Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- American University Washington College of Law (15)
- Boston University School of Law (12)
- University of Colorado Law School (11)
- Columbia Law School (9)
- University of Baltimore Law (9)
-
- Fordham Law School (8)
- University of Kentucky (8)
- University of Michigan Law School (8)
- New York Law School (7)
- University of Georgia School of Law (7)
- William & Mary Law School (7)
- University of Missouri School of Law (6)
- University of Pennsylvania Carey Law School (6)
- Schulich School of Law, Dalhousie University (5)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (5)
- University of Pittsburgh School of Law (5)
- Cleveland State University (4)
- University of Florida Levin College of Law (4)
- University of New Hampshire (4)
- Texas A&M University School of Law (3)
- University of Maryland Francis King Carey School of Law (3)
- Notre Dame Law School (2)
- Santa Clara Law (2)
- Singapore Management University (2)
- St. John's University School of Law (2)
- University of Miami Law School (2)
- University of Richmond (2)
- Boise State University (1)
- City University of New York (CUNY) (1)
- Embry-Riddle Aeronautical University (1)
- Publication Year
- Publication
-
- Faculty Scholarship (35)
- Faculty Publications (19)
- All Faculty Scholarship (16)
- Articles (13)
- Articles in Law Reviews & Other Academic Journals (12)
-
- Publications (12)
- Scholarly Works (9)
- Law Faculty Scholarly Articles (8)
- Articles & Chapters (7)
- Articles, Book Chapters, & Popular Press (5)
- Law Faculty Scholarship (5)
- Law Faculty Articles and Essays (4)
- UF Law Faculty Publications (4)
- Joint PIJIP/TLS Research Paper Series (3)
- Journal Articles (3)
- LLM Theses and Essays (3)
- Law Faculty Publications (3)
- Law Librarian Scholarship (2)
- Popular Media (2)
- Research Collection Yong Pung How School Of Law (2)
- Articles by Maurer Faculty (1)
- Boyd Briefs / Road Scholars (1)
- Department of Political Science and Law Faculty Scholarship and Creative Works (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Faculty Articles (1)
- Faculty Journal Articles and Book Chapters (1)
- Journal Publications (1)
- Library Philosophy and Practice (e-journal) (1)
- Management Faculty Publications and Presentations (1)
- Presentations (1)
Articles 31 - 60 of 182
Full-Text Articles in Law
Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello
Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello
Articles
There are more than one billion websites available online. Many are useful tools for attorneys, so it makes sense to review and refresh your favorite bookmarks regularly. While none of the many free sites offer the sophisticated search abilities of fee-based research services, a few minutes spent exploring free sites can help researchers significantly narrow their searches once they turn to a fee-based system. Remember to always take advantage of the advancesearch option when available on a free site. Free sites are offering increasingly sophisticated search options, such as Boolean and proximity searches, which were previously exclusive to paid services.
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
Against Data Exceptionalism, Andrew Keane Woods
Against Data Exceptionalism, Andrew Keane Woods
Law Faculty Scholarly Articles
One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions of jurisdiction. This Article …
Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring
Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring
Sociology & Criminal Justice Faculty Publications
The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long …
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Law Faculty Publications
Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Law Faculty Articles and Essays
We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …
Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame
Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame
Department of Political Science and Law Faculty Scholarship and Creative Works
The purpose of this study was to describe a sample of mental-health blogs, to determine the proportion of sampled blogs still posting several years after identification, and to identify the correlates of survival. One hundred eighty-eight mental-health blogs were identified in 2007–08 and revisited in 2014. Eligible blogs were U.S.-based, in English, and active. Baseline characteristics and survival status were described and variation based on blog focus and survival examined. Mental health bloggers tended to be females blogging as patients and caregivers focusing on specific mental illnesses/conditions. The proportion of blogs still active at follow-up ranged from 25.5 percent to …
At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld
At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld
Articles
On December 19, 2014, long-simmering tensions between Mississippi Attorney General Jim Hood and the search engine giant Google boiled over into federal court when Google filed suit against the Attorney General to enjoin him from bringing civil or criminal charges against it for alleged violations of the Mississippi Consumer Protection Act. Hood had been investigating and threatening legal action against Google for over a year for its alleged failure to do enough to prevent its search engine, advertisements, and YouTube website from facilitating public access to illegal, dangerous, or copyright protected goods. The case has garnered a great deal of …
Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods
Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods
Law Faculty Scholarly Articles
The global nature of today’s Internet services presents a unique challenge to international law enforcement cooperation. On a daily basis, law enforcement agents in one country seek access to data that is beyond their jurisdictional reach; as one industry analyst put it, there has been, “an internationalization of evidence.” In order to gain lawful access to data that is subject to another state’s jurisdiction, law enforcement agents must request mutual legal assistance (MLA) from the country that can legally compel the data’s disclosure. But the MLA regime has not been updated to manage the enormous rise of requests for MLA. …
Trust And Social Commerce, Julia Y. Lee
Trust And Social Commerce, Julia Y. Lee
Journal Articles
Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace.
The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble
The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble
Scholarly Works
From the early days of the Internet, commentators have warned that it would be impossible for those who act on the Internet (“Internet actors”) to comply with the copyright laws of all Internet-connected countries if the national copyright laws of all those countries were to apply simultaneously to Internet activity. A multiplicity of applicable copyright laws seems plausible at least when the Internet activity is ubiquitous — i.e., unrestricted by geoblocking or by other means — given the territoriality principle that governs international copyright law and the choice-of-law rules that countries typically use for copyright infringements.
This Article posits that …
Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman
Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman
Articles & Chapters
This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.”
The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy …
A New Taxonomy For Online Harms, Kate Klonick
A New Taxonomy For Online Harms, Kate Klonick
Faculty Publications
(Excerpt)
Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …
Authors, Online, Daniel J. Gervais
Authors, Online, Daniel J. Gervais
Vanderbilt Law School Faculty Publications
The fate of professional creators is a major cultural issue. While specific copyright rules are obviously contingent and should be adapted to the new realities of online distribution and easy reuse, professional authorship remains necessary. I also believe that to be a professional author, creators need time, which, in turn, does require some form of payment. We need healthy financial flows to allow professional authors to make a decent, market-based living. This requires a move away from one-size-fits-all copyright and the resulting "tug of norms" that requires a shift of the entire policy package to the benefit of one category …
Recent Journalism Awards Won By "Old," "New," And "Hybrid" Media, Robert H. Lande, Thomas J. Horton, Virginia Callahan
Recent Journalism Awards Won By "Old," "New," And "Hybrid" Media, Robert H. Lande, Thomas J. Horton, Virginia Callahan
All Faculty Scholarship
This compares the quality of the "old" media to that of the "new" media by determining how often each type of media source wins major journalism awards. It divides media sources into three categories: old, new and hybrid. New media is limited to publications that were started purely as online news publications. Old media is classified in the traditional sense to include such newspapers as the New York Times. Hybrid media combines elements of both new and old media. Our research compares the number of Pulitzer Prizes and other major journalism awards won by these three types of media sources …
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo
All Faculty Scholarship
As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.
• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …
Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson
Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
This Article presents a theory of judicial notice for the information age. It argues that the ease of accessing factual data on the Internet allows judges and litigants to expand the use of judicial notice in ways that raise significant concerns about admissibility, reliability, and fair process. State and federal courts are already applying the surprisingly pliant judicial notice rules to bring websites ranging from Google Maps to Wikipedia into the courtroom, and these decisions will only increase in frequency in coming years. This rapidly emerging judicial phenomenon is notable for its ad hoc and conclusory nature – attributes that …
The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello
The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello
Faculty Scholarship
This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …
Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll
Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
Has the time come to substantially revise the Copyright Act to better adapt the law to the ever-evolving digital environment? A number of influential sources appear to think so. If their initiatives gain momentum, it will be important to consider lessons learned from the first such effort fifteen years ago when Congress made far-reaching changes to copyright law by extending the term of copyright for twenty years and by enacting a package of reform proposals known as the Digital Millennium Copyright Act (“DMCA”). This Article intertwines the story of one important provision of the DMCA - safe harbors for Internet …
Teenage Crowdfunding, Andrew A. Schwartz
Teenage Crowdfunding, Andrew A. Schwartz
Publications
Teenage startups are in the public interest and should be encouraged, yet the federal CARD Act of 2009 eliminated credit card financing for many such companies, cutting off an important source of early-stage business capital for teenage entrepreneurs. Since then, however, Congress passed the CROWDFUND Act of 2012 which will allow teenagers to raise early-stage financing through Internet crowdfunding. Teens, being masters of the Internet, are well positioned to exploit this new opportunity, with the upshot being that securities crowdfunding may become an important way for youthful entrepreneurs to fund their business dreams.
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Faculty Scholarship
This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …
Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman
Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman
All Faculty Scholarship
Private ordering plays a significant role in the application of intellectual property laws, especially in the context of copyright law. In this Article, I highlight some of the dominant modes of private ordering and consider what formal copyright law should do, if anything, to engage with private ordering in the copyright space. I conclude that there is not one single approach that copyright law should take with regard to private ordering, but instead several different approaches. In some instances, the best option is for the law to get out of the way and simply continue to provide room for various …
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Publications
The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Faculty Scholarship
Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …
After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane
After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane
Articles
The Federal Trade Commission's (“FTC” or “the commission”) January 3, 2013 decision to close its longstanding investigation of Google1 brings to a close a flurry of discussion over the possibility that Google could become subject to a “search neutrality” principle in the United States. Although the Commission found against Google on several grounds, it rejected petitions from Google's critics to create a search neutrality principle as a matter of antitrust law. This essay briefly analyzes what remains of U.S. antitrust scrutiny of Internet search bias after the Google settlement. In particular, it suggests that a sensible line can be drawn …
Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande
Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande
All Faculty Scholarship
This article examines whether the "old media" and the "new media", including the Internet, should be considered to be within the same relevant market for antitrust purposes. To do this the article first demonstrates that proper antitrust consideration of the role of non-price competition necessitates that “news” and “journalism” be analyzed in two distinct ways. First, every part of the operations of a newspaper (or other type of media source), including its investigative reporting and local coverage, should be assessed separately. We present empirical evidence collected for this study which demonstrates that the old media continues to win the vast …
Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park
Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park
Management Faculty Publications and Presentations
No abstract provided.
The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga
The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga
Law Faculty Publications
Do metaphors influence our information policy preferences? Professor Osenga thinks so, which makes it especially important to choose the right one, as a metaphor is often the primary tool the general public uses to understand information policy. Using a five-point rubric, she evaluates, among others, understanding the Internet as “tubes,” “highway,” “space (cyberspace),” “coffee shop/bar” and “cloud.” Osenga finds them all lacking in important ways. However, she believes the metaphor of the Internet as “ecosystem” is very promising and deserves to be further developed.
From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers
From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers
Elisabeth Haub School of Law Faculty Publications
This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …