Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Michigan Law School (6)
- University of Rhode Island (5)
- Northwestern Pritzker School of Law (2)
- Seattle University School of Law (2)
- University of Richmond (2)
-
- Cleveland State University (1)
- Maurer School of Law: Indiana University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- New York Law School (1)
- Pepperdine University (1)
- St. John's University School of Law (1)
- United Arab Emirates University (1)
- University of Oklahoma College of Law (1)
- Publication Year
- Publication
-
- Dignity: A Journal of Analysis of Exploitation and Violence (5)
- Michigan Telecommunications & Technology Law Review (3)
- Seattle University Law Review (2)
- University of Michigan Journal of Law Reform (2)
- University of Richmond Law Review (2)
-
- Cleveland State Law Review (1)
- Federal Communications Law Journal (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Michigan Journal of International Law (1)
- NYLS Law Review (1)
- Northwestern Journal of Law & Social Policy (1)
- Northwestern University Law Review (1)
- Oklahoma Law Review (1)
- ProAcademy (1)
- St. John's Law Review (1)
- UAEU Law Journal (1)
Articles 1 - 25 of 25
Full-Text Articles in Law
Can A Person's "Slate" Ever Really Be "Cleaned"? The Modern-Day Implications Of Pennsylvania's Clean Slate Act, Kimberly E. Capuder
Can A Person's "Slate" Ever Really Be "Cleaned"? The Modern-Day Implications Of Pennsylvania's Clean Slate Act, Kimberly E. Capuder
St. John's Law Review
(Exceprt)
In 2006, Khalia was arrested for a “low-level counterfeiting charge.” While Khalia was innocent and never convicted for the charged offense, she still had a criminal record. Because she was concerned that future employers would “view her as a thief,” she never applied to any of her dream jobs. But once Khalia’s arrest record was automatically sealed, she finally had enough confidence to send in a job application to a prestigious consulting firm, and was offered the position. Khalia believes that her newly sealed criminal record “means a future without judgment.” And this future without judgment was made possible …
Protection Of Criminal Offences To Face New Ethical Legislation In Jordan And United Arab Emirates
Protection Of Criminal Offences To Face New Ethical Legislation In Jordan And United Arab Emirates
UAEU Law Journal
It is said that 'honor' is the most precious of all things to human, and that without it the life itself becomes undignified especially for societies who give too much of a weight to this matter such as the Islamic Arabian societies.
The world has recently witnessed massive changes in the way of life that has produced a variety of new crimes and criminal techniques which gravely scratches the person's honor. These had specific adverse consequences on the Arabic societies, since this part of the world has become easily connected to the rest of the liberal countries within the concept …
Formation And Development Of The Prosecutor's Supervision Over The Compliance Of Laws In Investigation Of Crimes In The Sphere Of Information Technologies, Atobek Ravshanovich Davronov, Atobek Davronov
Formation And Development Of The Prosecutor's Supervision Over The Compliance Of Laws In Investigation Of Crimes In The Sphere Of Information Technologies, Atobek Ravshanovich Davronov, Atobek Davronov
ProAcademy
The rapid growth of information technologies naturally determines the interest of researchers in them from various fields of science. Law, including criminal law, is no exception. Currently: a separate branch of law is being formed - information law. Despite this, until now in science unified approaches to the analysis of information and legal phenomena have not been developed. The article analyzes the formation and development of prosecutorial supervision over the execution of laws in the investigation of crimes in the field of information technology, and also studied the process of the emergence of information technology as a type of crime …
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
The Internet Never Forgets: A Federal Solution To The Dissemination Of Nonconsensual Pornography, Alexis Santiago
Seattle University Law Review
As technology evolves, new outlets for interpersonal conflict and crime evolve with it. The law is notorious for its inability to keep pace with this evolution. This Comment focuses on one area that the law urgently needs to regulate—the dissemination of “revenge porn,” otherwise known as nonconsensual pornography. Currently, no federal law exists in the U.S. that criminalizes the dissemination of nonconsensual pornography. Most U.S. states have criminalized the offense, but with vastly different degrees of severity, resulting in legal inconsistencies and jurisdictional conflicts. This Comment proposes a federal solution to the dissemination of nonconsensual pornography that carefully balances the …
Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes
Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell
Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell
Journal of the National Association of Administrative Law Judiciary
This article argues that one of the ways to appropriately fight online human trafficking is through governmental regulation of the Dark Web. Specifically, this article argues that a new Attaching Criminal Dark Web Statute is the best method to combat human trafficking because it can incentivize prosecutors to use current human trafficking statutes to prosecute traffickers. This proposal can deter traffickers from enslaving people. Additionally, this article shows the evolution of online human trafficking laws, investigation, and prosecution (Section II); demonstrates why current and proposed laws do not effectively address the online human trafficking issue (Sections III and IV); introduces …
Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman
Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins
It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael
Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Fighting Back Against Revenge Porn: A Legislative Solution, Alex Jacobs
Fighting Back Against Revenge Porn: A Legislative Solution, Alex Jacobs
Northwestern Journal of Law & Social Policy
No abstract provided.
Prosecuting Online Threats After Elonis, Michael Pierce
Prosecuting Online Threats After Elonis, Michael Pierce
Northwestern University Law Review
In Elonis v. United States, decided last term, the Supreme Court vacated a conviction for online threats on the ground that the lower court erred in its instructions to the jury regarding mens rea. In doing so, however, the Court declined to articulate which mens rea standard would have sustained a conviction. It is thus currently uncertain which mens rea the government must prove when prosecuting online threats under 18 U.S.C. § 875(c). The Elonis Court discussed three potential mens rea standards; as universal standards for online threats, each leaves something to be desired. Fortunately, federal courts need not …
The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker
The Incitement Of Terrorism On The Internet: Legal Standards, Enforcement, And The Role Of The European Union, Ezekiel Rediker
Michigan Journal of International Law
Consider this sentence: “The Shining Path is a heroic organization.” Over the past thirty years, the Shining Path has waged a violent guerilla war against the Peruvian government, prompting the European Union to designate the group as a terrorist organization. In certain European countries, speech inciting or glorifying terrorist organizations is criminalized. As a result, citizens risk prosecution if they do not carefully limit what they say about the Shining Path, or other terrorist organizations. But where does free speech end and incitement to terrorism begin? The debate over free speech and incitement to terrorism is actively being played out …
Let's Reinvent The Wheel: The Internet As A Means Of Interstate Commerce In United States V. Kieffer, Valeria G. Luster
Let's Reinvent The Wheel: The Internet As A Means Of Interstate Commerce In United States V. Kieffer, Valeria G. Luster
Oklahoma Law Review
No abstract provided.
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
The Communication Decency Act Gone Wild: A Case For Renewing The Presumption Against Preemption, Ryan J.P. Dyer
Seattle University Law Review
Since its inception, the Internet has disseminated the most vital commodity known to man—information. But not all information is societally desirable. In fact, much of what the Internet serves to disseminate is demonstrably criminal. Nevertheless, in the effort to unbind the “vibrant and competitive free market” of ideas on the Internet, Congress enacted section 230 of the Communications Decency Act, which essentially grants immunity to interactive computer service providers from liability for information provided by a third party. This Comment suggests that, in certain contexts, courts applying section 230 immunity should reexamine the preemptive effect Congress intended section 230 to …
A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe
A Victimless Sex Crime: The Case For Decriminalizing Consensual Teen Sexting, Joanna R. Lampe
University of Michigan Journal of Law Reform
As teenagers' access to cellular phones and the internet has increased over the past two decades, so has their ability to harm themselves and others through misuse of new technology. One risky behavior that has become common among teenagers is "sexting"--the digital sharing of sexually suggestive images. To combat the dangers of teen sexting, many states have criminalized the act. Criminalization does not resolve the issue of teen sexting, however, and in many cases it may cause additional harm. This Note reviews existing state laws related to teen sexting, and critiques these laws on constitutional and policy grounds. It then …
Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin
Exploring The First Amendment Rights Of Teens In Relationship To Sexting And Censorship, Julia Halloran Mclaughlin
University of Michigan Journal of Law Reform
This Article explores child pornography law in relation to teen sexting conduct. Recently, some teens who engaged in teen sexting have been convicted under child pornography laws and have been required to register as sexual predators. The criminalization of teens for developmentally typical behavior, mimicking the conduct of adults, can result in grave harm to most teens. Furthermore, the application of child pornography laws to teen sexting conduct demonstrates the constitutional overbreadth of the current definition of child pornography. Photographs have an emblematic role in society-capturing and celebrating youth. Moreover, the creation of teen sexting images accompanies a teen's developmental …
