Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Self-Defense To Cyber Force: Combatting The Notion Of 'Scale And Effect', Thomas Eaton Jan 2021

Self-Defense To Cyber Force: Combatting The Notion Of 'Scale And Effect', Thomas Eaton

Scholarly Works

The ability to reach out, with a few keystrokes or a couple lines of code, through the interconnected world of cyberspace and create militarily advantageous effects 10,000 miles away has changed warfare as previously conceived, perhaps more than any other advancement in any other domain of war. Cyber weapons are weapons, and whatever law applies to conventional weapons equally applies to cyber weapons. Long before cyber operations were even science fiction, there was much debate over what constituted a use of force that would justify force in response. In many ways, the debate over what constitutes cyber-attacks has been pasted …


Speech, Innovation, And Competition, Greg Day Jan 2020

Speech, Innovation, And Competition, Greg Day

Scholarly Works

Critics contend that concentrated power in digital markets has generated threats to free speech. For a variety of reasons, market power is naturally thought to concentrate in digital markets. The consequence is that “big tech” is said to face little competition; Facebook controls 72 percent of the social media market while the parent of YouTube (72 percent of the video market) is Google (92 percent of the search market). This landscape has potentially vested private companies with unprecedented power over the flow of information. If Facebook, for example, decides to ban certain types of speech or ideas, it would potentially …


Networks Of Empathy, Thomas E. Kadri Jan 2020

Networks Of Empathy, Thomas E. Kadri

Scholarly Works

Digital abuse is on the rise. People increasingly use technology to perpetrate and exacerbate abusive conduct like stalking and harassment, manipulating digital tools to control and harm their victims. By some accounts, 95% of domestic-abuse cases involve technology, while a sizeable chunk of the U.S. population now admits to having suffered or perpetrated serious abuse online. To make matters worse, people often trivialize digital abuse or underestimate its prevalence. Even among those who do appreciate its severity, there remains ample disagreement about how to address it.

Although law can be a powerful tool to regulate digital abuse, legal responses are …


The Legal Implications Of Synthetic And Manipulated Media, Thomas E. Kadri Nov 2019

The Legal Implications Of Synthetic And Manipulated Media, Thomas E. Kadri

Popular Media

Ahead of the U.S. 2020 presidential election, the Carnegie Endowment for International Peace convened more than 100 experts from three dozen organizations inside and outside Silicon Valley in private meetings to help address the challenges that synthetic and manipulated media pose for industry, government, and society more broadly. Among other things, the meetings developed a common understanding of the potential for synthetic and manipulated media circulated on technology platforms to disrupt the upcoming presidential election, generated definitions of “inappropriate” election-related synthetic and manipulated media that have informed platform content moderation policies, and equipped platforms with playbooks of effective and ethical …


Facebook V. Sullivan: Public Figures And Newsworthiness In Online Speech, Thomas E. Kadri, Kate Klonick Jan 2019

Facebook V. Sullivan: Public Figures And Newsworthiness In Online Speech, Thomas E. Kadri, Kate Klonick

Scholarly Works

In the United States, there are now two systems to adjudicate disputes about harmful speech. The first is older and more established: the legal system in which judges apply constitutional law to limit tort claims alleging injuries caused by speech. The second is newer and less familiar: the content-moderation system in which platforms like Facebook implement the rules that govern online speech. These platforms are not bound by the First Amendment. But, as it turns out, they rely on many of the tools used by courts to resolve tensions between regulating harmful speech and preserving free expression—particularly the entangled concepts …


How Supreme A Court?, Thomas E. Kadri Nov 2018

How Supreme A Court?, Thomas E. Kadri

Popular Media

Facebook is planning an independent appeals process for content moderation decisions. But how much power will it have?


How To Make Facebook's 'Supreme Court' Work, Kate Klonick, Thomas E. Kadri Nov 2018

How To Make Facebook's 'Supreme Court' Work, Kate Klonick, Thomas E. Kadri

Popular Media

The idea of a body that will decide what kind of content is allowed on the site is promising — but only if it’s done right.


Speech V. Speakers, Thomas E. Kadri Jan 2018

Speech V. Speakers, Thomas E. Kadri

Popular Media

Twitter's new rules about extremist speech blur the lines between people and words.


No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott Apr 2015

No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott

Occasional Papers Series

Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …


To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers Jan 2011

To Reveal Or Conceal?—An Isp’S Dilemma, Presenting A New “Anonymous Public Concern Test” For Evaluating Isp Subpoenas In Online Defamation Suits, Cayce Myers

LLM Theses and Essays

This article proposes a new test called the “Anonymous Public Concern Test” which incorporates public concern analysis in enforcing Internet Service Provider [ISP] subpoenas in online defamation suits. Anonymous speech is an important aspect of First Amendment rights that warrants protection. Current tests used by courts to analyze whether to enforce ISP subpoenas are either too pro-plaintiff or too pro-defendant. The article’s proposed “Anonymous Public Concern Test” is the best approach in dealing with ISP subpoenas because it protects both anonymous speeches and preserves online defamation plaintiffs’ rights.


Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe Jan 2006

Protecting Children From The Dark Side Of The Internet, Anne Dupre, John Dayton, Christine Kiracofe

Scholarly Works

This article examines the history of judicial and legislative responses to the issue of consumption of pornography and other harmful materials over the Internet by children. The article begins by giving a brief overview of free speech law in the US. Next, summaries of relevant U.S. legislation and corresponding litigation on Internet free speech are given. Highlighted are: 1) the Communications Decency Act (CDA) and the U.S. Supreme Court’s response in Reno v. ACLU; 2) The Child Pornography Prevention Act (CPPA) and Ashcroft v. Free Speech Coalition; 3) the Children’s Internet Protection Act (CIPA) and United States v. American …


Securities Disclosure Regime - Challenges Posed By The Internet And Technology, Thomas Thomas Thoppil Jan 2000

Securities Disclosure Regime - Challenges Posed By The Internet And Technology, Thomas Thomas Thoppil

LLM Theses and Essays

This thesis is an effort to evaluate the structural changes that have taken place in the securities market of the United States and its impact on securities disclosure regime mandated by the Federal Securities Act. Part 2 of the thesis discusses the securities disclosure regime and its underlying economic theories. This part also traces the challenges posed by technology and takes a quick look at the argument that the traditional norms are incompatible in dealing with those challenges. Part 3 deals primarily with structural developments in the securities market over the past five years by examining some of the innovative …


Legal Aspects Of The Internet, Etienne Pichat Jan 1997

Legal Aspects Of The Internet, Etienne Pichat

LLM Theses and Essays

This thesis will explain the legal aspects of the Internet so that users who wish to protect their rights and avoid liability can log on with a better understanding of the rules of the game. This work will be divided into two chapters. The first chapter will focus on existing legal regulation of the Internet to advise users on which law is relevant, and how to solve problems of conflicts of laws in the cyberworld. It will answer the question of whether cyberspace is, or not, a "no laws land", and what kind of regulation would better fit the cyberworld. …


Legal Implications Of The Virtual Enterprise, Jan Gerhard Werner Jan 1993

Legal Implications Of The Virtual Enterprise, Jan Gerhard Werner

LLM Theses and Essays

With technologies changing so rapidly today, being competitive in the market often requires corporations to form alliances and new types of relationships. One of these relationships is a Virtual Enterprise, which are similar to joint ventures and strategic alliances but are less formal, short lived, and highly flexible. Virtual Enterprises are especially useful when developing or producing computer products, biotechnology, telecommunications, industrial equipment, and consumer electronics. The characteristics of a Virtual Enterprise along with the special problems attorneys face in supporting their development, maintenance, and termination are analyzed in this thesis. Due to the informal and fast change nature of …