Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Santa Clara Law (13)
- University of Pittsburgh School of Law (6)
- University of Maryland Francis King Carey School of Law (4)
- Boston University School of Law (3)
- Columbia Law School (3)
-
- Schulich School of Law, Dalhousie University (3)
- University of Colorado Law School (3)
- American University Washington College of Law (2)
- Cornell University Law School (2)
- Embry-Riddle Aeronautical University (2)
- Singapore Management University (2)
- University of Washington School of Law (2)
- Brigham Young University Law School (1)
- Cleveland State University (1)
- Florida A&M University College of Law (1)
- Maurer School of Law: Indiana University (1)
- New York Law School (1)
- Notre Dame Law School (1)
- Pace University (1)
- University at Buffalo School of Law (1)
- University of Connecticut (1)
- University of Dayton (1)
- University of Florida Levin College of Law (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of Missouri School of Law (1)
- University of Missouri-Kansas City School of Law (1)
- University of New Hampshire (1)
- Western Kentucky University (1)
- Keyword
-
- Google (12)
- Copyright (7)
- Cyberspace (6)
- Rosetta Stone (6)
- Adwords (5)
-
- Intellectual property (5)
- Internet (5)
- Trademark (5)
- 2009 (4)
- Privacy (4)
- Technology (4)
- Expert testimony (3)
- Externalist (3)
- Internal (3)
- Realist (3)
- Sexual harassment (3)
- Trademark policy (3)
- Virtualism (3)
- Virtualist (3)
- Barnowl (2)
- Commons (2)
- Constitution (2)
- Cyber gender harassment (2)
- Cyberlaw (2)
- Digital forensics (2)
- Facebook (2)
- Fair information practices (2)
- First Amendment (2)
- Free speech (2)
- Gender discrimination (2)
- Publication
-
- Rosetta Stone v. Google (Joint Appendix) (13)
- Articles (10)
- Faculty Scholarship (10)
- Articles, Book Chapters, & Popular Press (3)
- Publications (3)
-
- Cornell Law Faculty Publications (2)
- Journal Articles (2)
- Research Collection Yong Pung How School Of Law (2)
- Applied Aviation Sciences - Daytona Beach (1)
- Articles & Chapters (1)
- Articles by Maurer Faculty (1)
- Articles in Law Reviews & Journals (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Faculty Publications (1)
- Faculty Works (1)
- Honors Scholar Theses (1)
- Journal Publications (1)
- Law Faculty Presentations and Testimony (1)
- Law Faculty Scholarship (1)
- Parameters of Law in Student Affairs and Higher Education (CNS 670) (1)
- School of Law Faculty Publications (1)
- Security Studies & International Affairs - Daytona Beach (1)
- Studio for Law and Culture (1)
- UF Law Faculty Publications (1)
Articles 1 - 30 of 62
Full-Text Articles in Law
Cyber Warfare And Precautions Against The Effects Of Attacks, Eric Talbot Jensen
Cyber Warfare And Precautions Against The Effects Of Attacks, Eric Talbot Jensen
Faculty Scholarship
Ninety-eight percent of all U.S. government communications travel over civilian-owned-and-operated networks. Additionally, the government relies almost completely on civilian providers for computer software and hardware products, services, and maintenance. This near-complete intermixing of civilian and military computer infrastructure makes many of those civilian objects and providers legitimate targets under the law of armed conflict. Other civilian networks, services, and communications may suffer collateral damage from legitimate attacks on government targets. To protect those civilian objects and providers from the effects of attacks, the law of armed conflict requires a state to segregate its military assets from the civilian population and …
Vol. Xxiv, Tab 61 - Ex. 2 - Rosetta Stone's Answers To Google's First Set Of Interrogatories, Rosetta Stone
Vol. Xxiv, Tab 61 - Ex. 2 - Rosetta Stone's Answers To Google's First Set Of Interrogatories, Rosetta Stone
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 46 - Ex. 37 - Expert Report Of Dr. Kent D. Van Liere, Kent Van Liere
Vol. Ix, Tab 46 - Ex. 37 - Expert Report Of Dr. Kent D. Van Liere, Kent Van Liere
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Comments On Expanding Civic Participation In Voting By Expanded Use Of The Internet, Candice Hoke
Comments On Expanding Civic Participation In Voting By Expanded Use Of The Internet, Candice Hoke
Law Faculty Presentations and Testimony
Hoke's comments to the FCC on expanding civic participation in voting by expanded use of the Internet. Hoke recommends that the FCC not become involved in election regulatory issues concerning the Internet, but will support a different federal regulatory agency with national security and technical-cybersecurity expertise receiving primary jurisdiction over election cybersecurity.
