Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Maurer School of Law: Indiana University (22)
- University of Michigan Law School (20)
- The Catholic University of America, Columbus School of Law (6)
- University of Pennsylvania Carey Law School (5)
- New York Law School (4)
-
- University of Miami Law School (4)
- American University Washington College of Law (3)
- Vanderbilt University Law School (3)
- Columbia Law School (2)
- Northwestern Pritzker School of Law (2)
- Pepperdine University (2)
- Seattle University School of Law (2)
- Selected Works (2)
- University of Pittsburgh School of Law (2)
- Boston University School of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Notre Dame Law School (1)
- Penn State Dickinson Law (1)
- Roger Williams University (1)
- SelectedWorks (1)
- St. John Fisher University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- University of Colorado Law School (1)
- University of Massachusetts Amherst (1)
- University of Massachusetts School of Law (1)
- University of Richmond (1)
- University of Washington School of Law (1)
- Publication Year
- Publication
-
- Federal Communications Law Journal (20)
- Michigan Telecommunications & Technology Law Review (10)
- Articles (6)
- All Faculty Scholarship (5)
- Catholic University Journal of Law and Technology (5)
-
- Michigan Law Review (5)
- Faculty Scholarship (3)
- University of Michigan Journal of Law Reform (3)
- Articles & Chapters (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Indiana Law Journal (2)
- NYLS Law Review (2)
- Northwestern Journal of International Law & Business (2)
- Seattle University Law Review (2)
- Andrea Matwyshyn (1)
- CommLaw Conspectus: Journal of Communications Law and Technology Policy (1993-2015) (1)
- Dickinson Law Review (2017-Present) (1)
- Doctoral Dissertations (1)
- Faculty Publications (1)
- Giancarlo Francesco Frosio (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Jorge R Roig (1)
- Journal of Law and Mobility (1)
- Law Library Newsletters/Blog (1)
- Loyola of Los Angeles Law Review (1)
- Notre Dame Journal on Emerging Technologies (1)
- Pepperdine Dispute Resolution Law Journal (1)
- Pepperdine Law Review (1)
- Publications (1)
- The Review: A Journal of Undergraduate Student Research (1)
- Publication Type
Articles 1 - 30 of 92
Full-Text Articles in Law
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Washington Law Review Online
In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …
Deplatforming, Ganesh Sitaraman
Deplatforming, Ganesh Sitaraman
Vanderbilt Law School Faculty Publications
Deplatforming in the technology sector is hotly debated, and at times may even seem unprecedented. In recent years, scholars, commentators, jurists, and lawmakers have focused on the possibility of treating social-media platforms as common carriers or public utilities, implying that the imposition of a duty to serve the public would restrict them from deplatforming individuals and content.
But, in American law, the duty to serve all comers was never absolute. In fact, the question of whether and how to deplatform-—to exclude content, individuals, or businesses from critical services—- has been commonly and regularly debated throughout American history. In the common …
The Policy Origins Of Wi-Fi, John Blevins
The Policy Origins Of Wi-Fi, John Blevins
Indiana Law Journal
Wi-Fi technology has become a necessary foundation of modern economic and cultural life. This Article explains its history. Specifically, it argues that Wi-Fi owes its existence and widespread adoption to federal policy choices that have been underexplored in the literature. Wi-Fi’s development is often portrayed as an unexpected and lucky accident following the FCC’s initial decision in the 1980s to allow more unlicensed and experimental uses. This view, however, obscures the more fundamental role that federal policy played. For one, the rise of modern Wi-Fi was the product of a series of policy decisions spanning decades. In addition, the FCC’s …
The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry
The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry
Seattle University Law Review
If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …
Freedom From Speech, Mary Anne Franks
Freedom From Speech, Mary Anne Franks
Articles
The importance of freedom of speech in a democratic society is usually taken as a given, but freedom from speech is no less important in safeguarding the values of truth, autonomy, and democracy. Freedom from speech includes both the right of the individual to not be forced to speak and the freedom to avoid the speech of others. This essay attempts to highlight the significance of freedom from speech in order to clarify the importance of the First Amendment right against compelled speech; provide an explanation for when the right of free speech yields to other rights; and offer a …
Racialized, Judaized, Feminized: Identity-Based Attacks On The Press, Lili Levi
Racialized, Judaized, Feminized: Identity-Based Attacks On The Press, Lili Levi
Articles
No abstract provided.
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …
How Should We Regulate The Internet? A Proposal, Natalie Petruzelli
How Should We Regulate The Internet? A Proposal, Natalie Petruzelli
The Review: A Journal of Undergraduate Student Research
With the invention of the internet providing newfangled methods of spreading information around the world, misinformation has also found home in these pathways, disrupting the general public’s ability to discern fact from fiction and creating divides in society. Regulation must be enacted to stop the effects of misinformation, but the efforts of technology companies and the general public have been insufficient thus far. Regulatory control of the internet and its content should be the responsibility of the government, based on their constitutional right to intervene under certain circumstances and the fact that previous efforts by other parties to mitigate misinformation …
The Futility Of Regulating Social Media Content In A Global Media Environment, Rick G. Morris
The Futility Of Regulating Social Media Content In A Global Media Environment, Rick G. Morris
Notre Dame Journal on Emerging Technologies
Social media reaches more people on the planet than any prior form of media and transmits more information world-wide than ever before. It is an empowering factor in establishing and growing communities, but at the same time, creates havoc and disseminates pernicious and perhaps dangerous speech. And so it has been with the media from the beginning of time. Throughout the media’s history, efforts at regulation or control of media speech has been fraught with difficulty, ineffectiveness, discrimination, and failure. The use of technology can deceive the consumer of the information, and the social media companies as well. Both government …
Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson
Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson
Catholic University Journal of Law and Technology
The growing backlash against Big Tech companies is a symptom of digital technology increasing the world’s legibility. James C. Scott’s book, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, explores how past governments responded to increased legibility – for good and for ill. This article shows how Scott’s historical lessons can guide governments and tech platforms as they seek to improve the human condition online.
To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard
To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard
Catholic University Journal of Law and Technology
The purpose of this article is to analyze whether cloud service providers should be considered Systemically Important Financial Market Utilities (SIFMU), subjecting them to increased oversight. It also considers the risks and benefits associated with the use of the technology by financial institutions, as well as potential alternatives. Overall, this article argues that cloud service providers do not fall under the current SIFMU framework, and any regulation of the technology should strive to strike a balance between innovation and safe regulation.
"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue
"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue
Catholic University Journal of Law and Technology
The "ad tech ecosystem" is a web of interconnected technologies and intermediaries that facilitate targeted advertising based on consumer data, and supports the free internet while providing users with promotional content relevant to their interests. However, in recent years, lawmakers and consumer advocates have highlighted the dangers associated with the unregulated use of consumer data for advertising purposes, prompting a flurry of legislative action at both the state and federal levels. These various laws and proposed bills impose new challenges on the ad tech industry--threatening to fundamentally change the way the business operates. However, through innovation and creative thinking, the …
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.
How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith
How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith
Journal of Law and Mobility
This article identifies a series of specific questions that reporters can ask about claims made by developers of automated motor vehicles (“AVs”). Its immediate intent is to facilitate more critical, credible, and ultimately constructive reporting on progress toward automated driving. In turn, reporting of this kind advances three additional goals. First, it encourages AV developers to qualify and support their public claims. Second, it appropriately manages public expectations about these vehicles. Third, it fosters more technical accuracy and technological circumspection in legal and policy scholarship.
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast
Catholic University Journal of Law and Technology
The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”
Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming
Seattle University Law Review
This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …
How The Internet Unmakes Law, Mary Anne Franks
The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Mary Anne Franks, Danielle Citron
The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Mary Anne Franks, Danielle Citron
Articles
No abstract provided.
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Andrea Matwyshyn
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …
The Media, A Polarized America & Adr Tools To Enhance Understanding Of Perspectives, Ginsey Varghese Kramarczyk
The Media, A Polarized America & Adr Tools To Enhance Understanding Of Perspectives, Ginsey Varghese Kramarczyk
Pepperdine Dispute Resolution Law Journal
This article will survey: (1) the intended role of the media in a democracy; (2) the current polarized political climate in the United States; (3) the challenges facing the twenty-first century with the growth of technology, cable news, and online platforms; (4) the media's role in perpetuating conflict; and (5) propose that media professionals use Alternative Dispute Resolution (ADR) tools and processes to increase the public’s understanding of differing perspectives in our conflict-laden political discourse.
Law Library Blog (January 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
User-Generated Evidence, Rebecca Hamilton
User-Generated Evidence, Rebecca Hamilton
Articles in Law Reviews & Other Academic Journals
Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …
Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland
Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland
Catholic University Journal of Law and Technology
No abstract provided.
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …
Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman
Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman
Faculty Scholarship
An international public debate over the law and ethics of autonomous weapon systems (AWS) has been underway since 2012, with those urging legal regulation of AWS under existing principles and requirements of the international law of armed conflict, on the one side, in argument with opponents who favor, instead, a preemptive international treaty ban on all such weapons, on the other. This Chapter provides an introduction to this international debate, offering the main arguments on each side. These include disputes over defining an AWS, the morality and law of automated targeting and target selection by machine, and the interaction of …
Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs
Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs
Loyola of Los Angeles Law Review
No abstract provided.
The Forgotten Core Of The Telecommunications Act Of 1996, Philip J. Weiser
The Forgotten Core Of The Telecommunications Act Of 1996, Philip J. Weiser
Publications
No abstract provided.
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Giancarlo Francesco Frosio
In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …