Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Journal

Internet Law

Institution
Keyword
Publication

Articles 1 - 30 of 57

Full-Text Articles in Science and Technology Law

Rethinking Ucita: Lessons From The Open Source Movement, Matthew D. Stein Nov 2017

Rethinking Ucita: Lessons From The Open Source Movement, Matthew D. Stein

Maine Law Review

For those within the information technology (IT) industry, the phrase “open source” has been as prominent at water cooler and boardroom discussions over the last several years as the phrase “out source.” Open source is at once a software development model, a business model, a social movement, and a philosophy that has recently garnered attention from outside of the IT sphere. As such, the topic has become increasingly fertile ground for academic scholarship from several disciplines. Economists, legal academics and practitioners, computer engineers, and social commentators have offered their varying perspectives on open source software. Whether or not this attention …


Property Rights In Augmented Reality, Declan T. Conroy Nov 2017

Property Rights In Augmented Reality, Declan T. Conroy

Michigan Telecommunications & Technology Law Review

Increasingly, cities, towns, and even rural communities are being slowly reshaped by a dynamic yet initially imperceptible phenomenon: the elaboration of augmented reality. Through applications that place virtual features over specific, real-world locations, layers of augmented reality are proliferating, adding new elements to an increasingly wide range of places. However, while many welcome the sudden appearance of arenas for battling digital creatures in their neighborhood or the chance to write virtual messages on their neighbor’s wall, the areas being augmented oftentimes are privately owned, thereby implicating property rights. Many intrusions, of course, are de minimis: an isolated, invisible Pikachu unexpectedly …


User-Friendly Taxpaying, Kathleen Delaney Thomas Oct 2017

User-Friendly Taxpaying, Kathleen Delaney Thomas

Indiana Law Journal

Technology is revolutionizing our lives. With the touch of a button or a simple voice command, we can instantly order groceries, get directions, or find the nearest sushi restaurant. Sensibly, the private sector has capitalized on these recent innovations to drive up profits. To sell more laundry detergent, Amazon now enables consumers to order refills by simply pressing the “dash button” mounted above their laundry machines. Starbucks lures more customers by allowing them to pre-order online and have their drink waiting when they arrive at the store. The theory behind this approach is simple: if you want someone to use …


Piracy On Peer-To-Peer File Sharing Networks: Why A Streamlined Online Dispute Resolution System Should Not Be Forgotten In The Shadow Of A Federal Small Claims Tribunal, Naomi Gemmell Sep 2017

Piracy On Peer-To-Peer File Sharing Networks: Why A Streamlined Online Dispute Resolution System Should Not Be Forgotten In The Shadow Of A Federal Small Claims Tribunal, Naomi Gemmell

Pepperdine Dispute Resolution Law Journal

This Article proposes application of an ADR system for resolving online copyright disputes related to P2P file sharing. Section II provides an overview of P2P file sharing networks and associated copyright infringement. Section III explores current approaches that fall short in resolving P2P copyright disputes, namely the Digital Millennium Copyright Act, litigation, and private agreements. Section IV examines the two primary proposed solutions to online copyright disputes: alternative dispute resolution and federal small claims. Section V recommends that a streamlined online dispute resolution system is necessary (even if a federal small claims tribunal is adopted), and concludes.


The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson Aug 2017

The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard May 2017

Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard

Catholic University Journal of Law and Technology

This note argues that the current framework that governs health care applications and consumer privacy is slacking and outlines strategies to ensure protection against third party accessibility of information that consumers deem private.


Table Of Contents May 2017

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead May 2017

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini May 2017

Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini

Catholic University Journal of Law and Technology

No abstract provided.


#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu May 2017

#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu

Catholic University Journal of Law and Technology

No abstract provided.


Section 337 Of The Tariff Act Of 1930 And Its Impacts On China, Yiqing Yin May 2017

Section 337 Of The Tariff Act Of 1930 And Its Impacts On China, Yiqing Yin

Catholic University Journal of Law and Technology

337 of the Tariff Act of 1930 (“Section 337”) is one of the statutes that prohibit unfair trade or unfair competition in importation, and it aims at protecting intellectual property at the United States borders. Because of the international impacts of Section 337 and the injunctive nature of its remedies, the application of the statute has profound impacts on the trade between U.S. and other countries.

