Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,081 Full-Text Articles 3,297 Authors 2,186,894 Downloads 128 Institutions

All Articles in Internet Law

Faceted Search

4,081 full-text articles. Page 1 of 104.

Behavioral Finance, Decumulation And The Regulatory Strategy For Robo-Advice, Tom Baker, Benedict Dellaert 2018 University of Pennsylvania Law School

Behavioral Finance, Decumulation And The Regulatory Strategy For Robo-Advice, Tom Baker, Benedict Dellaert

Faculty Scholarship

This working paper surveys the decumulation services offered by investment robo-advisors as a case study with which to examine regulatory and market structure issues raised by automated financial advice. We provide a short introduction to decumulation, describing some of the uncertainties involved in identifying optimal decumulation strategies and sketching a few of the ‘rules of thumb’ that financial advisors have developed in this area in the face of this uncertainty. Next we describe behavioral effects that could inhibit consumers from following an optimal decumulation strategy, concluding that, left to their own devices, consumers are likely to make sub-optimal decumulation decisions ...


A Slap On The Wrist: Combatting Russia’S Cyber Attack On The 2016 U.S. Presidential Election, Christina Lam 2018 Boston College Law School

A Slap On The Wrist: Combatting Russia’S Cyber Attack On The 2016 U.S. Presidential Election, Christina Lam

Boston College Law Review

On June 14, 2016, suspicions emerged that Russia launched a cyber attack on the U.S. Democratic National Committee in the midst of an extremely contentious presidential election season. The damage was extensive, occurring over a series of months and resulting in numerous leaks of highly sensitive information regarding Democratic Presidential Candidate Hillary Clinton. After it was verified that Russia was behind the cyber attack, President Barack Obama relied on general and anachronistic principles of international law to issue a grossly ineffective response. Russia’s cyber attack and the U.S. response thus highlighted the ways in which international law ...


A Peek Over The Great Firewall: A Breakdown Of China’S New Cybersecurity Law, Jacob Quinn 2018 Southern Methodist University

A Peek Over The Great Firewall: A Breakdown Of China’S New Cybersecurity Law, Jacob Quinn

Science and Technology Law Review

No abstract provided.


Combatting Fake News: Alternatives To Limiting Social Media Misinformation And Rehabilitating Quality Journalism, Dallas Flick 2018 Southern Methodist University

Combatting Fake News: Alternatives To Limiting Social Media Misinformation And Rehabilitating Quality Journalism, Dallas Flick

Science and Technology Law Review

No abstract provided.


Front Matter, 2018 Southern Methodist University

Front Matter

Science and Technology Law Review

No abstract provided.


Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen 2018 St. Mary's University School of Law

Hearsay In The Smiley Face: Analyzing The Use Of Emojis As Evidence, Erin Janssen

St. Mary's Law Journal

Abstract forthcoming


Rise Of The Intelligent Information Brokers: Role Of Computational Law Applications In Administering The Dynamic Cybersecurity Threat Surface In Iot, Eran Kahana 2018 University of Minnesota Law School

Rise Of The Intelligent Information Brokers: Role Of Computational Law Applications In Administering The Dynamic Cybersecurity Threat Surface In Iot, Eran Kahana

Minnesota Journal of Law, Science & Technology

No abstract provided.


Emerging Technologies Challenging Current Legal Paradigms, W. Keith Robinson 2018 Southern Methodist University Dedman School of Law

Emerging Technologies Challenging Current Legal Paradigms, W. Keith Robinson

Minnesota Journal of Law, Science & Technology

No abstract provided.


Out Of Thin Air: Trade Secrets, Cybersecurity, And The Wrongful Acquisition Tort, Sharon Sandeen 2018 Mitchell Hamline School of Law

Out Of Thin Air: Trade Secrets, Cybersecurity, And The Wrongful Acquisition Tort, Sharon Sandeen

Minnesota Journal of Law, Science & Technology

No abstract provided.


Securing The Internet Of Healthcare, Scott J. Shackelford, Michael Mattioli, Steve Myers, Austin Brady 2018 Indiana University Maurer School of Law

Securing The Internet Of Healthcare, Scott J. Shackelford, Michael Mattioli, Steve Myers, Austin Brady

Minnesota Journal of Law, Science & Technology

No abstract provided.


Rewriting The "Book Of The Machine": Regulatory And Liability Issues For The Internet Of Things, Jane Kirtley, Scott Memmel 2018 University of Minnesota Law School

Rewriting The "Book Of The Machine": Regulatory And Liability Issues For The Internet Of Things, Jane Kirtley, Scott Memmel

Minnesota Journal of Law, Science & Technology

No abstract provided.


