Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4090 Full-Text Articles 3242 Authors 2133273 Downloads 116 Institutions

All Articles in Internet Law

Faceted Search

4090 full-text articles. Page 1 of 106.

Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden 2017 The University of Akron

Unmasking The Teen Cyberbully: A First Amendment-Compliant Approach To Protecting Child Victims Of Anonymous, School-Related Internet Harassment, Benjamin A. Holden

Akron Law Review

In proposing a new rule under the First Amendment to adjudicate anonymous Cyberbullying cases, this Article first reviews and summarizes the First Amendment precedents governing regulation of speech by minors and student speech in the school environment. Second, it reviews and discusses the prevalence of minors’ online harassment or Cyberbullying, including pre-litigation disputes reported in the press. Third, it reviews and summarizes the First Amendment precedents governing the “unmasking” of anonymous speakers. Finally, the Cyberbully Unmasking Test is proposed and applied.


Rethinking Ucita: Lessons From The Open Source Movement, Matthew D. Stein 2017 University of Maine School of Law

Rethinking Ucita: Lessons From The Open Source Movement, Matthew D. Stein

Maine Law Review

For those within the information technology (IT) industry, the phrase “open source” has been as prominent at water cooler and boardroom discussions over the last several years as the phrase “out source.” Open source is at once a software development model, a business model, a social movement, and a philosophy that has recently garnered attention from outside of the IT sphere. As such, the topic has become increasingly fertile ground for academic scholarship from several disciplines. Economists, legal academics and practitioners, computer engineers, and social commentators have offered their varying perspectives on open source software. Whether or not this attention ...


New Wine, Old Wineskins: Emerging Issues In Internet-Based Personal Jurisdiction, Jeffrey Hunter Moon, Esq. 2017 St. John's University School of Law

New Wine, Old Wineskins: Emerging Issues In Internet-Based Personal Jurisdiction, Jeffrey Hunter Moon, Esq.

The Catholic Lawyer

No abstract provided.


You Can Run But You Can't Hide: Cell Phone Tracking Data Do Not Receive Fourth Amendment Protection, Merissa Sabol 2017 Southern Methodist University

You Can Run But You Can't Hide: Cell Phone Tracking Data Do Not Receive Fourth Amendment Protection, Merissa Sabol

Science and Technology Law Review

No abstract provided.


Vmg Salsoul, L.L.C. V. Ciccone: The Ninth Circuit Strikes A Pose, Applying The De Minimis Exception To Music Sampling, Jacob Quinn 2017 Southern Methodist University

Vmg Salsoul, L.L.C. V. Ciccone: The Ninth Circuit Strikes A Pose, Applying The De Minimis Exception To Music Sampling, Jacob Quinn

Science and Technology Law Review

No abstract provided.


Is Your Roommate A Felon? Considering The Effect Of Criminalizing Password Sharing In Nosal Ii, London Ryyanen England 2017 Southern Methodist University

Is Your Roommate A Felon? Considering The Effect Of Criminalizing Password Sharing In Nosal Ii, London Ryyanen England

Science and Technology Law Review

No abstract provided.


Lost Esi Under The Federal Rules Of Civil Procedure, Jeffrey A. Parness 2017 Northern Illinois University College of Law

Lost Esi Under The Federal Rules Of Civil Procedure, Jeffrey A. Parness

Science and Technology Law Review

Current Issue

Volume 20, Number 1 – The Privacy, Probability, and Political Pitfalls of Universal DNA Collection

Meghan J. Ryan 20 SMU Sci. & Tech. L. Rev. 3 Watson and Crick’s discovery of the structure of DNA (deoxyribonucleic acid) in 1953 launched a truth-finding mission not only in science but also in the law. Just thirty years later–after the science had evolved–DNA evidence was being introduced in criminal courts. Today, DNA evidence is heavily relied on in criminal and related cases. It is routinely introduced in murder and rape cases as evidence of guilt; DNA databases have grown as even arrestees have been required to surrender DNA samples; and this evidence has been used to exonerate hundreds of convicted individuals. DNA evidence is generally revered as the “gold standard” in criminal cases because, unlike eyewitness testimony, bite-mark evidence, hair analysis, and the like, it is considered nearly infallible. This potency of DNA evidence has led to suggestions that we, as a nation, should magnify the power of DNA by increasing the size ...


The Wisdom Of Universal Dna Collection: A Reply To Professor Meghan J. Ryan, Arnold Loewy 2017 Texas Tech University School of Law

The Wisdom Of Universal Dna Collection: A Reply To Professor Meghan J. Ryan, Arnold Loewy

Science and Technology Law Review

No abstract provided.


The Privacy, Probability, And Political Pitfalls Of Universal Dna Collection, Meghan J. Ryan 2017 Southern Methodist University

The Privacy, Probability, And Political Pitfalls Of Universal Dna Collection, Meghan J. Ryan

Science and Technology Law Review

Watson and Crick’s discovery of the structure of DNA (deoxyribonucleic acid) in 1953 launched a truth-finding mission not only in science but also in the law. Just thirty years later–after the science had evolved–DNA evidence was being introduced in criminal courts. Today, DNA evidence is heavily relied on in criminal and related cases. It is routinely introduced in murder and rape cases as evidence of guilt; DNA databases have grown as even arrestees have been required to surrender DNA samples; and this evidence has been used to exonerate hundreds of convicted individuals. DNA evidence is generally revered ...


Front Matter, 2017 Southern Methodist University

Front Matter

Science and Technology Law Review

No abstract provided.


“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao 2017 Fordham University School of Law

“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao

Fordham Law Review

The popularity of “esports,” also known as “electronic sports” or competitive video gaming, has exploded in recent years and captured the attention of cord-cutting millennials—often to the detriment of sports such as basketball, football, baseball, and hockey. In the United States, the commercial dominance of such traditional sports stems from decades of regulatory support. Consequently, while esports regulation is likely to emulate many aspects of traditional sports governance, the esports industry is fraught with challenges that inhibit sophisticated ownership and capital investment. Domestic regulation is complicated by underlying intellectual property ownership and ancillary considerations such as fluctuations in a ...


Reevaluating The Computer Fraud And Abuse Act: Amending The Statute To Explicitly Address The Cloud, Amanda B. Gottlieb 2017 Fordham University School of Law

Reevaluating The Computer Fraud And Abuse Act: Amending The Statute To Explicitly Address The Cloud, Amanda B. Gottlieb

Fordham Law Review

Under the current interpretations of authorization, instances where an individual harmlessly accesses the cloud data of another user could be classified as hacking and a violation of this federal statute. As such, this Note demonstrates that all of the current interpretations of the CFAA are too broad because they could result in this nonsensical outcome. This Note accordingly proposes an amendment to the CFAA specifically addressing user access to data on the cloud. Such an amendment would eliminate the unusual result of innocuous cloud-computing users being deemed hackers under federal law.


Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble 2017 Fordham University School of Law

Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble

Fordham Law Review

This Note argues that Facebook’s services—specifically the personalization of content through machine-learning algorithms—constitute the “development” of content and as such do not qualify for § 230 immunity. This Note analyzes the evolution of § 230 jurisprudence to help inform the development of a revised framework. This framework is guided by congressional and public policy goals and creates brighter lines for technological immunity. It tailors immunity to account for user data mined by ISPs and the pervasive effect that the use of that data has on users—two issues that courts have yet to confront. This Note concludes that under ...


A Critical Discourse Analysis Of The Intellectual Property Chapter Of The Tpp: Confirming What The Critics Fear, Karyn Hollis 2017 Villanova University

A Critical Discourse Analysis Of The Intellectual Property Chapter Of The Tpp: Confirming What The Critics Fear, Karyn Hollis

communication +1

A host of organizations and citizens groups have convincingly pointed out that so called “Free Trade Agreements” have done more harm than good to the U.S. and other countries involved. Thanks to their protests, for the moment, the most ambitious multinational, neoliberal project of our young century, the Trans-Pacific Partnership (TPP), has been defeated. If the agreement had been adopted, the TPP would have shaped new rules of trade for over 8 million people, spanning 40% of the global economy. Using Critical Discourse Analysis (CDA), my study shows how the complex language of the actual treaty compared to its ...


Smart Contracts: Terminology, Technical Limitations And Real World Complexity, Eliza MIK 2017 Singapore Management University

Smart Contracts: Terminology, Technical Limitations And Real World Complexity, Eliza Mik

Research Collection School Of Law

If one is to believe the popular press and many “technical writings,” blockchains create not only a perfect transactional environment but also obviate the need for banks, lawyers and courts. The latter will soon be replaced by smart contracts: unbiased and infallible computer programs that form, perform and enforce agreements. Predictions of future revolutions must, however, be distinguished from the harsh reality of the commercial marketplace and the technical limitations of blockchains. The fact that a technological solution is innovative and elegant need not imply that it is commercially useful or legally viable. Apart from attempting a terminological “clean-up” surrounding ...


The Struggle Over Webcasting--Where Is The Stream Carrying Us?, Susan A. Russell 2017 University of Oklahoma College of Law

The Struggle Over Webcasting--Where Is The Stream Carrying Us?, Susan A. Russell

Oklahoma Journal of Law and Technology

No abstract provided.


Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon 2017 University of Oklahoma College of Law

Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon

Oklahoma Journal of Law and Technology

No abstract provided.


The Safe Harbor Solution: Is It An Effective Mechanism For International Data Transfers Between The United States And The European Union, Alexander Zinser 2017 University of Oklahoma College of Law

The Safe Harbor Solution: Is It An Effective Mechanism For International Data Transfers Between The United States And The European Union, Alexander Zinser

Oklahoma Journal of Law and Technology

No abstract provided.


Balancing The Crucible: The Revolving Conflict Between Fair Use And Corporate Use In The Battle To Control Domain Names, Stacey Knapp 2017 University of Oklahoma College of Law

Balancing The Crucible: The Revolving Conflict Between Fair Use And Corporate Use In The Battle To Control Domain Names, Stacey Knapp

Oklahoma Journal of Law and Technology

No abstract provided.


Shifting The Burden To Internet Service Providers: The Validity Of Subpoena Power Under The Digital Millennium Copyright Act, Matt Sellers 2017 University of Oklahoma College of Law

Shifting The Burden To Internet Service Providers: The Validity Of Subpoena Power Under The Digital Millennium Copyright Act, Matt Sellers

Oklahoma Journal of Law and Technology

No abstract provided.


Digital Commons powered by bepress