Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 70

Full-Text Articles in Law

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen Apr 2023

A Fake Future: The Threat Of Foreign Disinformation On The U.S. And Its Allies, Brandon M. Rubsamen

Global Tides

This paper attempts to explain the threat that foreign disinformation poses for the United States Intelligence Community and its allies. The paper examines Russian disinformation from both a historical and contemporary context and how its effect on Western democracies may only be exacerbated in light of Chinese involvement and evolving technologies. Fortunately, the paper also studies practices and strategies that the United States Intelligence Community and its allied foreign counterparts may use to respond. It is hoped that this study will help shed further light on Russian and Chinese disinformation campaigns and explain how the Intelligence Community can efficiently react.


Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg Jul 2022

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg

Articles

The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …


Publish, Share, Re-Tweet, And Repeat, Michal Lavi Jan 2021

Publish, Share, Re-Tweet, And Repeat, Michal Lavi

University of Michigan Journal of Law Reform

New technologies allow users to communicate ideas to a broad audience easily and quickly, affecting the way ideas are interpreted and their credibility. Each and every social network user can simply click “share” or “retweet” and automatically republish an existing post and expose a new message to a wide audience. The dissemination of ideas can raise public awareness about important issues and bring about social, political, and economic change.

Yet, digital sharing also provides vast opportunities to spread false rumors, defamation, and Fake News stories at the thoughtless click of a button. The spreading of falsehoods can severely harm the …


Internet Architecture And Disability, Blake Reid Apr 2020

Internet Architecture And Disability, Blake Reid

Indiana Law Journal

The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …


Data Governance And The Emerging University, Michael J. Madison Jan 2020

Data Governance And The Emerging University, Michael J. Madison

Book Chapters

Knowledge and information governance questions are tractable primarily in institutional terms, rather than in terms of abstractions such as knowledge itself or individual or social interests. This chapter offers the modern research university as an example. Practices of data-intensive research by university-based researchers, sometimes reduced to the popular phrase “Big Data,” pose governance challenges for the university. The chapter situates those challenges in the traditional understanding of the university as an institution for understanding forms and flows of knowledge. At a broad level, the chapter argues that the new salience of data exposes emerging shifts in the social, cultural, and …


Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow Aug 2019

Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow

Duke Law & Technology Review

No abstract provided.


Privacy Statements Under The Gdpr, Mike Hintze Apr 2019

Privacy Statements Under The Gdpr, Mike Hintze

Seattle University Law Review

The need to include specific types of information in a privacy statement is a GDPR compliance obligation that does not get as much attention as some other GDPR requirements. Perhaps that is because privacy statements have been much maligned in recent years. They are too long and full of legalese. Nobody reads them. They are part of a notice and consent approach to privacy that puts an unrealistic burden on consumers to make informed choices. But despite these well-known criticisms, the GDPR doubles down on privacy statements. In fact, gauging by the roughly fourfold increase in privacy statement requirements compared …


Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett Apr 2019

Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett

Seattle University Law Review

In scope, ambition, and animating philosophy, U.S. privacy law and Europe’s General Data Protection Regulation are almost diametric opposites. The GDPR’s ambitious individual rights, significant prohibitions, substantive enforcement regime, and broad applicability contrast vividly with a scattershot U.S. regime that generally prioritizes facilitating commerce over protecting individuals, and which has created perverse incentives for industry through anemic enforcement of the few meaningful limitations that do exist. A privacy law that characterizes data collectors as information fiduciaries could coalesce with the commercial focus of U.S. law, while emulating the GDPR’s laudable normative objectives and fortifying U.S. consumer privacy law with a …


Understanding The Consumer Review Fairness Act Of 2016, Eric Goldman Nov 2017

Understanding The Consumer Review Fairness Act Of 2016, Eric Goldman

Michigan Telecommunications & Technology Law Review

Consumer reviews are vitally important to our modern economy. Markets become stronger and more efficient when consumers share their marketplace experiences and guide other consumers toward the best vendors and away from poor ones. Businesses recognize the importance of consumer reviews, and many businesses take numerous steps to manage how consumer reviews affect their public image. Unfortunately, in a misguided effort to control consumer reviews, some businesses have deployed contract provisions that ban or inhibit their consumers from reviewing them. I call those provisions “antireview clauses.”

