Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (20)
- Computer Law (9)
- International Law (6)
- Privacy Law (6)
- Intellectual Property Law (5)
-
- Law and Society (4)
- Civil Rights and Discrimination (3)
- Constitutional Law (3)
- Criminal Law (3)
- Military, War, and Peace (3)
- National Security Law (3)
- Social and Behavioral Sciences (3)
- Antitrust and Trade Regulation (2)
- Commercial Law (2)
- International and Area Studies (2)
- Jurisdiction (2)
- Law and Economics (2)
- Law and Politics (2)
- Public Law and Legal Theory (2)
- Transnational Law (2)
- Administrative Law (1)
- Agency (1)
- Archival Science (1)
- Asian Studies (1)
- Banking and Finance Law (1)
- Business Organizations Law (1)
- Civil Law (1)
- Civil Procedure (1)
- Institution
-
- Selected Works (6)
- University of Maryland Francis King Carey School of Law (4)
- Schulich School of Law, Dalhousie University (3)
- Boston University School of Law (2)
- University of Michigan Law School (2)
-
- American University Washington College of Law (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University College of Law (1)
- Georgetown University Law Center (1)
- New York Law School (1)
- Penn State Dickinson Law (1)
- Seattle University School of Law (1)
- SelectedWorks (1)
- U.S. Naval War College (1)
- University of Oklahoma College of Law (1)
- University of Pittsburgh School of Law (1)
- University of San Diego (1)
- Publication Year
- Publication
-
- Faculty Scholarship (6)
- Susan Freiwald (3)
- Canadian Journal of Law and Technology (2)
- William L. Reynolds (2)
- Articles (1)
-
- Articles & Chapters (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Articles, Book Chapters, & Popular Press (1)
- Dickinson Law Review (2017-Present) (1)
- Faculty Publications (1)
- Georgetown Law Faculty Publications and Other Works (1)
- International Law Studies (1)
- Ira Steven Nathenson (1)
- Journal of Digital Forensics, Security and Law (1)
- Michigan Journal of International Law (1)
- Michigan Law Review (1)
- Oklahoma Journal of Law and Technology (1)
- San Diego International Law Journal (1)
- Seattle University Law Review (1)
- Thomas E. Baker (1)
- Publication Type
- File Type
Articles 1 - 29 of 29
Full-Text Articles in Science and Technology Law
Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan
Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan
Canadian Journal of Law and Technology
It is a common claim that law is always catching up with technology. This is not entirely fair. The European Union’s General Data Protection Regulation1 (GDPR) could be viewed as a case of technology having to catch up to the law. That said, clearly there are challenges in law and in the legal profession, both in terms of how the law can adapt to changes in the digital world and the disruption of the legal profession. On the former point, there are perhaps three broad schools of thought: existing law is sufficient for adapting to new technological challenges, as it …
Drawing The Cyber Baseline: The Applicability Of Existing International Law To The Governance Of Information And Communication Technologies, Dapo Akande, Antonio Coco, Talita De Souza Dias
Drawing The Cyber Baseline: The Applicability Of Existing International Law To The Governance Of Information And Communication Technologies, Dapo Akande, Antonio Coco, Talita De Souza Dias
International Law Studies
"Cyberspace" is often treated as a new domain of State activity in international legal discourse. This has led to the assumption that for international law to apply to cyber operations carried out by States or non-State actors, "cyber-specific" State practice and opinio juris must be demonstrated. This article challenges that assumption on five different bases. First, it argues that rules of general international law are generally applicable to all domains, areas, or types of State activity. In their interpretation and application to purported new domains, limitations to their scope of application cannot be presumed. Second, this article demonstrates that the …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Seattle University Law Review
The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Articles
In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg
Faculty Scholarship
To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …
Sovereignty In The Age Of Cyber, Gary Corn
Sovereignty In The Age Of Cyber, Gary Corn
Articles in Law Reviews & Other Academic Journals
International law is a foundational pillar of the modern international order, and its applicability to both state and nonstate cyber activities is, by now, beyond question. However, owing to the unique and rapidly evolving nature of cyberspace, its ubiquitous interconnectivity, its lack of segregation between the private and public sectors, and its incompatibility with traditional concepts of geography, there are difficult and unresolved questions about exactly how international law applies to this domain. Chief among these is the question of the exact role that the principle of sovereignty plays in regulating states' cyber activities.
Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James
Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James
Journal of Digital Forensics, Security and Law
Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the …
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
Oklahoma Journal of Law and Technology
No abstract provided.
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Faculty Scholarship
The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …
War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste
War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste
Canadian Journal of Law and Technology
No abstract provided.
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Thomas E. Baker
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds
William L. Reynolds
In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds
William L. Reynolds
This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.
Understanding The New Virtualist Paradigm, Jonathon Penney
Understanding The New Virtualist Paradigm, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
In this survey, we review electronic contracting cases decided between June 15, 2008 and June 15, 2009. During that period we found that there was not much action on the formation by click-wrap and browse-wrap front. We have previously observed that the law of electronic contracts has matured, and the fact that there have not been any decisions on whether click-wrap and browse-wrap are effective ways of forming contracts reflects that observation. This year brought us three modification cases, two cases in which a party alleged that it was not bound to the offered terms because an unauthorized party agreed …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
In this survey, we discuss electronic contracting cases decided between July 1, 2007 and June 30, 2008. In addition to cases adding to the literature on the enforceability of online contracts, this survey includes cases discussing modification of online contracts, incorporation by reference, and unconscionability. We conclude that our common law is developing nicely to address the issues presented by internet contracting.
