Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Science and Technology Law

Digital Copyright And Confuzzling Rhetoric, Peter K. Yu Jul 2011

Digital Copyright And Confuzzling Rhetoric, Peter K. Yu

Faculty Scholarship

The entertainment industry tells people they shouldn’t steal music because they wouldn’t steal a car, but has anybody ever downloaded a car? Music fans praise Napster and other file-sharing services for helping to free artists from the stranglehold of the music industry, but how many of these services actually have shared profits with songwriters and performing artists? Industry representatives claim that people use YouTube primarily to listen to or watch copyrighted contents, but are they missing a big piece of the user-generated content picture? Artists are encouraged to forget about copyright and hold live concerts instead, but can all artists …


Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle K. Citron, Helen Norton Jul 2011

Intermediaries And Hate Speech: Fostering Digital Citizenship For Our Information Age, Danielle K. Citron, Helen Norton

Faculty Scholarship

No longer confined to isolated corners of the web, cyber hate now enjoys a major presence on popular social media sites. The Facebook group “Kill a Jew Day,” for instance, acquired thousands of friends within days of its formation, while YouTube has hosted videos with names like “How to Kill Beaners,” “Execute the Gays,” and “Murder Muslim Scum.” The mainstreaming of cyber hate has the troubling potential to shape public expectations of online discourse.

Internet intermediaries have the freedom and influence to seize this defining moment in cyber hate’s history. We believe that a thoughtful and nuanced intermediary-based approach to …


Is Internet Exceptionalism Dead?, Tim Wu Jan 2011

Is Internet Exceptionalism Dead?, Tim Wu

Faculty Scholarship

Is there such a thing as Internet exceptionalism? If so, just what is the Internet an exception to? It may appear technical, but this is actually one of the big questions of our generation, for the Internet has shaped the United States and the world over the last twenty years in ways people still struggle to understand. The question is not merely academic. The greatest Internet firms can be succinctly defined as those that have best understood what makes the Internet different.


Was Mechanization De-Skilling? The Origins Of Task-Biased Technical Change, James Bessen Jan 2011

Was Mechanization De-Skilling? The Origins Of Task-Biased Technical Change, James Bessen

Faculty Scholarship

Did nineteenth century technology reduce demand for skilled workers in contrast to modern technology? I obtain direct evidence on human capital investments and the returns to skill by using micro-data on individual weavers and an engineering production function. Weavers learned substantially on the job. While mechanization eliminated some tasks and the associated skills, it increased returns to skill on the remaining tasks. Technical change was task-biased, much as with computer technology. As more tasks were automated, weavers’ human capital increased substantially. Although technology increased the demand for skill like today, weavers’ wages eventually increased and inequality decreased, contrary to current …


The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars Jan 2011

The In Rem Forfeiture Of Copyright-Infringing Domain Names, Andrew Sellars

Faculty Scholarship

In the summer of 2010, the Immigration and Customs Enforcement Division of the Department of Homeland Security began "Operation In Our Sites," an enforcement sweep targeted towards websites allegedly dealing in counterfeit goods and copyright-infringing files. The operation targeted the websites by proceeding in rem against their respective domain names. For websites targeted for copyright infringement, ICE Agents used recently-expanded copyright forfeiture remedies passed under the 2008 PRO-IP Act, providing no adversarial hearing prior to the websites being removed, and only a probable cause standard of proof.

This Paper examines three specific harms resulting from Operation In Our Sites, and …