Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (27)
- SelectedWorks (25)
- UIC School of Law (21)
- Santa Clara Law (13)
- University of Richmond (12)
-
- Washington and Lee University School of Law (11)
- Vanderbilt University Law School (9)
- University of Michigan Law School (8)
- Maurer School of Law: Indiana University (7)
- University of Pittsburgh School of Law (6)
- University of Washington School of Law (6)
- Loyola University Chicago, School of Law (5)
- University of Maryland Francis King Carey School of Law (4)
- University of the Pacific (4)
- Boston University School of Law (3)
- Chicago-Kent College of Law (3)
- Cornell University Law School (3)
- Duke Law (3)
- Schulich School of Law, Dalhousie University (3)
- University of Colorado Law School (3)
- Villanova University Charles Widger School of Law (3)
- American University Washington College of Law (2)
- Columbia Law School (2)
- Embry-Riddle Aeronautical University (2)
- Singapore Management University (2)
- University of Massachusetts Amherst (2)
- West Virginia University (2)
- Brigham Young University Law School (1)
- Cleveland State University (1)
- Florida A&M University College of Law (1)
- Keyword
-
- Internet (18)
- Privacy (15)
- Copyright (14)
- Google (14)
- Technology (9)
-
- Cyberspace (8)
- Cyberlaw (7)
- Intellectual property (7)
- Cyberspace Law (6)
- Rosetta Stone (6)
- Adwords (5)
- First Amendment (5)
- Law and Technology (5)
- Sexual harassment (5)
- Social media (5)
- Trademark (5)
- 2009 (4)
- Facebook (4)
- Gender discrimination (4)
- Intellectual Property (4)
- Internet Law (4)
- Virtual reality games (4)
- Virtual worlds (4)
- Administrative Law (3)
- Broadband (3)
- Child development (3)
- Computer Law (3)
- Copyright Law (3)
- Cyber gender harassment (3)
- DMCA (3)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Rosetta Stone v. Google (Joint Appendix) (13)
- Richmond Journal of Law & Technology (11)
- Washington and Lee Law Review (11)
- Articles (10)
-
- Faculty Scholarship (9)
- Vanderbilt Journal of Entertainment & Technology Law (8)
- Matthew Rimmer (6)
- Mubashshir Sarshar (6)
- Danielle Keats Citron (5)
- Public Interest Law Reporter (5)
- Federal Communications Law Journal (4)
- Henry L Hu (4)
- McGeorge Law Review (4)
- Articles, Book Chapters, & Popular Press (3)
- Chicago-Kent Law Review (3)
- Duke Law & Technology Review (3)
- Michigan Law Review (3)
- Michigan Telecommunications & Technology Law Review (3)
- Publications (3)
- Washington Journal of Law, Technology & Arts (3)
- Cornell Law Faculty Publications (2)
- Daniel Lyons (2)
- James Grimmelmann (2)
- Jeffrey S. Moorad Sports Law Journal (2)
- Journal Articles (2)
- Laura Quilter (2)
- Michael Risch (2)
- Research Collection Yong Pung How School Of Law (2)
- Subhajit Basu (2)
- Publication Type
- File Type
Articles 31 - 60 of 207
Full-Text Articles in Law
A Submission To The House Standing Committee On Procedure Inquiry Into The Effectiveness Of House Committees, Simon Rice, Matthew Rimmer
A Submission To The House Standing Committee On Procedure Inquiry Into The Effectiveness Of House Committees, Simon Rice, Matthew Rimmer
Matthew Rimmer
Thank you for the opportunity to make a submission to your inquiry into the effectiveness of the House Committees. Our Parliamentary committees have six basic roles: to advise, to inquire, to administrate, to legislate, to negotiate, and to scrutinise and control’. After a slow start in Australia, committees have become increasingly important to democratic governance in Australia.
The committees’ effective performance of their tasks are vital to a healthy Australian democracy. It is our experience, as frequent participants in parliamentary committee inquiries, that the committees are not sufficiently resourced, in time and personnel, to effectively discharge their increasingly important role.
…And Net Neutrality For All: An Advisement Against Regulated Broadband Expansion, Nicholas R. Brown
…And Net Neutrality For All: An Advisement Against Regulated Broadband Expansion, Nicholas R. Brown
Nicholas R Brown
Ever since the now YouTube famous Google interview of then Senator Barack Obama promoting broadband Internet deployment nation wide, broadband deployment as part of Obama’s overarching $825 billion stimulus package has been a ready topic of conversation in technology circles. Broadband penetration in the United States is only 25.67% of all Internet connectivity or available to roughly 71 million Americans, ranking the U.S. 19th in the world. Home connections via broadband have risen to 92.4%, creating the argument that the majority of Internet users are engaged in daily activities that require, or at least benefit from, broadband connectivity. Obama has …
Digital Divide Older People And Online Legal Advice, Subhajit Basu, Joe Duffy, Helen Davey
Digital Divide Older People And Online Legal Advice, Subhajit Basu, Joe Duffy, Helen Davey
Subhajit Basu
Many older people are not aware where and when advice is available. Furthermore they may be unaware that advice is needed
Cuarto Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Cuarto Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Bruno L. Costantini García
Memorias del Cuarto Congreso Nacional de Organismos Públicos Autónomos
"El papel de los Organismos Públicos Autónomos en la Consolidación de la Democracia"
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Invoking And Avoiding The First Amendment: How Internet Service Providers Leverage Their Status As Both Content Creators And Neutral Conduits, Rob M. Frieden
Rob Frieden
Much of the policy debate and scholarly literature on network neutrality has addressed whether the Federal Communications Commission (“FCC”) has statutory authority to require Internet Service Providers (“ISPs”) to operate in a nondiscriminatory manner. Such analysis largely focuses on questions about jurisdiction, the scope of lawful regulation, and the balance of power between stakeholders, generally adverse to government oversight, and government agencies, apparently willing to overcome the same inclination. The public policy debate primarily considers micro-level issues, without much consideration of broader concerns such as First Amendment values. While professing to support marketplace resource allocation and a regulation-free Internet, the …
Fiber Optic Foxes: Virtual Objects And Virtual Worlds Through The Lens Of Pierson V. Post And The Law Of Capture, John W. Nelson
Fiber Optic Foxes: Virtual Objects And Virtual Worlds Through The Lens Of Pierson V. Post And The Law Of Capture, John W. Nelson
John W. Nelson
Virtual worlds are more successfully blurring the lines between real and virtual. This tempts many to try and equate virtual property with tangible property. Such an equation creates problems when the common law of property is applied to virtual objects over which users can not possess complete dominion and control. The result is a conversion of the tangible resources that support virtual worlds into a virtual commons. Accordingly, the common law of contracts, rather than that of property, should be used to govern transactions between a user and owner of a virtual world.
Virtual Parentalism, Joshua A.T. Fairfield
Virtual Parentalism, Joshua A.T. Fairfield
Washington and Lee Law Review
Parents, not Laws, ultimately protect children both online and offline. If legislation places adults at legal risk because of the presence of children in virtual worlds, adults will exit those worlds, and children will be isolated into separate spaces. This will not improve safety for children. Instead, this Article suggests that Congress enact measures that encourage filtering technology and parental tools that will both protect children in virtual worlds, and protectfree speech online.
Trustworthiness As A Limitation On Network Neutrality, Aaron J. Burstein, Fred B. Schneider
Trustworthiness As A Limitation On Network Neutrality, Aaron J. Burstein, Fred B. Schneider
Federal Communications Law Journal
The policy debate over how to govern access to broadband networks has largely ignored the objective of network trustworthiness-a set of properties (including security, survivability, and safety) that guarantee expected behavior. Instead, the terms of the network access debate have focused on whether imposing a nondiscrimination or "network neutrality" obligation on network providers is justified by the condition of competition among last-mile providers. Rules proposed by scholars and policymakers would allow network providers to deviate from network neutrality to protect network trustworthiness, but none of these proposals has explored the implications of such exceptions for either neutrality or trustworthiness.
This …
Unlocking The Wireless Safe: Opening Up The Wireless World For Consumers, Adam Clay
Unlocking The Wireless Safe: Opening Up The Wireless World For Consumers, Adam Clay
Federal Communications Law Journal
Facing resistance to the use of its Voice-over-Internet Protocol application on mobile phones, in February 2007, Skype Communications filed a petition with the FCC asking for application of the Carterfone standards to the wireless phone industry. This Note discusses Carterfone and the merits of Skype's petition in light of the recent auction of the C Block, which carries open network requirements, and developments in wireless technology. This Note argues that the FCC should require carriers to provide technical standards for access to their networks, whereby individuals will be able to connect any approved device and application of their choosing.
The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth
The Never-Ending Limits Of § 230: Extending Isp Immunity To The Sexual Exploitation Of Children, Katy Noeth
Federal Communications Law Journal
In 2006, the U.S. District Court for the Eastern District of Texas extended civil liability to Yahoo! under § 230 of the Communications Decency Act so that it could not be sued for knowingly profiting from a Web site where members exchanged sexually explicit pictures of minors. The court found that the reasoning of the seminal § 230 case, Zeran v. AOL, was analogous and that policy considerations mandated its holding.
This Note argues that a multifaceted approach is needed to prevent future courts from following that decision, including an amendment to § 230 that would impose civil liability upon …
Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce
Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce
Chicago-Kent Law Review
Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …
Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder
Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder
Chicago-Kent Law Review
Peer-to-peer networks are often used to infringe copyrights, but they also serve some legitimate purposes consistent with copyright law. In attempting to find a satisfactor solution, this note develops and analyzes two models that future peer-to-peer networks could employ to attempt to avoid liability for copyright infringement. The note then analyzes the law, applies the two models to the relevant legal tests, and analyzes whether a peer-to-peer network operating on each model could avoid liability for copyright infringement. It concludes that modifying their technological structure may help peer-to-peer networks avoid liability, but that some risks remain.
Protecting Children In Virtual Worlds Without Undermining Their Economic, Educational, And Social Benefits, Robert Bloomfield, Benjamin Duranske
Protecting Children In Virtual Worlds Without Undermining Their Economic, Educational, And Social Benefits, Robert Bloomfield, Benjamin Duranske
Washington and Lee Law Review
Advances in virtual world technology pose risks for the safety and welfare of children. Those advances also alter the interpretations of key terms in applicable Laws. For example, in the Miller test for obscenity, virtual worlds constitute places, rather than "works," and may even constitute local communities from which standards are drawn. Additionally, technological advances promise to make virtual worlds places of such significant social benefit that regulators must take care to protect them, even as they protect children who engage with them.
Developmental Implications Of Children's Virtual Worlds, Kaveri Subrahmanyam
Developmental Implications Of Children's Virtual Worlds, Kaveri Subrahmanyam
Washington and Lee Law Review
As virtual worlds for children increase in popularity, it is important to examine their developmental implications. Given the limited research on this question, we use extant social science research on youth and digital media to understand how children 's participation in virtual worlds might mediate their development. We identify four different pathways by which new media can potentially mediate development. Then we review relevant research on video games, which, like virtual worlds, contain three-dimensional online fantasy worlds; we also review research on online communication forums, which are like virtual worlds in that they allow users to create online selves and …
Introduction [To The Symposium], Joan M. Shaughnessy
Introduction [To The Symposium], Joan M. Shaughnessy
Washington and Lee Law Review
No abstract provided.
Play And The Search For Identity In The Cyberspace Community, Dorothy G. Singer
Play And The Search For Identity In The Cyberspace Community, Dorothy G. Singer
Washington and Lee Law Review
No abstract provided.
A Review Of The Effects Of Violent Video Games On Children And Adolescents, Jodi L. Whitaker, Brad J. Bushman
A Review Of The Effects Of Violent Video Games On Children And Adolescents, Jodi L. Whitaker, Brad J. Bushman
Washington and Lee Law Review
No abstract provided.
Fertility And Virtual Reality, Edward Castronova
Fertility And Virtual Reality, Edward Castronova
Washington and Lee Law Review
No abstract provided.
Sex Play In Virtual Worlds, Robin Fretwell Wilson
Sex Play In Virtual Worlds, Robin Fretwell Wilson
Washington and Lee Law Review
No abstract provided.
Virtual Heisenberg: The Limits Of Virtual World Regulability, Viktor Mayer-Schonberger
Virtual Heisenberg: The Limits Of Virtual World Regulability, Viktor Mayer-Schonberger
Washington and Lee Law Review
No abstract provided.
Online Dangers: Keeping Children And Adolescents Safe, Jodi L. Whitaker, Brad J. Bushman
Online Dangers: Keeping Children And Adolescents Safe, Jodi L. Whitaker, Brad J. Bushman
Washington and Lee Law Review
No abstract provided.
Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Citron
Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Citron
Danielle Keats Citron
The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women’s home addresses alongside suggestions that they should be sexually assaulted and technological attacks that shut down blogs and websites. It impedes women’s full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women’s experience, deeming it harmless teasing that women should expect, and tolerate, given the Internet’s Wild West norms …
Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington
Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington
Matthew Hoisington
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via cyberspace strains traditional definitions of the use of force. In order to clearly delineate the rights of the parties involved, including the right to self-defense, the international community must come to some consensus on the meaning of cyberwarfare within the existing jus ad bellum paradigm. After examining the shortcomings inherent in classifying cyberattacks according to classical notions of kinetic warfare, …
Vol. Ix, Tab 41 - Ex. 17 - Email From Baris Gultekin (Google Product Manager Director), Baris Gultekin
Vol. Ix, Tab 41 - Ex. 17 - Email From Baris Gultekin (Google Product Manager Director), Baris Gultekin
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?
Legal Framework Regulating Internet Obscenity: An Indian Perspective, Dharmendra Chatur
Legal Framework Regulating Internet Obscenity: An Indian Perspective, Dharmendra Chatur
Dharmendra Chatur
No abstract provided.
Saving Facebook, James Grimmelmann
Saving Facebook, James Grimmelmann
Cornell Law Faculty Publications
This Article provides the first comprehensive analysis of the law and policy of privacy on social network sites, using Facebook as its principal example. It explains how Facebook users socialize on the site, why they misunderstand the risks involved, and how their privacy suffers as a result. Facebook offers a socially compelling platform that also facilitates peer-to-peer privacy violations: users harming each others' privacy interests. These two facts are inextricably linked; people use Facebook with the goal of sharing some information about themselves. Policymakers cannot make Facebook completely safe, but they can help people use it safely.
The Article makes …
Technological Due Process, Danielle Citron
Technological Due Process, Danielle Citron
Danielle Keats Citron
Today, computer systems terminate Medicaid benefits, remove voters from the rolls, exclude travelers from flying on commercial airlines, label (and often mislabel) individuals as dead-beat parents, and flag people as possible terrorists from their email and telephone records. But when an automated system rules against an individual, that person often has no way of knowing if a defective algorithm, erroneous facts, or some combination of the two produced the decision. Research showing strong psychological tendencies to defer to automated systems suggests that a hearing officer’s check on computer decisions will have limited value. At the same time, automation impairs participatory …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds
William L. Reynolds
In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.
Digital Ethics In Bridging Digital Divide, Subhajit Basu
Digital Ethics In Bridging Digital Divide, Subhajit Basu
Subhajit Basu
Our information society is creating parallel systems: one for those with income, education and literacy connections, giving plentiful information at low cost and high speed: the other are those without connections, blocked by high barriers of time, cost and uncertainty and dependent upon outdated information. Hence it can be expressed the DD is nothing but a reflection of social divide. The question is what is the best strategy to construct an information society that is ethically sound? Most people have the views that ICT and underlying ideologies are neutral. This Technology has become so much naturalized that it can no …