Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Science and Technology Law

Owning Music: From Publisher's Privilege To Composer's Copyright, Michael W. Carroll Aug 2004

Owning Music: From Publisher's Privilege To Composer's Copyright, Michael W. Carroll

ExpressO

More than four years after Napster demonstrated the power of the Internet as a means of distributing music, we still are in the midst of a cultural and legal debate about what the respective rights of music copyright owners, follow-on creators, disseminators, and purchasers should be. A common assumption underlying much of the debate is that whatever settlement emerges, it will apply equally to all forms of expression. This Article questions that assumption by investigating the early history of copyright in music.

For the first time in legal scholarship, the Article reveals and examines the distinct early history of copyright …


Media Policy Out Of The Box: Content Abundance, Attention Scarcity, And The Failures Of Digital Markets, Ellen P. Goodman Aug 2004

Media Policy Out Of The Box: Content Abundance, Attention Scarcity, And The Failures Of Digital Markets, Ellen P. Goodman

ExpressO

No abstract provided.


The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig Feb 2004

The Dmca Subpoena Power: Who Does It Actually Protect?, Thomas P. Ludwig

ExpressO

After years of legal maneuvering and courtroom skirmishes, the lines in the war between copyright holders and online copyright infringers have been clearly drawn. This conflict, which is poised to erupt in courts across the country, began decades ago with the birth of the Internet, which gave rise to a previously unparalleled opportunity for the dissemination, sharing, and enjoyment of every conceivable form of human expression. In addition to the benefits it has provided, the Internet also has given rise to copyright infringement on a global scale through the unauthorized posting and sharing of digital files. After years of unsuccessfully …