Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4088 Full-Text Articles 3233 Authors 2133273 Downloads 116 Institutions

All Articles in Internet Law

Faceted Search

4088 full-text articles. Page 6 of 106.

Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin 2017 Catholic University of America (Student)

Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin

Catholic University Journal of Law and Technology

No abstract provided.


Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti 2017 Holland & Knight LLP

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.


Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton 2017 Laton & Strain LLC

Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton

Catholic University Journal of Law and Technology

This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing ...


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney 2017 John Marshall Law School

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney

Keidra Chaney

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an ...


Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. McKenna 2017 Penn State Law

Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna

Anne T. McKenna

No abstract provided.


Algorithms, Expression And The Charter: A Way Forward For Canadian Courts, Veenu Goswami 2017 University of Toronto, Faculty of Law

Algorithms, Expression And The Charter: A Way Forward For Canadian Courts, Veenu Goswami

Western Journal of Legal Studies

As a result of rapid advances in technology and computer programming, algorithms are increasingly able to generate expressive material. In light of these advances, it is inevitable that courts will be asked to determine whether this algorithmically generated content is protected expression under section 2(b) of the Canadian Charter of Rights and Freedoms. Although algorithmically generated content can serve many of the same constitutionally-protected purposes as human expression, this paper explains why the Supreme Court of Canada’s current framework is inadequate for use in the context of algorithmically generated content. This paper offers a proactive and principled solution ...


The Right To Attention, Jasper L. Tran 2017 George Mason University

The Right To Attention, Jasper L. Tran

Jasper L. Tran

What marketing, contracts, and healthcare—specifically informed consent and mandatory ultrasounds—have in common is the right to attention from the information receiver. However, scholarship most often focuses on the communicator’s perspective (e.g., how much information the communicator discloses) or on the information itself, but surprisingly, not much on the receiver’s perspective. This dearth of scholarship from the information receiver’s perspective is problematic, because the information receiver is often the “little guy” in the conversation. We own and are entitled to our attention because attention is a property right and part of our individual dignity. Yet ...


Compulsory Corporate Cyber-Liability Insurance: Outsourcing Data Privacy Regulation To Prevent And Mitigate Data Breaches, Minhquang N. Trang 2017 University of Minnesota Law School

Compulsory Corporate Cyber-Liability Insurance: Outsourcing Data Privacy Regulation To Prevent And Mitigate Data Breaches, Minhquang N. Trang

Minnesota Journal of Law, Science & Technology

No abstract provided.


Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh 2017 American University Washington College of Law

Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh

American University Law Review

No abstract provided.


Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick 2017 Berkman Klein Center for Internet & Society at Harvard University

Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick

All Faculty Scholarship

This Article examines the matrix of vulnerabilities that low-income people face as a result of the collection and aggregation of big data and the application of predictive analytics. On one hand, big data systems could reverse growing economic inequality by expanding access to opportunities for low-income people. On the other hand, big data could widen economic gaps by making it possible to prey on low-income people or to exclude them from opportunities due to biases entrenched in algorithmic decision-making tools. New kinds of “networked privacy” harms, in which users are simultaneously held liable for their own behavior and the actions ...


Contributory Liability Under The Acpa: A More Effective Approach To Deterring Cybersquatting At Its Source, Andrew J. Piombino 2017 Roger Williams University

Contributory Liability Under The Acpa: A More Effective Approach To Deterring Cybersquatting At Its Source, Andrew J. Piombino

Roger Williams University Law Review

No abstract provided.


Consumer-Iot: Where Every Thing Collides Promoting Consumer Internet Of Things Protection In Australia., Kate Mathews-Hunt 2017 Bond University

Consumer-Iot: Where Every Thing Collides Promoting Consumer Internet Of Things Protection In Australia., Kate Mathews-Hunt

Theses

The ‘smart’(ly) disruptive world of the consumer internet of things (CIOT) is here. Australian consumers are poised to live in ‘smart’ homes, monitor their ‘smart’ selves and ride in ever- ‘smart’er cars, while smart(er) cities, transport and industrial IOT brilliance changes their world, and the world around them, irretrievably. This thesis both celebrates and exposes this radical, impending CIOT-driven disruption in all its consumer-abusive, privacy-intrusive glory. It posits that consumers and regulators do not yet understand the adverse implications of this new panopticon technology which surveys everything and blurs traditional understandings of human autonomy and privacy, nor ...


Territorialization Of The Internet Domain Name System, Marketa Trimble 2017 University of Nevada, Las Vegas -- William S. Boyd School of Law

Territorialization Of The Internet Domain Name System, Marketa Trimble

Scholarly Works

A territorialization of the internet – the linking of the internet to physical geography – is a growing trend. Internet users have become accustomed to the conveniences of localized advertising, have enjoyed location-based services, and have witnessed an increasing use of geolocation and geoblocking tools by service and content providers who – for various reasons – either allow or block access to internet content based on users’ physical locations. This article analyzes whether, and if so how, the territorialization trend has affected the internet Domain Name System (“DNS”). As a hallmark of cyberspace governance that aimed to be detached from the territoriallypartitioned governance of ...


Blocking Ad Blockers, 16 J. Marshall Rev. Intell. Prop. L. 272 (2017), Tyler Barbacovi 2017 John Marshall Law School

Blocking Ad Blockers, 16 J. Marshall Rev. Intell. Prop. L. 272 (2017), Tyler Barbacovi

The John Marshall Review of Intellectual Property Law

The prevalence of ad blocking software (software that prevents the loading of web based advertisements) is a growing problem for website owners and content creators who rely on advertising revenue to earn money. While the number of ad block users continues to increase, there has thus far been no significant legal challenge to ad blocking in the United States. This comment examines how a website owner, through a combination of technological improvements and the anti-circumvention provisions of the Digital Millennium Copyright Act, could successfully raise a legal challenge against the purveyors of ad blocking software.


Commercial Creations: The Role Of End User License Agreements In Controlling The Exploitation Of User Generated Content, 16 J. Marshall Rev. Intell. Prop. L. 382 (2017), Neha Ahuja 2017 John Marshall Law School

Commercial Creations: The Role Of End User License Agreements In Controlling The Exploitation Of User Generated Content, 16 J. Marshall Rev. Intell. Prop. L. 382 (2017), Neha Ahuja

The John Marshall Review of Intellectual Property Law

This article considers the current licensing regime used to control the exploitation of copyright protected works within the online interactive entertainment sector—particularly virtual worlds including multiplayer online games—to further author new copyrightable works. This article aims to identify the gaps that have arisen on account of the nature of these subsequently authored works and the potential for their exploitation under the said licensing regime. Users and the proprietors of virtual worlds often end up in conflict over the monetization and commercialization of user generated content on account of contradictory yet overlapping rights created by copyright law when controlled ...


Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll 2017 Georgetown University Law Center

Making News: Balancing Newsworthiness And Privacy In The Age Of Algorithms, Erin C. Carroll

Georgetown Law Faculty Publications and Other Works

In deciding privacy lawsuits against media defendants, courts have for decades deferred to the media. They have given it wide berth to determine what is newsworthy and so, what is protected under the First Amendment. And in doing so, they have often spoken reverently of the editorial process and journalistic decision-making.

Yet, in just the last several years, news production and consumption has changed dramatically. As we get more of our news from digital and social media sites, the role of information gatekeeper is shifting from journalists to computer engineers, programmers, and app designers. The algorithms that the latter write ...


Sharenting: Children's Privacy In The Age Of Social Media, Stacey B. Steinberg 2017 University of Florida Levin College of Law

Sharenting: Children's Privacy In The Age Of Social Media, Stacey B. Steinberg

UF Law Faculty Publications

Through sharenting, or online sharing about parenting, parents now shape their children’s digital identity long before these young people open their first email. The disclosures parents make online are sure to follow their children into adulthood. Indeed, social media and blogging have dramatically changed the landscape facing today’s children as they come of age.

Children have an interest in privacy. Yet a parent’s right to control the upbringing of his or her children and a parent’s right to free speech may trump this interest. When parents share information about their children online, they do so without ...


Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou 2017 American University Washington College of Law

Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou

American University National Security Law Brief

No abstract provided.


Disruptive Platforms, Margot Kaminski 2017 University of Colorado Law School

Disruptive Platforms, Margot Kaminski

Articles

No abstract provided.


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski 2017 University of Colorado Law School

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Articles

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis ...


Digital Commons powered by bepress