Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3998 Full-Text Articles 3130 Authors 1811991 Downloads 102 Institutions

All Articles in Internet Law

Faceted Search

3998 full-text articles. Page 1 of 103.

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung HUI, Seung Hyun KIM, QIU-HONG WANG 2017 Singapore Management University

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang

Research Collection School Of Information Systems

In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by ...


Can Sharing Be Taxed?, Diane M. Ring, Shu-Yi Oei 2017 Boston College Law School

Can Sharing Be Taxed?, Diane M. Ring, Shu-Yi Oei

Diane M. Ring

In the past few years, we have seen the rise of a new model of production and consumption of goods and services, often referred to as the “sharing economy.” Fueled by startups such as Uber and Airbnb, sharing enables individuals to obtain rides, accommodations, and other goods and services from peers via personal computer or mobile application in exchange for payment. The rise of sharing has raised questions about how it should be regulated, including whether existing laws and regulations can and should be enforced in this new sector or whether new ones are needed.

In this Article, we explore ...


The Tax Lives Of Uber Drivers: Evidence From Online Forums, Diane M. Ring, Shu-Yi Oei 2017 Boston College Law School

The Tax Lives Of Uber Drivers: Evidence From Online Forums, Diane M. Ring, Shu-Yi Oei

Diane M. Ring

In this Article, we investigate the tax issues and challenges facing Uber and Lyft drivers by studying their online interactions in three internet discussion forums: Reddit.com, Uberpeople.net, and Intuit TurboTax AnswerXchange. Using descriptive statistics and content analysis, we examine (1) the substantive tax concerns facing forum participants, (2) how taxes affect their driving and profitability decisions, and (3) the degree of user sophistication, accuracy of legal advising, and other cultural features of the forums. We find that while forum participants displayed generally accurate understandings of tax filing and income inclusion obligations, their approaches to expenses and deductions were ...


Proposed Arbitration Ban Would Be Bad Law And Bad Policy, Daniel A. Lyons 2017 Boston College Law School

Proposed Arbitration Ban Would Be Bad Law And Bad Policy, Daniel A. Lyons

Daniel Lyons

No abstract provided.


Net Neutrality’S Path To The Supreme Court: Chevron And The “Major Questions” Exception, Daniel A. Lyons 2017 Boston College Law School

Net Neutrality’S Path To The Supreme Court: Chevron And The “Major Questions” Exception, Daniel A. Lyons

Daniel Lyons

No abstract provided.


How Should Courts Consider Agency Remarks During The Comment Period?, Daniel A. Lyons 2017 Boston College Law School

How Should Courts Consider Agency Remarks During The Comment Period?, Daniel A. Lyons

Daniel Lyons

No abstract provided.


Investment Treaties Are About Justice, Frank J. Garcia 2017 Boston College Law School

Investment Treaties Are About Justice, Frank J. Garcia

Frank J. Garcia

This Perspective argues that investment law is ripe for a paradigm shift away from pure capital protection. Rather, investment law should be recognized as part of a comprehensive global economic governance system for ensuring justice and the rule of law, in this case in the allocation of investment capital.


Websites As Facilities Under Ada Title Iii, Ryan C. Brunner 2017 Duke Law

Websites As Facilities Under Ada Title Iii, Ryan C. Brunner

Duke Law & Technology Review

Title III of the Americans with Disabilities Act requires public accommodations—private entities that offer goods or services to the public—to be accessible to individuals with disabilities. There is an ongoing debate about whether Title III applies to websites that offer services to the public, but this debate may be resolved in the coming years by litigation or Department of Justice regulations. Assuming for the sake of argument that Title III will eventually be applied to websites, the next inquiry is what that application should look like. The regulatory definition of “facilities” should be amended to include nonphysical places ...


Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael 2017 DePaul University College of Law

Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael

Dignity: A Journal on Sexual Exploitation and Violence

No abstract provided.


Schools, Speech, And Smartphones: Online Speech And The Evolution Of The Tinker Standard, Aleaha Jones 2017 Duke Law

Schools, Speech, And Smartphones: Online Speech And The Evolution Of The Tinker Standard, Aleaha Jones

Duke Law & Technology Review

Under the Supreme Court’s holding in Tinker v. Des Moines Independent Community School District, public schools may only restrict student speech where the speech is reasonably forecasted to cause a “substantial and material disruption.” With online forums calling into question who may control speech and forecast its impact, the circuit courts have granted public schools broad authority to monitor, and punish, their students for online activity that occurs off-campus. The Supreme Court recently declined the opportunity to reverse this disturbing trend by denying certiorari for Bell v. Itawamba County. As a result, questions remain unanswered regarding students’ right to ...


Enjoying Your "Free" App? The First Circuit's Approach To An Outdated Law In Yershov V. Gannett Satellite Information Network, Inc., Wendy Beylik 2017 Boston College Law School

Enjoying Your "Free" App? The First Circuit's Approach To An Outdated Law In Yershov V. Gannett Satellite Information Network, Inc., Wendy Beylik

Boston College Law Review

On April 29, 2016, in Yershov v. Gannett Satellite Information Network, Inc. (“Yershov II”), the U.S. Court of Appeals for the First Circuit held that the Video Privacy Protection Act (“VPPA”) of 1988 extended to a free application provider who disclosed its users’ GPS coordinates, phone identification numbers, and video histories to a data analytics company. In a similar case, the U.S. Court of Appeals for the Eleventh Circuit held that the VPPA did not apply because the relationship was too weak to render the user a “subscriber” under the Act. The U.S. Court of Appeals for ...


Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies 2017 Roger Williams University School of Law

Newsroom: Cybersecurity: Obama's Conflicted Legacy 02-17-2017, Peter Margulies

Life of the Law School (1993- )

No abstract provided.


Too Much Information!: The Need For Stronger Privacy Protection For The Online Activities Of Employees And Applicants, Ralph Carter 2017 St. John's University School of Law

Too Much Information!: The Need For Stronger Privacy Protection For The Online Activities Of Employees And Applicants, Ralph Carter

Journal of Civil Rights and Economic Development

No abstract provided.


Standing In The Future: The Case For A Substantial Risk Theory Of "Injury-In-Fact" In Consumer Data Breach Class Actions, Nicholas Green 2017 Boston College Law School

Standing In The Future: The Case For A Substantial Risk Theory Of "Injury-In-Fact" In Consumer Data Breach Class Actions, Nicholas Green

Boston College Law Review

The increasing digitalization of our personal and professional lives has generated corresponding growth in the amount of electronically stored private information in the hands of third parties. That private information is at risk of theft, loss, or manipulation. Employers that hold employee tax information and merchants that hold significant troves of consumer credit card data are particularly attractive targets. When hackers strike, victims often band together in federal class actions, naming the custodians of their private data as defendants. More and more, however, district courts are dismissing these class action claims at the doorstep for lack of Article III standing ...


Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell 2017 Georgetown University Law Center

Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell

Georgetown Law Faculty Publications and Other Works

This article describes major changes in how video content and advertising is delivered to consumers. Digital technologies such as broadband allow consumers to stream or download programming. Smart phones and tablets allow consumers to view screen content virtually anywhere at any time. Advertising has become personalized and integrated with other content.

Despite these major changes in the media markets, the framework for regulating advertising to children has not changed very much since the 1990s. This article argues that the existing regulatory framework must be reinvented to protect children in the digital age. It uses Google’s recently introduced YouTube Kids ...


Against Data Exceptionalism, Andrew Keane Woods 2017 University of Kentucky, College of Law

Against Data Exceptionalism, Andrew Keane Woods

Andrew Keane Woods

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions ...


Scientists & Librarians Turn To “End Of Presidential Term” Web Archive To Safeguard Climate Change Data, Alyssa S. Rosen 2017 Elisabeth Haub School of Law at Pace University

Scientists & Librarians Turn To “End Of Presidential Term” Web Archive To Safeguard Climate Change Data, Alyssa S. Rosen

Pace Law Faculty Publications

In anticipation of president-elect Donald Trump’s taking office, scientists have been working round the clock to safeguard federal government climate change data. Many academics and librarians share the concern that federal .gov climate data and information, for example from the EPA and NOAA websites, will be lost or become unavailable with the transition to the new administration. Fact is, a large percentage of information on federal government servers, including digital federal records, reports, and research, is not protected by any law or agency mandate, and can vanish within days of the arrival of a new president.


Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton 2017 Laton & Strain LLC

Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton

Catholic University Journal of Law and Technology

This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing ...


Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland 2017 U.S. Department of Homeland Security

Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland

Catholic University Journal of Law and Technology

No abstract provided.


Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti 2017 Holland & Knight LLP

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.


Digital Commons powered by bepress