China is a country that has enormous trade with the U.S and imports large amounts of goods to the U.S. each year. Moreover, the weak intellectual property protection in China has been a serious …


Examining The Legalization Of Daily Fantasy Sports, Mark Dourmashkin May 2017

Examining The Legalization Of Daily Fantasy Sports, Mark Dourmashkin

Catholic University Journal of Law and Technology

No abstract provided.


Candidate Appearances, Equal Time, And The Fcc's Online Public File Database: Empirical Data On Tv Station Compliance During The 2016 Presidential Primary, Christopher Terry May 2017

Candidate Appearances, Equal Time, And The Fcc's Online Public File Database: Empirical Data On Tv Station Compliance During The 2016 Presidential Primary, Christopher Terry

Catholic University Journal of Law and Technology

Following the appearances of presidential candidates Donald Trump, Bernie Sanders and Hillary Clinton on episodes of Saturday Night Live, local television affiliates were required to upload documents related to the appearances to the FCC’s online public file database. After discussing the FCC’s database, the Bona Fide News Exception and the modern application of Section 315’s Equal Time Requirements, this study examines the compliance by the local NBC affiliates in the top 100 television markets with the public file requirements for candidate appearances and subsequent equal time requests as a test of station compliance with the requirements of the FCC’s online …


How Might The Supreme Court, If It Reviews The Federal Communication's 2015 Open Internet Order, Utilize The Chevron And Arbitrary And Capricious Tests?, John B. Meisel May 2017

How Might The Supreme Court, If It Reviews The Federal Communication's 2015 Open Internet Order, Utilize The Chevron And Arbitrary And Capricious Tests?, John B. Meisel

Catholic University Journal of Law and Technology

The article focuses on two Supreme Court decisions, King v. Burwell and FCC v. Fox Televisions Stations, Inc., that provide diametrically different models for how deferential a court should be when it reviews administrative action. The former case addresses how deferential a court should be for an agency’s statutory interpretation of an ambiguous statute for a question that has significant economic and political effects but Congress had not expressly delegated the question to the agency. The latter case addresses how deferential a court should be when an agency’s changes a policy that is within its statutory authority. These two …


Nobody Puts Blockchain In A Corner: The Disruptive Role Of Blockchain Technology In The Financial Services Industry And Current Regulatory Issues, Elizabeth Sara Ross May 2017

Nobody Puts Blockchain In A Corner: The Disruptive Role Of Blockchain Technology In The Financial Services Industry And Current Regulatory Issues, Elizabeth Sara Ross

Catholic University Journal of Law and Technology

This Note examines the disruptive effects that distributed ledger technology will have on payment systems and the financial services industry. It discusses how financial technology companies and banks will need to adapt to ensure that American consumers and banks, as well as the American economy at large, remain secure and efficient within an increasingly online and global financial system. This Note argues that the disjointed digital currency licensing regimes and complex landscape of state-by-state money transmission licensing directly threaten to stifle innovation, capital formation, consumer protection, and national cybersecurity. To ensure the U.S. remains competitive in the global financial revolution, …


Having An Affair May Shorten Your Life: The Ashley Madison Suicides, Sakinah N. Jones Mar 2017

Having An Affair May Shorten Your Life: The Ashley Madison Suicides, Sakinah N. Jones

Georgia State University Law Review

Ashley Madison is an online dating service originally designed for people in committed relationships who want to cheat on their partners. In 2015, the website claimed to be “100% discreet.” Ashley Madison’s FAQs promised that its users would never compromise their “safety, privacy or security” and would never have to reveal their identities unless they chose to.

Ashley Madison’s concept attracted over forty million ostensibly anonymous members to its site. In July 2015, a group calling itself The Impact Team (Impact) hacked into Ashley Madison’s parent company, Avid Life Media, Inc. (Avid Life), breaching its security walls and reaching directly …


Forcing Players To Walk The Plank: Why End User License Agreements Improperly Control Players’ Rights Regarding Microtransactions In Video Games, Chelsea King Mar 2017

Forcing Players To Walk The Plank: Why End User License Agreements Improperly Control Players’ Rights Regarding Microtransactions In Video Games, Chelsea King

William & Mary Law Review

No abstract provided.


Table Of Contents Jan 2017

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Telecommunications Infrastructure: Another O-Ring In The Economic Development Of The Third World, James Germano Jan 2017

Telecommunications Infrastructure: Another O-Ring In The Economic Development Of The Third World, James Germano

Catholic University Journal of Law and Technology

No abstract provided.


How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs Jan 2017

How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs

Catholic University Journal of Law and Technology

This comment asserts that there is a need for an update to the multifactor test considered by courts in determining the strength of a trademark. Traditional factors include the expenses an entity can afford to pay in advertising, but do not give any weight to the presence of the entity on social media to reach its target consumer group.


Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland Jan 2017

Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland

Catholic University Journal of Law and Technology

No abstract provided.


Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin Jan 2017

Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin

Catholic University Journal of Law and Technology

No abstract provided.


Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones Jan 2017

Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones

Catholic University Journal of Law and Technology

No abstract provided.


Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti Jan 2017

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.


Masthead Jan 2017

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton Jan 2017

Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton

Catholic University Journal of Law and Technology

This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing an …


Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy Jan 2017

Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy

American University Law Review

Smartphones have swiftly replaced most-if not all-conventional methods of sending, receiving, and storing personal information. Letters, address books, calendars, and trips to the bank have been rendered obsolete by tools such as text messaging, digital contacts, iCal, and mobile banking apps. Although these digital alternatives are convenient, they are not immune from attack. Therefore, to remain competitive, technology companies must maintain safe and secure platforms on which users may freely store and share their personal information.

Apple Inc., for example, strives to protect its users' intimate information, consequently earning a reputation for prioritizing security. Like a king protecting his castle, …


Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar Jan 2017

Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar

American University Law Review

The internet is a marvel of human accomplishment and a feat of technological engineering, which allows nearly instantaneous communication across the globe-an act once considered the stuff of science fiction. It has been lauded for its environmental benefits, such as reducing paper production and waste, but, as with any great accomplishment, there are unintended consequences. The increased proliferation of electronic devices to access the internet and the exponential advancement of those devices results in large amounts of electronic waste-a problem in its own right. Compounding the issue, for all of those internet-enabled devices to work, they must rely on the …


Ignorance Of Technology A Pass For Violating Child Pornography Laws? – What’S The Cache?, 33 J. Marshall J. Info. Tech. & Privacy L. 47 (2017), Angela Lewosz Jan 2017

Ignorance Of Technology A Pass For Violating Child Pornography Laws? – What’S The Cache?, 33 J. Marshall J. Info. Tech. & Privacy L. 47 (2017), Angela Lewosz

UIC John Marshall Journal of Information Technology & Privacy Law

This comment explains how the cache works, discusses computer forensic examinations, and provides a history of child pornography laws. It next explores how the courts have interpreted the changing pornography laws with advances in technology. It then specifically assesses the different approaches the courts take when reconciling the mens rea (the mental element) of knowledge in accordance with possession. Finally, this comment analyzes the strengths and flaws in the courts’ arguments and suggests a proposal for how the courts should deal with the cache in relation to the criminalization of possession within the federal child pornography laws.


Exposure To Police Brutality Allows For Transparency And Accountability Of Law Enforcement, 33 J. Marshall J. Info. Tech. & Privacy L. 75 (2017), Kendal Harden Jan 2017

Exposure To Police Brutality Allows For Transparency And Accountability Of Law Enforcement, 33 J. Marshall J. Info. Tech. & Privacy L. 75 (2017), Kendal Harden

UIC John Marshall Journal of Information Technology & Privacy Law

Thanks to the advancements in technology and valor of citizens, the public is finally able to understand the true severity of police brutality within the United States. The following considerations aim to address the lack of accountability and transparency of police brutality in the United States today. Part III will show how advancements in technology brings police brutality to the forefront of our nation’s issues by creating an informed society. Part IV will describe how individual states control the use of private cameras and cell phones of citizens to capture occurrences of police brutality. States do this by employing anti-wiretapping …