Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,708 Full-Text Articles 3,048 Authors 2,021,503 Downloads 130 Institutions

All Articles in Communications Law

Faceted Search

3,708 full-text articles. Page 52 of 71.

La Industria Del Libro 3.0 Y J.K. Rowling, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq. 2012 Selected Works

La Industria Del Libro 3.0 Y J.K. Rowling, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.

Rodolfo C. Rivas

The authors provide a brief overview of what could be called the 3.0 version of the book industry. Under the 3.0 book industry, the author’s role in exploiting their creations has to embrace new and creative business models, which may often come into conflict with publisher’s old business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others. ///////////////////////////////////////////////////////////////////////////////////////////////////// Los autores proporcionan una breve descripción de lo que podría llamarse la versión 3.0 de la industria del libro. En la industria del libro 3.0, …


Antitrust And The 'Filed Rate' Doctrine: Deregulation And State Action, Herbert J. Hovenkamp 2012 University of Pennsylvania Carey Law School

Antitrust And The 'Filed Rate' Doctrine: Deregulation And State Action, Herbert J. Hovenkamp

All Faculty Scholarship

In its Keogh decision the Supreme Court held that although the Interstate Commerce Act did not exempt railroads from antitrust liability, a private plaintiff may not recover treble damages based on an allegedly monopolistic tariff rate filed with a federal agency. Keogh very likely grew out of Justice Brandeis's own zeal for regulation and his concern for the protection of small business — in this case, mainly shippers whom he felt were protected from discrimination by filed rates. The Supreme Court's Square D decision later conceded that Keogh may have been “unwise as a matter of policy,” but reaffirmed it …


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman 2012 National University of singapore

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


The Evolving Internet: Patterns In Usage And Pricing, Daniel Lyons 2012 Boston College

The Evolving Internet: Patterns In Usage And Pricing, Daniel Lyons

Daniel Lyons

No abstract provided.


Podcast, Usage-Based Pricing In Broadband, Daniel Lyons 2012 Boston College

Podcast, Usage-Based Pricing In Broadband, Daniel Lyons

Daniel Lyons

No abstract provided.


Changing Places: A New Role For Creators In The Digital World, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq. 2012 Selected Works

Changing Places: A New Role For Creators In The Digital World, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.

Rodolfo C. Rivas

The authors provide a brief overview of the author’s role in exploiting their creations and how new technologies have made authors and publishers explore new business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others./////////////////////////////////////////////////// Los autores proporcionan una breve descripción de la función del autor en la explotación de sus creaciones y cómo las nuevas tecnologías han obligado a los autores y editores explorar nuevos modelos de negocio. En el artículo, los autores echan un vistazo a los modelos de negocio innovadores …


Telecommunications: Communications Law Reform, Jonathan Baker, Robert McDowell, Ajit Pai, Daniel Crane, Maureen Ohlhausen, Jennifer Elrod 2012 Federal Communications Commission

Telecommunications: Communications Law Reform, Jonathan Baker, Robert Mcdowell, Ajit Pai, Daniel Crane, Maureen Ohlhausen, Jennifer Elrod

Presentations

The transcript was published on 2013 Journal of Law, Technology & Policy University of Illinois Issue 1.


"You May Have Already Won. . .": Telemarketing Fraud And The Need For A Federal Legislative Solution , Patrick E. Michela 2012 Pepperdine University

"You May Have Already Won. . .": Telemarketing Fraud And The Need For A Federal Legislative Solution , Patrick E. Michela

Pepperdine Law Review

No abstract provided.


Information Escrows, Ian Ayres, Cait Unkovic 2012 Yale Law School

Information Escrows, Ian Ayres, Cait Unkovic

Michigan Law Review

A variety of information escrows - including allegation escrows, suspicion escrows, and shared-interest escrows - hold the promise of reducing the first-mover disadvantage that can deter people with socially valuable private information from disclosing that information to others. Information escrows allow people to transmit sensitive information to a trusted intermediary, an escrow agent, who only forwards the information under prespecified conditions. For example, an allegation escrow for sexual harassment might allow a victim to place a private complaint into escrow with instructions that the complaint be lodged with the proper authorities only if the escrow agent receives at least one …


Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq. 2012 Selected Works

Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq.