The Unified Sealed Theory: Updating Ohio's Record-Sealing Statute For The Twenty-First Century, Michael H. Jagunic
The Unified Sealed Theory: Updating Ohio's Record-Sealing Statute For The Twenty-First Century, Michael H. Jagunic
Cleveland State Law Review
This Note will argue that Ohio's record sealing statute is still a viable means to achieve this balance, but that it must be supplemented by additional laws in order to remain effective. Part II provides a short history of record sealing and expungement in the United States and explains how Ohio's record sealing statute effectively deals with some common criticisms of record sealing. Part III then briefly examines why sealing and expungement statutes are becoming increasingly ineffective due to the proliferation of electronic criminal records and the rise of the data-mining industry. Part IV critiques some of the proposed solutions …
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
Michigan Telecommunications & Technology Law Review
By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …
Try, Try Again: Will Congress Ever Get It Right? A Summary Of Internet Pornography Laws Protecting Children And Possible Solutions, Susan Hanley Kosse
Try, Try Again: Will Congress Ever Get It Right? A Summary Of Internet Pornography Laws Protecting Children And Possible Solutions, Susan Hanley Kosse
University of Richmond Law Review
No abstract provided.
New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers
New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers
University of Richmond Law Review
No abstract provided.
United States V. Jarrett, Andres A. Munoz
Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young
Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young
Michigan Telecommunications & Technology Law Review
This Comment examines the current legal framework governing Fourth Amendment rights for foreign nationals accused of committing crimes within the United States. Over the past three years, federal courts have tried several cases charging foreign nationals with committing crimes through the use of the Internet; these cases demonstrate a lack of clarity in the standard for warrant requirements regarding these searches. Utilizing these cases, this Comment creates a hypothetical case that presents the issues of Fourth Amendment rights for foreign nationals and seeks to determine how such a question should be answered. It advocates the clear application of United States …
Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham
Carnivore, The Fbi’S E-Mail Surveillance System: Devouring Criminals, Not Privacy, Griffin S. Dunham
Federal Communications Law Journal
On July 11, 2000, the FBI intorduced Carnivore, an Internet monitoring system. It was designed, and is used exclusively, to carry out court-ordered surveillance of electronic communications. It is a tangible, portable device, tantamount to a phone tap, that allows the FBI to intercept and collect criminal suspects' e-mail without their knowledge or consent. This Note addresses competing and parallel interests between the government and society to determine the legitimacy and necessity of Carnivore. The purpose of this Note is twofold: first, to demonstrate the need for Carnivore to enable law enforcement to keep up with criminals who utilize cyberspace …
Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum
Incitement To Violence On The World Wide Web: Can Web Publishers Seek First Amendment Refuge?, Lonn Weissblum
Michigan Telecommunications & Technology Law Review
The purpose of this comment is to analyze the potential First Amendment implications of the appearance of bomb-making instructions on the Web in the United States. Moreover, this comment will ultimately consider the notion that "because Brandenburg allows consideration of all the unique characteristics of the Web, there is no reason to formulate new jurisprudence merely because of new technology." Part II examines the seminal cases in the area of speech action, including Schenck v. United States, Hess v. Indiana, and Brandenburg v. Ohio, and the adulations and criticisms that resulted from these cases. Part III discusses the civil cases …