Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Social and Behavioral Sciences

Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik Nov 2005

Bloggers Beware: The Five Commandments For Bloggers, Warren B. Chik

Research Collection Yong Pung How School Of Law

There is a need for Singapore bloggers to be aware of legal issues arising from their online diaries, particularly in the light of the recent cases involving seditious remarks made online by bloggers that resulted in jail terms and fines; and earlier in the year, a dispute arose over allegedly defamatory speeches made by a blogger about A*STAR’s Chairman, Philip Yeo, which was resolved amicably, but not without an apology. The threats of legal repercussions in the form of civil lawsuits and criminal charges serve as reminders of the potential legal problems that can arise from blogging, and indeed from …


Buggy Whips And Broadcast Flags: The Need For A New Politics Of Expression, Garrett Levin Oct 2005

Buggy Whips And Broadcast Flags: The Need For A New Politics Of Expression, Garrett Levin

Duke Law & Technology Review

In response to growing fears from the entertainment industry over online file-sharing of valuable content, the Federal Communications Commission ("FCC") enacted sweeping regulations over the production of electronic devices in the name of protecting digital television broadcasts. Although the FCC's "broadcast flag" regulation was struck down on jurisdictional grounds, Hollywood has not given up the push for strict control. If Hollywood successfully acquires broadcast flag protection there could be far-reaching implications for innovation and development of new digital technologies. While content providers have important reasons to protect copyrighted material, there is too much at stake to merely acquiesce to their …


Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler Oct 2005

Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler

ExpressO

The Digital Age has spawned major legal battles over the fundamental principles of intellectual property law and antitrust law. These diverse struggles can best be analyzed using the basic norm of "value added" from neo-classical normative economics. This analysis suggests that current intellectual property doctirnes provide excessive protection and current antitrust doctrines remain awkward in dealing with the cross-market leveraging of monopoly power in the presence of "natural monopolies" created by network effects.


Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler Sep 2005

Digital Wars -- Legal Battles And Economic Bottlenecks In The Digital Information Industries, Curt A. Hessler

ExpressO

The Digital Revolution has created the apparent anomaly that information, though very cheap to create and near costless to share, is managed by industries that are increasingly concentrated and roiled by endless legal warfare. This paper surveys the major legal battles by subjecting all of them to the familiar norm of "maximizing economic value added", as defined by neo-classical "welfare economics". The various legal wars are traced to defects and confusions in current legal approaches to intellectual property (the "property wars") and to antitrust doctrines (the "monopoly wars").


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik Sep 2005

Proposed Anti-Spam Legislation Model In Singapore - Are We Losing The War Before Even Starting The Battle?, Warren B. Chik

Research Collection Yong Pung How School Of Law

Unsolicited messages have grown into an intractable parasite on the underbelly of an otherwise effectual and vibrant electronic communications regime. There has been a sudden surge in the enactment of anti-spam laws globally within the last couple of years. On 25 May 2004, the Infocomm Development Authority of Singapore and the Attorney-General’s Chambers of Singapore jointly released a Consultation Paper on a Proposed Legislative Framework for the Control of E-mail Spam in Singapore. It is timely to consider the proposed anti-spam legislation model for Singapore in the light of such existing laws in other countries and their levels of effectiveness …


Sharing Potential And The Potential For Sharing: Open Source Licensing As A Legal And Economic Modality For The Dissemination Of Renewable Energy Technology, Jason Wiener May 2005

Sharing Potential And The Potential For Sharing: Open Source Licensing As A Legal And Economic Modality For The Dissemination Of Renewable Energy Technology, Jason Wiener

ExpressO

No abstract provided.


A Model For Emergency Service Of Voip Through Certification And Labeling, Patrick S. Ryan, Tom Lookabaugh, Douglas Sicker May 2005

A Model For Emergency Service Of Voip Through Certification And Labeling, Patrick S. Ryan, Tom Lookabaugh, Douglas Sicker

ExpressO

Voice over Internet Protocol (VoIP) will transform many aspects of traditional telephony service, including the technology, the business models, and the regulatory constructs that govern such service. Perhaps not unexpectedly, this transformation is generating a host of technical, business, social, and policy problems. In attempting to respond to these problems, the Federal Communications Commission (FCC) could mandate obligations or specific solutions to VoIP policy issues; however, it is instead looking first to industry initiatives focused on the key functionality that users have come to expect of telecommunications services. High among this list of desired functionality is user access to emergency …


What Makes Asset Securitization "Inefficient"?, Kenji Yamazaki May 2005

What Makes Asset Securitization "Inefficient"?, Kenji Yamazaki

ExpressO

Despite the damage caused by the recent Enron scandal , the asset securitization market has been vibrant and has become a popular financing alternative . A number of academics emphasize its merits and suggest that it is a more favorable way of financing, and Congress’s proposal to make sales of asset in securitization immune from characterization as secured transactions under the Bankruptcy Reform Act of 2001 (the “Reform Act”) almost materialized when the Enron scandal hit the scene. Conversely, there have been accusations that securitization is not a legitimate way of financing because, for example, it fosters fraudulent transactions.

Why …


Regulating Indecency: The Federal Communication Commission’S Threat To The First Amendment, Reed Hundt May 2005

Regulating Indecency: The Federal Communication Commission’S Threat To The First Amendment, Reed Hundt

Duke Law & Technology Review

This paper is adapted from a talk given by the author at Duke University School of Law on April 6, 2005. The author argues that the Federal Communication Commission's recent crackdown on television indecency poses a significant threat to First Amendment protections by (1) limiting television viewers' freedom of choice and (2) implying the possibility of punishment for failure to cooperate with the political objectives of the governing party.


An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann Apr 2005

An Economic Theory Of Infrastructure And Commons Management, Brett M. Frischmann

ExpressO

In this article, Professor Frischmann combines a number of current debates across many disciplinary lines, all of which examine from different perspectives whether certain resources should be managed through a regime of private property or through a regime of open access. Frischmann develops and applies a theory that demonstrates there are strong economic arguments for managing and sustaining openly accessible infrastructure. The approach he takes differs from conventional analyses in that he focuses extensively on demand-side considerations and fully explores how infrastructure resources generate value for consumers and society. As a result, the theory brings into focus the social value …


Keeping Score: The Struggle For Music Copyright, Michael W. Carroll Feb 2005

Keeping Score: The Struggle For Music Copyright, Michael W. Carroll

ExpressO

Inspired by the passionate contemporary debates about music copyright, this Article investigates how, when, and why music first came within copyright's domain. Although music publishers and recording companies are among the most aggressive advocates for strong copyright protection today, when copyright law was first invented in eighteenth-century England, music publishers resisted its extension to music. This Article sheds light on a series of early legal disputes concerning printed music that yield important insights into original understandings of copyright law and music's role in society. By focusing attention on this understudied episode, this Article demonstrates that the concept of copyright was …


Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow Jan 2005

Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow

Law Faculty Scholarship

This Essay suggests possible explanations for why there is not very much legal scholarship devoted to gender issues on the Internet; and it asserts that there is a powerful need for Internet legal theorists and activists to pay substantially more attention to the gender-based differences in communicative style and substance that have been imported from real space to cyberspace. Information portals, such as libraries and web logs, are "gendered" in ways that may not be facially apparent. Women are creating and experiencing social solidarity online in ways that male scholars and commentators do not seem to either recognize or deem …


On The Regulation Of Networks As Complex Systems: A Graph Theory Approach, Daniel F. Spulber, Christopher S. Yoo Jan 2005

On The Regulation Of Networks As Complex Systems: A Graph Theory Approach, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

The dominant approach to regulating communications networks treats each network component as if it existed in isolation. In so doing, the current approach fails to capture one of the essential characteristics of networks, which is the complex manner in which components interact with one another when combined into an integrated system. In this Essay, Professors Daniel Spulber and Christopher Yoo propose a new regulatory framework based on the discipline of mathematics known as graph theory, which better captures the extent to which networks represent complex systems. They then apply the insights provided by this framework to a number of current …


Solving The Digital Piracy Puzzle: Disaggregating Fair Use From The Dmca's Anti-Device Provisions, Jacqueline D. Lipton Jan 2005

Solving The Digital Piracy Puzzle: Disaggregating Fair Use From The Dmca's Anti-Device Provisions, Jacqueline D. Lipton

Articles

Copyright law has always involved balancing creative pursuits against innovations in copying, distribution and, more recently, encryption technologies. A significant problem for copyright law is that many such technologies can be utilized for both socially useful and socially harmful purposes. It is difficult to regulate such technologies in a way that prevents social harms while at the same time facilitating social benefits. The most recent example of this dynamic is evident in the 2005 United States Supreme Court decision in MGM v Grokster - dealing with digital file-sharing technologies. This article draws from the file sharing debate in considering another …


Online Defamation: A Case Study In Competing Rights, Julie Dare Jan 2005

Online Defamation: A Case Study In Competing Rights, Julie Dare

Theses : Honours

As a consequence of the dominant role the United States has played in its development, the Internet has become synonymous with a liberal interpretation of freedom of expression, heavily imbued with First Amendment free speech principles. This has resulted in an environment that supports an adversarial, aggressive style of interaction; an environment which has become a "defamation prone zone" (Edwards, 1997). However, resolving online defamation disputes is problematic, particularly in cross-jurisdictional cases involving defendants based in the United States. Incongruities in the balance of free speech and reputation between the United States and most other countries, as expressed through defamation …


Architectural Censorship And The Fcc, Christopher S. Yoo Jan 2005

Architectural Censorship And The Fcc, Christopher S. Yoo

All Faculty Scholarship

Most First Amendment analyses of U.S. media policy have focused predominantly on “behavioral” regulation, which either prohibits the transmission of disfavored content (such as indecent programming) or mandates the dissemination of preferred content (such as children’s educational programming and political speech). In so doing, commentators have largely overlooked how program content is also affected by “structural” regulation, which focuses primarily on increasing the economic competitiveness of media industries. In this Article, Professor Christopher Yoo employs economic analysis to demonstrate how structural regulation can constitute a form of “architectural censorship” that has the unintended consequence of reducing the quantity, quality, and …


Beyond Network Neutrality, Christopher S. Yoo Jan 2005

Beyond Network Neutrality, Christopher S. Yoo

All Faculty Scholarship

In this Article, Professor Yoo takes issue with the emerging scholarly consensus in favor of ""network neutrality,"" which would prohibit network owners from employing proprietary protocols or entering into exclusivity agreements with content providers that would reduce the transparency of the Internet. Economic theory suggests that network neutrality advocates are focusing on the wrong policy problem. Rather than directing attention on the market for Internet content and applications, the segments of the industry that are the most competitive and the most likely to remain that way, communications policy would be better served if the focus were placed on the segment …


Rewriting Fair Use And The Future Of Copyright Reform, Michael J. Madison Jan 2005

Rewriting Fair Use And The Future Of Copyright Reform, Michael J. Madison

Articles

This Essay describes a social practices approach to the production of creative expression, as a construct to guide reform of copyright law. Specifically, it reimagines copyright's fair use doctrine by basing its statutory text explicitly on social practices. It argues that the social practices approach is consistent with the historical development of the fair use doctrine and with the policy goals of copyright law, and that the approach should be recognized in the text of the statute as well as in judicial applications of fair use.


Tattoos On Our Digital Skin: Anonymity, Privacy, And Accountability In Cyberspace, Sam Grey Dec 2004

Tattoos On Our Digital Skin: Anonymity, Privacy, And Accountability In Cyberspace, Sam Grey

Sam Grey

While it may be oddly flattering that Chapters, Amazon or HMV knew you would like the new Johnny Cash compilation album, you may be less than thrilled to discover that they also knew about your prescription drug addiction, your crabs, your bankruptcy, or your having skipped out on the rent one month back in 1993. When you add the possibility of your favourite e-retailer sharing your personal information- for a profit- to the frank probability of their having known it in the first place, what you initially found flattering may begin to appear more offensive and ominous. Simply put, there …