Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Journal

2009

Institution
Keyword
Publication

Articles 1 - 30 of 91

Full-Text Articles in Law

The International Trade Commission: Potential Bias, Hold-Up, And The Need For Reform, William Dolan Dec 2009

The International Trade Commission: Potential Bias, Hold-Up, And The Need For Reform, William Dolan

Duke Law & Technology Review

The International Trade Commission (ITC) is an alternate venue for holders of U.S. patents to pursue litigation against infringing products produced abroad and imported to the United States. Because the ITC may only grant injunctive relief, it has awarded injunctions in situations where there may have been better and more efficient remedies to the infringement available through litigation in federal district court. The increased likelihood of injunctive relief bolsters the position of patent holders against a wide range of producers in royalty negotiations and can harm the end consumers through a process known as "patent hold-up." There are currently sweeping …


Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Keats Citron Dec 2009

Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Keats Citron

Michigan Law Review

The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women's home addresses alongside suggestions that they are interested in anonymous sex, and technological attacks that shut down blogs and websites. It impedes women's full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women's experiences, deeming the harassment harmless teasing that women should expect, and tolerate, given the internet's Wild …


The Future Of “Fair And Balanced”: The Fairness Doctrine, Net Neutrality, And The Internet, Sasha Leonhardt Oct 2009

The Future Of “Fair And Balanced”: The Fairness Doctrine, Net Neutrality, And The Internet, Sasha Leonhardt

Duke Law & Technology Review

In recent months, different groups--pundits, politicians, and even an FCC Commissioner--have discussed resurrecting the now-defunct Fairness Doctrine and applying it to Internet communication. This iBrief responds to the novel application of the Doctrine to the Internet in three parts. First, this iBrief will review the history and legal rationale that supported the Fairness Doctrine, with a particular emphasis on emerging technologies. Second, this iBrief applies these legal arguments to the evolving structure of the Internet. Third, this iBrief will consider what we can learn about Net Neutrality through an analogy to the Fairness Doctrine. This iBrief concludes that, while the …


Experimenting With Territoriality: Pan-European Music License And The Persistence Of Old Paradigms, Ana Eduarda Santos Sep 2009

Experimenting With Territoriality: Pan-European Music License And The Persistence Of Old Paradigms, Ana Eduarda Santos

Duke Law & Technology Review

This article tells the story of what could have been an interesting and important shift in our approach to territoriality in the digitalized world. Europe had the chance to be the cradle of an unprecedented copyright experience – the creation of a quasi pan- continental license in the music field – but it might have lost that opportunity in the midst of non-binding recommendations and resolutions. This article argues this loss is due to the overreaching persistence of old paradigms, namely the principle of territoriality.


Facebook 2 Blackberry And Database Trading Systems: Morphing Social Networking To Business Growth In A Global Recession, Roger M. Groves Sep 2009

Facebook 2 Blackberry And Database Trading Systems: Morphing Social Networking To Business Growth In A Global Recession, Roger M. Groves

West Virginia Law Review

No abstract provided.


Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin Jul 2009

Privacy 3.0-The Principle Of Proportionality, Andrew B. Serwin

University of Michigan Journal of Law Reform

Individual concern over privacy has existed as long as humans have said or done things they do not wish others to know about. In their groundbreaking law review article The Right to Privacy, Warren and Brandeis posited that the common law should protect an individual's right to privacy under a right formulated as the right to be let alone-Privacy 1.0. As technology advanced and societal values also changed, a belief surfaced that the Warren and Brandeis formulation did not provide sufficient structure for the development of privacy laws. As such, a second theoretical construct of privacy, Privacy 2.0 as …


Trustworthiness As A Limitation On Network Neutrality, Aaron J. Burstein, Fred B. Schneider Jun 2009

Trustworthiness As A Limitation On Network Neutrality, Aaron J. Burstein, Fred B. Schneider

Federal Communications Law Journal

The policy debate over how to govern access to broadband networks has largely ignored the objective of network trustworthiness-a set of properties (including security, survivability, and safety) that guarantee expected behavior. Instead, the terms of the network access debate have focused on whether imposing a nondiscrimination or "network neutrality" obligation on network providers is justified by the condition of competition among last-mile providers. Rules proposed by scholars and policymakers would allow network providers to deviate from network neutrality to protect network trustworthiness, but none of these proposals has explored the implications of such exceptions for either neutrality or trustworthiness.

This …


Unlocking The Wireless Safe: Opening Up The Wireless World For Consumers, Adam Clay Jun 2009

Unlocking The Wireless Safe: Opening Up The Wireless World For Consumers, Adam Clay

Federal Communications Law Journal

Facing resistance to the use of its Voice-over-Internet Protocol application on mobile phones, in February 2007, Skype Communications filed a petition with the FCC asking for application of the Carterfone standards to the wireless phone industry. This Note discusses Carterfone and the merits of Skype's petition in light of the recent auction of the C Block, which carries open network requirements, and developments in wireless technology. This Note argues that the FCC should require carriers to provide technical standards for access to their networks, whereby individuals will be able to connect any approved device and application of their choosing.


The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth Jun 2009

The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth

Federal Communications Law Journal

In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.

This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …


Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce Jun 2009

Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce

Chicago-Kent Law Review

Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.


Coding Privacy, Lilian Edwards Jun 2009

Coding Privacy, Lilian Edwards

Chicago-Kent Law Review

Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …


Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder Jun 2009

Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder

Chicago-Kent Law Review

Peer-to-peer networks are often used to infringe copyrights, but they also serve some legitimate purposes consistent with copyright law. In attempting to find a satisfactor solution, this note develops and analyzes two models that future peer-to-peer networks could employ to attempt to avoid liability for copyright infringement. The note then analyzes the law, applies the two models to the relevant legal tests, and analyzes whether a peer-to-peer network operating on each model could avoid liability for copyright infringement. It concludes that modifying their technological structure may help peer-to-peer networks avoid liability, but that some risks remain.


Play And The Search For Identity In The Cyberspace Community, Dorothy G. Singer Jun 2009

Play And The Search For Identity In The Cyberspace Community, Dorothy G. Singer

Washington and Lee Law Review

No abstract provided.


Protecting Children In Virtual Worlds Without Undermining Their Economic, Educational, And Social Benefits, Robert Bloomfield, Benjamin Duranske Jun 2009

Protecting Children In Virtual Worlds Without Undermining Their Economic, Educational, And Social Benefits, Robert Bloomfield, Benjamin Duranske

Washington and Lee Law Review

Advances in virtual world technology pose risks for the safety and welfare of children. Those advances also alter the interpretations of key terms in applicable Laws. For example, in the Miller test for obscenity, virtual worlds constitute places, rather than "works," and may even constitute local communities from which standards are drawn. Additionally, technological advances promise to make virtual worlds places of such significant social benefit that regulators must take care to protect them, even as they protect children who engage with them.


Virtual Heisenberg: The Limits Of Virtual World Regulability, Viktor Mayer-Schonberger Jun 2009

Virtual Heisenberg: The Limits Of Virtual World Regulability, Viktor Mayer-Schonberger

Washington and Lee Law Review

No abstract provided.


Developmental Implications Of Children's Virtual Worlds, Kaveri Subrahmanyam Jun 2009

Developmental Implications Of Children's Virtual Worlds, Kaveri Subrahmanyam

Washington and Lee Law Review

As virtual worlds for children increase in popularity, it is important to examine their developmental implications. Given the limited research on this question, we use extant social science research on youth and digital media to understand how children 's participation in virtual worlds might mediate their development. We identify four different pathways by which new media can potentially mediate development. Then we review relevant research on video games, which, like virtual worlds, contain three-dimensional online fantasy worlds; we also review research on online communication forums, which are like virtual worlds in that they allow users to create online selves and …


Online Dangers: Keeping Children And Adolescents Safe, Jodi L. Whitaker, Brad J. Bushman Jun 2009

Online Dangers: Keeping Children And Adolescents Safe, Jodi L. Whitaker, Brad J. Bushman

Washington and Lee Law Review

No abstract provided.


Introduction [To The Symposium], Joan M. Shaughnessy Jun 2009

Introduction [To The Symposium], Joan M. Shaughnessy

Washington and Lee Law Review

No abstract provided.


Sex Play In Virtual Worlds, Robin Fretwell Wilson Jun 2009

Sex Play In Virtual Worlds, Robin Fretwell Wilson

Washington and Lee Law Review

No abstract provided.


Fertility And Virtual Reality, Edward Castronova Jun 2009

Fertility And Virtual Reality, Edward Castronova

Washington and Lee Law Review

No abstract provided.


A Review Of The Effects Of Violent Video Games On Children And Adolescents, Jodi L. Whitaker, Brad J. Bushman Jun 2009

A Review Of The Effects Of Violent Video Games On Children And Adolescents, Jodi L. Whitaker, Brad J. Bushman

Washington and Lee Law Review

No abstract provided.


Virtual Parentalism, Joshua A.T. Fairfield Jun 2009

Virtual Parentalism, Joshua A.T. Fairfield

Washington and Lee Law Review

Parents, not Laws, ultimately protect children both online and offline. If legislation places adults at legal risk because of the presence of children in virtual worlds, adults will exit those worlds, and children will be isolated into separate spaces. This will not improve safety for children. Instead, this Article suggests that Congress enact measures that encourage filtering technology and parental tools that will both protect children in virtual worlds, and protectfree speech online.


A Study Of Cyber-Violence And Internet Service Providers' Liability: Lessons From China, Anne S.Y. Cheung Apr 2009

A Study Of Cyber-Violence And Internet Service Providers' Liability: Lessons From China, Anne S.Y. Cheung

Washington International Law Journal

Cyber-violence and harassment have been on the rise and have been a worrying trend worldwide. With the rise of blogs, discussion boards, and Youtube, we may become targets of false allegations or our movements and gestures may have been captured by modern technology at any moment to be broadcast on the Internet for a public trial of millions to judge. In China, netizens have resorted to cyber manhunt, known as the “human flesh search engine,” to expose details of individuals who have violated social norms one way or another, achieving social shaming, monitoring and ostracism. Individuals concerned have little legal …


Rationing The Infinite, Leonard M. Niehoff Apr 2009

Rationing The Infinite, Leonard M. Niehoff

Michigan Law Review

This Review raises a number of objections to Baker's arguments and proposals. Furthermore, this Review raises the fundamental question of whether Baker's central operating assumption-that media is a scarce resource that should be fairly distributed-remains timely in light of the far-reaching and fast-paced changes wrought by the internet. Nevertheless, this Review also recognizes that, as with Baker's prior works, Media Concentration and Democracy makes a serious contribution to the discussion of the political, social, and economic dynamics that challenge the existence of a strong and independent media. Media Concentration and Democracy does a better job of raising questions than of …


Privacy, Accountability, And The Cooperating Defendant: Towards A New Role For Internet Access To Court Records, Caren M. Morrison Apr 2009

Privacy, Accountability, And The Cooperating Defendant: Towards A New Role For Internet Access To Court Records, Caren M. Morrison

Vanderbilt Law Review

Now that federal court records are available online, anyone can obtain criminal case files instantly over the Internet. But this unfettered flow of information is in fundamental tension with many goals of the criminal justice system, including the integrity of criminal investigations, the accountability of prosecutors, and the security of witnesses. It has also altered the behavior of prosecutors intent on protecting the identity of cooperating defendants who assist them in investigating other targets. As prosecutors and courts collaborate to obscure the process by which cooperators are recruited and rewarded, Internet availability risks degrading the value of the information obtained …


Safe Haven No More: How Online Affiliate Marketing Programs Can Minimize New State Sales Tax Liability, Jennifer Heidt White Apr 2009

Safe Haven No More: How Online Affiliate Marketing Programs Can Minimize New State Sales Tax Liability, Jennifer Heidt White

Washington Journal of Law, Technology & Arts

Affiliate marketing has become a popular and profitable way for online merchants to access potential buyers, especially where those merchants lack a physical presence in the buyer’s home state. By increasing market penetration and brand recognition, affiliates have contributed to the growth of e-commerce and, consequently, the growth of untaxed electronic purchases. As a result, affiliates recently became the focus of states looking to capture lost sales tax revenue from online sales. In 2008, New York became the first state to target affiliate marketing programs with a tax amendment that requires out-of-state vendors that solicit more than $10,000 worth of …


The Life Of The Mind And A Life Of Meaning: Reflections On Fahrenheit 451, Rodney A. Smolla Apr 2009

The Life Of The Mind And A Life Of Meaning: Reflections On Fahrenheit 451, Rodney A. Smolla

Michigan Law Review

Fahrenheit 451 still speaks to us, vibrantly and passionately, still haunts and vexes and disturbs. The novel has sold millions of copies, was reset for a fiftieth anniversary printing, and continues to be assigned reading in middle school, high school, and college courses. That power to endure is well worth contemplation, both for what it says about Ray Bradbury's literary imagination, and, more powerfully, for what it teaches us about our recent past, our present, and our own imagined future. First Amendment jurisprudence has taken giant leaps since Fahrenheit 451 was written, and American society has managed to avoid the …


With Great Power Comes Great Responsibility: Korea's Role In The War Against Online Piracy, Edward Choi Mar 2009

With Great Power Comes Great Responsibility: Korea's Role In The War Against Online Piracy, Edward Choi

San Diego International Law Journal

South Korea is one of the most Internet-savvy countries in the world, with more than 34 million Koreans over the age of six—74.8% of the total population—regularly accessing the Internet. According to the Organization for Economic Co-operation and Development (OECD), as of June 2007, South Korea has the fourth largest number of broadband subscribers at over 14.4 million, behind only Japan, Germany, and the United States, all of which have much higher populations. Studies show the time Koreans spend online is primarily for entertainment purposes, as almost 80% of Korean Internet users report online consumption of audio and video, almost …


The Riaa, The Dmca, And The Forgotten Few Webcasters: A Call For Change In Digital Copyright Royalties, Kellen Myers Mar 2009

The Riaa, The Dmca, And The Forgotten Few Webcasters: A Call For Change In Digital Copyright Royalties, Kellen Myers

Federal Communications Law Journal

Emerging webcasting technology is playing an increasing role in modem society. The ease of use of webcast technology has brought about an increased user base as well as an increased viability for small webcasting businesses. However, the mix-tape genre of independent Internet radio has been financially and legislatively abused as a forerunner of rapidly advancing digital technology and concerns over protecting copyright royalties. This Note argues for a revision of the DMCA to provide a middle ground between protecting copyrighted works and allowing the continued existence of Internet radio.


Virtually Liable, Garrett Legerwood Mar 2009

Virtually Liable, Garrett Legerwood

Washington and Lee Law Review

No abstract provided.