Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Communications Law

Technology

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 92

Full-Text Articles in Law

Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real Jan 2024

Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real

Washington Law Review Online

In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …


Deplatforming, Ganesh Sitaraman Nov 2023

Deplatforming, Ganesh Sitaraman

Vanderbilt Law School Faculty Publications

Deplatforming in the technology sector is hotly debated, and at times may even seem unprecedented. In recent years, scholars, commentators, jurists, and lawmakers have focused on the possibility of treating social-media platforms as common carriers or public utilities, implying that the imposition of a duty to serve the public would restrict them from deplatforming individuals and content.

But, in American law, the duty to serve all comers was never absolute. In fact, the question of whether and how to deplatform-—to exclude content, individuals, or businesses from critical services—- has been commonly and regularly debated throughout American history. In the common …


The Policy Origins Of Wi-Fi, John Blevins Jan 2023

The Policy Origins Of Wi-Fi, John Blevins

Indiana Law Journal

Wi-Fi technology has become a necessary foundation of modern economic and cultural life. This Article explains its history. Specifically, it argues that Wi-Fi owes its existence and widespread adoption to federal policy choices that have been underexplored in the literature. Wi-Fi’s development is often portrayed as an unexpected and lucky accident following the FCC’s initial decision in the 1980s to allow more unlicensed and experimental uses. This view, however, obscures the more fundamental role that federal policy played. For one, the rise of modern Wi-Fi was the product of a series of policy decisions spanning decades. In addition, the FCC’s …


The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry Jan 2023

The World Moved On Without Me: Redefining Contraband In A Technology-Driven World For Youth Detained In Washington State, Stephanie A. Lowry

Seattle University Law Review

If you ask a teenager in the United States to show you one of their favorite memories, they will likely show you a picture or video on their cell phone. This is because Americans, especially teenagers, love cell phones. Ninety-seven percent of all Americans own a cell phone according to a continuously updated survey by the Pew Research Center. For teenagers aged thirteen to seventeen, the number is roughly 95%. For eighteen to twenty-nine-year-olds, the number grows to 100%. On average, eight to twelve-year-old’s use roughly five and a half hours of screen media per day, in comparison to thirteen …


Freedom From Speech, Mary Anne Franks Jul 2022

Freedom From Speech, Mary Anne Franks

Articles

The importance of freedom of speech in a democratic society is usually taken as a given, but freedom from speech is no less important in safeguarding the values of truth, autonomy, and democracy. Freedom from speech includes both the right of the individual to not be forced to speak and the freedom to avoid the speech of others. This essay attempts to highlight the significance of freedom from speech in order to clarify the importance of the First Amendment right against compelled speech; provide an explanation for when the right of free speech yields to other rights; and offer a …


Racialized, Judaized, Feminized: Identity-Based Attacks On The Press, Lili Levi Jan 2022

Racialized, Judaized, Feminized: Identity-Based Attacks On The Press, Lili Levi

Articles

No abstract provided.


Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis Jan 2022

Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis

Dickinson Law Review (2017-Present)

For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.

People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …


How Should We Regulate The Internet? A Proposal, Natalie Petruzelli Jun 2021

How Should We Regulate The Internet? A Proposal, Natalie Petruzelli

The Review: A Journal of Undergraduate Student Research

With the invention of the internet providing newfangled methods of spreading information around the world, misinformation has also found home in these pathways, disrupting the general public’s ability to discern fact from fiction and creating divides in society. Regulation must be enacted to stop the effects of misinformation, but the efforts of technology companies and the general public have been insufficient thus far. Regulatory control of the internet and its content should be the responsibility of the government, based on their constitutional right to intervene under certain circumstances and the fact that previous efforts by other parties to mitigate misinformation …


The Futility Of Regulating Social Media Content In A Global Media Environment, Rick G. Morris Apr 2021

The Futility Of Regulating Social Media Content In A Global Media Environment, Rick G. Morris

