Open Access. Powered by Scholars. Published by Universities.®

Communications Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,134 Full-Text Articles 2,512 Authors 1,048,308 Downloads 105 Institutions

All Articles in Communications Law

Faceted Search

3,134 full-text articles. Page 6 of 50.

Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble 2017 Fordham University School of Law

Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble

Fordham Law Review

This Note argues that Facebook’s services—specifically the personalization of content through machine-learning algorithms—constitute the “development” of content and as such do not qualify for § 230 immunity. This Note analyzes the evolution of § 230 jurisprudence to help inform the development of a revised framework. This framework is guided by congressional and public policy goals and creates brighter lines for technological immunity. It tailors immunity to account for user data mined by ISPs and the pervasive effect that the use of that data has on users—two issues that courts have yet to confront. This Note concludes that under ...


Terrorist Advocacy And Exceptional Circumstances, David S. Han 2017 Pepperdine University School of Law

Terrorist Advocacy And Exceptional Circumstances, David S. Han

Fordham Law Review

This Article proceeds as follows. Part I discusses the harmful effects of terrorist advocacy and outlines the present doctrinal treatment of such speech. Part II discusses the issue of exceptional circumstances and highlights the two approaches courts might take to account for them: applying strict scrutiny to the case at hand or broadly reformulating the First Amendment’s doctrinal boundaries. Part III sets forth my central thesis: courts should adhere to case-by-case strict scrutiny analysis, rather than broad doctrinal reformulation, as the initial means of accounting for exceptional circumstances with respect to terrorist advocacy. This approach reflects the vital importance ...


Entertaining Satan: Why We Tolerate Terrorist Incitement, Andrew Koppelman 2017 Northwestern University

Entertaining Satan: Why We Tolerate Terrorist Incitement, Andrew Koppelman

Fordham Law Review

Words are dangerous. That is why governments sometimes want to suppress speech. The law of free speech reflects a settled decision that, at the time that law was adopted, the dangers were worth tolerating. But people keep dreaming up nasty new things to do with speech. Recently, the Islamic State of Iraq and Syria (ISIS) and other terrorist organizations have employed a small army of Iagos on the internet to recruit new instruments of destruction. Some of what they have posted is protected speech under present First Amendment law. In response, scholars have suggested that there should be some new ...


Terror On Your Timeline: Criminalizing Terrorist Incitement On Social Media Through Doctrinal Shift, Zachary Leibowitz 2017 Fordham University School of Law

Terror On Your Timeline: Criminalizing Terrorist Incitement On Social Media Through Doctrinal Shift, Zachary Leibowitz

Fordham Law Review

The United States faces a barrage of threats from terrorist organizations on a daily basis. The government takes some steps to prevent these threats from coming to fruition, but not much is being done proactively. Any person can log into a social media account to preach hate and incite violence against the United States and its citizenry, and sometimes these words result in action. When speakers are not held accountable, they can continue to incite the masses to violent action across the United States. This Note proposes a new incitement doctrine to prevent these speakers from being able to spread ...


The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum 2017 New York University School of Law

The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum

Fordham Law Review

The panel I was assigned to, for this distinguished gathering of scholars at Fordham Law School, where I had previously been a professor for twentythree years, was given the name, “Caution Against Overreaching.” Overreaching and the caution it occasions, in this case, refer to the First Amendment, a uniquely American absolutist, legalistic obsession. For many who fixate on such matters, the government must never be allowed to trample upon the unfettered free speech rights guaranteed under America’s first, and most favorite, Amendment.


Algorithmic Jim Crow, Margaret Hu 2017 Washington and Lee University School of Law

Algorithmic Jim Crow, Margaret Hu

Fordham Law Review

This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on ...


A Critical Discourse Analysis Of The Intellectual Property Chapter Of The Tpp: Confirming What The Critics Fear, Karyn Hollis 2017 Villanova University

A Critical Discourse Analysis Of The Intellectual Property Chapter Of The Tpp: Confirming What The Critics Fear, Karyn Hollis

communication +1

A host of organizations and citizens groups have convincingly pointed out that so called “Free Trade Agreements” have done more harm than good to the U.S. and other countries involved. Thanks to their protests, for the moment, the most ambitious multinational, neoliberal project of our young century, the Trans-Pacific Partnership (TPP), has been defeated. If the agreement had been adopted, the TPP would have shaped new rules of trade for over 8 million people, spanning 40% of the global economy. Using Critical Discourse Analysis (CDA), my study shows how the complex language of the actual treaty compared to its ...


The Do-Not-Call List: Will It Survive?, Chris Kannady 2017 University of Oklahoma College of Law

The Do-Not-Call List: Will It Survive?, Chris Kannady

Oklahoma Journal of Law and Technology

No abstract provided.


Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson 2017 University of Oklahoma College of Law

Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Can Schools Use Nanotechnology To Prevent Cell Phones From Ringing, Sarah C. Boyer 2017 University of Oklahoma College of Law

Can Schools Use Nanotechnology To Prevent Cell Phones From Ringing, Sarah C. Boyer

Oklahoma Journal of Law and Technology

No abstract provided.


Toll-Free Assignment Modernization And The Triumph Of Coase, Daniel A. Lyons 2017 Boston College Law School

Toll-Free Assignment Modernization And The Triumph Of Coase, Daniel A. Lyons

Boston College Law School Faculty Papers

No abstract provided.


Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee 2017 University of Maine School of Law

Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee

Maine Law Review

Almost anyone with a smartphone can recall a time when an online advertisement followed them from webpage to webpage, or mobile browser to mobile application, or even jumped from a mobile device to a desktop web browser. While some people see it as a harmless—or even helpful—quirk of the online world, others find it creepy and intrusive. In the absence of significant government regulation of online advertising practices, particularly aggrieved individuals have sought relief in the courts by alleging violations of ill-fitting statutes drafted decades ago. This note explores just such a case, Yershov v. Gannett, in which ...


Personal Data Protection Act 2012: Understanding The Consent Obligation, Man YIP 2017 Singapore Management University

Personal Data Protection Act 2012: Understanding The Consent Obligation, Man Yip

Research Collection School Of Law

The Personal Data Protection Act 20121 (“PDPA”) provides the baseline standards of protection of personal data and works in tandem with existing law to provide comprehensive protection. The birth of the legislation clearly signals Singapore’s commitment to protect the collection, use and disclosure of personal data in the age of big data and its awareness of the importance of such protection in strengthening Singapore’s position as a leading commercial hub. Significantly, the PDPA protection model balances “both the rights of individuals to protect their personal data” against “the needs of organisations to collect, use or disclose personal data ...


Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford 2017 University of New Hampshire School of Law

Comments To The Federal Trade Commission On The Can-Spam Rule Review, 16 C.F.R. Part 316, Project No. R711010, Roger Allan Ford

Law Faculty Scholarship

These comments respond to the Federal Trade Commission’s request for public comment on the CAN-SPAM Rule, 16 C.F.R. Part 316.

The CAN-SPAM Act set a minimum baseline for consumer protections that senders of unsolicited commercial email must respect. These protections have been largely effective at giving consumers the ability to manage how a large group of companies uses their email addresses for marketing. At the same time, the Act has had little effect on the volume of unsolicited commercial email or on the amount of email sent by scammers and fraudsters. The Act and its implementing Rule ...


Mass Communication Law And Policy Research And The Values Of Free Expression, Edward L. Carter 2017 Brigham Young University - Provo

Mass Communication Law And Policy Research And The Values Of Free Expression, Edward L. Carter

All Faculty Publications

Mass communication law and policy research, including on values and theory of freedom of expression, has played an important role in Journalism & Mass Communication Quarterly for decades. Mass communication law research in Quarterly reached a high point with a special issue on the First Amendment in 1992 and numerous articles in the decade that followed. A relationship is explored between First Amendment theory and structural archetypes of constitutional argument. Future research could focus on international law and contemporary challenges involving technology, surveillance and changes in democratic citizenship.


In Re Akhbar Beirut & Al Amin, Monica Hakimi 2017 University of Michigan Law School

In Re Akhbar Beirut & Al Amin, Monica Hakimi

Articles

On August 29, 2016, the Special Tribunal for Lebanon (Tribunal) sentenced a corporate media enterprise and one of its employees for contemptuously interfering with the Tribunal's proceedings in Ayyash, a prosecution concerning the February 2005 terrorist attack that killed former Lebanese Prime Minister Rafiq Hariri. The contempt decision is significant for two reasons: (1) it adopts an expansive definition of the crime of contempt to restrict a journalist's freedom of expression; and (2) it is the first international judicial decision to hold a corporate entity criminally responsible.


Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman 2017 Shared Hope International

Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman

Dignity: A Journal on Sexual Exploitation and Violence

No abstract provided.


It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins 2017 National Center on Sexual Exploitation

It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins

Dignity: A Journal on Sexual Exploitation and Violence

No abstract provided.


The Secretary's Emails: The Intersection Of Transparency, Security, And Technology, Joshua Jacobson 2017 University of Florida Levin College of Law

The Secretary's Emails: The Intersection Of Transparency, Security, And Technology, Joshua Jacobson

Florida Law Review

Transparency laws are designed to inform the public of government workings and to hold government officials accountable to the people. The emergence of email has amplified the government’s communicative abilities and simultaneously created major challenges for records management. These challenges were put on full display when it was revealed that Hillary Clinton exclusively used a private email address and server for government business while serving as Secretary of State. The email arrangement Clinton used was permissible under the law at that time, and despite recent changes, government employees may still use private email for non-classified correspondence so long as ...


Does The Telephone Consumer Protection Act Violate Due Process As Applied?, J. Gregory Sidak 2017 University of Florida Levin College of Law

Does The Telephone Consumer Protection Act Violate Due Process As Applied?, J. Gregory Sidak

Florida Law Review

The Telephone Consumer Protection Act of 1991 (TCPA) subjects a telemarketer’s use of autodialed telephone calls, automated text messages, and faxes to statutory damages of $500 per violation or up to $1,500 per willful violation. Depending on the circumstances of the violating communication, the TCPA’s penalties can exceed by orders of magnitude any plausible economic estimate of the recipient’s actual harm, such that the TCPA, as applied, likely violates the Due Process Clause of the Fifth Amendment.


Digital Commons powered by bepress