Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,080 Full-Text Articles 3,296 Authors 2,186,894 Downloads 127 Institutions

All Articles in Internet Law

Faceted Search

4,080 full-text articles. Page 7 of 104.

E-Commerce And The Americans With Disabilities Act: Failing To Extend The Ada To The Internet In Access Now V. Southwest Airlines, Emily Short 2017 University of Oklahoma College of Law

E-Commerce And The Americans With Disabilities Act: Failing To Extend The Ada To The Internet In Access Now V. Southwest Airlines, Emily Short

Oklahoma Journal of Law and Technology

No abstract provided.


Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner 2017 University of Oklahoma College of Law

Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner

Oklahoma Journal of Law and Technology

No abstract provided.


Censorship On The Internet: Who Should Make The Rules, Joe Zopolsky 2017 University of Oklahoma College of Law

Censorship On The Internet: Who Should Make The Rules, Joe Zopolsky

Oklahoma Journal of Law and Technology

No abstract provided.


Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe 2017 University of Oklahoma College of Law

Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe

Oklahoma Journal of Law and Technology

No abstract provided.


Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington 2017 University of Oklahoma College of Law

Courthouses, Bookshelves, And Portals: The Implications Of U.S. V. American Library Association On First Amendment Forum Analysis And Future Internet-Based Litigation Strategies, Alexandra R. Harrington

Oklahoma Journal of Law and Technology

No abstract provided.


Piracy On Peer-To-Peer File Sharing Networks: Why A Streamlined Online Dispute Resolution System Should Not Be Forgotten In The Shadow Of A Federal Small Claims Tribunal, Naomi Gemmell 2017 Pepperdine University

Piracy On Peer-To-Peer File Sharing Networks: Why A Streamlined Online Dispute Resolution System Should Not Be Forgotten In The Shadow Of A Federal Small Claims Tribunal, Naomi Gemmell

Pepperdine Dispute Resolution Law Journal

This Article proposes application of an ADR system for resolving online copyright disputes related to P2P file sharing. Section II provides an overview of P2P file sharing networks and associated copyright infringement. Section III explores current approaches that fall short in resolving P2P copyright disputes, namely the Digital Millennium Copyright Act, litigation, and private agreements. Section IV examines the two primary proposed solutions to online copyright disputes: alternative dispute resolution and federal small claims. Section V recommends that a streamlined online dispute resolution system is necessary (even if a federal small claims tribunal is adopted), and concludes.


Three Chords And The Truth: Analyzing Copyright Infringement Claims Against Guitar Tablature Websites, Krist Caldwell 2017 University of Oklahoma College of Law

Three Chords And The Truth: Analyzing Copyright Infringement Claims Against Guitar Tablature Websites, Krist Caldwell

Oklahoma Journal of Law and Technology

No abstract provided.


Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson 2017 University of Oklahoma College of Law

Cyberspace…The Final Frontier: How The Communications Decency Act Allows Entrepreneurs To Boldly Go Where No Blog Has Gone Before, Aaron Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee 2017 University of Maine School of Law

Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee

Maine Law Review

Almost anyone with a smartphone can recall a time when an online advertisement followed them from webpage to webpage, or mobile browser to mobile application, or even jumped from a mobile device to a desktop web browser. While some people see it as a harmless—or even helpful—quirk of the online world, others find it creepy and intrusive. In the absence of significant government regulation of online advertising practices, particularly aggrieved individuals have sought relief in the courts by alleging violations of ill-fitting statutes drafted decades ago. This note explores just such a case, Yershov v. Gannett, in which ...


Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James 2017 Legal Informatics and Forensic Science Institute

Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James

Journal of Digital Forensics, Security and Law

When considering the possession of child exploitation material U.S. and German courts have the same focus, but slightly different interpretations. This slight difference in interpretation could mean that in one country a defendant will be found guilty of possession while in the other country he or she could be found not guilty. In this work we examine the standards courts in Germany and the United States have used to combat child pornography, and analyze the approaches specifically related to viewing and possession of CEM. A uniform solution is suggested that criminalizes “knowing access with the intention to view” as ...


Data Collection And The Regulatory State, Ahmed Ghappour 2017 Boston University School of Law

Data Collection And The Regulatory State, Ahmed Ghappour

Faculty Scholarship

The following remarks were given on January 27, 2017 during the Connecticut Law Review’s symposium, “Privacy, Security & Power: The State of Digital Surveillance.” Hillary Greene, the Zephaniah Swift Professor of Law at the University of Connecticut School of Law, offered introductory remarks and moderated the panel. The panel included Dr. Cooper, Associate Professor of Law and Director of the Program on Economics & Privacy at Antonin Scalia Law School at George Mason University, Professor Ghappour, Visiting Assistant Professor at UC Hastings College of the Law, Attorney Lieber, Senior Privacy Policy Counsel at Google, and Dr. Wu, Professor of Law and ...


The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson 2017 University of Oklahoma College of Law

The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Netflix And No Chill: The Criminal Ramification Of Password Sharing, Benjamin Kweskin 2017 University of Missouri School of Law

Netflix And No Chill: The Criminal Ramification Of Password Sharing, Benjamin Kweskin

The Business, Entrepreneurship & Tax Law Review

Password sharing is a unique issue because it requires two actors: the person who accesses the information, and the sharer. Sharing your password and logging on could easily be seen as trespassing on Netflix’s website to provide you with content you should have otherwise paid for, thus it has value. All other elements aside, the question of whether or not the sharer of information could be criminally liable remains unanswered. Under Nosal, there is strong evidence to suggest liability. It is clear that the person who accesses this information is liable, but what about the password sharer?


Print Your Own Pandora's Box: 3d Printing, Intellectual Property Law, And The Internet For Lay-Lawyers, Adam Lewental 2017 University of Missouri School of Law

Print Your Own Pandora's Box: 3d Printing, Intellectual Property Law, And The Internet For Lay-Lawyers, Adam Lewental

The Business, Entrepreneurship & Tax Law Review

This comment’s main purpose is to explore intellectual property law meant to protect against manufacturing infringement after manufacturing becomes decentralized. Part II glimpses into the applicable 3D printing technology, with a focus on its current capabilities and future application. Part III explores the rift between utility and design intellectual property protection within the framework of intellectual property protection. Part IV analyzes the overlap of the technology and the law. Part V projects the potential impact of inaction by drawing comparisons to parallel issues, as well as the potential impact of the technology itself.


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow 2017 University of Pennsylvania Law School

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


A Picture's Worth: The Future Of Copyright Protection Of User-Generated Images On Social Media, Elizabeth Tao 2017 Indiana University Maurer School of Law

A Picture's Worth: The Future Of Copyright Protection Of User-Generated Images On Social Media, Elizabeth Tao

Indiana Journal of Global Legal Studies

In the current digital age, the internet is teeming with personal websites and social media posts. As more people around the world are becoming and staying connected to the internet, more stories and photos are sharing over social networking sites each second. Social media presents a ubiquitous platform to share one's life with others, but this accessibility comes at a price. This Note examines the history and present state of copyright law, within the framework of photography, to highlight the gaps within these laws as applied to personal works of art, like personal photographs, posted to social media sites ...


The Tax Lives Of Uber Drivers: Evidence From Online Forums, Diane M. Ring, Shu-Yi Oei 2017 Boston College Law School

The Tax Lives Of Uber Drivers: Evidence From Online Forums, Diane M. Ring, Shu-Yi Oei

Shu-Yi Oei

In this Article, we investigate the tax issues and challenges facing Uber and Lyft drivers by studying their online interactions in three internet discussion forums: Reddit.com, Uberpeople.net, and Intuit TurboTax AnswerXchange. Using descriptive statistics and content analysis, we examine (1) the substantive tax concerns facing forum participants, (2) how taxes affect their driving and profitability decisions, and (3) the degree of user sophistication, accuracy of legal advising, and other cultural features of the forums. We find that while forum participants displayed generally accurate understandings of tax filing and income inclusion obligations, their approaches to expenses and deductions were ...


Social Capital Of Directors And Corporate Governance: A Social Network Analysis, Zihan NIU, Christopher C. H. CHEN 2017 Singapore Management University

Social Capital Of Directors And Corporate Governance: A Social Network Analysis, Zihan Niu, Christopher C. H. Chen

Research Collection School Of Law

This articleexamines how a director’s social capital might affect his behavior, the board’sperformance, and corporate governance, as well as the potential normativeimplications of the director’s social network. We argue that the quality ofboard performance could be improved where the social network closure within theboard is high and there are many non-redundant contacts beyond the board.Network closure can improve trust and collaboration within a board, whileexternal contacts may benefit a company with more diverse sources ofinformation. Moreover, different network positioning leads to the inequality ofsocial capital for directors. With more social capital, a director is morelikely to ...


Privacy, Security, And The Connected Hairbrush, Travis LeBlanc 2017 University of Maryland Francis King Carey School of Law

Privacy, Security, And The Connected Hairbrush, Travis Leblanc

Maryland Law Review

No abstract provided.


Notice And Takedown In The Domain Name System: Icann's Ambivalent Drift Into Online Content Regulation, Annemarie Bridy 2017 University of Idaho College of Law

Notice And Takedown In The Domain Name System: Icann's Ambivalent Drift Into Online Content Regulation, Annemarie Bridy

Faculty Scholarship

No abstract provided.


Digital Commons powered by bepress