Notre Dame Journal on Emerging Technologies

Social media reaches more people on the planet than any prior form of media and transmits more information world-wide than ever before. It is an empowering factor in establishing and growing communities, but at the same time, creates havoc and disseminates pernicious and perhaps dangerous speech. And so it has been with the media from the beginning of time. Throughout the media’s history, efforts at regulation or control of media speech has been fraught with difficulty, ineffectiveness, discrimination, and failure. The use of technology can deceive the consumer of the information, and the social media companies as well. Both government …


Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson Jan 2021

Seeing (Platforms) Like A State: Digital Legibility And Lessons For Platform Governance, Neil Chilson

Catholic University Journal of Law and Technology

The growing backlash against Big Tech companies is a symptom of digital technology increasing the world’s legibility. James C. Scott’s book, Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed, explores how past governments responded to increased legibility – for good and for ill. This article shows how Scott’s historical lessons can guide governments and tech platforms as they seek to improve the human condition online.


To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard Jan 2021

To Innovate Or Regulate: How To Regulate Cloud Service Providers Within Financial Institutions, Morgan Willard

Catholic University Journal of Law and Technology

The purpose of this article is to analyze whether cloud service providers should be considered Systemically Important Financial Market Utilities (SIFMU), subjecting them to increased oversight. It also considers the risks and benefits associated with the use of the technology by financial institutions, as well as potential alternatives. Overall, this article argues that cloud service providers do not fall under the current SIFMU framework, and any regulation of the technology should strive to strike a balance between innovation and safe regulation.


"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue Jan 2021

"Times They Are A Changin'" - Can The Ad Tech Industry Survive In A Privacy Conscious World?, Meaghan Donahue

Catholic University Journal of Law and Technology

The "ad tech ecosystem" is a web of interconnected technologies and intermediaries that facilitate targeted advertising based on consumer data, and supports the free internet while providing users with promotional content relevant to their interests. However, in recent years, lawmakers and consumer advocates have highlighted the dangers associated with the unregulated use of consumer data for advertising purposes, prompting a flurry of legislative action at both the state and federal levels. These various laws and proposed bills impose new challenges on the ad tech industry--threatening to fundamentally change the way the business operates. However, through innovation and creative thinking, the …


Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal Oct 2020

Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith Jan 2020

How Reporters Can Evaluate Automated Driving Announcements, Bryant Walker Smith

Journal of Law and Mobility

This article identifies a series of specific questions that reporters can ask about claims made by developers of automated motor vehicles (“AVs”). Its immediate intent is to facilitate more critical, credible, and ultimately constructive reporting on progress toward automated driving. In turn, reporting of this kind advances three additional goals. First, it encourages AV developers to qualify and support their public claims. Second, it appropriately manages public expectations about these vehicles. Third, it fosters more technical accuracy and technological circumspection in legal and policy scholarship.


Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast Jan 2020

Protecting Online Privacy In The Digital Age: Carpenter V. United States And The Fourth Amendment’S Third-Party Doctrine, Cristina Del Rosso, Carol M. Bast

Catholic University Journal of Law and Technology

The goal of this paper is to examine the future of the third-party doctrine with the proliferation of technology and the online data we are surrounded with daily, specifically after the Supreme Court’s decision in Carpenter v. United States. It is imperative that individuals do not forfeit their Constitutional guarantees for the benefit of living in a technologically advanced society. This requires an understanding of the modern-day functional equivalents of “papers” and “effects.”

Looking to the future, this paper contemplates solutions on how to move forward in this technology era by scrutinizing the relevancy of the third-party doctrine due …


A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming Jan 2020

A Dangerous Inheritance: A Child’S Digital Identity, Kate Hamming

Seattle University Law Review

This Comment begins with one family’s story of its experience with social media that many others can relate to in today’s ever-growing world of technology and the Internet. Technology has made it possible for a person’s online presence to grow exponentially through continuous sharing by other Internet users. This ability to communicate and share information amongst family, friends, and strangers all over the world, while beneficial in some regard, comes with its privacy downfalls. The risks to privacy are elevated when children’s information is being revealed, which often stems from a child’s own parents conduct online. Parents all over the …


How The Internet Unmakes Law, Mary Anne Franks Jan 2020

How The Internet Unmakes Law, Mary Anne Franks

Articles

No abstract provided.


The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Mary Anne Franks, Danielle Citron Jan 2020

The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Mary Anne Franks, Danielle Citron

Articles

No abstract provided.


Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn Jul 2019

Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn

Andrea Matwyshyn

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …


The Media, A Polarized America & Adr Tools To Enhance Understanding Of Perspectives, Ginsey Varghese Kramarczyk May 2019

The Media, A Polarized America & Adr Tools To Enhance Understanding Of Perspectives, Ginsey Varghese Kramarczyk

Pepperdine Dispute Resolution Law Journal

This article will survey: (1) the intended role of the media in a democracy; (2) the current polarized political climate in the United States; (3) the challenges facing the twenty-first century with the growth of technology, cable news, and online platforms; (4) the media's role in perpetuating conflict; and (5) propose that media professionals use Alternative Dispute Resolution (ADR) tools and processes to increase the public’s understanding of differing perspectives in our conflict-laden political discourse.


Law Library Blog (January 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2019

Law Library Blog (January 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


User-Generated Evidence, Rebecca Hamilton Jan 2018

User-Generated Evidence, Rebecca Hamilton

Articles in Law Reviews & Other Academic Journals

Around the world, people are using their smartphones to document atrocities. This Article is the first to address the implications of this important development for international criminal law. While acknowledging the potential benefits such user-generated evidence could have for international criminal investigations, the Article identifies three categories of concern related to its use: (i) user security; (ii) evidentiary bias; and (iii) fair trial rights. In the absence of safeguards, user-generated evidence may address current problems in international criminal justice at the cost of creating new ones and shifting existing problems from traditional actors, who have institutional backing, to individual users …


Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland Jan 2017

Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland

Catholic University Journal of Law and Technology

No abstract provided.


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman Jan 2017

Debating Autonomous Weapon Systems, Their Ethics, And Their Regulation Under International Law, Kenneth Anderson, Matthew C. Waxman

Faculty Scholarship

An international public debate over the law and ethics of autonomous weapon systems (AWS) has been underway since 2012, with those urging legal regulation of AWS under existing principles and requirements of the international law of armed conflict, on the one side, in argument with opponents who favor, instead, a preemptive international treaty ban on all such weapons, on the other. This Chapter provides an introduction to this international debate, offering the main arguments on each side. These include disputes over defining an AWS, the morality and law of automated targeting and target selection by machine, and the interaction of …


Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs Jan 2016

Need For Informed Consent In The Age Of Ubiquitous Human Testing, Caitlyn Kuhs

Loyola of Los Angeles Law Review

No abstract provided.


The Forgotten Core Of The Telecommunications Act Of 1996, Philip J. Weiser Jan 2016

The Forgotten Core Of The Telecommunications Act Of 1996, Philip J. Weiser

Publications

No abstract provided.


Can Dna Be Speech?, Jorge R. Roig Dec 2015

Can Dna Be Speech?, Jorge R. Roig

Jorge R Roig

DNA is generally regarded as the basic building block of life itself. In the most fundamental sense, DNA is nothing more than a chemical compound, albeit a very complex and peculiar one. DNA is an information-carrying molecule. The specific sequence of base pairs contained in a DNA molecule carries with it genetic information, and encodes for the creation of particular proteins. When taken as a whole, the DNA contained in a single human cell is a complete blueprint and instruction manual for the creation of that human being.
In this article we discuss myriad current and developing ways in which …


Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg Jun 2015

Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg

Michigan Telecommunications & Technology Law Review

This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …