Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (36)
- Maurer School of Law: Indiana University (8)
- University of Richmond (5)
- American University Washington College of Law (4)
- Chicago-Kent College of Law (4)
-
- University of Michigan Law School (4)
- William & Mary Law School (3)
- University of Miami Law School (2)
- Cleveland State University (1)
- Cornell University Law School (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Loyola University Chicago, School of Law (1)
- Selected Works (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- Vanderbilt University Law School (1)
- Keyword
-
- Internet (11)
- Communications Decency Act (4)
- First Amendment (4)
- Internet Law (4)
- Technology (4)
-
- Access to information (3)
- Cyberspace (3)
- Information (3)
- Pornography (3)
- CDA (2)
- Computers (2)
- Copyright (2)
- Digital Information (2)
- Legal research (2)
- Online Services (2)
- Websites (2)
- ARPANET (1)
- Access to legal information (1)
- American Association of Law Libraries (1)
- Anonymous communication (1)
- Baltimore City Department of Social Services (1)
- Book Review (1)
- Boyd (1)
- Braswell v. US (1)
- Broadband Media (1)
- CLE (1)
- CRTC (1)
- Cable Act (1)
- Canadian Radio-Television and Telecommunications Commission (1)
- Children (1)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (35)
- All Faculty Scholarship (4)
- Federal Communications Law Journal (4)
- Richmond Journal of Law & Technology (4)
- American University Law Review (3)
-
- Articles (3)
- Articles by Maurer Faculty (2)
- Faculty Publications (2)
- Indiana Law Journal (2)
- Michigan Law Review (2)
- Articles in Law Reviews & Other Academic Journals (1)
- Cornell Law Faculty Publications (1)
- Faculty Scholarship (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Law Faculty Articles and Essays (1)
- Law Faculty Publications (1)
- Loyola University Chicago Law Journal (1)
- Michigan Journal of International Law (1)
- Popular Media (1)
- Susan Freiwald (1)
- Touro Law Review (1)
- UIC Law Review (1)
- Vanderbilt Journal of Transnational Law (1)
- Publication Type
- File Type
Articles 61 - 74 of 74
Full-Text Articles in Law
Conflicts On The Net: Choice Of Law In Transnational Cyberspace, Matthew R. Burnsteln
Conflicts On The Net: Choice Of Law In Transnational Cyberspace, Matthew R. Burnsteln
Vanderbilt Journal of Transnational Law
No recent technological advance has captured the attention and imagination of the United States and the international community like the advent of global communications networks--the Internet, Cyberspace, the Information Superhighway. While the technology advances daily, a legal regime for ordering cyberspace has not yet evolved. Already, cases are reaching the courts in which plaintiffs complain of improper and unlawful activities by defendants in cyberspace. Both cyberspace's growing ubiquity and the anonymity found online will increase international use of the networks for interaction and commerce. This Note considers the conflict of laws implications of transnational cyberspace. The need to consider choice …
Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Aaron J. Reber, Karin Mika
Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Aaron J. Reber, Karin Mika
Touro Law Review
No abstract provided.
Starting An Electronic Journal In Law, I. Trotter Hardy
Starting An Electronic Journal In Law, I. Trotter Hardy
Faculty Publications
Starting and operating an electronic journal is similar to starting and operating any journal; it is only the actual “mailing” of an electronic journal that is easier. The author discusses his experience in starting the Journal of Online Law, an electronic journal dealing with the legal issues of cyberspace. He describes his experience in addressing questions such as whether to charge for access, how to gain visibility for the journal, what type of articles make the most sense for electronic publication, which forms of electronic distribution make the most sense, and other issues.
International Law And The Information Age, John K. Gamble
International Law And The Information Age, John K. Gamble
Michigan Journal of International Law
The subject of this article is problematic because of the paucity of other work addressing the topic and its amorphous and technical nature. The author shall argue that the information age will affect almost all aspects of how international law is made and studied, everything from theory to sources to research to teaching. Rather than limiting the article to one or two aspects of the changes brought by the information age, the author offers a tour d'horizon. This risks superficiality, but is consonant with the goal of stimulating discussion about issues that are important to the future of international …
Book Review. Telecom Regulation Monitor (S. Gieman And E. Herman, Eds.), Juliet Casper Smith
Book Review. Telecom Regulation Monitor (S. Gieman And E. Herman, Eds.), Juliet Casper Smith
Articles by Maurer Faculty
No abstract provided.
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Karin M. Mika, Aaron J. Reber
Commercial Exploitation Or Protected Use? Stern V. Delphi Internet Services Corporation And The Erosion Of The Right Of Publicity, Karin M. Mika, Aaron J. Reber
Law Faculty Articles and Essays
This article addresses the repercussions of Stern v. Delphi Internet Services Corporation and argues that the decision in Stern opens the door to a broader interpretation of “newsworthiness” and “public interest” that will enable advertisers broader First Amendment protections when using “unauthorized” likenesses. This article posits that artful advertisers could very well use the theory of Stern as a basis for virtually ensuring that every “unauthorized likeness” will enjoy First Amendment protection and not be considered as violative of the right of publicity.
It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow", A. Michael Froomkin
It Came From Planet Clipper: The Battle Over Cryptographic Key "Escrow", A. Michael Froomkin
Articles
No abstract provided.
Property (And Copyright) In Cyberspace, I. Trotter Hardy
Property (And Copyright) In Cyberspace, I. Trotter Hardy
Faculty Publications
No abstract provided.
Governing Networks And Rule-Making In Cyberspace, Joel R. Reidenberg
Governing Networks And Rule-Making In Cyberspace, Joel R. Reidenberg
Faculty Scholarship
The global network environment defies traditional regulatory theories and policymaking practices. At present, policymakers and private sector organizations are searching for appropriate regulatory strategies to encourage and channel the global information infrastructure (“GII”). Most attempts to define new rules for the development of the GII rely on disintegrating concepts of territory and sector, while ignoring the new network and technological borders that transcend national boundaries. The GII creates new models and sources for rules. Policy leadership requires a fresh approach to the governance of global networks. Instead of foundering on old concepts, the GII requires a new paradigm for governance …
A Right To Read Anonymously: A Closer Look At "Copyright Management" In Cyberspace, Julie E. Cohen
A Right To Read Anonymously: A Closer Look At "Copyright Management" In Cyberspace, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
It has become commonplace to say that we have entered the age of information. The words conjure up images of a reader’s paradise—an era of limitless access to information resources and unlimited interpersonal communication. In truth, however, the new information age is turning out to be as much an age of information about readers as an age of information for readers. The same technologies that have made vast amounts of information accessible in digital form are enabling information providers to amass an unprecedented wealth of data about who their customers are and what they like to read. In the new …
Cybermarks: A Proposed Hierarchical Modeling System Of Registration And Internet Architecture For Domain Names, 29 J. Marshall L. Rev. 623 (1996), G. Andrew Barger
Cybermarks: A Proposed Hierarchical Modeling System Of Registration And Internet Architecture For Domain Names, 29 J. Marshall L. Rev. 623 (1996), G. Andrew Barger
UIC Law Review
No abstract provided.
Law In Cyberspace, Fred H. Cate
Uncertain Privacy: Communication Attributes After The Digital Telephony Act, Susan Freiwald
Uncertain Privacy: Communication Attributes After The Digital Telephony Act, Susan Freiwald
Susan Freiwald
This article argues that the coming tide of electronic Federal law protects the privacy of transmitted communications under a two-tiered system. The actual contents of communications occupy the first tier, where they enjoy fairly effective protection against disclosure. Communication attributes encompass all of the other information that can be learned about a communication, such as when and where it occurred, to whom and from whom it was sent and how long it lasted. They occupy a lowly second tier, where the protections against disclosure are weak, ambiguous and in some cases non-existent. This bifurcated system becomes increasingly untenable as advances …