Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- American University Washington College of Law (5)
- University of Florida Levin College of Law (4)
- Boston University School of Law (3)
- New York Law School (3)
- Roger Williams University (3)
-
- University of Pennsylvania Carey Law School (3)
- Maurer School of Law: Indiana University (2)
- SJ Quinney College of Law, University of Utah (2)
- St. John's University School of Law (2)
- University of Baltimore Law (2)
- University of Colorado Law School (2)
- University of Georgia School of Law (2)
- University of Missouri School of Law (2)
- University of South Carolina (2)
- Cleveland State University (1)
- Duke Law (1)
- Loyola University Chicago, School of Law (1)
- Notre Dame Law School (1)
- Penn State Law (1)
- Seattle University School of Law (1)
- University of Michigan Law School (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- Virginia Community College System (1)
- Washington University in St. Louis (1)
- William & Mary Law School (1)
- Publication Year
- Publication
-
- Faculty Publications (6)
- All Faculty Scholarship (5)
- Articles in Law Reviews & Other Academic Journals (5)
- Faculty Scholarship (4)
- UF Law Faculty Publications (4)
-
- Articles & Chapters (3)
- Articles by Maurer Faculty (2)
- Journal Articles (2)
- Publications (2)
- Scholarly Works (2)
- Utah Law Faculty Scholarship (2)
- Articles (1)
- Boyd Briefs / Road Scholars (1)
- Faculty Publications & Other Works (1)
- Law Faculty Briefs and Court Documents (1)
- Law Faculty Scholarship (1)
- Law School Blogs (1)
- Life of the Law School (1993- ) (1)
- Popular Media (1)
- Scholarship@WashULaw (1)
- Seattle University Law Review SUpra (1)
- Student Writing (1)
Articles 1 - 30 of 48
Full-Text Articles in Law
Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara
Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara
Student Writing
Social media has evolved into an essential mode of communication in recent years, allowing people to express their thoughts with the audience of their choice by sending private messages, posting their thoughts, or sharing their opinions. Such audiences can come from all over the world because this online technology breaks down geographic, linguistic, and cultural barriers. As a result, social media has evolved into a powerful tool for self-expression, allowing anyone with an Internet connection to participate in global debates. However, its misuse has had disastrous consequences in the real world, such as the attack on the Capitol that occurred …
Absolute Publishing Power And Bulletproof Immunity: How Section 230 Shields Internet Service Providers From Liability And Makes It Impossible To Protect Your Reputation Online, Victoria Anderson
Seattle University Law Review SUpra
No abstract provided.
Rescuing Our Democracy By Rethinking New York Times Co. V. Sullivan, David A. Logan
Rescuing Our Democracy By Rethinking New York Times Co. V. Sullivan, David A. Logan
Law Faculty Scholarship
No abstract provided.
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Brief Amici Curiae Of Electronic Frontier Foundation, 1851 Center For Constitutional Law, And Profs. Jonathan Entin, David F. Forte, Andrew Geronimo, Raymond Ku, Stephen Lazarus, Kevin Francis O’Neill, Margaret Tarkington, Aaron H. Caplan, And Eugene Volokh In Support Of Respondent-Appellant, Joni Bey And Rebecca Rasawehr V. Jeffrey Rasawehr, Supreme Court Of Ohio (Case No. 2019-0295), David Forte, Stephen R. Lazarus, Kevin F. O'Neill, Jonathan L. Entin, Andrew Geronimo, Raymond Ku, Margaret Tarkington, Aaron H. Kaplan, Eugene Volokh
Brief Amici Curiae Of Electronic Frontier Foundation, 1851 Center For Constitutional Law, And Profs. Jonathan Entin, David F. Forte, Andrew Geronimo, Raymond Ku, Stephen Lazarus, Kevin Francis O’Neill, Margaret Tarkington, Aaron H. Caplan, And Eugene Volokh In Support Of Respondent-Appellant, Joni Bey And Rebecca Rasawehr V. Jeffrey Rasawehr, Supreme Court Of Ohio (Case No. 2019-0295), David Forte, Stephen R. Lazarus, Kevin F. O'Neill, Jonathan L. Entin, Andrew Geronimo, Raymond Ku, Margaret Tarkington, Aaron H. Kaplan, Eugene Volokh
Law Faculty Briefs and Court Documents
The brief argues that the Third District Court of Appeals, in violation of the First Amendment, erred in upholding an injunction that barred defendant from any online postings regarding plaintiff, whether or not those postings were to plaintiff or to third parties.
