Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- The Catholic University of America, Columbus School of Law (8)
- UC Law SF (5)
- Villanova University Charles Widger School of Law (4)
- Mercer University School of Law (2)
- Penn State Dickinson Law (2)
-
- University of Michigan Law School (2)
- Washington and Lee University School of Law (2)
- American University Washington College of Law (1)
- Association of Arab Universities (1)
- Florida International University College of Law (1)
- Fordham Law School (1)
- Northwestern Pritzker School of Law (1)
- St. John's University School of Law (1)
- Texas A&M University School of Law (1)
- University of Massachusetts School of Law (1)
- University of Miami Law School (1)
- University of Oklahoma College of Law (1)
- University of Washington School of Law (1)
- West Virginia University (1)
- Keyword
-
- FCC (5)
- Privacy (3)
- COVID-19 (2)
- Data (2)
- Fake news (2)
-
- Misinformation (2)
- Public interest (2)
- Social media (2)
- Social media platforms (2)
- 5G (1)
- 5G technology (1)
- 5th Amendment (1)
- ATDS (1)
- Acceptance and assimilation of new technological policy measures (1)
- Act (1)
- Advertisements (1)
- Apps (1)
- Auto (1)
- Autodials (1)
- Automated calls (1)
- Automatic telephone dialing system (1)
- Bailment (1)
- Black Americans (1)
- Broadband (1)
- Broadcast (1)
- Broadcasting (1)
- Byron Allen (1)
- COVID (1)
- Cable (1)
- Cartoon contracts (1)
- Publication
-
- Catholic University Journal of Law and Technology (6)
- UC Law SF Communications and Entertainment Journal (5)
- Catholic University Law Review (2)
- Dickinson Law Review (2017-Present) (2)
- Jeffrey S. Moorad Sports Law Journal (2)
-
- Mercer Law Review (2)
- Michigan Technology Law Review (2)
- American University Business Law Review (1)
- FIU Law Review (1)
- Fordham Law Review Online (1)
- Journal of Civil Rights and Economic Development (1)
- Northwestern Journal of Technology and Intellectual Property (1)
- Oklahoma Law Review (1)
- Texas A&M Journal of Property Law (1)
- University of Massachusetts Law Review (1)
- University of Miami Business Law Review (1)
- Villanova Environmental Law Journal (1)
- Villanova Law Review (1)
- Washington Law Review (1)
- Washington and Lee Journal of Civil Rights and Social Justice (1)
- Washington and Lee Law Review (1)
- West Virginia Law Review (1)
- مجلة جامعة الإمارات للبحوث القانونية UAEU LAW JOURNAL (1)
Articles 1 - 30 of 37
Full-Text Articles in Law
Forms Of Expression Of Will In Constitutional Texts Regulating Rights And Freedoms And Its Impact On Their Guarantee: A Comparative Study), Fatima Zohra Ramdani Dr.
Forms Of Expression Of Will In Constitutional Texts Regulating Rights And Freedoms And Its Impact On Their Guarantee: A Comparative Study), Fatima Zohra Ramdani Dr.
مجلة جامعة الإمارات للبحوث القانونية UAEU LAW JOURNAL
The study presents the problem of multiple method of expression in drafting constitutional legal rules related to the rights and freedoms of individuals, because the good constitutional rule simplifies the difficulties related to understanding and applying them, and spreading legitimate confidence in the legal system of the state, which results in protecting the legal framework in which individuals and state authorities interact alike the objective of the state of law.
The recherche revealed that the multiplicity of methods, and how to provide for rights and freedoms has two butt: the first hand is demonstrates the interest of the constitutional founder …
Blocking Nature's Vulnerable Calls For Help: The Tenth Circuit Dials Into The Telecommunications Act's Federal Environmental Preemption Clause In Santa Fe Alliance V. City Of Santa Fe, Samantha Speiss
Villanova Environmental Law Journal
No abstract provided.
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Wiretapping The Internet: Analyzing The Application Of The Federal Wiretap Act’S Party Exception Online, Hayden Driscoll
Washington and Lee Journal of Civil Rights and Social Justice
The federal Wiretap Act—originally enacted to curtail the government’s unbridled use of wiretaps to monitor telephonic communications—was amended in 1986 to provide a private right of action, extending the Act’s Fourth Amendment-like protections to private intrusions. Since the advent of the internet, plaintiffs have attempted to predicate claims of unauthorized online privacy intrusions on the Wiretap Act. In response, defendants claim they are parties to the communications at issue and should be absolved of liability under the Act’s party exception. The federal circuit courts of appeal disagree on how the party exception applies in the internet context. This Note evaluates …
Countering Personalized Speech, Leon G. Ho
Countering Personalized Speech, Leon G. Ho
Northwestern Journal of Technology and Intellectual Property
Social media platforms use personalization algorithms to make content curation decisions for each end user. These personalized recommendation decisions are essentially speech conveying a platform's predictions on content relevance for each end user. Yet, they are causing some of the worst problems on the internet. First, they facilitate the precipitous spread of mis- and disinformation by exploiting the very same biases and insecurities that drive end user engagement with such content. Second, they exacerbate social media addiction and related mental health harms by leveraging users' affective needs to drive engagement to greater and greater heights. Lastly, they erode end user …
Representation Without Elections: Civil Society Participation As A Remedy For The Democratic Deficits Of Online Speech Governance, Brenda Dvoskin
Representation Without Elections: Civil Society Participation As A Remedy For The Democratic Deficits Of Online Speech Governance, Brenda Dvoskin
Villanova Law Review
No abstract provided.
Beyond True And False: Fake News And The Digital Epistemic Divide, Gilad Abiri, Johannes Buchheim
Beyond True And False: Fake News And The Digital Epistemic Divide, Gilad Abiri, Johannes Buchheim
Michigan Technology Law Review
The massive fact-checking, flagging, and content removal campaigns run by major digital platforms during the 2020 elections and the Covid-19 pandemic did some good. However, they failed to prevent substantial portions of the population from believing that the election was stolen or that vaccinations are dangerous.
In this Article, we argue that the reason for the ineffectiveness of truth-based solutions—such as fact-checking— is that they do not reach the heart of the problem. Both scholars and policymakers share the implicit or explicit belief that the rise of digital fake news is harmful mainly because it spreads false information, which lays …
Private Censorship, Disinformation And The First Amendment: Rethinking Online Platforms Regulation In The Era Of A Global Pandemic, Tzu- Chiang Huang
Private Censorship, Disinformation And The First Amendment: Rethinking Online Platforms Regulation In The Era Of A Global Pandemic, Tzu- Chiang Huang
Michigan Technology Law Review
The proliferation of online disinformation and the rise of private censorship are paradigmatic examples of the challenges to traditional First Amendment jurisprudence in an algorithmic society. The limitations of traditional First Amendment jurisprudence are amplified by the impact of the COVID-19 pandemic in two ways. On the one hand, in the wake of the pandemic, we have entered an “infodemic” era where the volume of disinformation, as well as the harm it causes have reached unprecedented levels. For example, health disinformation has contributed to vaccine hesitancy. On the other hand, even though the proliferation of online disinformation seems to suggest …
High School Coaches Call A Foul: Important Considerations For High School Coaches Considering A Defamation Claim, Mallory Shumaker
High School Coaches Call A Foul: Important Considerations For High School Coaches Considering A Defamation Claim, Mallory Shumaker
Jeffrey S. Moorad Sports Law Journal
No abstract provided.
The Three Laws: The Chinese Communist Party Throws Down The Data Regulation Gauntlet, William Chaskes
The Three Laws: The Chinese Communist Party Throws Down The Data Regulation Gauntlet, William Chaskes
Washington and Lee Law Review
Criticism of the Chinese Communist Party (CCP) runs a wide gamut. Accusations of human rights abuses, intellectual property theft, authoritarian domestic policies, disrespecting sovereign borders, and propaganda campaigns all have one common factor: the CCP’s desire to control information. Controlling information means controlling data. Lurking beneath the People’s Republic of China’s (PRC) tumultuous relationship with the rest of the world is the fight between nations to control their citizens’ data while also keeping it out of the hands of adversaries. The CCP’s Three Laws are its newest weapon in this data war.
One byproduct of the CCP’s emphasis on controlling …
The Kids Are All Right: The Law Of Free Expression And New Information Technologies, Mark Tushnet
The Kids Are All Right: The Law Of Free Expression And New Information Technologies, Mark Tushnet
Catholic University Law Review
Recently the literature on free expression has turned to the question, should the law of free expression be adjusted because of the availability of new information technologies (hereafter NIT), and if so, how? The only thing about NIT that distinguishes them from traditional media is that disseminating expression via NIT is much less expensive than doing so via traditional media. The tenor of recent scholarship on NIT and free expression is that the invention of NIT does support some modification of free expression law. This Essay argues that that conclusion might be correct, but that many of the arguments offered …
Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas
Paving A New (Hua)Wei: A Comparative Analysis Of International Approaches To Securing Information And Communication Technology Supply Chains, Jordan Villegas
Catholic University Law Review
Recent amendments to Chinese Intelligence Laws codify affirmative obligations upon domestic companies and citizens alike, namely, that they must assist and support the Chinese Communist Party (CCP) in its intelligence gathering efforts. Coupling these laws with the international prevalence of Huawei, a Chinese telecommunications company comprising two-thirds of 5G equipment outside China, CCP compromised 5G equipment is an unassailable reality. This article explores five intelligence allied nations and how each has respectively addressed the risk posed by Huawei. It argues each nation’s policies are deducible to three primary approaches, categorically including: (1) promulgation of law explicitly excluding Huawei 5G equipment; …
Investing In Human Futures: How Big Tech And Social Media Giants Abuse Privacy And Manipulate Consumerism, Brett Dembrow
Investing In Human Futures: How Big Tech And Social Media Giants Abuse Privacy And Manipulate Consumerism, Brett Dembrow
University of Miami Business Law Review
Social media companies such as Facebook, Twitter, and Instagram originated with one seemingly innocent goal: “to bring the world closer together.”1 Now, these Big Tech giants own and operate some of the most powerful platforms in the world simply because of their unethical yet effective strategies to maintain their users’ attention. Social media companies have monetized the amount of time their users spend on their platforms by honing in on the individual preferences of each user and selling that access to advertisers. This heightened access to potential consumers and their preferences has become the most valuable marketing tool for digital …
Broadband In The Mountain State: Connectivity Linked To Local Options, Denali S. Hendrick
Broadband In The Mountain State: Connectivity Linked To Local Options, Denali S. Hendrick
West Virginia Law Review
No abstract provided.
How To Regulate Online Platforms: Why Common Carrier Doctrine Is Inappropriate To Regulate Social Networks And Alternate Approaches To Protect Rights, Edward W. Mclaughlin
How To Regulate Online Platforms: Why Common Carrier Doctrine Is Inappropriate To Regulate Social Networks And Alternate Approaches To Protect Rights, Edward W. Mclaughlin
Fordham Law Review Online
Concerns about the “concentrated control of so much speech in the hands of a few private parties” and their ability to suppress some user speech have led to calls to regulate online platforms like common carriers or public accommodations. Advocates of that regulation theorize that social media platforms host today’s public forum and are open to all comers and so should have a responsibility to be content neutral and allow all voices to be heard. Traditionally, the argument that private players, as opposed to only government actors, can violate individuals’ free speech rights was a progressive cause, but recently conservative …
Rage Against The Machine: Reducing Robocall Abuse To Protect At-Risk Consumers, Nicole Egan
Rage Against The Machine: Reducing Robocall Abuse To Protect At-Risk Consumers, Nicole Egan
University of Massachusetts Law Review
For most people, robocalls are nothing more than an annoying side-effect of owning a cell phone today. But a successful robocall scheme is still capable of wreaking financial and psychological havoc on its victims. Senior citizens and cognitively impaired individuals are often targeted by fraudulent phone calls or texts because they may have trouble understanding how to identify and protect themselves from robocall abuse. This Note proposes a collaborative solution to this problem by calling on the judiciary and legislatures to minimize the amount of robocalls received by American telephone consumers. By adopting a broader understanding of the law and …
Sunday Ticket: The Ninth Circuit's Expansion Of The Quick Look Test Could Incidentally Help Fans Watch More Football For Less Money, Matthew Oakley
Sunday Ticket: The Ninth Circuit's Expansion Of The Quick Look Test Could Incidentally Help Fans Watch More Football For Less Money, Matthew Oakley
Jeffrey S. Moorad Sports Law Journal
No abstract provided.
The Empty Promises Of Diversity Mou's: How The Fcc Can Strengthen Commitments To Racial Equity, Jeleesa Omala
The Empty Promises Of Diversity Mou's: How The Fcc Can Strengthen Commitments To Racial Equity, Jeleesa Omala
Journal of Civil Rights and Economic Development
(Excerpt)
African Americans have been systematically disenfranchised from nearly all sectors of American society since the country’s founding. As such, African Americans do not just perceive the problem of racial discrimination as a matter of personal prejudice but also a matter of survival. Without access to fundamental resources like higher education, healthcare, and economic opportunity, the quality of Black life decreases astronomically. The nation begins to equate being Black with being “less than,” and continues to disinvest in Black populations, which signals to Black people that their lives do not matter.
Nevertheless, determined Black entrepreneurs continue to fight to expand …
The Jurisprudence Of Public Concern In Anti-Slapp Law: Shifting Boundaries In State Statutory Protection Of Free Expression, Matthew D. Bunker, Emily Erickson
The Jurisprudence Of Public Concern In Anti-Slapp Law: Shifting Boundaries In State Statutory Protection Of Free Expression, Matthew D. Bunker, Emily Erickson
UC Law SF Communications and Entertainment Journal
No abstract provided.