Rodolfo C. Rivas

The author analyzes and describes the necessary elements of a successful social media and Internet corporate policy; through citing common pitfalls and learning lessons from different jurisdictions across the world. The author then offers general guidelines on policies for Mexican enterprises under Mexican legislation.///////////////////////////////////////////////////////////////////////////////////////El autor analiza y describe los elementos necesarios de una política corporativa sobre internet y redes sociales exitosa, citando los errores más comunes y aprendiendo lecciones de las legislaciones de distintos países.


The Fourth Estate And The Third Level: Turner Broadcasting System, Inc. V. Federal Communications Commission—Cable Television And Intermediate Scrutiny, R. Stuart Phillips 2012 Pepperdine University

The Fourth Estate And The Third Level: Turner Broadcasting System, Inc. V. Federal Communications Commission—Cable Television And Intermediate Scrutiny, R. Stuart Phillips

Pepperdine Law Review

No abstract provided.


Televised Political Debates And Arkansas Educational Television Commission V. Forbes: Excluding The Public From Public Broadcasting, Joshua Dale 2012 Pepperdine University

Televised Political Debates And Arkansas Educational Television Commission V. Forbes: Excluding The Public From Public Broadcasting, Joshua Dale

Pepperdine Law Review

No abstract provided.


Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel 2012 Pepperdine University

Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel

Pepperdine Law Review

No abstract provided.


Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino 2012 The University of Western Ontario

Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino

FIMS Presentations

No abstract provided.


A Case Study On Burying Alive Of Two Women In Balochistan, Sohail Ahmed Ansari Advocate 2012 City School of Law, Balochistan, Pakistan

A Case Study On Burying Alive Of Two Women In Balochistan, Sohail Ahmed Ansari Advocate

Sohail Ahmed Ansari Advocate

Violence against women is present in a variety of forms in Pakistan. From domestic abuse & sexual harassment to child marriages and honour killing; a range of anti-women atrocities are carried out. Pakistani women face systematic discrimination from the day they are born. The patriarchal mindset of society refuses to recognize them as human beings deserving of equality, human rights and justice. Unfortunately in some parts of Balochistan a brutal custom of justice prevails; where the women are treated as trading objects. They are being tried without hearing their cause. They are not allowed to plea their case. They are …


Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp 2012 University of Pennsylvania Carey Law School

Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp

All Faculty Scholarship

Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.

FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …


Can You Hear Me Now? Cell Phone Jamming And The Tenth Amendment, Thomas L. Chittum, III 2012 University of Nevada, Las Vegas -- William S. Boyd School of Law

Can You Hear Me Now? Cell Phone Jamming And The Tenth Amendment, Thomas L. Chittum, Iii

Nevada Law Journal

No abstract provided.


Applying Crawford's Confrontation Right In A Digital Age, Jeffrey Bellin 2012 William & Mary Law School

Applying Crawford's Confrontation Right In A Digital Age, Jeffrey Bellin

Faculty Publications

No abstract provided.


Public Forum 2.1: Public Higher Education Institutions And Social Media, Robert H. Jerry II, Lyrissa Barnett Lidsky 2012 University of Florida Levin College of Law

Public Forum 2.1: Public Higher Education Institutions And Social Media, Robert H. Jerry Ii, Lyrissa Barnett Lidsky

UF Law Faculty Publications

Like most of us, public colleges and universities increasingly are communicating via Facebook, Second Life, YouTube, Twitter and other social media. Unlike most of us, public colleges and universities are government actors, and their social media communications present complex administrative and First Amendment challenges. The authors of this article — one the dean of a major public university law school responsible for directing its social media strategies, the other a scholar of social media and the First Amendment — have combined their expertise to help public university officials address these challenges. To that end, this article first examines current and …


Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru 2012 University of Michigan Law School

Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru

Michigan Law Review

Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …


Digital Commons powered by bepress