Speech Across Borders, Jennifer Daskal
Speech Across Borders, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
As both governments and tech companies seek to regulate speech online, these efforts raise critical, and contested, questions about how far those regulations can and should extend. Is it enough to take down or delink material in a geographically segmented way? Or can and should tech companies be ordered to takedown or delink unsavory content across their entire platforms—no matter who is posting the material or where the unwanted content is viewed? How do we deal with conflicting speech norms across borders? And how do we protect against the most censor-prone nation effectively setting global speech rules? These questions were …
Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis
Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis
Faculty Publications & Other Works
The availability of almost limitless sets of digital information has opened a vast marketplace of ideas. Information service providers like Facebook and Twitter provide users with an array of personal information about products, friends, acquaintances, and strangers. While this data enriches the lives of those who share content on the internet, it comes at the expense of privacy. Social media companies disseminate news, advertisements, and political messages, while also capitalizing on consumers' private shopping, surfing, and traveling habits. Companies like Cambridge Analytica, Amazon, and Apple rely on algorithmic programs to mash up and scrape enormous amounts of online and otherwise …
Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green
Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green
Faculty Scholarship
The Supreme Court’s Brandenburg v. Ohio test provides an exception to the First Amendment’s broad guarantee of freedom of speech. Where speech is (1) directed to inciting or producing imminent lawless action, and (2) is likely to incite or produce such action, the First Amendment withdraws its promise of protection. Thus, where the “imminence” of lawless action cannot be shown, free speech cannot be restricted. Since Brandenburg, Courts have applied a test for imminence that turns on proximity in space and in time — that is, the test evaluates how spatiotemporally imminent lawless activity is. In this Article, I argue …
Rwu First Amendment Blog: David A. Logan's Blog: Infowars Goes To War With The First Amendment 08-15-2018, David A. Logan
Rwu First Amendment Blog: David A. Logan's Blog: Infowars Goes To War With The First Amendment 08-15-2018, David A. Logan
Law School Blogs
No abstract provided.
Corporate Social Responsibility And Social Media Corporations: Incorporating Human Rights Through Rankings, Self-Regulation And Shareholder Resolutions, Erika George
Utah Law Faculty Scholarship
This article examines the emergence and evolution of selected ranking and reporting frameworks in the expanding realm of business and human rights advocacy. It explores how indicators in the form of rankings and reports evaluating the conduct of transnational corporate actors can serve as regulatory tools with potential to bridge a global governance gap that often places human rights at risk. This article examines the relationship of transnational corporations in the Internet communications technology sector (ICT sector) to human rights and the risks presented to the right to freedom of expression and the right to privacy when ICT sector companies …
Inciting Terrorism On The Internet: The Limits Of Tolerating Intolerance, Amos N. Guiora
Inciting Terrorism On The Internet: The Limits Of Tolerating Intolerance, Amos N. Guiora
Utah Law Faculty Scholarship
The Internet is a limitless platform for information and data sharing. It is, in addition, however, a low-cost, high-speed dissemination mechanism that facilitates the spreading of hate speech, including violent and virtual threats. Indictment and prosecution for social media posts that transgress from opinion to incitable hate speech are appropriate in limited circumstances. Several real-world examples discussed here help to explore when limitations on Internet-based hate speech are appropriate.
In October 2015, twenty thousand Israelis joined a civil lawsuit filed against Facebook in the Supreme Court for the State of New York. Led by the civil rights organization Shurat HaDin, …
The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick
The New Governors: The People, Rules And Processes Governing Online Speech, Kate Klonick
Faculty Publications
Private online platforms have an increasingly essential role in free speech and participation in democratic culture. But while it might appear that any internet user can publish freely and instantly online, many platforms actively curate the content posted by their users. How and why these platforms operate to moderate speech is largely opaque.
This Article provides the first analysis of what these platforms are actually doing to moderate online speech under a regulatory and First Amendment framework. Drawing from original interviews, archived materials, and internal documents, this Article describes how three major online platforms — Facebook, Twitter, and YouTube — …
Forward Into The Past: Speech Intermediaries In Television And Internet Ages Symposium: Falsehoods, Fake News, And The First Amendment: Panel 3: The Brave New World Of Free Speech, Gregory P. Magarian
Forward Into The Past: Speech Intermediaries In Television And Internet Ages Symposium: Falsehoods, Fake News, And The First Amendment: Panel 3: The Brave New World Of Free Speech, Gregory P. Magarian
Scholarship@WashULaw
Communication constructs society. By speaking to, with, and among one another, people and groups build relationships that allow us all to live more fully, understand the world better, and govern ourselves collectively. As societies grow, expression and engagement become more challenging. The presence of more ideas, larger and more diverse potential audiences, and more powerful and remote institutions threatens to reduce communication to a futile exercise. Whatever normative goals different people and groups may want public discourse to serve, pursuing those goals gets harder.
The Ongoing Challenge To Define Free Speech, Stephen Wermiel
The Ongoing Challenge To Define Free Speech, Stephen Wermiel
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble
Session On "Geoblocking Tools And The Law" At Law, Borders, And Speech Conference At Stanford Law School, Marketa Trimble
Boyd Briefs / Road Scholars
Professor Marketa Trimble appeared on a panel at the Law, Borders, and Speech Conference hosted by The Center for Internet and Society at Stanford Law School on October 24, 2016. The session defined and discussed geoblocking and its implications for internet users, government, and private companies.
A video of the session is available here. Additionally, Professor Trimble's presentation is available here.
The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters
The “Sovereigns Of Cyberspace” And State Action: The First Amendment’S Application (Or Lack Thereof) To Third-Party Platforms, Jonathan Peters
Scholarly Works
Many scholars have commented that the state action doctrine forecloses use of the First Amendment to constrain the policies and practices of online service providers. But few have comprehensively studied this issue, and the seminal article exploring “[c]yberspace and the [s]tate [a]ction [d]ebate” is fifteen years old, published before the U.S. Supreme Court reformulated the federal approach to state action. It is important to give the state action doctrine regular scholarly attention, not least because it is increasingly clear that “the private sector has a shared responsibility to help safeguard free expression.” It is critical to understand whether the First …
The 'Press,' Then & Now, Sonja R. West
The 'Press,' Then & Now, Sonja R. West
Scholarly Works
Does the First Amendment’s protection of freedom of “the press” simply mean that we all have the right to use mass communication technology to disseminate our speech? Or does it provide constitutional safeguards for a particular group of speakers who function as government watchdogs and citizen surrogates? This question defines the current debate over the Press Clause. The Supreme Court’s Citizens United decision, along with recent work by Michael McConnell and Eugene Volokh, suggests the answer is the former. This article pushes back on that view.
It starts by expanding the scope of the relevant historical evidence. Discussions about the …
A New Taxonomy For Online Harms, Kate Klonick
A New Taxonomy For Online Harms, Kate Klonick
Faculty Publications
(Excerpt)
Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Articles & Chapters
While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.
I argue that the myth of the online anonym is not only false as a …
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
Incendiary Speech And Social Media, Lyrissa Barnett Lidsky
UF Law Faculty Publications
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker, even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman
All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman
Articles & Chapters
Online and face-to-face harassment in schools requires a coordinated response from the school, parents, students, and government. In this Article, I address a particular subset of online and face-to-face harassment, or identity-based harassment. Identity-based aggressors highlight a quality intrinsic to someone’s personhood and demean it, deprive it of value, and use it as a weapon. They attack women, racial minorities, religious minorities, and other traditionally victimized groups. And, as such, they attack not only their particular victims but also their victims’ communities. Identity-based aggressors com- mit a constitutional evil not only because their behavior interferes with victims’ access to education, …
Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski
Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski
Publications
As people increasingly use social media to organize both protests and robberies, government will try to regulate these calls to action. With an eye to this intensifying dynamic, this Article reviews First Amendment jurisprudence on incitement and applies it to existing statutes on incitement to riot at a common law, state, and federal level. The article suggests that First Amendment jurisprudence has a particularly tortuous relationship with regulating speech directed to crowds. It examines current crowd psychology to suggest which crowd behavior, if any, should as a matter of policy be subject to regulation. It concludes that many existing incitement-to-riot …
Incendiary Speech And Social Media, Lyrissa Lidsky
Incendiary Speech And Social Media, Lyrissa Lidsky
Faculty Publications
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
Pornography As Pollution, John C. Nagle
Pornography As Pollution, John C. Nagle
Journal Articles
Pornography is often compared to pollution. But little effort has been made to consider what it means to describe pornography as a pollution problem, even as many legal scholars have concluded that the law has failed to control internet pornography. Opponents of pornography maintain passionate convictions about how sexually-explicit materials harm both those who are exposed to them and the broader cultural environment. Viewers of pornography may generally hold less fervent beliefs, but champions of free speech and of a free internet object to anti-pornography regulations with strong convictions of their own. The challenge is how to address the widespread …
Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo
Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo
All Faculty Scholarship
In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …
Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow
Proving Fair Use: Burden Of Proof As Burden Of Speech, Ned Snow
Faculty Publications
Courts have created a burden of proof in copyright that chills protected speech. The doctrine of fair use purports to ensure that copyright law does not trample rights of speakers whose expression employs copyrighted material. Yet those speakers face a burden of proof that weighs heavily in the fair use analysis, where factual inquiries are often subjective and speculative. Failure to satisfy the burden means severe penalties, which prospect quickly chills the free exercise of speech that constitutes a fair use. The fair-use burden of proof is repugnant to the fair use purpose. Today, copyright holders are exploiting the burden …
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Barnett Lidsky
UF Law Faculty Publications
This Article examines the evolution of the law governing libel suits against anonymous "John Doe" defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire, and other nonfactual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …
Cybercrimes Vs. Cyberliberties, Nadine Strossen
Cybercrimes Vs. Cyberliberties, Nadine Strossen
Articles & Chapters
Cybercrimes vs. Cyberliberties, Chapter 8 in Internet Policy and Economics: Challenges and Perspectives 2nd ed. at 110-127 ( W.H. Lehr & L.M. Pupillo, eds. Springer, 2009).
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe
Introducing A Takedown For Trade Secrets On The Internet, Elizabeth A. Rowe
UF Law Faculty Publications
This Article explores, for the first time, an existing void in trade-secret law. When a trade-secret owner discovers that its trade secrets have been posted on the Internet, there is currently no legislative mechanism by which the owner can request that the information be taken down. The only remedy to effectuate removal of the material is to obtain a court order, usually either a temporary restraining order or a preliminary injunction. When a trade secret appears on the Internet, the owner often loses the ability to continue to claim it as a trade secret and to prevent others from using …
Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer
Censorship By Proxy: The First Amendment, Internet Intermediaries, And The Problem Of The Weakest Link, Seth F. Kreimer
All Faculty Scholarship
The rise of the Internet has changed the First Amendment drama, for governments confront technical and political obstacles to sanctioning either speakers or listeners in cyberspace. Faced with these challenges, regulators have fallen back on alternatives, predicated on the fact that, in contrast to the usual free expression scenario, the Internet is not dyadic. The Internet's resistance to direct regulation of speakers and listeners rests on a complex chain of connections, and emerging regulatory mechanisms have begun to focus on the weak links in that chain. Rather than attacking speakers or listeners directly, governments have sought to enlist private actors …