Children Of Internet Era: A Critical Analysis Of Vulnerability Of Children In The Darker Sides Of Social Media And Whatsapp, 2015 NLSIU, Bangalore, Karnataka, India
Children Of Internet Era: A Critical Analysis Of Vulnerability Of Children In The Darker Sides Of Social Media And Whatsapp, Debarati Halder Dr.
Information communication technology has been made an essential part of school curriculums in India today. As per the guidelines of the, National Policy on Information and Communication technology (ICT) in school education, children must be taught the positive usage of the internet, the computer technology and digital communication technology. But internet is a double edged weapon: if it is used positively, it may yield positive results, if it is used negatively, it can create large scale devastation. It has been seen that children are often misusing the information communication technology. In the present age, children are growing up seeing their ...
Economic Growth And Breakthrough Innovations – The Semiconductor Chip Industry And Its Ip Law Framework, 2015 University of Münster (Germany)
Economic Growth And Breakthrough Innovations – The Semiconductor Chip Industry And Its Ip Law Framework, Thomas Hoeren
Semiconductors constitute the backbone of the digital society. But the history of this innovation is as well controversial as the development of IP protection for semiconductors. The author describes the different economic trends in the US and Japan behind semiconductors and explains the reasons why the sui generis protection for chips didn´t work.
Aaron's Law: Reactionary Legislation In The Guise Of Justice, 2015 University of Massachusetts School of Law
Aaron's Law: Reactionary Legislation In The Guise Of Justice, Matthew Aaron Viana
University of Massachusetts Law Review
This Note argues that the proposed amendment to the Computer Fraud and Abuse Act dubbed “Aaron’s Law,” created in the wake of the prosecution and subsequent suicide of hacktivist Aaron Swartz, should not be enacted as it is overly reactionary legislation which would have unfortunate and unjust repercussions in the realm of civil litigation. This Note first describes the circumstances under which Mr. Swartz found himself prosecuted under the Computer Fraud and Abuse Act, namely his intrusion into, and downloading massive amounts of data from, large internet databases like PACER and JSTOR. This Note also explores the disputed interpretation ...
Information Technology And The Law - Trademarks In Cyberspace, Macerata 2015, 2015 Lund University, Faculty of Law
Information Technology And The Law - Trademarks In Cyberspace, Macerata 2015, Ulf Maunsbach
No abstract provided.
, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, 2015 Atlanta's John Marshall Law School
, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta
Jeffrey A. Van Detta
This article discusses the disruptive change in American (and trans-national) legal education that the convergence of technology and economics is bringing to legal education. It posits, and then defends, the following assertion about "law schools of the future":
“Law schools will no longer be ‘places’ in the sense of a single faculty located on a physical campus. In the future, law schools will consist of an array of technologies and instructional techniques brought to bear, in convergence, on particular educational needs and problems.”
This paper elaborates on that prediction, discussing the ways in which technology will positively impact legal education ...
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, 2015 University of Illinois at Chicago
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that ...
The "Uberization" Of Healthcare: The Forthcoming Legal Storm Over Mobile Health Technology's Impact On The Medical Profession, 2015 University of Georgia School of Law
The "Uberization" Of Healthcare: The Forthcoming Legal Storm Over Mobile Health Technology's Impact On The Medical Profession, Fazal Khan
The nascent field of mobile health technology is still very small but is predicted to grow exponentially as major technology companies such as Apple, Google, Samsung, and even Facebook have announced mobile health initiatives alongside influential healthcare provider networks. Given the highly regulated nature of healthcare, significant legal barriers stand in the way of mobile health’s potential ascension. I contend that the most difficult legal challenges facing this industry will be restrictive professional licensing and scope of practice laws. The primary reason is that mobile health threatens to disrupt historical power dynamics within the healthcare profession that have legally ...
Toward A "Digital Transfer Doctrine"? The First Sale Doctrine In The Digital Era, 2015 Northwestern University School of Law
Toward A "Digital Transfer Doctrine"? The First Sale Doctrine In The Digital Era, Sarah Reis
Northwestern University Law Review
The first sale doctrine in copyright law allows a person who owns a copy of a copyrighted work to sell, lend, or give away the copy to someone else. An owner of a copy of a copyrighted work can take advantage of the first sale doctrine, but a licensee cannot. In today’s digital environment, people are increasingly purchasing digital music files and e-books instead of CDs and physical books. Customers often mistakenly believe they become owners of the digital content they purchase when in actuality they merely become licensees most of the time. Licensing agreements impose use restrictions on ...
Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively
Jesse D Lively
This Comment argues that the Supreme Court of Virginia should first reverse the Virginia Court of Appeal’s decision when it hears the Yelp case later this year. Secondly, the court hold that the Virginia statute for identifying persons communicating anonymously over the Internet violates the First Amendment's required showing of merit on both law and facts before a subpoena duces tecum to identify an anonymous speaker can be enforced. Lastly, it should adopt a new “unveiling standard” similar to the standards used in either Dendrite or Cahill. Part II examines the jurisprudential history of identifying anonymous Internet speakers ...
Installation Failure: How The Predominant Purpose Test Has Perpetuated Software’S Uncertain Legal Status Under The Uniform Commercial Code, 2015 University of Michigan Law School
Installation Failure: How The Predominant Purpose Test Has Perpetuated Software’S Uncertain Legal Status Under The Uniform Commercial Code, Spencer Gottlieb
Michigan Law Review
Courts have struggled to uniformly classify software as a good or a service and have consequently failed to apply a consistent body of law in that domain. Instead, courts have relied on the predominant purpose test to determine whether the Uniform Commercial Code (“UCC”) or common law should apply to a given software contract. This test, designed for traditional goods and services that do not share software’s complexity or rapid advancement, has perpetuated the uncertainty surrounding software’s legal status. This Note proposes that courts adopt the substantial software test as an alternative to the predominant purpose test. Under ...
Cybersecurity: What About U.S. Policy?, 2015 Entrepreneur & Professional Corporate Director
Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman
Lawrence J. Trautman Sr.
During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more ...
Information Technology And The Law - An Overview Of Issues, 2015 Lund University, Faculty of Law
Information Technology And The Law - An Overview Of Issues, Ulf Maunsbach
No abstract provided.
Youtube Marketing: Legality Of Sponsorship And Endorsement In Advertising, 2015 University of San Diego
Youtube Marketing: Legality Of Sponsorship And Endorsement In Advertising, Katrina Wu
YouTube endorsement marketing, sometimes referred to as native advertising, is a form of marketing where advertisements are seamlessly incorporated into the video content unlike traditional commercials. The paper categorizes YouTube endorsement marketing into three forms: (1) direct sponsorship where the content creator partners with the sponsor to create videos, (2) affiliated links where the content creator gets a commission resulting from purchases attributable to the content creator, and (3) free product sampling where products are sent to content creators for free to be featured in a video. Examples in each of the three forms of YouTube marketing can be observed ...
Net Neutrality - Computer Law, 2015 Barry University
Net Neutrality - Computer Law, Matthew Charles Quattrochi
Matthew Charles Quattrochi
The overall purpose of this work is to discuss the current state of net neutrality. Given Federal Communication Commission (“FCC”) Chairman Tom Wheeler’s most recent proposal to pass net neutrality into law, net neutrality is ripe for discussion.The court ruling striking down the infrastructure of the Open Internet Order in Verizon v. F.C.C., and the devaluation of Title I regulatory authority exhibited in the decision made in Comcast Corp. v. F.C.C. bring about an appropriate point to stop and reflect concerning the options the FCC has to instill net neutrality regulation.Part II of ...
Intersection Of “Tokku” Special Zone, Robots, And The Law: A Case Study On Legal Impacts To Humanoid Robots, Yueh-Hsuan Weng, Yusuke Sugahara, Kenji Hashimoto, Atsuo Takanishi
The unique “Tokku” Special Zone for Robotics Empirical Testing and Development (RT special zone) originated in Japan. Since 2003, the world’s first RT special zone had already established in Fukuoka Prefecture, Fukuoka City and Kitakyushu City. At that time, Takanishi Laboratory, Humanoid Robotics Institute of Waseda University had conducted many empirical testing within several different spots of the special zone to evaluate the feasibility for bipedal humanoid robots on public roads from 2004 to 2007. It is also known as the world’s first public roads testing for bipedal robots. The history of RT special zone is merely 10 ...
Peer-To-Peer File Sharing As User Rights Activism, 2015 University of Western Ontario
Peer-To-Peer File Sharing As User Rights Activism, Michael A. Gunn
Western Journal of Legal Studies
The pre-digital marketplace is no longer sustainable. With the imposition of digital rights management restrictions on the distribution of media, the Internet cannot promote intellectual freedom. Peer-to-peer file sharing technology helps expose the work of artists and authors to a much wider audience than previously possible. This provides an opportunity for more sales and a greater number of successful artists and authors. Yet corporate copyright owners continue to propagate the “piracy” label to discredit the idea of open access channels. This paper argues that as information professionals, librarians are in a position to promote policy change that revolutionizes the political ...
Comment With The Copyright Office Regarding A Proposed Exemption Under 17 U.S.C. Section 1201 For Software Security Research (Class 25), Candice Hoke
Law Faculty Reports and Comments
Professor Candice Hoke, Cleveland State University, and others (Douglas W. Jones, University of Iowa; Professor Deirdre Mulligan, University of California, Berkeley; Professor Vern Paxson, University of California, Berkeley;Professor Pamela Samuelson, University of California, Berkeley; Bruce Schneier Erik Stallman, Center for Democracy & Technology (CDT); comment addressing Proposed Class 25: Software Security Research and an exemption for software security research in order to promote the active research and testing efforts necessary to keep pace with evolving cybersecurity risks. Software and related access controls are increasingly embedded in a wide range of systems, from consumer goods to medical devices to infrastructure to industrial equipment ...
Proactive Cybersecurity: A Comparative Industry And Regulatory Analysis, 2015 Indiana University - Bloomington
Proactive Cybersecurity: A Comparative Industry And Regulatory Analysis, Scott J. Shackelford, Amanda Craig, Janine Hiller
This Article analyzes recent business realities and regulatory trends shaping the proactive cybersecurity industry. To provide a framework for our discussion, we begin by describing the historical development of the industry and how it has been shaped by the applicable law in the United States and other G8 nations. We then catalogue the proactive cybersecurity practices of more than twenty companies, focusing on four case studies that we consider in the context of polycentric “global security assemblages.” Finally, we assess the emergence of proactive cybersecurity norms, both within industry and international law, and consider the implications of this movement on ...
How To Maneuver In The World Of Negative Online Reviews, The Important Ethical Considerations For Attorneys, And Changes Needed To Protect The Legal Profession, Angela Goodrum
No abstract provided.
Balance And Team Production, 2015 Seattle University School of Law
Balance And Team Production, Kelli A. Alces
Seattle University Law Review
For decades, those holding the shareholder primacy view that the purpose of a corporation is to earn a profit for its shareholders have been debating with those who believe that corporations exist to serve broader societal interests. Adolph Berle and Merrick Dodd began the conversation over eighty years ago, and it continues today, with voices at various places along a spectrum of possible corporate purposes participating. Unfortunately, over time, the various sides of the debate have begun to talk past each other rather than engage with each other and have lost sight of whatever common ground they may be able ...