Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Communications Law (2)
- Computer Law (2)
- Criminal law; symposium; communications law; international law; first amendment (2)
- Law and Technology (2)
- Administrative Law (1)
-
- Arkansas cyberbullying law (1)
- Broadband (1)
- Bullying (1)
- Canada (1)
- Communications Act 2003 (1)
- Comparative and Foreign Law (1)
- Competition (1)
- Confidential communications--Press (1)
- Confidential communications--Press; Journalistic ethics; United States; Canada (1)
- Cyberbullying (1)
- Cyberbullying Laws (1)
- England (1)
- FCC (1)
- Federalism (1)
- Forms of Cyberbulling (1)
- ICANN (1)
- IGF (1)
- ITU (1)
- Idaho cyberbullying law (1)
- Intellectual Property Law (1)
- International Law (1)
- Internet (1)
- Internet governance (1)
- Journalistic ethics (1)
- Malicious Communication Act 1988 (1)
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Law
The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor
The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor
Fordham Law Review
Gatekeeping is defined as the work of third parties “who are able to disrupt misconduct by withholding their cooperation from wrongdoers.”1 Internet intermediaries need to be far more proactive as gatekeepers than they are now. Socially responsible measures can prevent the translation of violent thoughts into violent actions. Designated monitoring mechanisms can potentially prevent such unfortunate events. This Article suggests an approach that harnesses the strengths and capabilities of the public and private sectors in offering practical solutions to pressing problems. It proposes that internet intermediaries should fight stringently against terror and further argues that a responsible gatekeeping approach is …
Terrorist Advocacy And Exceptional Circumstances, David S. Han
Terrorist Advocacy And Exceptional Circumstances, David S. Han
Fordham Law Review
This Article proceeds as follows. Part I discusses the harmful effects of terrorist advocacy and outlines the present doctrinal treatment of such speech. Part II discusses the issue of exceptional circumstances and highlights the two approaches courts might take to account for them: applying strict scrutiny to the case at hand or broadly reformulating the First Amendment’s doctrinal boundaries. Part III sets forth my central thesis: courts should adhere to case-by-case strict scrutiny analysis, rather than broad doctrinal reformulation, as the initial means of accounting for exceptional circumstances with respect to terrorist advocacy. This approach reflects the vital importance of …
Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges
Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges
Patrick T. Ryan
This essay looks at the the different roles that institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the layered model of the Internet. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications to show why it is important for different institutions within the governance system to focus on their areas of expertise (e.g., the ITU, ICANN, and IGF). Several areas of conflict are reviewed, such as the desire to promote more broadband infrastructure (a topic that is in the …
Journalists And Their Secret Sources, Jamie Cameron
Journalists And Their Secret Sources, Jamie Cameron
Jamie Cameron
Jamie Cameron, Professor at Osgoode Hall Law School, on confidential sources, free press and the link to democratic values.
Confidential Sources: The Public Interest In Keeping Secrets, Brian Rogers, Kevin Donovan, Gail C. Cove, Jamie Cameron, Julian Sher
Confidential Sources: The Public Interest In Keeping Secrets, Brian Rogers, Kevin Donovan, Gail C. Cove, Jamie Cameron, Julian Sher
Jamie Cameron
"Confidential sources: The public interest in keeping secrets What is different about confidential newsgathering sources? Why is it in the public interest to protect these sources, and when is it more important to know who they are? How do shield laws work in the US, and who should set the rules for confidential sources -- the courts or the legislatures?"
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Federal And State Authority For Network Neutrality And Broadband Regulation, Tejas N. Narechania
Tejas N. Narechania
For the second time in less than four years, the D.C. Circuit has rebuffed the Federal Communications Commission’s attempt at imposing network neutrality rules on internet traffic. But in so doing, the D.C. Circuit affirmed the FCC’s theory of jurisdiction based on section 706 of the Telecommunications Act of 1996. This ruling has the significant effect of transforming a questionable source of authority into what may become the Commission’s most significant font of regulatory power.
Surprisingly, section 706 seems to give the Commission the power to implement a slightly revised set of network neutrality rules. By narrowing the scope of …
Cyberbullying: What's The "Status" In England?, Krupa A. Patel
Cyberbullying: What's The "Status" In England?, Krupa A. Patel
San Diego International Law Journal
This comment will explore the growing concern of cyberbullying and will highlight the need for the English Parliament to create its own national anti-cyberbullying legislation, or to incorporate this activity into existing laws as a preventative measure. Part II will define cyberbullying, highlight the various ways in which cyberbullying differs from traditional forms of bullying, and explore specific forms and mediums of cyberbullying to underscore the difficulty in regulating such actions through the law. It will also include illustrative examples of cyberbullying incidents. Part III explores the current laws that English prosecutors are attempting to use to penalize those who …