Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

6,084 Full-Text Articles 5,026 Authors 5,313,269 Downloads 158 Institutions

All Articles in Internet Law

Faceted Search

6,084 full-text articles. Page 99 of 189.

Future Strategies For Improving Consent In Electronic Contracting, Ran Bi 2015 Jinan University / Dacheng Law Offices

Future Strategies For Improving Consent In Electronic Contracting, Ran Bi

Ran Bi

China's economy has been running deep into an exciting phrase called “Internet +”. In North America, most businesses have online presence and conduct numerous transactions online. Unprecedentedly, electronic contracts have been governing more Individuals and corporations’ legal relationships in a growing proportion of businesses and everyday life.

E-contracts, usually with no physical architecture, are easy to “sign”—people just click one or two icons on a computer / smartphone screen after “reading” (scroll down) the contents. However, e-contracts are standard form contracts which are provided by vendors . Users are easy to become victims of exploitative terms, because their consent has …


Walk A Mile In The Shoes Of A Copyright Troll: Analyzing And Overcoming The Joinder Issue In Bittorrent Lawsuits, Kristina Unanyan 2015 Pepperdine University

Walk A Mile In The Shoes Of A Copyright Troll: Analyzing And Overcoming The Joinder Issue In Bittorrent Lawsuits, Kristina Unanyan

The Journal of Business, Entrepreneurship & the Law

This Comment analyzes the issues surrounding joinder of copyright infringers who use BitTorrent, explores how joinder can be used and limited to create a more viable solution for copyright holders and consumers, as well as, supplements the sparse regulations that encompass joinder to create a rule that accommodates this technological era. Part II explains Copyright Law and the procedural aspects of a copyright infringement suit and joinder of defendants. Part III delves into the history of peer-to-peer (P2P) file-sharing lawsuits and provides an illustration of where case law rests today regarding P2P networks. Part IV describes the BitTorrent network and …


Note: A Series Of (Inseparable) Tubes? “New Media” Streaming And The Impact Of In Re. Pandora Media, Related Decisions, And Performance Licensing In The Internet Era, Ross Coker 2015 Pepperdine University

Note: A Series Of (Inseparable) Tubes? “New Media” Streaming And The Impact Of In Re. Pandora Media, Related Decisions, And Performance Licensing In The Internet Era, Ross Coker

The Journal of Business, Entrepreneurship & the Law

No abstract provided.


Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek 2015 Yale University

Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek

The Journal of Business, Entrepreneurship & the Law

No abstract provided.


The Sharing Economy And Consumer Protection Regulation: The Case For Policy Change, Christopher Koopman, Matthew Mitchell, Adam Thierer 2015 Pepperdine University

The Sharing Economy And Consumer Protection Regulation: The Case For Policy Change, Christopher Koopman, Matthew Mitchell, Adam Thierer

The Journal of Business, Entrepreneurship & the Law

In this Paper, we discuss the central benefit of the sharing economy thus far: it has overcome market imperfections without recourse to regulatory bodies prone to capture by entrenched firms. As an introduction to the various issues surrounding this ongoing debate, we begin with an explanation of the sharing economy. Then we review the traditional “consumer protection” rationales for economic regulation and explain why many regulations persist even though their initial justifications are no longer valid. We argue continued application of these outmoded regulatory regimes is likely to harm consumers. In the last section, we explain how the Internet and …


Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio 2015 Stanford University

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman 2015 Author, Educator, Entrepreneur & Professional Corporate Director

Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …


Broadband Institute Of California Amicus Brief.Pdf, jodi benassi 2015 Santa Clara University School of Law

Broadband Institute Of California Amicus Brief.Pdf, Jodi Benassi

Jodi Benassi

California Broadband Institute Amicus Brief filed in support of the Federal Communications Commission's (FCC) net neutrality rules.


Fairness, Trust And Security In Online Dispute Resolution, Noam Ebner, John Zeleznikow 2015 Creighton University

Fairness, Trust And Security In Online Dispute Resolution, Noam Ebner, John Zeleznikow

Journal of Public Law and Policy

No abstract provided.


Future Strategies For Improving Consent In Electronic Contracting, Ran Bi 2015 Jinan University / Dacheng Law Offices

Future Strategies For Improving Consent In Electronic Contracting, Ran Bi

Ran Bi

China's economy has been running deep into an exciting phrase called “Internet +”. In North America, most businesses have online presence and conduct numerous transactions online. Unprecedentedly, electronic contracts have been governing more Individuals and corporations’ legal relationships in a growing proportion of businesses and everyday life.

E-contracts, usually with no physical architecture, are easy to “sign”—people just click one or two icons on a computer / smartphone screen after “reading” (scroll down) the contents. However, e-contracts are standard form contracts which are provided by vendors1. Users2 are easy to become victims of exploitative terms, because their consent has been …


Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage 2015 University of Michigan Law School

Avoiding The Next Napster: Copyright Infringement And Investor Liability In The Age Of User Generated Content, Truan Savage

Michigan Business & Entrepreneurial Law Review

Rapid developments in digital technology over the past quarter century have made it easier than ever for people to create and instantly share content. These developments have served as the basis for countless innovations and have spawned some of today’s largest and most profitable companies. As content creation and distribution continues to evolve, businesses seek new ways to profit from these technological innovations. But while businesses continue to develop around new methods of content distribution, the law of copyright, which generally aims to encourage the creation of content, has been slow to adapt. This era of modern technological innovation thus …


Big Data Blacklisting, Margaret Hu 2015 William & Mary Law School

Big Data Blacklisting, Margaret Hu

Faculty Publications

“Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation …


"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo 2015 Universidad de Valparaiso

"Globalization And Legal Culture. The Influence Of Law & Economics’ Blogs In Developing Countries,", Críspulo Marmolejo

Críspulo Marmolejo

This paper considers the relationship between blogs and Law and Economics from two perspectives: some aspects of the law and economics approach to blogging, and the influence of blogs in the diffusion of Law and Economics. The article explores how blogs are a modern way of low cost domestic journalism, in a context in which the increasingsize of the blogosphere is a current challenge in terms of free speech and quality of the information. At the same time, blogs such as “The Volokh Conspiracy” are playing an interesting role in the American legal academia as areal instrument to analyze the …


Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest 2015 Michigan State University College of Law

Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest

Sean Pager

INFRINGEMENT AS UNFAIR COMPETITION: A BLUEPRINT FOR GLOBAL GOVERNANCE?

Sean A. Pager Michigan State University College of Law

Eric Priest University of Oregon School of Law

ABSTRACT

This Article examines a new approach to address persistent regulatory failures in global supply chains. In a series of recent cases, unfair competition actions have been brought in U.S. court against foreign manufacturers who infringe software overseas under the theory that the cost savings from infringement confers an unfair advantage in U.S. markets. While this theory has been advanced in the intellectual property context, the same approach could work to target abuses in …


A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian 2015 University of Florida Levin College of Law

A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian

Omri Y Marian

This Essay proposes a conceptual framework for the regulation of transactions involving cryptocurrencies. Cryptocurrencies offer tremendous opportunities for innovation and development but are also uniquely suited to facilitate illicit behavior. The regulatory framework suggested herein is intended to support (or at least not impair) cryptocurrencies’ innovative potential. At the same time, it aims to disrupt cryptocurrencies’ criminal utility. To achieve these purposes, this Essay proposes a regulatory framework that imposes costs on the characteristics of cryptocurrencies that make them especially useful for criminal behavior (in particular, anonymity) but does not impose costs on characteristics that are at the core of …


Does Australia Really Need Mandatory Data Breach Notification Laws - And If So, What Kind?, Sara Smyth 2015 Bond University

Does Australia Really Need Mandatory Data Breach Notification Laws - And If So, What Kind?, Sara Smyth

Sara Smyth

Extract

Mandatory data breach notification laws brought much-needed attention to areas of concern that were previously unknown, particularly organisational inadequacies regarding the security of personal information, and led to innovative organisational practices and regulatory initiatives. This is important given that there is little or no incentive for private and public organisations to report data breach information on their own, particularly given the fear of reputational sanctions.137 Yet, data breach notification laws can also bring publicity to breaches that are relatively minor, and not likely to have a significant impact given the low risk of identity theft, which can unnecessarily lead …


E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman 2015 Author, Educator, Entrepreneur & Professional Corporate Director

E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials …


On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock 2015 John Marshall Law School

On The Centrality Of Information Law: A Rational Choice Discussion Of Information Law And Transparency, 17 J. Marshall J. Computer & Info. L. 1069 (1999), William B.T. Mock

William B.T. Mock

The purpose of this Article is to establish the importance of information law and to encourage its further study. By applying information technology theory, economic theory and, and political theory insights, the Article examines the centrality of information law in open societies. Information law rests upon two premises. The first of which is that information is a legally cognizable concept- that it can be framed in legal terms and has legal significance. The second premise is that there exists a rationale for government regulation and provision of information, either explicitly or implicitly. Transparency is a flexible concept used in a …


The Shaky Ground Of The Right To Be Delisted, Miquel Peguera 2015 Universitat Oberta de Catalunya

The Shaky Ground Of The Right To Be Delisted, Miquel Peguera

Miquel Peguera

It has long been discussed whether individuals should have a “right to be forgotten” online to suppress old information that could seriously interfere with their privacy and data protection rights. In the landmark case of Google Spain v AEPD, the Court of Justice of the European Union addressed the particular question of whether, under EU Data Protection Law, individuals have a right to have links delisted from the list of search results, in searches made on the basis of their name. It found that they do have this right – which can be best described as a “right to be …


Visualizing Dna Proof, Nicholas L. Georgakopoulos 2015 Indiana University Robert H. McKinney School of Law

Visualizing Dna Proof, Nicholas L. Georgakopoulos

Nicholas L Georgakopoulos

DNA proof inherently involves the use of probability theory, which is often counterintuitive. Visual depictions of probability theory, however, can clarify the analysis and make it tractable. A DNA hit from a large database is a notoriously difficult probabi­li­ty theory issue, yet the visuals should enable courts and juries to handle it. The Puckett facts are an example of a general approach: A search in a large DNA database produces a hit for a cold crime from 1972 San Francisco. Probability theory allows us to process the probabilities that someone else in the database, someone not in the database, or …


Digital Commons powered by bepress