La Industria Del Libro 3.0 Y J.K. Rowling, 2012 Selected Works
La Industria Del Libro 3.0 Y J.K. Rowling, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.
Rodolfo C. Rivas
The authors provide a brief overview of what could be called the 3.0 version of the book industry. Under the 3.0 book industry, the author’s role in exploiting their creations has to embrace new and creative business models, which may often come into conflict with publisher’s old business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others. ///////////////////////////////////////////////////////////////////////////////////////////////////// Los autores proporcionan una breve descripción de lo que podría llamarse la versión 3.0 de la industria del libro. En la industria del libro 3.0, …
Antitrust And The 'Filed Rate' Doctrine: Deregulation And State Action, 2012 University of Pennsylvania Carey Law School
Antitrust And The 'Filed Rate' Doctrine: Deregulation And State Action, Herbert J. Hovenkamp
All Faculty Scholarship
In its Keogh decision the Supreme Court held that although the Interstate Commerce Act did not exempt railroads from antitrust liability, a private plaintiff may not recover treble damages based on an allegedly monopolistic tariff rate filed with a federal agency. Keogh very likely grew out of Justice Brandeis's own zeal for regulation and his concern for the protection of small business — in this case, mainly shippers whom he felt were protected from discrimination by filed rates. The Supreme Court's Square D decision later conceded that Keogh may have been “unwise as a matter of policy,” but reaffirmed it …
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, 2012 National University of singapore
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
Simon Chesterman
This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …
The Evolving Internet: Patterns In Usage And Pricing, 2012 Boston College
The Evolving Internet: Patterns In Usage And Pricing, Daniel Lyons
Daniel Lyons
No abstract provided.
Podcast, Usage-Based Pricing In Broadband, 2012 Boston College
Podcast, Usage-Based Pricing In Broadband, Daniel Lyons
Daniel Lyons
No abstract provided.
Changing Places: A New Role For Creators In The Digital World, 2012 Selected Works
Changing Places: A New Role For Creators In The Digital World, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.
Rodolfo C. Rivas
The authors provide a brief overview of the author’s role in exploiting their creations and how new technologies have made authors and publishers explore new business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others./////////////////////////////////////////////////// Los autores proporcionan una breve descripción de la función del autor en la explotación de sus creaciones y cómo las nuevas tecnologías han obligado a los autores y editores explorar nuevos modelos de negocio. En el artículo, los autores echan un vistazo a los modelos de negocio innovadores …
Telecommunications: Communications Law Reform, 2012 Federal Communications Commission
Telecommunications: Communications Law Reform, Jonathan Baker, Robert Mcdowell, Ajit Pai, Daniel Crane, Maureen Ohlhausen, Jennifer Elrod
Presentations
The transcript was published on 2013 Journal of Law, Technology & Policy University of Illinois Issue 1.
"You May Have Already Won. . .": Telemarketing Fraud And The Need For A Federal Legislative Solution , 2012 Pepperdine University
"You May Have Already Won. . .": Telemarketing Fraud And The Need For A Federal Legislative Solution , Patrick E. Michela
Pepperdine Law Review
No abstract provided.
Information Escrows, 2012 Yale Law School
Information Escrows, Ian Ayres, Cait Unkovic
Michigan Law Review
A variety of information escrows - including allegation escrows, suspicion escrows, and shared-interest escrows - hold the promise of reducing the first-mover disadvantage that can deter people with socially valuable private information from disclosing that information to others. Information escrows allow people to transmit sensitive information to a trusted intermediary, an escrow agent, who only forwards the information under prespecified conditions. For example, an allegation escrow for sexual harassment might allow a victim to place a private complaint into escrow with instructions that the complaint be lodged with the proper authorities only if the escrow agent receives at least one …
Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, 2012 Selected Works
Implementación De Políticas Corporativas Sobre Internet Y Redes Sociales En México, Rodolfo C. Rivas Rea Esq.
Rodolfo C. Rivas
The author analyzes and describes the necessary elements of a successful social media and Internet corporate policy; through citing common pitfalls and learning lessons from different jurisdictions across the world. The author then offers general guidelines on policies for Mexican enterprises under Mexican legislation.///////////////////////////////////////////////////////////////////////////////////////El autor analiza y describe los elementos necesarios de una política corporativa sobre internet y redes sociales exitosa, citando los errores más comunes y aprendiendo lecciones de las legislaciones de distintos países.
The Fourth Estate And The Third Level: Turner Broadcasting System, Inc. V. Federal Communications Commission—Cable Television And Intermediate Scrutiny, 2012 Pepperdine University
The Fourth Estate And The Third Level: Turner Broadcasting System, Inc. V. Federal Communications Commission—Cable Television And Intermediate Scrutiny, R. Stuart Phillips
Pepperdine Law Review
No abstract provided.
Televised Political Debates And Arkansas Educational Television Commission V. Forbes: Excluding The Public From Public Broadcasting, 2012 Pepperdine University
Televised Political Debates And Arkansas Educational Television Commission V. Forbes: Excluding The Public From Public Broadcasting, Joshua Dale
Pepperdine Law Review
No abstract provided.
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , 2012 Pepperdine University
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Pepperdine Law Review
No abstract provided.
Who's In Charge Here? Information Privacy In A Social Networking World, 2012 The University of Western Ontario
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
FIMS Presentations
No abstract provided.
A Case Study On Burying Alive Of Two Women In Balochistan, 2012 City School of Law, Balochistan, Pakistan
A Case Study On Burying Alive Of Two Women In Balochistan, Sohail Ahmed Ansari Advocate
Sohail Ahmed Ansari Advocate
Violence against women is present in a variety of forms in Pakistan. From domestic abuse & sexual harassment to child marriages and honour killing; a range of anti-women atrocities are carried out. Pakistani women face systematic discrimination from the day they are born. The patriarchal mindset of society refuses to recognize them as human beings deserving of equality, human rights and justice. Unfortunately in some parts of Balochistan a brutal custom of justice prevails; where the women are treated as trading objects. They are being tried without hearing their cause. They are not allowed to plea their case. They are …
Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, 2012 University of Pennsylvania Carey Law School
Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp
All Faculty Scholarship
Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.
FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …
Can You Hear Me Now? Cell Phone Jamming And The Tenth Amendment, 2012 University of Nevada, Las Vegas -- William S. Boyd School of Law
Can You Hear Me Now? Cell Phone Jamming And The Tenth Amendment, Thomas L. Chittum, Iii
Nevada Law Journal
No abstract provided.
Applying Crawford's Confrontation Right In A Digital Age, 2012 William & Mary Law School
Applying Crawford's Confrontation Right In A Digital Age, Jeffrey Bellin
Faculty Publications
No abstract provided.
Public Forum 2.1: Public Higher Education Institutions And Social Media, 2012 University of Florida Levin College of Law
Public Forum 2.1: Public Higher Education Institutions And Social Media, Robert H. Jerry Ii, Lyrissa Barnett Lidsky
UF Law Faculty Publications
Like most of us, public colleges and universities increasingly are communicating via Facebook, Second Life, YouTube, Twitter and other social media. Unlike most of us, public colleges and universities are government actors, and their social media communications present complex administrative and First Amendment challenges. The authors of this article — one the dean of a major public university law school responsible for directing its social media strategies, the other a scholar of social media and the First Amendment — have combined their expertise to help public university officials address these challenges. To that end, this article first examines current and …
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, 2012 University of Michigan Law School
Limits Of The Federal Wiretap Act's Ability To Protect Against Wi-Fi Sniffing, Mani Potnuru
Michigan Law Review
Adoption of Wi-Fi wireless technology continues to see explosive growth. However many users still operate their home Wi-Fi networks in unsecured mode or use publicly available unsecured Wi-Fi networks, thus exposing their communications to the dangers of "packet sniffing," a technique used for eavesdropping on a network. Some have argued that communications over unsecured Wi-Fi networks are "readily accessible to the general public" and that such communications are therefore excluded from the broad protections of the Federal Wiretap Act against intentional interception of electronic communications. This Note examines the Federal Wiretap Act and argues that the current Act's treatment of …