Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet

2017

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 30

Full-Text Articles in Internet Law

Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky Dec 2017

Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky

Maine Law Review

Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to …


Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden Nov 2017

Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden

Akron Law Review

In proposing a new rule under the First Amendment to adjudicate anonymous Cyberbullying cases, this Article first reviews and summarizes the First Amendment precedents governing regulation of speech by minors and student speech in the school environment. Second, it reviews and discusses the prevalence of minors’ online harassment or Cyberbullying, including pre-litigation disputes reported in the press. Third, it reviews and summarizes the First Amendment precedents governing the “unmasking” of anonymous speakers. Finally, the Cyberbully Unmasking Test is proposed and applied.


The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann Nov 2017

The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann

Popular Media

No abstract provided.


Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon Sep 2017

Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon

Oklahoma Journal of Law and Technology

No abstract provided.


E-Commerce And The Americans With Disabilities Act: Failing To Extend The Ada To The Internet In Access Now V. Southwest Airlines, Emily Short Sep 2017

E-Commerce And The Americans With Disabilities Act: Failing To Extend The Ada To The Internet In Access Now V. Southwest Airlines, Emily Short

Oklahoma Journal of Law and Technology

No abstract provided.


Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner Sep 2017

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner

Oklahoma Journal of Law and Technology

No abstract provided.


Censorship On The Internet: Who Should Make The Rules, Joe Zopolsky Sep 2017

Censorship On The Internet: Who Should Make The Rules, Joe Zopolsky

Oklahoma Journal of Law and Technology

No abstract provided.


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe Sep 2017

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington Sep 2017

Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington

Oklahoma Journal of Law and Technology

No abstract provided.


Three Chords And The Truth: Analyzing Copyright Infringement Claims Against Guitar Tablature Websites, Krist Caldwell Sep 2017

Three Chords And The Truth: Analyzing Copyright Infringement Claims Against Guitar Tablature Websites, Krist Caldwell

Oklahoma Journal of Law and Technology

No abstract provided.


Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman Jul 2017

Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins Jul 2017

It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford Jun 2017

Human Rights And Cybersecurity Due Diligence: A Comparative Study, Scott J. Shackelford

University of Michigan Journal of Law Reform

No company, just like no nation, is an island in cyberspace; the actions of actors from hacktivists to nation-states have the potential to impact the bottom line, along with the human rights of consumers and the public writ large. To help meet the multifaceted challenges replete in a rapidly globalizing world—and owing to the relative lack of binding international law to regulate both cybersecurity and the impact of business on human rights—companies are reconceptualizing what constitutes “due diligence.” This Article takes lessons from both the cybersecurity and human rights due diligence contexts to determine areas for cross-pollination in an effort …


Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler Jun 2017

Products Liability And The Internet Of (Insecure) Things: Should Manufacturers Be Liable For Damage Caused By Hacked Devices?, Alan Butler

University of Michigan Journal of Law Reform

While the application of products liability to insecure software is a frequently-discussed concept in academic literature, many commentators have been skeptical of the viability of such claims for several reasons. First, the economic loss doctrine bars recovery for productivity loss, business disruption, and other common damages caused by software defects. Second, the application of design defects principles to software is difficult given the complexity of the devices and recent tort reform trends that have limited liability. Third, the intervening cause of damage from insecure software is typically a criminal or tortious act by a third party, so principles of causation …


Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law Jun 2017

Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law

University of Michigan Journal of Law Reform

This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.


Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott May 2017

Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott

Articles

Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions toward …


Keynote Address: The Digital Forevermore, Thomas J. Ridge Mar 2017

Keynote Address: The Digital Forevermore, Thomas J. Ridge

University of Richmond Law Review

No abstract provided.


The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams Mar 2017

The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams

University of Richmond Law Review

No abstract provided.


Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott Mar 2017

Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott

University of Richmond Law Review

The purpose of this article is to explore the threats posed by

cybersecurity breaches, outline the steps taken by the government

to address those threats in the private sector economy, and

call attention to the ultimate solution, which will most certainly

spur private businesses to create a more secure cyber environment

for the American people-a Connie Francis-styled cyber civil

action lawsuit.


Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael Mar 2017

Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Source, Character And Taxable Presence In A Digital World: International Taxation Of Online Advertising, Assaf Prussak Jan 2017

Source, Character And Taxable Presence In A Digital World: International Taxation Of Online Advertising, Assaf Prussak

SJD Dissertations

The purpose of this dissertation is to examine the application of the U.S. and international tax rules and norms to income derived from online advertising, to consider the challenges and problems that arise when these rules are applied to such a purely-digital type of income, to propose an alternative framework for the taxation of online advertising, and to discuss the legislative measures adopted by various countries in an attempt to tax this type of income (and other income derived from digital-based activities).


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey

All Faculty Scholarship

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …


Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble Jan 2017

Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble

Boyd Briefs / Road Scholars

Professor Marketa Trimble appeared on a panel at the Law, Borders, and Speech Conference hosted by The Center for Internet and Society at Stanford Law School on October 24, 2016. The session defined and discussed geoblocking and its implications for internet users, government, and private companies.

A video of the session is available here. Additionally, Professor Trimble's presentation is available here.


Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello Jan 2017

Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello

Articles

There are more than one billion websites available online. Many are useful tools for attorneys, so it makes sense to review and refresh your favorite bookmarks regularly. While none of the many free sites offer the sophisticated search abilities of fee-based research services, a few minutes spent exploring free sites can help researchers significantly narrow their searches once they turn to a fee-based system. Remember to always take advantage of the advancesearch option when available on a free site. Free sites are offering increasingly sophisticated search options, such as Boolean and proximity searches, which were previously exclusive to paid services.


Strategies And Behaviors Of Cyber Deviance And Internet Trolling, Cody Taylor Jan 2017

Strategies And Behaviors Of Cyber Deviance And Internet Trolling, Cody Taylor

All Master's Theses

As society shifts towards making social media a center focus of contemporary life, trolls, are continually developing distractive dialogue. Although trolls may not be deviant in the sense of harsh online crimes, trolls do cause problems within online communities. Jonathan Bishop (2014) and Whitney Phillips (2015) have developed a foundation of internet troll research. Bishop (2014) studied the behaviors of trolls, while Philips (2015) investigated their techniques. However, neither researcher sampled from an online massive multiplayer Online game. Using one of the largest online gaming communities, World of Warcraft, this research examines the techniques and behaviors of trolling. Trolling was …


Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney Jan 2017

Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …


The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters Jan 2017

The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters

Scholarly Works

Many scholars have commented that the state action doctrine forecloses use of the First Amendment to constrain the policies and practices of online service providers. But few have comprehensively studied this issue, and the seminal article exploring “[c]yberspace and the [s]tate [a]ction [d]ebate” is fifteen years old, published before the U.S. Supreme Court reformulated the federal approach to state action. It is important to give the state action doctrine regular scholarly attention, not least because it is increasingly clear that “the private sector has a shared responsibility to help safeguard free expression.” It is critical to understand whether the First …


Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney Jan 2017

Internet Surveillance, Regulation, And Chilling Effects Online: A Comparative Case Study, Jonathon Penney

Articles, Book Chapters, & Popular Press

With internet regulation and censorship on the rise, states increasingly engaging in online surveillance, and state cyber-policing capabilities rapidly evolving globally, concerns about regulatory “chilling effects” online — the idea that laws, regulations, or state surveillance can deter people from exercising their freedoms or engaging in legal activities on the internet have taken on greater urgency and public importance. But just as notions of “chilling effects” are not new, neither is skepticism about their legal, theoretical, and empirical basis; in fact, the concept remains largely un-interrogated with significant gaps in understanding, particularly with respect to chilling effects online. This work …


Conceptualizing Cryptolaw, Carla L. Reyes Jan 2017

Conceptualizing Cryptolaw, Carla L. Reyes

Faculty Journal Articles and Book Chapters

Sweden transfers its real property recording system to the blockchain, a software protocol that enables public, cryptographically secure transaction verification without reliance upon a trusted third party. Dubai plans to issue blockchain-based government documents. The United States Department of Health and Human Services investigates blockchain-based systems for managing health data. Illinois explores blockchain-based applications for use in the Illinois government. News of governments and public-private partnerships developing blockchain-based legal applications increasingly splash across the headlines; however the law-makers using blockchain and other Distributed Ledger Technology (DLT) systems to implement legal processes do not systematically consider the broader implications of their …