Biotechnology's Great Divide: Strengthening The Relationship Between Patent Law And Bioethics In The Age Of Crispr-Cas9, Hannah M. Mosby 2018 University of Minnesota Law School

Biotechnology's Great Divide: Strengthening The Relationship Between Patent Law And Bioethics In The Age Of Crispr-Cas9, Hannah M. Mosby

Minnesota Journal of Law, Science & Technology

No abstract provided.


Governing Behind The Cloud: Is Transparency Too "Burdensome" In The Digital Age?, Sam Louwagie 2018 University of Minnesota Law School

Governing Behind The Cloud: Is Transparency Too "Burdensome" In The Digital Age?, Sam Louwagie

Minnesota Journal of Law, Science & Technology

No abstract provided.


No Good Deed Goes Unpunished: The Duties Held By Malware Researchers, Penetration Testers, And "White Hat" Hackers, Jon Watkins 2018 University of Minnesota Law School

No Good Deed Goes Unpunished: The Duties Held By Malware Researchers, Penetration Testers, And "White Hat" Hackers, Jon Watkins

Minnesota Journal of Law, Science & Technology

No abstract provided.


Search Query: Can America Accept A Right To Be Forgotten As A Publicity Right?, James J. Lavelle 2018 Brooklyn Law School

Search Query: Can America Accept A Right To Be Forgotten As A Publicity Right?, James J. Lavelle

Brooklyn Law Review

Search engines have profoundly changed the relationship between privacy and free speech by making personal information widely and cheaply available to a global audience. This has raised many concerns both over how online companies handle the information they collect and how regular citizens use online services to invade other people’s privacy. One way Europe has addressed this change is by providing European Union citizens with a right to petition search engines to deindex links from search results—a so-called “right to be forgotten.” If the information contained in a search result is “inadequate, irrelevant or no longer relevant,” the ...


Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman 2018 Brooklyn Law School

Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman

Brooklyn Journal of Corporate, Financial & Commercial Law

The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact ...


The Naked Truth: Insufficient Coverage For Revenge Porn Victims At State Law And The Proposed Federal Legislation To Adequately Redress Them, Meghan Fay 2018 Boston College Law School

The Naked Truth: Insufficient Coverage For Revenge Porn Victims At State Law And The Proposed Federal Legislation To Adequately Redress Them, Meghan Fay

Boston College Law Review

The distribution of revenge porn is a cyber-bullying phenomenon that has proliferated on the Internet. The nonconsensual sharing of sexually explicit photographs and videos causes irreparable harm to revenge porn victims. The current state of the law, however, does little to redress the damage. Tort claims are often unsuccessful because many victims do not have the resources necessary to initiate a lawsuit. Furthermore, federal law grants operators of revenge porn websites immunity from state tort claims. In an effort to fill this gap in the law, many states have made changes or additions to their criminal statutes. To date, thirty-eight ...


Digital Expungement, Eldar Haber 2018 University of Maryland Francis King Carey School of Law

Digital Expungement, Eldar Haber

Maryland Law Review

No abstract provided.


A Statistical Analysis Of Privacy Policy Design, Ari E. Waldman 2018 New York Law School

A Statistical Analysis Of Privacy Policy Design, Ari E. Waldman

Notre Dame Law Review Online

This Essay takes a further step in a developing research agenda on the design of privacy policies. As described in more detail in Part II, I created an online survey in which respondents were asked to choose one of two websites that would better protect their privacy given images of segments of their privacy policies. Some of the questions paired notices with, on the one hand, privacy protective practices displayed in difficult-to-read designs, and, on the other hand, invasive data use practices displayed in graphical, aesthetically pleasing ways. Many survey respondents seemed to make their privacy decisions based on design ...


The Battlefield Of Tomorrow, Today: Can A Cyberattack Ever Rise To An “Act Of War?”, Christopher M. Sanders 2018 SJ Quinney College of Law, University of Utah

The Battlefield Of Tomorrow, Today: Can A Cyberattack Ever Rise To An “Act Of War?”, Christopher M. Sanders

Utah Law Review

In a sense, war has not changed. The end results will always remain the same: death and destruction; even if that destruction is not fully tangible. The results may be instantaneous, or they may be delayed. It is only the means implemented to achieve these destructive ends that evolve. Cyberwarfare is a product of that evolution. Most importantly, we must always remain abreast of evolution and the changes in warfare in order to effectively and efficiently respond to new attacks, and to prevent them as well.

This Note sheds light on recent evolution in warfare. It enlightens the reader of ...


Digital Commons powered by bepress