Anti-review clauses distort the marketplace benefits society gets from consumer reviews by suppressing peer …


Do We Need Help Using Yelp? Regulating Advertising On Mediated Reputation Systems, David Adam Friedman Nov 2017

Do We Need Help Using Yelp? Regulating Advertising On Mediated Reputation Systems, David Adam Friedman

University of Michigan Journal of Law Reform

Yelp, Angie’s List, Avvo, and similar entities enable consumers to access an incredibly useful trove of information about peer experiences with businesses and their goods and services. These “mediated reputation systems,” gatherers and disseminators of consumer peer opinions, are more trusted by consumers than traditional commercial channels. They are omnipresent, carried everywhere on mobile devices, and used by consumers ready to transact.

Though this information is valuable, a troubling conflict emerges in its presentation. Most of these reputation platforms rely heavily on advertising sales to support their business models. This reliance compels these entities to display persuasive advertising right along …


Keynote Address: The Digital Forevermore, Thomas J. Ridge Mar 2017

Keynote Address: The Digital Forevermore, Thomas J. Ridge

University of Richmond Law Review

No abstract provided.


The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams Mar 2017

The 2016 Amendments To Criminal Rule 41: National Search Warrants To Seize Cyberspace, "Particularly" Speaking, Devin M. Adams

University of Richmond Law Review

No abstract provided.


Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill Mar 2017

Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill

University of Richmond Law Review

No abstract provided.


Governing Medical Knowledge Commons - Introduction And Chapter 1, Katherine J. Strandburg, Brett M. Frischmann, Michael J. Madison Jan 2017

Governing Medical Knowledge Commons - Introduction And Chapter 1, Katherine J. Strandburg, Brett M. Frischmann, Michael J. Madison

Book Chapters

Governing Medical Knowledge Commons makes three claims: first, evidence matters to innovation policymaking; second, evidence shows that self-governing knowledge commons support effective innovation without prioritizing traditional intellectual property rights; and third, knowledge commons can succeed in the critical fields of medicine and health. The editors' knowledge commons framework adapts Elinor Ostrom's groundbreaking research on natural resource commons to the distinctive attributes of knowledge and information, providing a systematic means for accumulating evidence about how knowledge commons succeed. The editors' previous volume, Governing Knowledge Commons, demonstrated the framework's power through case studies in a diverse range of areas. Governing Medical Knowledge …


Can Dna Be Speech?, Jorge R. Roig Dec 2015

Can Dna Be Speech?, Jorge R. Roig

Jorge R Roig

DNA is generally regarded as the basic building block of life itself. In the most fundamental sense, DNA is nothing more than a chemical compound, albeit a very complex and peculiar one. DNA is an information-carrying molecule. The specific sequence of base pairs contained in a DNA molecule carries with it genetic information, and encodes for the creation of particular proteins. When taken as a whole, the DNA contained in a single human cell is a complete blueprint and instruction manual for the creation of that human being.
In this article we discuss myriad current and developing ways in which …


Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute Dec 2015

Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute

Michigan Journal of International Law

The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …


Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt Jun 2015

Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt

Cynthia R. Farina

This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …


Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey Jun 2015

Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey

Michigan Telecommunications & Technology Law Review

The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …


Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart Jan 2015

Social Media And The Job Market: How To Reconcile Applicant Privacy With Employer Needs, Peter B. Baumhart

University of Michigan Journal of Law Reform

In the modern technological age, social media allows us to communicate vast amounts of personal information to countless people instantaneously. This information is valuable to more than just our “friends” and “followers,” however. Prospective employers can use this personal data to inform hiring decisions, thereby maximizing fit and minimizing potential liability. The question then arises, how best to acquire this information? For job applicants, the counter-question is how best to protect the privacy of their social media accounts. As these two competing desires begin to clash, it is important to find a method to mediate the conflict. Existing privacy law, …


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


Commons At The Intersection Of Peer Production, Citizen Science, And Big Data: Galaxy Zoo, Michael J. Madison Jan 2014

Commons At The Intersection Of Peer Production, Citizen Science, And Big Data: Galaxy Zoo, Michael J. Madison

Book Chapters

The knowledge commons research framework is applied to a case of commons governance grounded in research in modern astronomy. The case, Galaxy Zoo, is a leading example of at least three different contemporary phenomena. In the first place Galaxy Zoo is a global citizen science project, in which volunteer non-scientists have been recruited to participate in large-scale data analysis via the Internet. In the second place Galaxy Zoo is a highly successful example of peer production, sometimes known colloquially as crowdsourcing, by which data are gathered, supplied, and/or analyzed by very large numbers of anonymous and pseudonymous contributors to an …


Governing Knowledge Commons -- Introduction & Chapter 1, Brett M. Frischmann, Michael J. Madison, Katherine J. Strandburg Jan 2014

Governing Knowledge Commons -- Introduction & Chapter 1, Brett M. Frischmann, Michael J. Madison, Katherine J. Strandburg

Book Chapters

“Knowledge commons” describes the institutionalized community governance of the sharing and, in some cases, creation, of information, science, knowledge, data, and other types of intellectual and cultural resources. It is the subject of enormous recent interest and enthusiasm with respect to policymaking about innovation, creative production, and intellectual property. Taking that enthusiasm as its starting point, Governing Knowledge Commons argues that policymaking should be based on evidence and a deeper understanding of what makes commons institutions work. It offers a systematic way to study knowledge commons, borrowing and building on Elinor Ostrom’s Nobel Prize-winning research on natural resource commons. It …


Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen Jan 2014

Electronic Privacy Information Center V. National Security Agency: How Glomar Responses Benefit Businesses And Provide An Epic Blow To Individuals, Joshua R. Chazen

Journal of Business & Technology Law

No abstract provided.


Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg Dec 2013

Tollbooths And Newsstands On The Information Superhighway, Brad A. Greenberg

Michigan Telecommunications & Technology Law Review

Countering the perception that speech limitations affecting distribution necessarily reduce access to information, this Essay proffers that copyright expansions actually can increase access and thereby serve important copyright and First Amendment values. In doing so, this discussion contributes to the growing literature and two recent Supreme Court opinions discussing whether copyright law and First Amendment interests can coexist.


Stop Being Evil: A Proposal For Unbiased Google Search, Joshua G. Hazan Mar 2013

Stop Being Evil: A Proposal For Unbiased Google Search, Joshua G. Hazan

Michigan Law Review

Since its inception in the late 1990s, Google has done as much as anyone to create an "open internet." Thanks to Google's unparalleled search algorithms, anyone's ideas can be heard, and all kinds of information are easier than ever to find. As Google has extended its ambition beyond its core function, however it has conducted itself in a manner that now threatens the openness and diversity of the same internet ecosystem that it once championed. By promoting its own content and vertical search services above all others, Google places a significant obstacle in the path of its competitors. This handicap …


The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long Jan 2013

The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long

Pepperdine Law Review

In recent years, the legal profession has run head on into the increasing use of computers and computerized information. Discovery and evidentiary rules developed to deal with written documentation may not be flexible enough to adequately cover this relatively new method of storing information. This comment examines various methods by which courts have attempted to deal with discovery and evidentiary problems involving computerized information, and suggests certain areas that should be explored in supporting or attacking the credibility of such information.


Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett Jan 2013

Geographically Restricted Streaming Content And Evasion Of Geolocation: The Applicability Of The Copyright Anticircumvention Rules, Jerusha Burnett

Michigan Telecommunications & Technology Law Review

A number of methods currently exist or are being developed to determine where Internet users are located geographically when they access a particular webpage. Yet regardless of the precautions taken by website operators to limit the locations from which they allow access, it is likely that users will find ways to gain access to restricted content. Should the evasion of geolocation constitute circumvention of access controls so that § 1201 of the Digital Millennium Copyright Act ("DMCA") applies? Because location data can properly be considered personally identifiable information ("PII"), this Note argues that § 1201 should not apply absent a …


Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp Jan 2013

Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp

All Faculty Scholarship

Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.

FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …


Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp Oct 2012

Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp

All Faculty Scholarship

Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.

FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …