Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

International Law

PDF

Journal

Internet

Institution
Publication Year
Publication

Articles 1 - 30 of 48

Full-Text Articles in Law

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek Jan 2022

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek

Seattle Journal of Technology, Environmental & Innovation Law

The Internet of Things has experienced exponential growth and use across the globe with 25.1 billion devices currently in use. Until recently, the functionality of the IoT was dependent on secure data flow between internet terrestrial stations and the IoT devices. Now, a new alternative path of data flow is on the horizon.

IoT device manufacturers are now looking to outer space nanosatellite constellations to connect to a different type of internet. This new internet is no longer terrestrial with fiber cables six feet underground but now looking up, literally, 200 to 300 miles above the earth, to communicate, connect …


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


The "Sovereignty" Of The State In Cyberspace, Mustafa Naouse Mar 2021

The "Sovereignty" Of The State In Cyberspace, Mustafa Naouse

UAEU Law Journal

The principle of "Sovereignty" is no longer limited to the political dimensions as was the case in the last two centuries. A new technological dimension has been added to the already established original meaning. This is obvious through the states efforts to control their own distinctive domain names on the Internet. These names are assigned by ICANN[1]. It is a US (California) based international non-profit organization that controls distributing domain names on the Internet and the internet management processes. It can authorize entities to control their own domain names. It can even reassign or cancel the names of …


Internet Law, Taleb Hassan Musa, Omar Mahmoud Aamer Feb 2021

Internet Law, Taleb Hassan Musa, Omar Mahmoud Aamer

UAEU Law Journal

This paper aims to illustrate the basis of cyberspace law and its potential environment. Indeed, the laws governing the cyberspace are still premature at both national and international levels. This is due to the undefined nature of cyber borders that globalize the Internet in contradiction with the geographic borders. Hence, individual countries are losing part of their sovereignty as result of globalization of the internet to a point it is becoming a borderless space with no laws and regulations. This urges to agree on new international legislations to handle any acts that are not confined by geographical borders or any …


¿Protesta Social Antidemocrática? Hacia Nuevas Formas De Participación Ciudadana A Través Del Internet En El Marco De Las Recientes Movilizaciones En Colombia, Natalia Beltrán Orjuela Jan 2021

¿Protesta Social Antidemocrática? Hacia Nuevas Formas De Participación Ciudadana A Través Del Internet En El Marco De Las Recientes Movilizaciones En Colombia, Natalia Beltrán Orjuela

American University International Law Review

No abstract provided.


Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier Oct 2020

Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier

Dickinson Law Review (2017-Present)

In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …


Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount Apr 2019

Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount

Seattle University Law Review

Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …


Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


World War Web: Rethinking "Aiding And Abetting" In The Social Media Age, Rebecca J. Cambron Jan 2019

World War Web: Rethinking "Aiding And Abetting" In The Social Media Age, Rebecca J. Cambron

Case Western Reserve Journal of International Law

ISIS's use of social media presents a new challenge for counterterror efforts. The organization aims to recruit followers and incite violence through social media. Given that this is a new medium for terrorist organizations, social media companies have come under fire for indirectly providing ISIS with farreaching platforms to spread its content. The companies, as well as national governments and international entities, have attempted to respond to the threat posed by such content. These responses, however, have proven ineffective. This Note argues that to effectively respond to and combat the threat posed by terrorist speech, national governments should adopt a …


The Korea Database: Wipo-Administered Udrp Decisions, The First Fifteen Years (2000–2014), Ilhyung Lee Jan 2016

The Korea Database: Wipo-Administered Udrp Decisions, The First Fifteen Years (2000–2014), Ilhyung Lee

Chicago-Kent Journal of Intellectual Property

No abstract provided.


The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley Jan 2016

The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley

Brooklyn Journal of International Law

In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …


Towards An Internet Bill Of Rights, Giovanna De Minico Jul 2015

Towards An Internet Bill Of Rights, Giovanna De Minico

Loyola of Los Angeles International and Comparative Law Review

No abstract provided.


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders Sep 2014

Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders

Georgia Journal of International & Comparative Law

No abstract provided.


