Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 19 of 19
Full-Text Articles in Law
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Giancarlo Francesco Frosio
In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …
Toward A New Language Of Legal Drafting, Matthew Roach
Toward A New Language Of Legal Drafting, Matthew Roach
Matthew Roach
Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
Richard Warner
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden
Rob Frieden
This paper will examine new models for the carriage of Internet traffic with an eye toward providing insights on how the interconnection process has changed and what positive and negative consequences have resulted. Internet Service Provider (“ISP”) interconnection used to constitute a cooperative undertaking, but now it increasingly requires difficult and protracted negotiations between ventures that consider themselves adversaries in a winner take all transaction. The paper concludes that new commercial arrangements, such as paid peering, can achieve mutually beneficial outcomes. However, the paper also identifies instances where migration from traditional interconnection arrangements can harm consumers by reducing some of …
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
Sean Brian
No abstract provided.
Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden
Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden
Rob Frieden
Many advocates for less intrusive government oversight of telecommunications support the migration from regulation by an expert agency to the use of adjudication remedies largely guided by antitrust/competition policy principles. They believe that competition authorities, or reviewing courts can resolve disputes after they have occurred in lieu of having expert regulatory agencies available to anticipate and resolve problems before they become acute. Such ex post remedies typically determine whether anticompetitive conduct has occurred and what marketplace harm has resulted. Advocates for retaining so-called ex ante regulation believe that an expert agency remains essential particularly in light of fast changing market …
What’S New In The Network Neutrality Debate, Rob Frieden
What’S New In The Network Neutrality Debate, Rob Frieden
Rob Frieden
For over ten years, academics, practitioners, policy makers, consumers and other stakeholders have debated whether and how governments should regulate the Internet with an eye toward promoting accessibility, affordability and neutrality. This issue has triggered grave concerns about the Internet’s ability to continue generating substantial and widespread benefits. Advocates for various outcomes have vastly different assessments about many baseline subjects including the viability of sustainable competition and self-regulation. Consumers become agitated and confused by different framing of the issues, particularly when participants in the Internet ecosystem cannot reach closure on interconnection and compensation issues. Increasingly these disputes trigger temporary degradation …
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Rob Frieden
The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …
Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty
Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty
Meredith W. Doherty
As the technology of smartphones has progressed, electronic communication has become an integral and portable part of our daily lives. A recent New Jersey case highlighted the issue of holding the sender of a text message liable for injuries resulting from a motor vehicle accident in which the driver at fault was reading a text message from the sender at the time of the accident. This note focuses on the implications of such liability being imposed on senders of text messages as well as the slippery slope that could result, taking all forms of electronic communication, social media and mobile …
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Henry H. Perritt, Jr.
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden
Net Bias And The Treatment Of “Mission-Critical” Bits, Rob Frieden
Rob Frieden
The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any distribution format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a particular channel and in a single presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can …
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Lawrence J. Trautman Sr.
In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Jorge R Roig
Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar
Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar
Reuven Ashtar
This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Rob Frieden
Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …
The Need For Better Analysis Of High Capacity Services, George S. Ford, Lawrence J. Spiwak
The Need For Better Analysis Of High Capacity Services, George S. Ford, Lawrence J. Spiwak
GEORGE S FORD
In 1999, the Federal Communications Commission (“FCC”) began to grant incumbent local exchange carriers (“LECs”) pricing flexibility on special access services in some Metropolitan Statistical Areas (“MSAs”) when specific evidence of competitive alternatives is present. The propriety of that deregulatory move by the FCC has been criticized by the purchasers of such services ever since. Proponents of special access price regulation rely on three central arguments to support a retreat to strict price regulation: (1) the market(s) for special access and similar services is unduly concentrated; (2) rates of return on special access services, computed using FCC ARMIS data, are …