Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Maurer School of Law: Indiana University (22)
- University of Michigan Law School (20)
- The Catholic University of America, Columbus School of Law (6)
- Seattle University School of Law (3)
- New York Law School (2)
-
- Northwestern Pritzker School of Law (2)
- Pepperdine University (2)
- Vanderbilt University Law School (2)
- Loyola Marymount University and Loyola Law School (1)
- Notre Dame Law School (1)
- Penn State Dickinson Law (1)
- St. John Fisher University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Richmond (1)
- University of Washington School of Law (1)
- Publication Year
- Publication
-
- Federal Communications Law Journal (20)
- Michigan Telecommunications & Technology Law Review (10)
- Catholic University Journal of Law and Technology (5)
- Michigan Law Review (5)
- Seattle University Law Review (3)
-
- University of Michigan Journal of Law Reform (3)
- Indiana Law Journal (2)
- NYLS Law Review (2)
- Northwestern Journal of International Law & Business (2)
- CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015) (1)
- Dickinson Law Review (2017-Present) (1)
- Journal of Law and Mobility (1)
- Loyola of Los Angeles Law Review (1)
- Notre Dame Journal on Emerging Technologies (1)
- Pepperdine Dispute Resolution Law Journal (1)
- Pepperdine Law Review (1)
- The Review: A Journal of Undergraduate Student Research (1)
- Touro Law Review (1)
- University of Michigan Journal of Law Reform Caveat (1)
- University of Richmond Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Vanderbilt Law Review (1)
- Washington Law Review Online (1)
Articles 1 - 30 of 66
Full-Text Articles in Law
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Washington Law Review Online
In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …
Ai, New Technologies, And Corporate Governance: Three Phenomena, Martin Petrin
Ai, New Technologies, And Corporate Governance: Three Phenomena, Martin Petrin
Seattle University Law Review
Artificial intelligence (AI) and other new technologies are increasingly influencing the operations, business models, and structures of companies. This Article focuses on three emerging phenomena that impact significant aspects of corporate governance and regulation: (1) perforation and blurring of firm boundaries through the ubiquitous use of externally provided AI services; (2) businesses engaging in strategic access and leveraging of critical resources held by third parties without owning them; and (3) the unusual hybrid role of online platforms between market facilitators and markets themselves. The Article explores how these phenomena challenge traditional views of firms as separate units, with technology leading …
The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry
The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry
Seattle University Law Review
If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …
The Policy Origins Of Wi-Fi, John Blevins
The Policy Origins Of Wi-Fi, John Blevins
Indiana Law Journal
Wi-Fi technology has become a necessary foundation of modern economic and cultural life. This Article explains its history. Specifically, it argues that Wi-Fi owes its existence and widespread adoption to federal policy choices that have been underexplored in the literature. Wi-Fi’s development is often portrayed as an unexpected and lucky accident following the FCC’s initial decision in the 1980s to allow more unlicensed and experimental uses. This view, however, obscures the more fundamental role that federal policy played. For one, the rise of modern Wi-Fi was the product of a series of policy decisions spanning decades. In addition, the FCC’s …
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
How Should We Regulate The Internet? A Proposal, Natalie Petruzelli
How Should We Regulate The Internet? A Proposal, Natalie Petruzelli
The Review: A Journal of Undergraduate Student Research
With the invention of the internet providing newfangled methods of spreading information around the world, misinformation has also found home in these pathways, disrupting the general public’s ability to discern fact from fiction and creating divides in society. Regulation must be enacted to stop the effects of misinformation, but the efforts of technology companies and the general public have been insufficient thus far. Regulatory control of the internet and its content should be the responsibility of the government, based on their constitutional right to intervene under certain circumstances and the fact that previous efforts by other parties to mitigate misinformation …
The Futility Of Regulating Social Media Content In A Global Media Environment, Rick G. Morris
The Futility Of Regulating Social Media Content In A Global Media Environment, Rick G. Morris
Notre Dame Journal on Emerging Technologies
Social media reaches more people on the planet than any prior form of media and transmits more information world-wide than ever before. It is an empowering factor in establishing and growing communities, but at the same time, creates havoc and disseminates pernicious and perhaps dangerous speech. And so it has been with the media from the beginning of time. Throughout the media’s history, efforts at regulation or control of media speech has been fraught with difficulty, ineffectiveness, discrimination, and failure. The use of technology can deceive the consumer of the information, and the social media companies as well. Both government …