States, Markets, And Gatekeepers: Public-Private Regulatory Regimes In An Era Of Economic Globalization, Christopher M. Bruner
States, Markets, And Gatekeepers: Public-Private Regulatory Regimes In An Era Of Economic Globalization, Christopher M. Bruner
Michigan Journal of International Law
This Article illuminates the spectrum of international economic regimes through discussion of an under-theorized regulatory structure in which traditional distinctions between State and market, public and private power, hard and soft law, and international and domestic policy realms, essentially collapse-the "public-private gatekeeper."
Electronic Surveillance At The Virtual Border, Susan Freiwald
Electronic Surveillance At The Virtual Border, Susan Freiwald
Susan Freiwald
A virtual border divides people into two groups: those subject to the Fourth Amendment’s protections when the U.S. government conducts surveillance of their communications and those who are not. The distinction derives from a separation in powers: inside the virtual border, U.S. citizens and others enjoy the extensive oversight of the judiciary of executive branch surveillance. Judges review such surveillance before, during, and after it transpires. Foreign persons subject to surveillance in foreign countries fall within the executive branch’s’ foreign affairs function. However, the virtual border does not exactly match the physical border of the United States. Some people inside …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.
Cyberspace As/And Space, Julie E. Cohen
Cyberspace As/And Space, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
The appropriate role of place- and space-based metaphors for the Internet and its constituent nodes and networks is hotly contested. This essay seeks to provoke critical reflection on the implications of place- and space-based theories of cyberspace for the ongoing production of networked space more generally. It argues, first, that adherents of the cyberspace metaphor have been insufficiently sensitive to the ways in which theories of cyberspace as space themselves function as acts of social construction. Specifically, the leading theories all have deployed the metaphoric construct of cyberspace to situate cyberspace, explicitly or implicitly, as separate space. This denies all …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.
Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck
Trademark Law And The Social Construction Of Trust: Creating The Legal Framework For On-Line Identity, Beth Simone Noveck
Articles & Chapters
Trust is the foundation of society for without trust, we cannot cooperate. Trust, in turn, depends upon secure, reliable, and persistent identity. Cyberspace is thought to challenge our ability to build trust because the medium undermines the connection between online pseudonym and offline identity. We have no assurances of who stands behind an online avatar; it may be one person, it may be more, it may be a computer. The legal debate to date has focused exclusively on the question of how to maintain real world identity in cyberspace. But new "social software" technology that enables communities from eBay to …
Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy
Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy
San Diego International Law Journal
The debate over whether cyberspace can or should be regulated is essentially dead. This is the conclusion being taught in law schools today. The battle between Judge Frank Easterbrook and Professor Lawrence Lessig over "laws" and "horses", infamous among cyberspace legal scholars, became irrelevant when geographically-based governments began regulating Internet related activities. However, debate over how the Internet should be regulated continues. One way of framing this debate is in terms of deciding how to regulate behavior in cyberspace. Professor Lessig postulated four kinds of constraints regulate behavior: (1) social norms, (2) markets, (3) law, and (4) architecture. This comment …
Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald
Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald
Susan Freiwald
This Article explores those features of electronic surveillance that have made it challenging to regulate effectively. In balancing interests, lawmakers must create a workable law for an exceedingly complex topic, rein in law enforcement agents without crippling them, and draw a line between prohibited and permitted conduct despite society's ambivalence about surveillance. This Article demonstrates that lawmakers met those challenges when they regulated traditional wiretapping, but they have failed to meet them in the online context. It argues that the law should extend the significant restrictions on wiretapping to online surveillance, just as judges did in the case of video …
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Faculty Publications
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald
Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald
Susan Freiwald
Almost every day brings reports that Congress is considering new cyberspace-targeted laws and the courts are deciding novel cyberspace legal questions. These developments lend urgency to the question of whether a particular cyberspace legal change should come through operation of new statutes, judicial decisions, or the free market. If we can develop sophisticated analytical methods to evaluate institutional competence in cyberspace, we can vastly improve the development of cyberspace law and public policy.
Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation promotes just such an approach. By describing and extending a recently proposed model of comparative …
Zoning Speech On The Internet: A Legal And Technical Model, Lawrence Lessig, Paul Resnick
Zoning Speech On The Internet: A Legal And Technical Model, Lawrence Lessig, Paul Resnick
Michigan Law Review
Speech, it is said, divides into three sorts - (1) speech that everyone has a right to (political speech, speech about public affairs); (2) speech that no one has a right to (obscene speech, child porn); and (3) speech that some have a right to but others do not (in the United States, Ginsberg speech, or speech that is "harmful to minors," to which adults have a right but kids do not). Speech-protective regimes, on this view, are those where category (1) speech predominates; speech-repressive regimes are those where categories (2) and (3) prevail. This divide has meaning for speech …
Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson
Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson
Ira Steven Nathenson
This Article addresses 'spamdexing,' namely, the practice of stuffing invisible keywords into webpages in order to try to get more favorable listings with search engines. For instance, some website owners will stuff the trademarks of competitors into a webpage’s code, particularly by using 'meta tags,' indexing keywords that can be hidden in a webpage’s source code. Although meta tags are not typically viewed by users, the code can be read by search engines, with the result that webpages may be improperly boosted in search engine rankings. Such practices can confuse the public and have also spurred trademark lawsuits. But the …