Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Maurer School of Law: Indiana University (10)
- University of San Diego (7)
- Nova Southeastern University (6)
- Seattle University School of Law (4)
- Northwestern Pritzker School of Law (3)
-
- Case Western Reserve University School of Law (2)
- Loyola Marymount University and Loyola Law School (2)
- Penn State Dickinson Law (2)
- United Arab Emirates University (2)
- University of Michigan Law School (2)
- American University Washington College of Law (1)
- Brooklyn Law School (1)
- Chicago-Kent College of Law (1)
- Pepperdine University (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Denver (1)
- University of Georgia School of Law (1)
- University of Miami Law School (1)
- Publication Year
- Publication
-
- Indiana Journal of Global Legal Studies (9)
- San Diego International Law Journal (7)
- ILSA Journal of International & Comparative Law (6)
- Northwestern Journal of International Law & Business (3)
- Seattle University Law Review (3)
-
- Case Western Reserve Journal of International Law (2)
- Dickinson Law Review (2017-Present) (2)
- UAEU Law Journal (2)
- American University International Law Review (1)
- Brooklyn Journal of International Law (1)
- Catholic University Journal of Law and Technology (1)
- Chicago-Kent Journal of Intellectual Property (1)
- Federal Communications Law Journal (1)
- Georgia Journal of International & Comparative Law (1)
- Human Rights & Human Welfare (1)
- Loyola of Los Angeles International and Comparative Law Review (1)
- Loyola of Los Angeles Law Review (1)
- Michigan Journal of International Law (1)
- Michigan Telecommunications & Technology Law Review (1)
- Pepperdine Law Review (1)
- Seattle Journal of Technology, Environmental & Innovation Law (1)
- University of Miami International and Comparative Law Review (1)
Articles 1 - 30 of 48
Full-Text Articles in Law
On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek
On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek
Seattle Journal of Technology, Environmental & Innovation Law
The Internet of Things has experienced exponential growth and use across the globe with 25.1 billion devices currently in use. Until recently, the functionality of the IoT was dependent on secure data flow between internet terrestrial stations and the IoT devices. Now, a new alternative path of data flow is on the horizon.
IoT device manufacturers are now looking to outer space nanosatellite constellations to connect to a different type of internet. This new internet is no longer terrestrial with fiber cables six feet underground but now looking up, literally, 200 to 300 miles above the earth, to communicate, connect …
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
The "Sovereignty" Of The State In Cyberspace, Mustafa Naouse
The "Sovereignty" Of The State In Cyberspace, Mustafa Naouse
UAEU Law Journal
The principle of "Sovereignty" is no longer limited to the political dimensions as was the case in the last two centuries. A new technological dimension has been added to the already established original meaning. This is obvious through the states efforts to control their own distinctive domain names on the Internet. These names are assigned by ICANN[1]. It is a US (California) based international non-profit organization that controls distributing domain names on the Internet and the internet management processes. It can authorize entities to control their own domain names. It can even reassign or cancel the names of …
Internet Law, Taleb Hassan Musa, Omar Mahmoud Aamer
Internet Law, Taleb Hassan Musa, Omar Mahmoud Aamer
UAEU Law Journal
This paper aims to illustrate the basis of cyberspace law and its potential environment. Indeed, the laws governing the cyberspace are still premature at both national and international levels. This is due to the undefined nature of cyber borders that globalize the Internet in contradiction with the geographic borders. Hence, individual countries are losing part of their sovereignty as result of globalization of the internet to a point it is becoming a borderless space with no laws and regulations. This urges to agree on new international legislations to handle any acts that are not confined by geographical borders or any …
¿Protesta Social Antidemocrática? Hacia Nuevas Formas De Participación Ciudadana A Través Del Internet En El Marco De Las Recientes Movilizaciones En Colombia, Natalia Beltrán Orjuela
¿Protesta Social Antidemocrática? Hacia Nuevas Formas De Participación Ciudadana A Través Del Internet En El Marco De Las Recientes Movilizaciones En Colombia, Natalia Beltrán Orjuela
American University International Law Review
No abstract provided.
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Seattle University Law Review
Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Seattle University Law Review
The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …
World War Web: Rethinking "Aiding And Abetting" In The Social Media Age, Rebecca J. Cambron
World War Web: Rethinking "Aiding And Abetting" In The Social Media Age, Rebecca J. Cambron
Case Western Reserve Journal of International Law
ISIS's use of social media presents a new challenge for counterterror efforts. The organization aims to recruit followers and incite violence through social media. Given that this is a new medium for terrorist organizations, social media companies have come under fire for indirectly providing ISIS with farreaching platforms to spread its content. The companies, as well as national governments and international entities, have attempted to respond to the threat posed by such content. These responses, however, have proven ineffective. This Note argues that to effectively respond to and combat the threat posed by terrorist speech, national governments should adopt a …
The Korea Database: Wipo-Administered Udrp Decisions, The First Fifteen Years (2000–2014), Ilhyung Lee
The Korea Database: Wipo-Administered Udrp Decisions, The First Fifteen Years (2000–2014), Ilhyung Lee
Chicago-Kent Journal of Intellectual Property
No abstract provided.
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
The Need For An International Convention On Data Privacy: Taking A Cue From The Cisg, Morgan Corley
Brooklyn Journal of International Law
In light of the invalidation of the U.S.-EU Safe Harbor, along with the increase in sales of personal data as a commodity, data privacy has become a major concern amongst different nations. The lack of harmonization of data-privacy laws around the world continues to pose obstacles to the free flow of data across national borders. The free flow of data is, nonetheless, essential the international economy. As a result, nations continue to work together to try to create mechanisms by which data can be transferred across borders in a secure manner. This Note examines the current state of data-privacy law …
Towards An Internet Bill Of Rights, Giovanna De Minico
Towards An Internet Bill Of Rights, Giovanna De Minico
Loyola of Los Angeles International and Comparative Law Review
No abstract provided.
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders
Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders
Georgia Journal of International & Comparative Law
No abstract provided.
International Dispute Settlement At The Trademark-Domain Name Interface, Laurence R. Helfer
International Dispute Settlement At The Trademark-Domain Name Interface, Laurence R. Helfer
Pepperdine Law Review
No abstract provided.
Untangling The Web: Exploring Internet Regulation Schemes In Western Democracies, Renee Keen
Untangling The Web: Exploring Internet Regulation Schemes In Western Democracies, Renee Keen
San Diego International Law Journal
This Comment investigates past censorship schemes proposed and implemented by selected democratic administrations, in order to develop an improved framework and accompanying infrastructure that may accomplish the goals that these policies envisioned, but failed to achieve. The difficulty of this undertaking is in developing the intermediate and legally defensible parameters under which a regulation scheme can endure and gain support in a democratic society. The greater difficulty lies in developing a system that can accomplish these objectives in the burgeoning and ever-changing cyber realm. The challenges posed by Internet activity are novel ones, and the legitimacy of the actions taken …
Comparacion Historica Y Contemporanea De Los Esfuerzos Legales De Brasil Y Los Estados Unidos Para Acorralar La Piratedria De Musica Digital Y Software P2p, Nolan Garrido
ILSA Journal of International & Comparative Law
Hoy en dia las compras legales de mfisica en linea han subido notablemente.
Finding A Voice: Using The Internet For Free Speech And Expression In Iran, Chelsea Zimmerman
Finding A Voice: Using The Internet For Free Speech And Expression In Iran, Chelsea Zimmerman
Human Rights & Human Welfare
In July 2009, many Iranians took to the streets to protest the results of the presidential election in which Mahmoud Ahmadinejad won with a reported 62% of the vote. The protests, stemming from allegations of electoral fraud, quickly exposed the government's limited tolerance for dissent. In addition to street demonstrations, protestors utilized social networking websites to express their opposition to the election results. The world, following Internet feeds, witnessed the restrictive mechanisms Iran’s government placed on expression and speech. People throughout the world admonished Iran for the government's interference with cell phone and Internet networks. Iran’s free speech and expression …
With Great Power Comes Great Responsibility: Korea's Role In The War Against Online Piracy, Edward Choi
With Great Power Comes Great Responsibility: Korea's Role In The War Against Online Piracy, Edward Choi
San Diego International Law Journal
South Korea is one of the most Internet-savvy countries in the world, with more than 34 million Koreans over the age of six—74.8% of the total population—regularly accessing the Internet. According to the Organization for Economic Co-operation and Development (OECD), as of June 2007, South Korea has the fourth largest number of broadband subscribers at over 14.4 million, behind only Japan, Germany, and the United States, all of which have much higher populations. Studies show the time Koreans spend online is primarily for entertainment purposes, as almost 80% of Korean Internet users report online consumption of audio and video, almost …
Confronting The Limits Of The First Amendment: A Proactive Approach For Media Defendants Facing Liability Abroad, Michelle A. Wyant
Confronting The Limits Of The First Amendment: A Proactive Approach For Media Defendants Facing Liability Abroad, Michelle A. Wyant
San Diego International Law Journal
This Article confronts the limits this issue imposes on the First Amendment in four parts. Part I described the potential for conflicting defamation laws and forum shopping to undermine the American media's speech protections in the context of the Internet and global publications and outlines the Article's overall method of analysis. Part II first orients these conflicting defamation laws with respect to their development from the common law. It then frames them in terms of the underlying structural and policy differences that have produced their substantive divergence. This frame provides the analytical perspective through which this Article examines the varying …
Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono
Japanese Prefectural Scapegoats In The Constitutional Landscape: Protecting Children From Violent Video Games In The Name Of Public Welfare, Susan Minamizono
San Diego International Law Journal
Part I of this comment will examine the history and application of freedom of expression in Japanese case law and the evolution of the public welfare concept and its circumscribing effect on individual freedoms. Part II will explore the recent local regulatory efforts and the historical underpinnings for these laws that place restrictions on materials to children. Part III will compare the Japanese legislative endeavors with their American counterparts and highlight the reasons why United States laws will continue to be struck down by courts. Part IV will analyze the response of the video game industry to the onslaught of …
Net Neutrality: An International Policy For The United States, Frederick W. Pfister
Net Neutrality: An International Policy For The United States, Frederick W. Pfister
San Diego International Law Journal
Consider this scenario: Alex and John still are avid video game players and play hours a day, each connecting from the same town through different ISPs. However, since it is a peak Internet traffic time, it may be difficult for them to play. While Alex has the "Diamond" package from his ISP that ensures he has guaranteed high-bandwidth connection, John's ISP does not offer anything other than regular residential service. John must compete with everyone else in his local area for bandwidth, including a few who constantly watch high-definition video-on-demand and subsequently constrain bandwidth for other users. Would it not …
Breaching The Great Firewall Of China: Congress Overreaches In Attacking Chinese Internet Censorship, Miriam D. D'Jaen
Breaching The Great Firewall Of China: Congress Overreaches In Attacking Chinese Internet Censorship, Miriam D. D'Jaen
Seattle University Law Review
The Global Online Freedom Act of 2007 promotes freedom of expression on the Internet by prohibiting U.S. businesses from cooperating with officials in Internet-restricting countries. While the Act should be commended for imposing a higher standard of ethical business practices on U.S.corporations, there are significant problems with curing China's censorship policies by imposing liability on U.S. Internet companies. The standards and recommendations proposed by Congress within the Act correspond with an inherently American conception of freedom of expression. Thus, the Act imposes our domestic standards, rooted in the First Amendment, on states with very different political ideologies. A better alternative …
China's Media: The Impact Of The Internet, Richard Cullen, D. W. Choy
China's Media: The Impact Of The Internet, Richard Cullen, D. W. Choy
San Diego International Law Journal
[T]his paper provides a review of how the use of the Internet has grown and been regulated in China. We then draw some conclusions on what the experience to date may have to tell us about future regulatory and usage patterns with respect to the Internet in China.
Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy
Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy
San Diego International Law Journal
The debate over whether cyberspace can or should be regulated is essentially dead. This is the conclusion being taught in law schools today. The battle between Judge Frank Easterbrook and Professor Lawrence Lessig over "laws" and "horses", infamous among cyberspace legal scholars, became irrelevant when geographically-based governments began regulating Internet related activities. However, debate over how the Internet should be regulated continues. One way of framing this debate is in terms of deciding how to regulate behavior in cyberspace. Professor Lessig postulated four kinds of constraints regulate behavior: (1) social norms, (2) markets, (3) law, and (4) architecture. This comment …
Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller
Prescriptive Jurisdiction Over Internet Activity: The Need To Define And Establish The Boundaries Of Cyberliberty, Samuel F. Miller
Indiana Journal of Global Legal Studies
No abstract provided.
Spreading Angst Or Promoting Free Expression? Regulating Hate Speech On The Internet, Joshua Spector
Spreading Angst Or Promoting Free Expression? Regulating Hate Speech On The Internet, Joshua Spector
University of Miami International and Comparative Law Review
No abstract provided.
2002 Philip C. Jessup International Moot Court Competition, Chris Curran, Hamish Forsyth, Philippa Jones, Alexandra Smithyman, Reuven Young
2002 Philip C. Jessup International Moot Court Competition, Chris Curran, Hamish Forsyth, Philippa Jones, Alexandra Smithyman, Reuven Young
ILSA Journal of International & Comparative Law
The Republic of Turingia and the Republic of Babbage have brought their case before this Court by notification of the Special Agreement as provided for by Article 40(1) of the Statute of the International Court of Justice.
2002 Philip C. Jessup International Moot Court Competition, William Burker-White, David Mascari, Jin-Long Pao, Natalie Reid
2002 Philip C. Jessup International Moot Court Competition, William Burker-White, David Mascari, Jin-Long Pao, Natalie Reid
ILSA Journal of International & Comparative Law
The Republic of Turingia and the Republic of Babbage have brought their case before this Court by notification of the Special Agreement as provided for by Article 40(1) of the Statute of the International Court of Justice. The Court has jurisdiction over the case pursuant to Article 36(2) of the said Statute.