"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue
"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue
Catholic University Journal of Law and Technology
The "ad tech ecosystem" is a web of interconnected technologies and intermediaries that facilitate targeted advertising based on consumer data, and supports the free internet while providing users with promotional content relevant to their interests. However, in recent years, lawmakers and consumer advocates have highlighted the dangers associated with the unregulated use of consumer data for advertising purposes, prompting a flurry of legislative action at both the state and federal levels. These various laws and proposed bills impose new challenges on the ad tech industry--threatening to fundamentally change the way the business operates. However, through innovation and creative thinking, the …
To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard
To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard
Catholic University Journal of Law and Technology
The purpose of this article is to analyze whether cloud service providers should be considered Systemically Important Financial Market Utilities (SIFMU), subjecting them to increased oversight. It also considers the risks and benefits associated with the use of the technology by financial institutions, as well as potential alternatives. Overall, this article argues that cloud service providers do not fall under the current SIFMU framework, and any regulation of the technology should strive to strike a balance between innovation and safe regulation.
Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson
Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson
Catholic University Journal of Law and Technology
The growing backlash against Big Tech companies is a symptom of digital technology increasing the world’s legibility. James C. Scott’s book, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, explores how past governments responded to increased legibility – for good and for ill. This article shows how Scott’s historical lessons can guide governments and tech platforms as they seek to improve the human condition online.
How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith
How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith
Journal of Law and Mobility
This article identifies a series of specific questions that reporters can ask about claims made by developers of automated motor vehicles (“AVs”). Its immediate intent is to facilitate more critical, credible, and ultimately constructive reporting on progress toward automated driving. In turn, reporting of this kind advances three additional goals. First, it encourages AV developers to qualify and support their public claims. Second, it appropriately manages public expectations about these vehicles. Third, it fosters more technical accuracy and technological circumspection in legal and policy scholarship.
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
Seattle University Law Review
This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
The Media, A Polarized America & Adr Tools To Enhance Understanding Of Perspectives, Ginsey Varghese Kramarczyk
The Media, A Polarized America & Adr Tools To Enhance Understanding Of Perspectives, Ginsey Varghese Kramarczyk
Pepperdine Dispute Resolution Law Journal
This article will survey: (1) the intended role of the media in a democracy; (2) the current polarized political climate in the United States; (3) the challenges facing the twenty-first century with the growth of technology, cable news, and online platforms; (4) the media's role in perpetuating conflict; and (5) propose that media professionals use Alternative Dispute Resolution (ADR) tools and processes to increase the public’s understanding of differing perspectives in our conflict-laden political discourse.
Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland
Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland
Catholic University Journal of Law and Technology
No abstract provided.
Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs
Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs
Loyola of Los Angeles Law Review
No abstract provided.
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett
Cookie Monster: Balancing Internet Privacy With Commerce, Technology And Terrorism, Nichoel Forrett
Touro Law Review
No abstract provided.
Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson
Sexting Prosecutions: Minors As A Protected Class From Child Pornography Charges, Sarah Thompson
University of Michigan Journal of Law Reform Caveat
"Firt love is only a little foolishness and a lot of curiosity." -- George Bernard Shaw Teenagers will explore their sexuality; this is no new phenomenon. However, the ways that teens are exploring their curiosity is changing with technology. This trend has serious repercussions for teens, society, and the law. ‘Sexting’—defined as the act of sending sexually explicit photographs or messages via cell phone—is one recently-developed means of sexual exploration. The practice overlaps with the production, distribution, and possession of child pornography that is banned by both state and federal law. Due to the overlap, minors have been prosecuted under …
Technology In The Courtroom: Promoting Transparency Or Destroying Solemnity?, Emily Ittner
Technology In The Courtroom: Promoting Transparency Or Destroying Solemnity?, Emily Ittner
CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015)
No abstract provided.
Frand's Forever: Standards, Patent Transfers, And Licensing Commitments, Jay P. Kesan, Carol M. Hayes
Frand's Forever: Standards, Patent Transfers, And Licensing Commitments, Jay P. Kesan, Carol M. Hayes
Indiana Law Journal
No abstract provided.
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Wireless Localism: Beyond The Shroud Of Objectivity In Federal Spectrum Administration, Olivier Sylvain
Michigan Telecommunications & Technology Law Review
Recent innovations in mobile wireless technology have instigated a debate between two camps of legal scholars about federal administration of the electromagnetic spectrum. The first camp argues that the Federal Communications Commission (“FCC”) should define spectrum use rights more clearly and give spectrum licensees broad property rights in frequencies. The second camp argues that, rather than award exclusive licenses to the highest bidder, the FCC ought to open much, if not most, of the spectrum to unlicensed use by smartphones and tablets equipped with the newest spectrum administration technology. First, this Article shows that both of these camps comprise a …
A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe
A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe
University of Michigan Journal of Law Reform
As teenagers' access to cellular phones and the internet has increased over the past two decades, so has their ability to harm themselves and others through misuse of new technology. One risky behavior that has become common among teenagers is "sexting"--the digital sharing of sexually suggestive images. To combat the dangers of teen sexting, many states have criminalized the act. Criminalization does not resolve the issue of teen sexting, however, and in many cases it may cause additional harm. This Note reviews existing state laws related to teen sexting, and critiques these laws on constitutional and policy grounds. It then …
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Pepperdine Law Review
No abstract provided.
Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin
Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin
University of Michigan Journal of Law Reform
This Article explores child pornography law in relation to teen sexting conduct. Recently, some teens who engaged in teen sexting have been convicted under child pornography laws and have been required to register as sexual predators. The criminalization of teens for developmentally typical behavior, mimicking the conduct of adults, can result in grave harm to most teens. Furthermore, the application of child pornography laws to teen sexting conduct demonstrates the constitutional overbreadth of the current definition of child pornography. Photographs have an emblematic role in society-capturing and celebrating youth. Moreover, the creation of teen sexting images accompanies a teen's developmental …
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …
The Why In Diy Book Scanning, Daniel Reetz
The Future Of Digital Communications Research And Policy, Scott Wallsten
The Future Of Digital Communications Research And Policy, Scott Wallsten
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons
Technology Convergence And Federalism: Who Should Decide The Future Of Telecommunications Regulation?, Daniel A. Lyons
University of Michigan Journal of Law Reform
This Article critically examines the division of regulatory jurisdiction over telecommunications issues between the federal government and the states. Currently, the line between federal and state jurisdiction varies depending on the service at issue. This compartmentalization might have made sense fifteen years ago, but the advent of technology convergence has largely rendered this model obsolete. Yesterday's telephone and cable companies now compete head-to-head to offer consumers the vaunted "triple play" of voice, video, and internet services. But these telecommunications companies are finding it increasingly difficult to fit new operations into arcane, rigid regulatory compartments. Moreover, services that consumers view as …
Examining The Fcc's Indecency Regulations In Light Of Today's Technology, Elizabeth H. Steele
Examining The Fcc's Indecency Regulations In Light Of Today's Technology, Elizabeth H. Steele
Federal Communications Law Journal
Indecency regulations promulgated by the FCC used to be effective, but today's technological advances call those regulations into question. With the prevalence of digital video recorders and the availability of television shows on the Internet, children have unprecedented access to material broadcast at all times of day. As a result, the "safe harbor" rationale restricting the broadcast of indecent material no longer makes sense. A move toward deregulation is the most logical step to take, as it would prevent any First Amendment violations and would allow the networks freedom to broadcast material that the public may be interested in without …