International Dispute Settlement At The Trademark-Domain Name Interface, Laurence R. Helfer May 2012

International Dispute Settlement At The Trademark-Domain Name Interface, Laurence R. Helfer

Pepperdine Law Review

No abstract provided.


Untangling The Web: Exploring Internet Regulation Schemes In Western Democracies, Renee Keen Oct 2011

Untangling The Web: Exploring Internet Regulation Schemes In Western Democracies, Renee Keen

San Diego International Law Journal

This Comment investigates past censorship schemes proposed and implemented by selected democratic administrations, in order to develop an improved framework and accompanying infrastructure that may accomplish the goals that these policies envisioned, but failed to achieve. The difficulty of this undertaking is in developing the intermediate and legally defensible parameters under which a regulation scheme can endure and gain support in a democratic society. The greater difficulty lies in developing a system that can accomplish these objectives in the burgeoning and ever-changing cyber realm. The challenges posed by Internet activity are novel ones, and the legitimacy of the actions taken …


Comparacion Historica Y Contemporanea De Los Esfuerzos Legales De Brasil Y Los Estados Unidos Para Acorralar La Piratedria De Musica Digital Y Software P2p, Nolan Garrido Jan 2010

Comparacion Historica Y Contemporanea De Los Esfuerzos Legales De Brasil Y Los Estados Unidos Para Acorralar La Piratedria De Musica Digital Y Software P2p, Nolan Garrido

ILSA Journal of International & Comparative Law

Hoy en dia las compras legales de mfisica en linea han subido notablemente.


Finding A Voice: Using The Internet For Free Speech And Expression In Iran, Chelsea Zimmerman Jan 2010

Finding A Voice: Using The Internet For Free Speech And Expression In Iran, Chelsea Zimmerman

Human Rights & Human Welfare

In July 2009, many Iranians took to the streets to protest the results of the presidential election in which Mahmoud Ahmadinejad won with a reported 62% of the vote. The protests, stemming from allegations of electoral fraud, quickly exposed the government's limited tolerance for dissent. In addition to street demonstrations, protestors utilized social networking websites to express their opposition to the election results. The world, following Internet feeds, witnessed the restrictive mechanisms Iran’s government placed on expression and speech. People throughout the world admonished Iran for the government's interference with cell phone and Internet networks. Iran’s free speech and expression …


With Great Power Comes Great Responsibility: Korea's Role In The War Against Online Piracy, Edward Choi Mar 2009

With Great Power Comes Great Responsibility: Korea's Role In The War Against Online Piracy, Edward Choi

San Diego International Law Journal

South Korea is one of the most Internet-savvy countries in the world, with more than 34 million Koreans over the age of six—74.8% of the total population—regularly accessing the Internet. According to the Organization for Economic Co-operation and Development (OECD), as of June 2007, South Korea has the fourth largest number of broadband subscribers at over 14.4 million, behind only Japan, Germany, and the United States, all of which have much higher populations. Studies show the time Koreans spend online is primarily for entertainment purposes, as almost 80% of Korean Internet users report online consumption of audio and video, almost …


Confronting The Limits Of The First Amendment: A Proactive Approach For Media Defendants Facing Liability Abroad, Michelle A. Wyant May 2008

Confronting The Limits Of The First Amendment: A Proactive Approach For Media Defendants Facing Liability Abroad, Michelle A. Wyant

San Diego International Law Journal

This Article confronts the limits this issue imposes on the First Amendment in four parts. Part I described the potential for conflicting defamation laws and forum shopping to undermine the American media's speech protections in the context of the Internet and global publications and outlines the Article's overall method of analysis. Part II first orients these conflicting defamation laws with respect to their development from the common law. It then frames them in terms of the underlying structural and policy differences that have produced their substantive divergence. This frame provides the analytical perspective through which this Article examines the varying …


Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono Nov 2007

Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono

San Diego International Law Journal

Part I of this comment will examine the history and application of freedom of expression in Japanese case law and the evolution of the public welfare concept and its circumscribing effect on individual freedoms. Part II will explore the recent local regulatory efforts and the historical underpinnings for these laws that place restrictions on materials to children. Part III will compare the Japanese legislative endeavors with their American counterparts and highlight the reasons why United States laws will continue to be struck down by courts. Part IV will analyze the response of the video game industry to the onslaught of …


Net Neutrality: An International Policy For The United States, Frederick W. Pfister Nov 2007

Net Neutrality: An International Policy For The United States, Frederick W. Pfister

San Diego International Law Journal

Consider this scenario: Alex and John still are avid video game players and play hours a day, each connecting from the same town through different ISPs. However, since it is a peak Internet traffic time, it may be difficult for them to play. While Alex has the "Diamond" package from his ISP that ensures he has guaranteed high-bandwidth connection, John's ISP does not offer anything other than regular residential service. John must compete with everyone else in his local area for bandwidth, including a few who constantly watch high-definition video-on-demand and subsequently constrain bandwidth for other users. Would it not …


Breaching The Great Firewall Of China: Congress Overreaches In Attacking Chinese Internet Censorship, Miriam D. D'Jaen Jan 2007

Breaching The Great Firewall Of China: Congress Overreaches In Attacking Chinese Internet Censorship, Miriam D. D'Jaen

Seattle University Law Review

The Global Online Freedom Act of 2007 promotes freedom of expression on the Internet by prohibiting U.S. businesses from cooperating with officials in Internet-restricting countries. While the Act should be commended for imposing a higher standard of ethical business practices on U.S.corporations, there are significant problems with curing China's censorship policies by imposing liability on U.S. Internet companies. The standards and recommendations proposed by Congress within the Act correspond with an inherently American conception of freedom of expression. Thus, the Act imposes our domestic standards, rooted in the First Amendment, on states with very different political ideologies. A better alternative …


China's Media: The Impact Of The Internet, Richard Cullen, D. W. Choy May 2005

China's Media: The Impact Of The Internet, Richard Cullen, D. W. Choy

San Diego International Law Journal

[T]his paper provides a review of how the use of the Internet has grown and been regulated in China. We then draw some conclusions on what the experience to date may have to tell us about future regulatory and usage patterns with respect to the Internet in China.


Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy May 2004

Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy

San Diego International Law Journal

The debate over whether cyberspace can or should be regulated is essentially dead. This is the conclusion being taught in law schools today. The battle between Judge Frank Easterbrook and Professor Lawrence Lessig over "laws" and "horses", infamous among cyberspace legal scholars, became irrelevant when geographically-based governments began regulating Internet related activities. However, debate over how the Internet should be regulated continues. One way of framing this debate is in terms of deciding how to regulate behavior in cyberspace. Professor Lessig postulated four kinds of constraints regulate behavior: (1) social norms, (2) markets, (3) law, and (4) architecture. This comment …


Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller Jul 2003

Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller

Indiana Journal of Global Legal Studies

No abstract provided.


Spreading Angst Or Promoting Free Expression? Regulating Hate Speech On The Internet, Joshua Spector Oct 2002

Spreading Angst Or Promoting Free Expression? Regulating Hate Speech On The Internet, Joshua Spector

University of Miami International and Comparative Law Review

No abstract provided.


2002 Philip C. Jessup International Moot Court Competition, Chris Curran, Hamish Forsyth, Philippa Jones, Alexandra Smithyman, Reuven Young Jan 2002

2002 Philip C. Jessup International Moot Court Competition, Chris Curran, Hamish Forsyth, Philippa Jones, Alexandra Smithyman, Reuven Young

ILSA Journal of International & Comparative Law

The Republic of Turingia and the Republic of Babbage have brought their case before this Court by notification of the Special Agreement as provided for by Article 40(1) of the Statute of the International Court of Justice.


2002 Philip C. Jessup International Moot Court Competition, William Burker-White, David Mascari, Jin-Long Pao, Natalie Reid Jan 2002

2002 Philip C. Jessup International Moot Court Competition, William Burker-White, David Mascari, Jin-Long Pao, Natalie Reid

ILSA Journal of International & Comparative Law

The Republic of Turingia and the Republic of Babbage have brought their case before this Court by notification of the Special Agreement as provided for by Article 40(1) of the Statute of the International Court of Justice. The Court has jurisdiction over the case pursuant to Article 36(2) of the said Statute.