Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (900)
- Selected Works (505)
- SelectedWorks (312)
- Schulich School of Law, Dalhousie University (291)
- University of Richmond (228)
-
- Maurer School of Law: Indiana University (205)
- University of Michigan Law School (187)
- Seattle University School of Law (178)
- Universitas Indonesia (144)
- Santa Clara Law (125)
- Duke Law (124)
- The Catholic University of America, Columbus School of Law (117)
- University of Washington School of Law (111)
- BLR (109)
- Vanderbilt University Law School (109)
- American University Washington College of Law (106)
- University of Maryland Francis King Carey School of Law (99)
- DePaul University (91)
- Brooklyn Law School (90)
- Southern Methodist University (86)
- New York Law School (77)
- University of Pittsburgh School of Law (74)
- University of Pennsylvania Carey Law School (72)
- Brigham Young University Law School (69)
- Fordham Law School (67)
- University of Colorado Law School (67)
- Columbia Law School (64)
- Pepperdine University (63)
- University of Georgia School of Law (63)
- Singapore Management University (59)
- Keyword
-
- Internet (604)
- Privacy (348)
- Law and Technology (318)
- Copyright (266)
- Technology (211)
-
- First Amendment (173)
- Google (164)
- Science and Technology (150)
- Intellectual Property Law (147)
- Social media (141)
- Computer Law (126)
- Regulation (115)
- Intellectual property (106)
- Cyberspace (100)
- Law and Society (99)
- Communications Law (94)
- Facebook (82)
- Adwords (78)
- Cybersecurity (77)
- Surveillance (77)
- Cyberlaw (76)
- Internet Law (71)
- