, and private companies.
A video of the session is available here. Additionally, Professor Trimble's presentation is available here.
Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello
Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello
Articles
There are more than one billion websites available online. Many are useful tools for attorneys, so it makes sense to review and refresh your favorite bookmarks regularly. While none of the many free sites offer the sophisticated search abilities of fee-based research services, a few minutes spent exploring free sites can help researchers significantly narrow their searches once they turn to a fee-based system. Remember to always take advantage of the advancesearch option when available on a free site. Free sites are offering increasingly sophisticated search options, such as Boolean and proximity searches, which were previously exclusive to paid services.
Strategies And Behaviors Of Cyber Deviance And Internet Trolling, Cody Taylor
Strategies And Behaviors Of Cyber Deviance And Internet Trolling, Cody Taylor
All Master's Theses
As society shifts towards making social media a center focus of contemporary life, trolls, are continually developing distractive dialogue. Although trolls may not be deviant in the sense of harsh online crimes, trolls do cause problems within online communities. Jonathan Bishop (2014) and Whitney Phillips (2015) have developed a foundation of internet troll research. Bishop (2014) studied the behaviors of trolls, while Philips (2015) investigated their techniques. However, neither researcher sampled from an online massive multiplayer Online game. Using one of the largest online gaming communities, World of Warcraft, this research examines the techniques and behaviors of trolling. Trolling was …
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …
The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters
The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters
Scholarly Works
Many scholars have commented that the state action doctrine forecloses use of the First Amendment to constrain the policies and practices of online service providers. But few have comprehensively studied this issue, and the seminal article exploring “[c]yberspace and the [s]tate [a]ction [d]ebate” is fifteen years old, published before the U.S. Supreme Court reformulated the federal approach to state action. It is important to give the state action doctrine regular scholarly attention, not least because it is increasingly clear that “the private sector has a shared responsibility to help safeguard free expression.” It is critical to understand whether the First …
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney
Articles, Book Chapters, & Popular Press
With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …
Conceptualizing Cryptolaw, Carla L. Reyes
Conceptualizing Cryptolaw, Carla L. Reyes
Faculty Journal Articles and Book Chapters
Sweden transfers its real property recording system to the blockchain, a software protocol that enables public, cryptographically secure transaction verification without reliance upon a trusted third party. Dubai plans to issue blockchain-based government documents. The United States Department of Health and Human Services investigates blockchain-based systems for managing health data. Illinois explores blockchain-based applications for use in the Illinois government. News of governments and public-private partnerships developing blockchain-based legal applications increasingly splash across the headlines; however the law-makers using blockchain and other Distributed Ledger Technology (DLT) systems to implement legal processes do not systematically consider the broader implications of their …