From Utilitarianism To Fordism: How Americans Brought The Panopticon Home, Katherine Hoppe
From Utilitarianism To Fordism: How Americans Brought The Panopticon Home, Katherine Hoppe
UC Law SF Communications and Entertainment Journal
The COVID-19 pandemic forced many not considered essential employees into their homes. Many employers worried about employee accountability, leveraged surveillance techniques to maximize employee performance and ensure productivity. These technologies include screen monitoring software, video recordings of employees within their homes, monitoring of social media, and typing efficiency. While employees continue to work outside of the office, private employers will increasingly monitor employees in spaces traditionally considered private—including the home. As private and public life spheres continue to overlap, privacy for workers may erode. What kinds of surveillance have employees experienced in their homes since the Covid-19 lockdown orders? Moreover, …
Digital Wild West: Foreign Social Media Bans, Data Privacy, And Free Speech, Tiange (Tim) Chen
Digital Wild West: Foreign Social Media Bans, Data Privacy, And Free Speech, Tiange (Tim) Chen
UC Law SF Communications and Entertainment Journal
No abstract provided.
Cut! . . . Out Of Credit Arbitration The Case For Giving Hollywood Directors A Formalized Dispute Resolution Procedure For Conflicts Of Attribution, Madeline Giles
UC Law SF Communications and Entertainment Journal
No abstract provided.
The New Bailments, Danielle D’Onfro
The New Bailments, Danielle D’Onfro
Washington Law Review
The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …
Section 230 Of The Communications Decency Act: The “Good Samaritan” Law Which Grants Immunity To “Bad Samaritans”, Josh Slovin
Section 230 Of The Communications Decency Act: The “Good Samaritan” Law Which Grants Immunity To “Bad Samaritans”, Josh Slovin
Mercer Law Review
In 1989, the “world wide web” launched in the public domain, creating what we call today the “internet.” However, the internet was slow to catch on. In 1996, there were only 20 million American users on the internet. As the adoption of the internet by Americans slowly increased so did the development of internet websites and internet services. The United States Congress quickly began to see the pitfalls of the internet unfolding before its own eyes. In effect, the internet created a new venue for the dissemination of defamatory and elicit content.
Beginning in 1991, litigation commenced when individuals sought …
Burning The House To Roast A Pig: Examining Florida’S Controversial Social Media Law, Wes P. Rahn
Burning The House To Roast A Pig: Examining Florida’S Controversial Social Media Law, Wes P. Rahn
Mercer Law Review
The recent proliferation of social media platforms has revolutionized the way individuals convey ideas and communicate with one another. Social media has quickly become the most dominate form of communication, surpassing more traditional modes of communication such as newspapers and television. It is estimated that over two-thirds of American adults now use social networking sites. Moreover, an astonishing 90% of young adults use social media. Social media has not only become an integral part of American culture in terms of entertainment and communication, but has also become a useful tool for politicians and the electorate who wish to engage in …
Content Moderation Issues Online: Section 230 Is Not To Blame, Reese D. Bastian
Content Moderation Issues Online: Section 230 Is Not To Blame, Reese D. Bastian
Texas A&M Journal of Property Law
Section 230 of the Communications Decency Act (“Section 230”) is the glue that holds the Internet—as we know it today—together. Section 230 says, “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” Simply put, Section 230 says that websites or platforms are not liable for content posted by third parties. There are many critics who attribute the maladies of the online world to Section 230. Section 230 presents issues such as over-moderation by Interactive Computer Service (“ICS”) providers that can go as far …
Common Law Rules: Applying Common Law Principles To Reassigned Phone Number Disputes Under The Tcpa, Monica Fritsch
Common Law Rules: Applying Common Law Principles To Reassigned Phone Number Disputes Under The Tcpa, Monica Fritsch
American University Business Law Review
No abstract provided.
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao
Catholic University Journal of Law and Technology
The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.
This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …
À La Carte Cable: A Regulatory Solution To The Misinformation Subsidy, Christopher R. Terry, Eliezer J. Silberberg, Stephen Schmitz, John Stack, Eve Sando
À La Carte Cable: A Regulatory Solution To The Misinformation Subsidy, Christopher R. Terry, Eliezer J. Silberberg, Stephen Schmitz, John Stack, Eve Sando
Catholic University Journal of Law and Technology
Although “fake news” is as old as mass media itself, concerns over disinformation have reached a fever pitch in our current media environment. Online media outlets’ heavy reliance on user-generated content has altered the traditional gatekeeping functions and professional standards associated with traditional news organizations. The idea of objectivity-focused informational content has primarily been substituted for a realist acceptance of the power and popularity of opinion-driven “news.” This shift is starkly visible now: mainstream news media outlets knowingly spread hoaxes, conspiracy theories, and the like.
This current state of affairs is not some freak accident. The Supreme Court’s First Amendment …