Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- BLR (56)
- UIC School of Law (21)
- Schulich School of Law, Dalhousie University (14)
- University of Richmond (13)
- Duke Law (12)
-
- Cleveland State University (11)
- University of Michigan Law School (10)
- SelectedWorks (8)
- Maurer School of Law: Indiana University (6)
- Selected Works (5)
- Vanderbilt University Law School (4)
- Santa Clara Law (3)
- University of Colorado Law School (3)
- University of Pennsylvania Carey Law School (3)
- University of Pittsburgh School of Law (3)
- Columbia Law School (2)
- New York Law School (2)
- Texas A&M University School of Law (2)
- University of Washington School of Law (2)
- Brigham Young University Law School (1)
- Brooklyn Law School (1)
- Chicago-Kent College of Law (1)
- Cornell University Law School (1)
- Florida State University College of Law (1)
- Georgetown University Law Center (1)
- Golden Gate University School of Law (1)
- Loyola University Chicago, School of Law (1)
- Northwestern Pritzker School of Law (1)
- Penn State Dickinson Law (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- Keyword
-
- Law and Technology (56)
- Intellectual Property Law (31)
- Internet (30)
- Science and Technology (27)
- Computer Law (21)
-
- Law and Society (18)
- Law and Economics (16)
- Copyright (13)
- Constitutional Law (10)
- General Law (10)
- Health Law and Policy (10)
- Communications Law (9)
- Economics (9)
- Consumer Protection Law (8)
- Criminal Law and Procedure (7)
- Fair use (7)
- International Law (7)
- Media & Communications (7)
- Privacy (7)
- Antitrust (6)
- Commercial Law (6)
- Comparative and Foreign Law (6)
- Contracts (6)
- Courts (6)
- Evidence (6)
- Intellectual property (6)
- Legislation (6)
- Medical Jurisprudence (6)
- Politics (6)
- Administrative Law (5)
- Publication
-
- ExpressO (56)
- UIC John Marshall Journal of Information Technology & Privacy Law (16)
- Canadian Journal of Law and Technology (14)
- Richmond Journal of Law & Technology (13)
- Duke Law & Technology Review (12)
-
- Cleveland State Law Review (10)
- All Faculty Scholarship (5)
- Faculty Scholarship (5)
- Michigan Telecommunications & Technology Law Review (5)
- Articles (4)
- Federal Communications Law Journal (4)
- Faculty Publications (3)
- Publications (3)
- UIC Review of Intellectual Property Law (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Bruno L. Costantini García (2)
- Indiana Law Journal (2)
- Jonathan Zittrain (2)
- NYLS Law Review (2)
- Rosetta Stone v. Google (Joint Appendix) (2)
- University of Michigan Journal of Law Reform (2)
- Washington Journal of Law, Technology & Arts (2)
- Aaron K. Perzanowski (1)
- Andres Guadamuz (1)
- Books (1)
- Brigham Young University Education and Law Journal (1)
- California Agencies (1)
- Cornell Law Faculty Publications (1)
- Donald J. Kochan (1)
- Dr. A.V Narsimha Rao (1)
- Publication Type
- File Type
Articles 181 - 199 of 199
Full-Text Articles in Law
Regulation Of Municipal Wi-Fi, Michael Botein
Seeking Privacy: Examining A Role For The Fiduciary In Protecting Personal Information, Marcey L. Grigsby
Seeking Privacy: Examining A Role For The Fiduciary In Protecting Personal Information, Marcey L. Grigsby
NYLS Law Review
No abstract provided.
Pervasively Distributed Copyright Enforcement, Julie E. Cohen
Pervasively Distributed Copyright Enforcement, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
In an effort to control flows of unauthorized information, the major copyright industries are pursuing a range of strategies designed to distribute copyright enforcement functions across a wide range of actors and to embed these functions within communications networks, protocols, and devices. Some of these strategies have received considerable academic and public scrutiny, but much less attention has been paid to the ways in which all of them overlap and intersect with one another. This article offers a framework for theorizing this process. The distributed extension of intellectual property enforcement into private spaces and throughout communications networks can be understood …
Regulating Access To Databases Through Antitrust Law, Daryl Lim
Regulating Access To Databases Through Antitrust Law, Daryl Lim
Faculty Scholarly Works
It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …
Why Are Competitor's Advertising Links Displayed When I Google My Product? An Analysis Of Internet Search Engine Liability For Trademark Infringement, 5 J. Marshall Rev. Intell. Prop. L. 431 (2006), Isaiah A. Fishman
UIC Review of Intellectual Property Law
Traditional federal trademark law is being challenged in the current case of Google v. AmericanBlind. When internet issues clash with trademark infringement, courts are often faced with the dangerous task of either refusing to stretch not specifically internet tailored trademark law to grant remedy to a perceived wrong or refusing to grant remedy because of the chilling effect the remedy may have on traditional trademark. By analyzing the history of trademark law in relation with internet issues, focusing on domain name cases, pop-up advertising cases, and search engine cases, it becomes clear that specific congressional action is the most viable …
The Wipo "Internet Treaties" The United States As The Driver: The United States As The Main Source Of Obstruction — As Seen By An Anti-Revolutionary Central European, 6 J. Marshall Rev. Intell. Prop. L. 17 (2006), Mihály Ficsor
UIC Review of Intellectual Property Law
The copyright policy of the United States developed from initial isolationism, through the 1891 Chase Act, various bilateral and inter-American agreements and the establishment of the Universal Copyright Convention, to active participation in the international copyright cooperation. This development was completed by the United States’ accession to the Berne Convention in 1988. Since then, the United States has played a leading role in this field, which was manifested both during the negotiations of the 1994 TRIPS Agreement and the preparatory work of the two 1996 WIPO “Internet Treaties”, the WCT and the WPPT. These WIPO Treaties, the preparation and adoption …
The World Trade Law Of Censorship And Internet Filtering, Tim Wu
The World Trade Law Of Censorship And Internet Filtering, Tim Wu
Faculty Scholarship
Consider the following events, all from the last five years: (1) An American newsmagazine, Barron's, posts an unflattering profile of an Australian billionaire named Joseph Gutnick on its web site – the publisher, Dow Jones, Inc., is sued in Australia and forced to settle; (2) Mexico's incumbent telephone company, Telmex, blocks Mexicans from reaching the web site of the Voice-over-IP firm Skype; (3) the United States begins a major crackdown on web gambling services, causing serious economic damage to several small Caribbean economies; (4) the Chinese government prevents its citizens from using various foreign Internet services, including foreign e-mail and …
Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart
Let The People Know The Facts: Can Government Information Removed From The Internet Be Reclaimed?, Susan Nevelow Mart
Publications
Ms. Mart examines the legal bases of the public's right to access government information, reviews the types of information that have recently been removed from the Internet, and analyzes the rationales given for the removals. She suggests that the concerted use of the Freedom of Information Act by public interest groups and their constituents is a possible method of returning the information to the Internet.
Comments On Stealth Marketing And Editorial Integrity, R. Polk Wagner
Comments On Stealth Marketing And Editorial Integrity, R. Polk Wagner
All Faculty Scholarship
No abstract provided.
Network Neutrality And The Economics Of Congestion, Christopher S. Yoo
Network Neutrality And The Economics Of Congestion, Christopher S. Yoo
All Faculty Scholarship
No abstract provided.
Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya
Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya
Publications
No abstract provided.
Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison
Metaphor, Objects, And Commodities, George H. Taylor, Michael J. Madison
Articles
This Article is a contribution to a Symposium that focuses on the ideas of Margaret Jane Radin as a point of departure, and particularly on her analyses of propertization and commodification. While Radin focuses on the harms associated with commodification of the person, relying on Hegel's idea of alienation, we argue that objectification, and in particular objectification of various features of the digital environment, may have important system benefits. We present an extended critique of Radin's analysis, basing the critique in part on Gadamer's argument that meaning and application are interrelated and that meaning changes with application. Central to this …
Social Software, Groups, And Governance, Michael J. Madison
Social Software, Groups, And Governance, Michael J. Madison
Articles
Formal groups play an important role in the law. Informal groups largely lie outside it. Should the law be more attentive to informal groups? The paper argues that this and related questions are appearing more frequently as a number of computer technologies, which I collect under the heading social software, increase the salience of groups. In turn, that salience raises important questions about both the significance and the benefits of informal groups. The paper suggests that there may be important social benefits associated with informal groups, and that the law should move towards a framework for encouraging and recognizing them. …
The Idea Of The Law Review: Scholarship, Prestige, And Open Access, Michael J. Madison
The Idea Of The Law Review: Scholarship, Prestige, And Open Access, Michael J. Madison
Articles
This Essay was written as part of a Symposium on open access publishing for legal scholarship. It makes the claim that open access publishing models will succeed, or not, to the extent that they account for the existing economy of prestige that drives law reviews and legal scholarship. What may seem like a lot of uncharitable commentary is intended instead as an expression of guarded optimism: Imaginative reuse of some existing tools of scholarly publishing (even by some marginalized members of the prestige economy - or perhaps especially by them) may facilitate the emergence of a viable open access norm.
The Generative Internet, Jonathan Zittrain
The Generative Internet, Jonathan Zittrain
Jonathan Zittrain
The generative capacity for unrelated and unaccredited audiences to build and distribute code and content through the Internet to its tens of millions of attached personal computers has ignited growth and innovation in information technology and has facilitated new creative endeavors. It has also given rise to regulatory and entrepreneurial backlashes. A further backlash among consumers is developing in response to security threats that exploit the openness of the Internet and of PCs to third-party contribution. A shift in consumer priorities from generativity to stability will compel undesirable responses from regulators and markets and, if unaddressed, could prove decisive in …
Spam Works: Evidence From Stock Touts And Corresponding Market Activit, Jonathan Zittrain
Spam Works: Evidence From Stock Touts And Corresponding Market Activit, Jonathan Zittrain
Jonathan Zittrain
We assess the impact of spam that touts stocks upon the trading activity of those stocks and sketch how profitable such spamming might be for spammers and how harmful it is to those who heed advice in stock-touting e-mails. We find convincing evidence that stock prices are being manipulated through spam. We suggest that the effectiveness of spammed stock touting calls into question prevailing models of securities regulation that rely principally on the proper labeling of information and disclosure of conflicts of interest as means of protecting consumers, and we propose several regulatory and industry interventions. Based on a large …
Software And Internet Law, Peter Menell, Mark Lemley, Robert Merges, Pamela Samuelson
Software And Internet Law, Peter Menell, Mark Lemley, Robert Merges, Pamela Samuelson
Peter Menell
No abstract provided.
Fear And Norms And Rock & Roll: What Jambands Can Teach Us About Persuading People To Obey Copyright Law, Mark F. Schultz
Fear And Norms And Rock & Roll: What Jambands Can Teach Us About Persuading People To Obey Copyright Law, Mark F. Schultz
Mark F Schultz
Conventional wisdom says that people using modern technology are unlikely to obey copyright law, absent fear of lawsuits or extremely strong copy protection. This Article challenges that conventional wisdom. It explores why people obey copyright law and concludes that people can be persuaded to obey copyright voluntarily, provided that copyright owners can encourage the development of pro-copyright social norms.
This Article contributes to both the social norms and the copyright literature by explaining how pro-copyright social norms might be fostered from a behavioral trait known as reciprocity. It draws insight from a case study of a community of music fans …
The Blogosphere And The New Pamphleteers, Donald J. Kochan
The Blogosphere And The New Pamphleteers, Donald J. Kochan
Donald J. Kochan
The future of the free dissemination of information lies in the blog, some may say. The internet has entirely transformed how we receive and consume information. It’s the newest incarnation of information dissemination. From the insights of Alexis de Tocqueville, “Feelings and opinions are recruited, the heart is enlarged, and the human mind is developed only by the reciprocal influence of men upon one another.” Bloggers are a powerful force in the distribution of information and ideas and the creation of communities of conversation. Throughout history, the dissemination of information, news, opinions, and ideas has continuously transformed. In the 18th …