Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (900)
- Selected Works (505)
- SelectedWorks (312)
- Schulich School of Law, Dalhousie University (291)
- University of Richmond (228)
-
- Maurer School of Law: Indiana University (205)
- University of Michigan Law School (186)
- Seattle University School of Law (178)
- Universitas Indonesia (144)
- Santa Clara Law (125)
- Duke Law (124)
- The Catholic University of America, Columbus School of Law (117)
- University of Washington School of Law (110)
- BLR (109)
- Vanderbilt University Law School (109)
- American University Washington College of Law (106)
- University of Maryland Francis King Carey School of Law (99)
- DePaul University (91)
- Brooklyn Law School (90)
- Southern Methodist University (86)
- New York Law School (77)
- University of Pennsylvania Carey Law School (75)
- University of Pittsburgh School of Law (74)
- Brigham Young University Law School (69)
- Fordham Law School (67)
- University of Colorado Law School (67)
- Columbia Law School (64)
- Pepperdine University (63)
- University of Georgia School of Law (62)
- Singapore Management University (59)
- Keyword
-
- Internet (602)
- Privacy (345)
- Law and Technology (318)
- Copyright (264)
- Technology (211)
-
- First Amendment (173)
- Google (164)
- Science and Technology (150)
- Intellectual Property Law (147)
- Social media (141)
- Computer Law (126)
- Regulation (115)
- Intellectual property (106)
- Cyberspace (100)
- Law and Society (99)
- Communications Law (94)
- Facebook (82)
- Adwords (78)
- Cybersecurity (77)
- Surveillance (77)
- Cyberlaw (76)
- Internet Law (71)
- Information (70)
- Trademark (70)
- Free speech (65)
- Law (65)
- Constitutional Law (63)
- Intellectual Property (63)
- Copyright law (60)
- DMCA (60)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (794)
- Canadian Journal of Law and Technology (249)
- Faculty Scholarship (247)
- Richmond Journal of Law & Technology (191)
- Seattle University Law Review (151)
-
- All Faculty Scholarship (129)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (123)
- Duke Law & Technology Review (118)
- Rosetta Stone v. Google (Joint Appendix) (116)
- Articles (114)
- Federal Communications Law Journal (112)
- ExpressO (107)
- Catholic University Journal of Law and Technology (104)
- SMU Science and Technology Law Review (77)
- Vanderbilt Journal of Entertainment & Technology Law (76)
- DePaul Journal of Art, Technology & Intellectual Property Law (71)
- Michigan Telecommunications & Technology Law Review (71)
- Publications (66)
- Washington Journal of Law, Technology & Arts (64)
- Daniel Lyons (62)
- UIC Law Review (57)
- Faculty Publications (52)
- Research Collection Yong Pung How School Of Law (48)
- Indiana Law Journal (47)
- NYLS Law Review (46)
- Articles, Book Chapters, & Popular Press (38)
- BYU Law Review (38)
- Michigan Law Review (35)
- UIC Review of Intellectual Property Law (34)
- Fordham Law Review (32)
- Publication Type
Articles 5281 - 5310 of 6083
Full-Text Articles in Law
Halve The Baby: An Obvious Solution To The Troubling Use Of Trademarks As Metatags, 18 J. Marshall J. Computer & Info. L. 643 (2000), Dan Mccuaig
UIC John Marshall Journal of Information Technology & Privacy Law
In this article, the author proposes a solution to decide when metatags of other companies' trademarked terms should be allowed. First the author begins by describing the nature and function of metatags. A brief discussion of the relevant aspects of trademark law as they apply to trademark-metatags are fully investigated. The author then provides two significant cases in this field to support his contention. Following this discussion, the author proposes a solution to the use of trademark-metatags. Finally, the author ends this article with a discussion of anticipated market reactions to the "trademarks" metatag.
The Legislative Jurisdiction Of States Over Transactions In International Electronic Commerce, 18 J. Marshall J. Computer & Info. L. 689 (2000), Tapio Puurunen
The Legislative Jurisdiction Of States Over Transactions In International Electronic Commerce, 18 J. Marshall J. Computer & Info. L. 689 (2000), Tapio Puurunen
UIC John Marshall Journal of Information Technology & Privacy Law
With increasing growth and development of E-commerce and a rapid increase in the number of Internet Users, government assessment of current protections granted to consumers in their states is encouraged. The author's purpose is to examine national legislation on e-commerce regulation and its limits, to resolve jurisdictional conflict of laws associated with e-commerce, and to propose possible solutions to these emerging problems. This article covers market functions between business and consumer transactions. First, government should not ignore consumer e-commerce since e-commerce trade is significant on both national and international levels. Secondly, the author pushes for an extensive effort to unify …
Riaa V. Napster: A Window Onto The Future Of Copyright Law In The Internet Age, 18 J. Marshall J. Computer & Info. L. 755 (2000), Ariel Berschadsky
Riaa V. Napster: A Window Onto The Future Of Copyright Law In The Internet Age, 18 J. Marshall J. Computer & Info. L. 755 (2000), Ariel Berschadsky
UIC John Marshall Journal of Information Technology & Privacy Law
This article uses the Napster controversy as a stepping stone to discussing copyright law in the Internet age. Section II of the article discusses music piracy over the internet and MP3 files. Section III of the article discusses the birth of Napster and its functions. Section IV details the allegations against Napster by the RIAA. Section V. discusses Copyright Law in the digital age. Various forms of copyright infringement such as direct liability, contributory liability, vicarious liability are fully assessed. Furthermore, the author discusses the response of legislative efforts to emerging copyright challenges on the internet. Section VI examines Napter's …
Diana's Law, Celebrity And The Paparazzi: The Continuing Search For A Solution, 18 J. Marshall J. Computer & Info. L. 945 (2000), Richard J. Curry Jr.
Diana's Law, Celebrity And The Paparazzi: The Continuing Search For A Solution, 18 J. Marshall J. Computer & Info. L. 945 (2000), Richard J. Curry Jr.
UIC John Marshall Journal of Information Technology & Privacy Law
Celebrities and the media possess a unique relationship. Many celebrities skillfully use the media to market and advertise their movies, television shows, books, and records. They use the media to propel their careers and create a marketable celebrity image. Society is celebrity crazed and magazines, tabloids and other media forms such as Entertainment Tonight and Access Hollywood have combined to feed that craze. Our society's hunger for celebrities has spawned the existence of photographers known as the paparazzi. Armed with zoom lenses, high-powered microphones, and the promise of huge cash rewards for an exclusive celebrity expose, the paparazzi have become …
In Congress Electric: The Need For On-Line Parliamentary Procedure, 18 J. Marshall J. Computer & Info. L. 963 (2000), Phil Reiman
In Congress Electric: The Need For On-Line Parliamentary Procedure, 18 J. Marshall J. Computer & Info. L. 963 (2000), Phil Reiman
UIC John Marshall Journal of Information Technology & Privacy Law
Building a set of rules for operating an ordered, effective online association is the first step toward building virtual communities and the first step toward a democratic "e-government." Disputes online are not rare; they are just rarely resolved. Currently, online forums are watched over by a moderator, who is charged with keeping the discussion on track, and to keeping the debate from getting personal. Almost everyone who has been in an online discussion is aware of "Netiquette", the informal rules that govern chat room conversations. Everyone is equally aware that these rules are often ignored. While the exchange of ideas …
The Postman Always Rings 4,000 Times: New Approaches To Curb Spam, 18 J. Marshall J. Computer & Info. L. 915 (2000), Credence E. Fogo
The Postman Always Rings 4,000 Times: New Approaches To Curb Spam, 18 J. Marshall J. Computer & Info. L. 915 (2000), Credence E. Fogo
UIC John Marshall Journal of Information Technology & Privacy Law
Before 1994, the average Internet user received little unsolicited commercial email, or "spam." But that all changed in April 1994, when enterprising Arizona lawyers Laurence Canter and Martha Siegel sent spam advertising their immigration law "services" to approximately 8,000 Usenet newsgroups reaching approximately 20 million people. It inspired irate Usenet users to flame Canter and Siegel in such great volume that the attorneys' ISP's computer crashed. The computer overloads Canter and Siegel's stunt caused also completely knocked out New Zealand's Internet access. But the ads must have worked because despite the fallout, Cander and Siegel persisted in their spam ad …
Falling Into The Gap: The European Union's Data Protection Act And Its Impact On U.S. Law And Commerce, 18 J. Marshall J. Computer & Info. L. 981 (2000), Marie Clear
UIC John Marshall Journal of Information Technology & Privacy Law
The European Union ("E.U.") has been economically consolidating for some time, but the US appeared to feel this new composite player was relatively benign. In the past few years, though, the E.U. Has started asserting itself and setting rules in the game of international commercial gamesmanship. Until recently, the rules were limited to specific products and practices. This year, however, the E.U. changed the rules about how it would do business and, more significantly, how it would not. The E.U.'s Data Protection Directive came into force early in 2000 and presented the US with a huge dilemma: If the US …
Privacy On Federal Civilian Computer Networks: A Fourth Amendment Analysis Of The Federal Intrusion Detection Network, 18 J. Marshall J. Computer & Info. L. 1049 (2000), David Hueneman
UIC John Marshall Journal of Information Technology & Privacy Law
This comment explores the relationship between the privacy of the users of the federal non-public civilian computer networks and the government's power to monitor such networks. The background explains what a network is, how cyber-terrorists can greatly damage a system, what the government is planning to do about the problem, and the constitutional protections involved. The analysis moves on to examine the Fourth Amendment and the Electronic Communications Privacy Act and considers their respective effects on the implementation of FIDNet -- a proposed government system designed to protect America's infrastructure from cyber- attack. The FIDNet plan calls for the creation …
Big Brother Is At Your Back Door: An Examination Of The Effect Of Encryption Regulation On Privacy And Crime, 18 J. Marshall J. Computer & Info. L. 825 (2000), Hillary Victor
UIC John Marshall Journal of Information Technology & Privacy Law
This article compares the need of individuals for privacy and the U.S. government's desire for encryption regulation. The impact that CESA on cyberspace security and crime are fully discussed. Furthermore, a brief background on the advantages and disadvantages of encryption are investigated. A history of legislative effort to provide decryption tools are examined and outlined. Next, the comment provides an analysis of CESA, its legal implications and issues involving its effectiveness are discussed. A solution proposed by the author to redraft and amend CESA provides individuals with privacy protection.
The Erosion Of American Copyright Protection: The Fairness In Music Licensing Act, 18 J. Marshall J. Computer & Info. L. 791 (2000), Ralph Carter
UIC John Marshall Journal of Information Technology & Privacy Law
The author of this article begins by giving the reader a taste of the history of American copyright protection. A synopsis of the statutes, case history, and industry development are fully explained. Furthermore, the author criticizes the enactment of the Fairness in Music Licensing Act. The author further refutes arguments made by proponents of the Act and examines the underlying motives of restaurant lobbyists. This comment also shows the real victims of the Act's exemptions---the songwriters. The comment concludes by advocating the return of the "home use exemption" in the Copyright Act of 1976.
Invasion Of The Information Snatchers: Creating Liability For Corporations With Vulnerable Computer Networks, 18 J. Marshall J. Computer & Info. L. 1019 (2000), Sarah Faulkner
UIC John Marshall Journal of Information Technology & Privacy Law
Computer hackers are a serious threat to businesses and their customers, particularly if those businesses operate complex computer networks or operate as on-line businesses. However, now that corporate telecommunication networks are becoming more sophisticated, a company's phone system may also be susceptible to invasion. These telephonic hackers, called phone phreaks (and telecom hacking itself is known as phreaking), can cause large monetary losses as well. The question of who is liable for these losses, losses that are specifically caused by illegal activity, is the subject of this comment. This comment addresses the issue of liability for monetary losses in the …
Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik
Lawyers Who Lie On-Line: How Should The Legal Profession Respond To Ebay Ethics, 18 J. Marshall J. Computer & Info. L. 875 (2000), Mark E. Wojcik
UIC John Marshall Journal of Information Technology & Privacy Law
A recent scandal erupted in the press when a painting that was offered for sale on an Internet auction site was believed to be a lost contemporary masterpiece. The seller appeared to be a married man who was cleaning junk out of his garage, including a painting that his wife would not let him hang in the house. A bidding frenzy drove the price from the opening bid of 25 cents to more than $135,000 from a buyer in the Netherlands. After the sale was finished (it was ended by EBay when they learned he bid on the painting himself …
The Developing Legal Infrastructure And The Globalization Of Information: Constructing A Framework For Critical Choices In The New Millennium Internet -- Character, Content And Confusion, Tomas A. Lipinski
Richmond Journal of Law & Technology
This paper reviews recent attempts to extend traditional property rights and other information controls and regulations into new media, such as cyberspace, primarily the World Wide Web. It reviews developments in copyright, trademark, trademark dilution, misappropriation, trespass, censorship, tort, privacy and other legal doctrines as they are reflected in recent United States case law and legislation, and to a lesser extent, in international agreements. Legal problems often arise because there is a conflict of viewpoints in how to best characterize space on the Internet, specifically the World Wide Web. Some argue that traditional ownership rights should apply, or perhaps a …
Catalytic Impact Of Information Technology On The New International Financial Architecture, Jane K. Winn
Catalytic Impact Of Information Technology On The New International Financial Architecture, Jane K. Winn
Articles
The sudden emergence of the Internet as a global network threatens to eclipse the importance of the global information infrastructure painstakingly built by financial institutions and their regulators over the past three decades. The open public nature of the Internet threatens the value of the closed proprietary networks developed by financial institutions that now face serious problems in integrating their legacy systems and new Internet systems.
Information system security, once a dreary back office matter, is now central to the success of e-commerce business plans. Before financial institutions can capitalize on their expertise in information system security, they will have …
Electronic Records And Signatures Under The Federal E-Sign Legislation And The Ueta, Robert A. Wittie, Jane K. Winn
Electronic Records And Signatures Under The Federal E-Sign Legislation And The Ueta, Robert A. Wittie, Jane K. Winn
Articles
Federal legislation establishing legal parity between electronic records and signatures and their paper and ink counterparts was signed into law June 30, 2000, and became effective, at least for most purposes, on October 1. The Electronic Signatures in Global and National Commerce Act (E-SIGN or the Act) effectively sweeps away a myriad of anachronistic and inconsistent state and federal requirements for paper and ink documents and signatures. In so doing, E-SIGN eliminates many of the legal uncertainties that have surrounded the use of electronic media in commerce and should enable businesses and consumers alike to more fully realize the cost …
"Click Here To Buy The Next Microsoft": The Penny Stock Rules, Online Microcap Fraud, And The Unwary Investor, Kevin C. Bartels
"Click Here To Buy The Next Microsoft": The Penny Stock Rules, Online Microcap Fraud, And The Unwary Investor, Kevin C. Bartels
Indiana Law Journal
No abstract provided.
Securities Regulation In The Electronic Era: Private Placements And The Internet, Todd A. Mazur
Securities Regulation In The Electronic Era: Private Placements And The Internet, Todd A. Mazur
Indiana Law Journal
No abstract provided.
Letter From The Editor, Lisa Taylor Hudson, Dharmesh S. Vashee
Letter From The Editor, Lisa Taylor Hudson, Dharmesh S. Vashee
Richmond Journal of Law & Technology
Welcome to the fifth issue of The Richmond Journal of Law & Technology! This issue represents a watershed experience for JOLT, as this is the first time we have published more than three issues in a single year! The timing of this issue's publication is also significant because on April 5, 2000, we will celebrate the fifth birthday of our journal. As the oldest exclusively online law review in the U.S., we continue to enjoy our leadership role in the publication of academic pieces dedicated to the marriage of law and technology.
Metatags: Seeking To Evade User Detection And The Lanham Act, Terrell W. Mills
Metatags: Seeking To Evade User Detection And The Lanham Act, Terrell W. Mills
Richmond Journal of Law & Technology
You hop on the World Wide Web ready to do some Internet surfing. You decide to check the scores from last night's football game. You head to your favorite search engine and then pause . . . "where will the scores be" you ask yourself. You decide upon ESPN, because you know they have it all when it comes to sports. So, you type in ESPN and click on the "SEARCH" button. You eagerly await the return of the results to head out to the ESPN homepage to find out if your alma mater beat the in-state rival in the …
Opening Up To Open Source, Shawn W. Parker
Opening Up To Open Source, Shawn W. Parker
Richmond Journal of Law & Technology
The latest "revolution" in the software industry has nothing to do with breakthrough technology; the revolution is a rethinking of how software technology is held, developed, and distributed. The revolution is called "open source," although it has also been called "freeware," and "copyleft." Each term generically describes the movement, yet implies wildly different ideas to the developers, distributors, and users inside the open source community. Open source is not a company, but rather, a community; projects are established and programmers communicate and contribute software building blocks to each other via the Internet. When a software program is completed by this …
Update: Riaa V. Diamond Multimedia Systems - Napster And Mp3.Com, Jayne A. Pemberton A. Pemberton
Update: Riaa V. Diamond Multimedia Systems - Napster And Mp3.Com, Jayne A. Pemberton A. Pemberton
Richmond Journal of Law & Technology
After the Recording Industry Association of America's ("RIAA") attack on the Diamond Rio proved unsuccessful, the music industry turned its attention to the companies enabling reproduction of copyrighted music. Two important cases appeared after the United States Court of Appeals for the Ninth Circuit held that Diamond Rio was not infringing on copyrights. These cases, A&M Records, Inc. et al. v. Napster, Inc. and UMG, Inc., et. al. v. MP3.com, Inc., will shape computer technology's effect on American copyright law. This update will discuss these two cases and give brief overviews of the courts' findings and conclusions. These findings will …
You Can't Always Get What You Want: Government's Good Intentions V. The First Amendment's Prescribed Freedoms In Protecting Children From Sexually-Explicit Material On The Internet, Abbigale E. Bricker
You Can't Always Get What You Want: Government's Good Intentions V. The First Amendment's Prescribed Freedoms In Protecting Children From Sexually-Explicit Material On The Internet, Abbigale E. Bricker
Richmond Journal of Law & Technology
Once a small and diverse community of a handful of government computers, the Internet has expanded to an estimated 157 million users worldwide. According to current studies, the fastest growing user populations on the Internet are thirteen to eighteen year-olds and five to twelve year-olds. In addition, the latest "research . . . predicts that the number of children online [will increase] by 155% between 1998 and 2002."
The Development Of Arbitration In The Resolution Of Internet Domain Name Disputes, Christopher S. Lee
The Development Of Arbitration In The Resolution Of Internet Domain Name Disputes, Christopher S. Lee
Richmond Journal of Law & Technology
Web surfers who use the AltaVista Internet search engine may not realize that in 1998, Compaq Computer Corporation paid $3.3 million for the rights to the domain name AltaVista.com. A year later, eCompanies paid $7.5 million for the domain name business.com. And in February of 2000, Bank of America paid $3 million for the domain name loans.com. These transactions demonstrate that the ownership, transfer, and control of Internet domain names is a multi-million dollar industry.
Riaa V. Diamond Multimedia Systems: The Recording Industry Attempts To Slow The Mp3 Revolution, Taking Aim At The Jogger Friendly Diamond Rio, Stephen W. Webb
Riaa V. Diamond Multimedia Systems: The Recording Industry Attempts To Slow The Mp3 Revolution, Taking Aim At The Jogger Friendly Diamond Rio, Stephen W. Webb
Richmond Journal of Law & Technology
The music industry may never be the same again. In recent years, the recording industry has faced an onslaught of advances resulting from digital technology. The record industry has battled the manufacturing and import industries over digital home recording since the 1980's. Digital technology initially manifested itself with the compact disc ("CD") and the digital audio tape ("DAT") in the early 1980's and generated greater tensions between the recording, electronics, and computer industries.
Defamatory E-Mail And Employer Liability: Why Razing Zeran V. America Online Is A Good Thing, Michael H. Spencer
Defamatory E-Mail And Employer Liability: Why Razing Zeran V. America Online Is A Good Thing, Michael H. Spencer
Richmond Journal of Law & Technology
Electronic mail ("e-mail") has taken its place as an integral part of communication in modern society. Unlike other forms of communication, e-mail can cheaply and efficiently be placed in a public domain for literally the world to see. These public areas, otherwise known as bulletin boards, have expanded society's ability to communicate over vast distances. Individuals or groups can also engage in mass communication, which involves a myriad of topics and concerns. Nevertheless, such electronic communications, as almost any other form of communication, can become volatile and create animosity among users. Hence, many of the remarks made in such exchanges …
E-Business, E-Commerce & The Law, John F. Rudin
E-Business, E-Commerce & The Law, John F. Rudin
Richmond Journal of Law & Technology
Advocates argue that UCITA (Uniform Computer Information Transactions Act) provides rules of the road for the technology highway much like the Uniform Commercial Code (UCC) has done with our commerce system for several decades. However, the UCC provides a level playing field where businesses and customers are aware of the rules prior to conducting business. Among its many shortcomings, UCITA lacks the notice and disclosure features of the UCC. A simple double click of a mouse with the cursor on an icon that reads "I accept" binds the customer to a contract that has not been reviewed prior to purchase. …
Letter From The Editor, Dharmesh Vashee
Letter From The Editor, Dharmesh Vashee
Richmond Journal of Law & Technology
Welcome to the second issue of The Richmond Journal of Law and Technology's seventh publication term. As we near the halfway point of this term, the Journal is stronger than ever. Our continued growth and success is due in large part to the dedication of our staff and Editorial Board. This year we will publish four issues and will hold a symposium on the soon-to-be-enacted Uniform Computer Information Transactions Act ("UCITA"). The symposium will be held on March 2, 2001. Registration for and information on the symposium will be available on our website soon.
The Crime Of "Interruption Of Computer Services To Authorized Users" Have You Ever Heard Of It?, Jeff Nemerofsky
The Crime Of "Interruption Of Computer Services To Authorized Users" Have You Ever Heard Of It?, Jeff Nemerofsky
Richmond Journal of Law & Technology
The "interruption of computer services to authorized users," involves a violation of a series of federal and state computer-related crime laws which are designed to protect the authorized users of computer systems.Because most of these laws have only recently been legislated, and since few people have ever actually been charged with such violations, there is very little history or case law in this area. However, as computer-related crimes continue to escalate, these statutes could prove to be a positive force in efforts to catch the electronic criminals of the future. "Although there has never been accurate nationwide reporting of computer …
Consumer Privacy On The Internet, Andrew Shen
Consumer Privacy On The Internet, Andrew Shen
Richmond Journal of Law & Technology
If we do not bear the loss of this privacy then the prices would be passed along to consumers anyway. We're between a rock and a hard place there's nowhere that we can go. But I think we can be more optimistic than that and I think we can preserve privacy and I think we can further growth of electronic commerce. So let me begin with the consumer perspective. I would like to start with a trend that Mike has already done a good job of starting us out on, and that is the current popularity of personalization and customization. …
Understanding Internet Co-Branding Deals, Eric Goldman, Candice Lee
Understanding Internet Co-Branding Deals, Eric Goldman, Candice Lee
Faculty Publications
The Internet has spawned new business practices regarding the ways users access and obtain information and services. Because linking can create a network of web pages that appear integrated and seamless to users, many Internet companies enter what are known as co-branding relationships. This article addresses a common type of co-branding relationship in which a "provider" maintains a set of pages ("the co-branded site") that looks and feels like the "brander's" web site. The co-branded site is promoted on the brander's web site through linking.