Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

2009

Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 207

Full-Text Articles in Law

A Submission To The House Standing Committee On Procedure Inquiry Into The Effectiveness Of House Committees, Simon Rice, Matthew Rimmer Jul 2009

A Submission To The House Standing Committee On Procedure Inquiry Into The Effectiveness Of House Committees, Simon Rice, Matthew Rimmer

Matthew Rimmer

Thank you for the opportunity to make a submission to your inquiry into the effectiveness of the House Committees. Our Parliamentary committees have six basic roles: to advise, to inquire, to administrate, to legislate, to negotiate, and to scrutinise and control’. After a slow start in Australia, committees have become increasingly important to democratic governance in Australia.

The committees’ effective performance of their tasks are vital to a healthy Australian democracy. It is our experience, as frequent participants in parliamentary committee inquiries, that the committees are not sufficiently resourced, in time and personnel, to effectively discharge their increasingly important role.


…And Net Neutrality For All: An Advisement Against Regulated Broadband Expansion, Nicholas R. Brown Jun 2009

…And Net Neutrality For All: An Advisement Against Regulated Broadband Expansion, Nicholas R. Brown

Nicholas R Brown

Ever since the now YouTube famous Google interview of then Senator Barack Obama promoting broadband Internet deployment nation wide, broadband deployment as part of Obama’s overarching $825 billion stimulus package has been a ready topic of conversation in technology circles. Broadband penetration in the United States is only 25.67% of all Internet connectivity or available to roughly 71 million Americans, ranking the U.S. 19th in the world. Home connections via broadband have risen to 92.4%, creating the argument that the majority of Internet users are engaged in daily activities that require, or at least benefit from, broadband connectivity. Obama has …


Digital Divide Older People And Online Legal Advice, Subhajit Basu, Joe Duffy, Helen Davey Jun 2009

Digital Divide Older People And Online Legal Advice, Subhajit Basu, Joe Duffy, Helen Davey

Subhajit Basu

Many older people are not aware where and when advice is available. Furthermore they may be unaware that advice is needed


Cuarto Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García Jun 2009

Cuarto Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García

Bruno L. Costantini García

Memorias del Cuarto Congreso Nacional de Organismos Públicos Autónomos

"El papel de los Organismos Públicos Autónomos en la Consolidación de la Democracia"


Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden Jun 2009

Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden

Rob Frieden

Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …


Fiber Optic Foxes: Virtual Objects And Virtual Worlds Through The Lens Of Pierson V. Post And The Law Of Capture, John W. Nelson Jun 2009

Fiber Optic Foxes: Virtual Objects And Virtual Worlds Through The Lens Of Pierson V. Post And The Law Of Capture, John W. Nelson

John W. Nelson

Virtual worlds are more successfully blurring the lines between real and virtual. This tempts many to try and equate virtual property with tangible property. Such an equation creates problems when the common law of property is applied to virtual objects over which users can not possess complete dominion and control. The result is a conversion of the tangible resources that support virtual worlds into a virtual commons. Accordingly, the common law of contracts, rather than that of property, should be used to govern transactions between a user and owner of a virtual world.


Virtual Parentalism, Joshua A.T. Fairfield Jun 2009

Virtual Parentalism, Joshua A.T. Fairfield

Washington and Lee Law Review

Parents, not Laws, ultimately protect children both online and offline. If legislation places adults at legal risk because of the presence of children in virtual worlds, adults will exit those worlds, and children will be isolated into separate spaces. This will not improve safety for children. Instead, this Article suggests that Congress enact measures that encourage filtering technology and parental tools that will both protect children in virtual worlds, and protectfree speech online.


Trustworthiness As A Limitation On Network Neutrality, Aaron J. Burstein, Fred B. Schneider Jun 2009

Trustworthiness As A Limitation On Network Neutrality, Aaron J. Burstein, Fred B. Schneider

Federal Communications Law Journal

The policy debate over how to govern access to broadband networks has largely ignored the objective of network trustworthiness-a set of properties (including security, survivability, and safety) that guarantee expected behavior. Instead, the terms of the network access debate have focused on whether imposing a nondiscrimination or "network neutrality" obligation on network providers is justified by the condition of competition among last-mile providers. Rules proposed by scholars and policymakers would allow network providers to deviate from network neutrality to protect network trustworthiness, but none of these proposals has explored the implications of such exceptions for either neutrality or trustworthiness.

This …


Unlocking The Wireless Safe: Opening Up The Wireless World For Consumers, Adam Clay Jun 2009

Unlocking The Wireless Safe: Opening Up The Wireless World For Consumers, Adam Clay

Federal Communications Law Journal

Facing resistance to the use of its Voice-over-Internet Protocol application on mobile phones, in February 2007, Skype Communications filed a petition with the FCC asking for application of the Carterfone standards to the wireless phone industry. This Note discusses Carterfone and the merits of Skype's petition in light of the recent auction of the C Block, which carries open network requirements, and developments in wireless technology. This Note argues that the FCC should require carriers to provide technical standards for access to their networks, whereby individuals will be able to connect any approved device and application of their choosing.


The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth Jun 2009

The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth

Federal Communications Law Journal

In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.

This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …


Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce Jun 2009

Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce

Chicago-Kent Law Review

Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.


Coding Privacy, Lilian Edwards Jun 2009

Coding Privacy, Lilian Edwards

Chicago-Kent Law Review

Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …


Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder Jun 2009

Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder

Chicago-Kent Law Review

Peer-to-peer networks are often used to infringe copyrights, but they also serve some legitimate purposes consistent with copyright law. In attempting to find a satisfactor solution, this note develops and analyzes two models that future peer-to-peer networks could employ to attempt to avoid liability for copyright infringement. The note then analyzes the law, applies the two models to the relevant legal tests, and analyzes whether a peer-to-peer network operating on each model could avoid liability for copyright infringement. It concludes that modifying their technological structure may help peer-to-peer networks avoid liability, but that some risks remain.


Protecting Children In Virtual Worlds Without Undermining Their Economic, Educational, And Social Benefits, Robert Bloomfield, Benjamin Duranske Jun 2009

Protecting Children In Virtual Worlds Without Undermining Their Economic, Educational, And Social Benefits, Robert Bloomfield, Benjamin Duranske

Washington and Lee Law Review

Advances in virtual world technology pose risks for the safety and welfare of children. Those advances also alter the interpretations of key terms in applicable Laws. For example, in the Miller test for obscenity, virtual worlds constitute places, rather than "works," and may even constitute local communities from which standards are drawn. Additionally, technological advances promise to make virtual worlds places of such significant social benefit that regulators must take care to protect them, even as they protect children who engage with them.


Developmental Implications Of Children's Virtual Worlds, Kaveri Subrahmanyam Jun 2009

Developmental Implications Of Children's Virtual Worlds, Kaveri Subrahmanyam

Washington and Lee Law Review

As virtual worlds for children increase in popularity, it is important to examine their developmental implications. Given the limited research on this question, we use extant social science research on youth and digital media to understand how children 's participation in virtual worlds might mediate their development. We identify four different pathways by which new media can potentially mediate development. Then we review relevant research on video games, which, like virtual worlds, contain three-dimensional online fantasy worlds; we also review research on online communication forums, which are like virtual worlds in that they allow users to create online selves and …


Introduction [To The Symposium], Joan M. Shaughnessy Jun 2009

Introduction [To The Symposium], Joan M. Shaughnessy

Washington and Lee Law Review

No abstract provided.


Play And The Search For Identity In The Cyberspace Community, Dorothy G. Singer Jun 2009

Play And The Search For Identity In The Cyberspace Community, Dorothy G. Singer

Washington and Lee Law Review

No abstract provided.


A Review Of The Effects Of Violent Video Games On Children And Adolescents, Jodi L. Whitaker, Brad J. Bushman Jun 2009

A Review Of The Effects Of Violent Video Games On Children And Adolescents, Jodi L. Whitaker, Brad J. Bushman

Washington and Lee Law Review

No abstract provided.


Fertility And Virtual Reality, Edward Castronova Jun 2009

Fertility And Virtual Reality, Edward Castronova

Washington and Lee Law Review

No abstract provided.


Sex Play In Virtual Worlds, Robin Fretwell Wilson Jun 2009

Sex Play In Virtual Worlds, Robin Fretwell Wilson

Washington and Lee Law Review

No abstract provided.


Virtual Heisenberg: The Limits Of Virtual World Regulability, Viktor Mayer-Schonberger Jun 2009

Virtual Heisenberg: The Limits Of Virtual World Regulability, Viktor Mayer-Schonberger

Washington and Lee Law Review

No abstract provided.


Online Dangers: Keeping Children And Adolescents Safe, Jodi L. Whitaker, Brad J. Bushman Jun 2009

Online Dangers: Keeping Children And Adolescents Safe, Jodi L. Whitaker, Brad J. Bushman

Washington and Lee Law Review

No abstract provided.


Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Citron May 2009

Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Citron

Danielle Keats Citron

The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women’s home addresses alongside suggestions that they should be sexually assaulted and technological attacks that shut down blogs and websites. It impedes women’s full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women’s experience, deeming it harmless teasing that women should expect, and tolerate, given the Internet’s Wild West norms …


Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington May 2009

Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington

Matthew Hoisington

Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via cyberspace strains traditional definitions of the use of force. In order to clearly delineate the rights of the parties involved, including the right to self-defense, the international community must come to some consensus on the meaning of cyberwarfare within the existing jus ad bellum paradigm. After examining the shortcomings inherent in classifying cyberattacks according to classical notions of kinetic warfare, …


Vol. Ix, Tab 41 - Ex. 17 - Email From Baris Gultekin (Google Product Manager Director), Baris Gultekin May 2009

Vol. Ix, Tab 41 - Ex. 17 - Email From Baris Gultekin (Google Product Manager Director), Baris Gultekin

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


Legal Framework Regulating Internet Obscenity: An Indian Perspective, Dharmendra Chatur May 2009

Legal Framework Regulating Internet Obscenity: An Indian Perspective, Dharmendra Chatur

Dharmendra Chatur

No abstract provided.


Saving Facebook, James Grimmelmann May 2009

Saving Facebook, James Grimmelmann

Cornell Law Faculty Publications

This Article provides the first comprehensive analysis of the law and policy of privacy on social network sites, using Facebook as its principal example. It explains how Facebook users socialize on the site, why they misunderstand the risks involved, and how their privacy suffers as a result. Facebook offers a socially compelling platform that also facilitates peer-to-peer privacy violations: users harming each others' privacy interests. These two facts are inextricably linked; people use Facebook with the goal of sharing some information about themselves. Policymakers cannot make Facebook completely safe, but they can help people use it safely.

The Article makes …


Technological Due Process, Danielle Citron Apr 2009

Technological Due Process, Danielle Citron

Danielle Keats Citron

Today, computer systems terminate Medicaid benefits, remove voters from the rolls, exclude travelers from flying on commercial airlines, label (and often mislabel) individuals as dead-beat parents, and flag people as possible terrorists from their email and telephone records. But when an automated system rules against an individual, that person often has no way of knowing if a defective algorithm, erroneous facts, or some combination of the two produced the decision. Research showing strong psychological tendencies to defer to automated systems suggests that a hearing officer’s check on computer decisions will have limited value. At the same time, automation impairs participatory …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds Apr 2009

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds

William L. Reynolds

In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.


Digital Ethics In Bridging Digital Divide, Subhajit Basu Apr 2009

Digital Ethics In Bridging Digital Divide, Subhajit Basu

Subhajit Basu

Our information society is creating parallel systems: one for those with income, education and literacy connections, giving plentiful information at low cost and high speed: the other are those without connections, blocked by high barriers of time, cost and uncertainty and dependent upon outdated information. Hence it can be expressed the DD is nothing but a reflection of social divide. The question is what is the best strategy to construct an information society that is ethically sound? Most people have the views that ICT and underlying ideologies are neutral. This Technology has become so much naturalized that it can no …