The Evolution Of Copyright Law In The Arts, Kevin Liftig
The Evolution Of Copyright Law In The Arts, Kevin Liftig
Honors Scholar Theses
As digital storage of intellectual goods such as literature and music has become widespread, the duplication and unlicensed distribution of these goods has become a frequent source of legal contention. When technology for production and replication of intellectual goods advanced, there were disputes concerning the rights to produce and duplicate these works. As new technologies have made copies of intellectual goods more accessible, legal institutions have largely moved to protect the rights of ownership of ideas through copyright laws. This paper will examine key changes in the technology that affect intellectual property, and the responses that legal institutions have made …
Law's Expressive Value In Combating Cyber Gender Harassment, Danielle K. Citron
Law's Expressive Value In Combating Cyber Gender Harassment, Danielle K. Citron
Faculty Scholarship
The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women’s home addresses alongside suggestions that they should be sexually assaulted and technological attacks that shut down blogs and websites. It impedes women’s full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women’s experience, deeming it harmless teasing that women should expect, and tolerate, given the Internet’s Wild West norms …
The Effectiveness Of Acceptances Communicated By Electronic Means, Or – Does The Postal Acceptance Rule Apply To Email, Eliza Mik
Research Collection Yong Pung How School Of Law
The ‘traditional’ classi?cation into ‘instantaneous’ and ‘non-instantaneous’ methods of communication must be abandoned. As all Internet transmissions are instantaneous, the choice between the principle of receipt and the postal exception must be based on other criteria. The focus must be shifted from communication devices to the characteristics of the communication process. The latter resembles either dealings face-to-face or dealings at a distance. This simple division should remain the basis for all analyses. Instantaneity and control are two of many characteristics of face-to-face dealings and are not the only factors to be taken into account when making the choice between the …
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky
UF Law Faculty Publications
This Article examines the evolution of the law governing libel suits against anonymous "John Doe" defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire, and other nonfactual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Applied Aviation Sciences - Daytona Beach
"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Security Studies & International Affairs - Daytona Beach
"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview
Vol. Ix, Tab 46 - Ex. 45 - Email From Jason Calhoun (Rosetta Enforcement Manager), Jason Calhoun
Vol. Ix, Tab 46 - Ex. 45 - Email From Jason Calhoun (Rosetta Enforcement Manager), Jason Calhoun
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 41 - Ex. 18 - Email From Baris Gultekin And Trademark Report (Google Product Manager Director), Baris Gultekin
Vol. Ix, Tab 41 - Ex. 18 - Email From Baris Gultekin And Trademark Report (Google Product Manager Director), Baris Gultekin
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 42 - Ex. 1 - Reporter's Transcript, Motions Hearing, September 18, 2009, United States District Court For The Eastern District Of Virginia
Vol. Ix, Tab 42 - Ex. 1 - Reporter's Transcript, Motions Hearing, September 18, 2009, United States District Court For The Eastern District Of Virginia
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
The Networked Electorate: The Internet And The Quiet Democratic Revolution In Malaysia And Singapore, Hang Wu Tang
The Networked Electorate: The Internet And The Quiet Democratic Revolution In Malaysia And Singapore, Hang Wu Tang
Research Collection Yong Pung How School Of Law
This paper is intended to be a contribution to the literature on claims of the democratising effect of the Internet. The paper begins by setting out the arguments and also critiques of claims of the democratising power of the Internet. In order to test the validity of these arguments, the author will undertake a comparative study of the impact of the Internet on recent general elections in Malaysia and Singapore. The study will demonstrate that in the case of Singapore, the Internet has merely exerted some pressure on the pre-existing laws and state-imposed norms governing free speech; in contrast, in …
Vol. Ix, Tab 41 - Ex. 17 - Email From Baris Gultekin (Google Product Manager Director), Baris Gultekin
Vol. Ix, Tab 41 - Ex. 17 - Email From Baris Gultekin (Google Product Manager Director), Baris Gultekin
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Saving Facebook, James Grimmelmann
Saving Facebook, James Grimmelmann
Cornell Law Faculty Publications
This Article provides the first comprehensive analysis of the law and policy of privacy on social network sites, using Facebook as its principal example. It explains how Facebook users socialize on the site, why they misunderstand the risks involved, and how their privacy suffers as a result. Facebook offers a socially compelling platform that also facilitates peer-to-peer privacy violations: users harming each others' privacy interests. These two facts are inextricably linked; people use Facebook with the goal of sharing some information about themselves. Policymakers cannot make Facebook completely safe, but they can help people use it safely.
The Article makes …
The Google Book Search Settlement: Ends, Means, And The Future Of Books, James Grimmelmann
The Google Book Search Settlement: Ends, Means, And The Future Of Books, James Grimmelmann
Faculty Scholarship
For the past four years, Google has been systematically making digital copies of books in the collections of many major university libraries. It made the digital copies searchable through its web site--you couldn't read the books, but you could at least find out where the phrase you're looking for appears within them. This outraged copyright owners, who filed a class action lawsuit to make Google stop. Then, last fall, the parties to this large class action announced an even larger settlement: one that would give Google a license not only to scan books, but also to sell them.
The settlement …
Vol. Viii, Tab 39 - Ex. 4 - Naso News, Google
Vol. Viii, Tab 39 - Ex. 4 - Naso News, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 43 - Google Memorandum In Support Of Its Motion To Exclude Expert Report And Opinion Of Dr. Kent Van Liere, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
How To Fix The Google Book Search Settlement, James Grimmelmann
How To Fix The Google Book Search Settlement, James Grimmelmann
Faculty Scholarship
The proposed settlement in the Google Book Search case should be approved with strings attached. The project will be immensely good for society, and the proposed deal is a fair one for Google, for authors, and for publishers. The public interest demands, however, that the settlement be modified first. It creates two new entities—the Books Rights Registry Leviathan and the Google Book Search Behemoth—with dangerously concentrated power over the publishing industry. Left unchecked, they could trample on consumers in any number of ways. We the public have a right to demand that those entities be subject to healthy, pro-competitive oversight, …
Breathing New Life Into Old Technological Infrastructure: Broadband Internet As A Means Of Jump-Starting The Economy And Connecting The Country, Elizabeth Chernow
Breathing New Life Into Old Technological Infrastructure: Broadband Internet As A Means Of Jump-Starting The Economy And Connecting The Country, Elizabeth Chernow
Articles in Law Reviews & Journals
This paper examines the current structure of universal service and the FCC’s Universal Service Fund, recent pushes to expand the definition of and funding for universal service to include broadband access, and how broadband internet can contribute to saving the ailing economy. The paper concludes by calling for the inclusion of broadband internet in the Universal Service Fund.
Current financial support for the Universal Service Fund is problematic in that only telecommunications carriers providing interstate services are required to contribute to the fund. The author maintains that the contribution base should be expanded to include companies providing broadband internet access. …
The Ginsburg Group: Technology: How To Stay Out Of Court, Jennifer Ballard, Lee Maglinger, Alisha Orosz, Mandy Skinner, Kevin Thomas
The Ginsburg Group: Technology: How To Stay Out Of Court, Jennifer Ballard, Lee Maglinger, Alisha Orosz, Mandy Skinner, Kevin Thomas
Parameters of Law in Student Affairs and Higher Education (CNS 670)
For professionals in higher education, it is our responsibility to stay on top of the ever changing landscape of technology at our colleges and universities. In order to provide the best and most convenient services, it is our objective to continue to expand the walls of higher education into the global boundaries of technology. For the purpose of this paper, the Ginsburg Group has focused on five different areas regarding the use of technology. In these areas, the information provided is our thoughts and best advice in how institutions of higher learning can avoid the courtroom. The following pages will …
Cyber Civil Rights, Danielle K. Citron
Cyber Civil Rights, Danielle K. Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …
Cyberthreats: The Emerging Fault Lines Of The Nation State, Susan W. Brenner
Cyberthreats: The Emerging Fault Lines Of The Nation State, Susan W. Brenner
School of Law Faculty Publications
As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace have allowed virtually anyone to launch an attack from a remote and anonymous location. But once these attacks occur, it raises several important questions. Who should respond, and how? How should nation-states effectively deal with a cyber-attack? Will the United States and other nation-states be able to survive in a world where virtual boundaries are …
Is Cyberprostitution Prostitution? New Paradigm, Old Crime, Brooke Campbell
Is Cyberprostitution Prostitution? New Paradigm, Old Crime, Brooke Campbell
Studio for Law and Culture
In any given industry, machines are rapidly replacing workers. Alternately celebrated as the liberation of the worker from the grind and peril of manual labor and lamented as the condemnation of the worker to lowered wages and/or the effeteness of unemployment, so-called “advances” in technology problematically recast the labor-capital relation as a human-machine relation. What does this process look like in the context of a criminalized industry like the sex industry? In this paper, I examine the way in which cyberprostitution — ostensibly, an advance in the technology of communication — places the conceptual terrain of prostitution into question. For …
Vol. Ix, Tab 46 - Ex. 2 "New Us Trademark Policy (Barnowl) Update", Google
Vol. Ix, Tab 46 - Ex. 2 "New Us Trademark Policy (Barnowl) Update", Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Ix, Tab 46 - Ex. 1 "Fair Use Of Trademark Terms In Some Creatives", Google
Vol. Ix, Tab 46 - Ex. 1 "Fair Use Of Trademark Terms In Some Creatives", Google
Rosetta Stone v. Google (Joint Appendix)
No abstract provided.
Vol. Ix, Tab 47 - Ex. 2-9 - Documents "Rosetta Stone Competitive Website Analytics Report", Rosetta Stone
Vol. Ix, Tab 47 - Ex. 2-9 - Documents "Rosetta Stone Competitive Website Analytics Report", Rosetta Stone
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Xiv, Tab 51 - Google's Objection To Evidence And Motion To Strike, Google
Vol. Xiv, Tab 51 - Google's Objection To Evidence And Motion To Strike, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Vol. Xiii, Tab 50 - Google's Opposition To Rosetta Stone's Motion For Partial Summary Judgment, Google
Vol. Xiii, Tab 50 - Google's Opposition To Rosetta Stone's Motion For Partial Summary Judgment, Google
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?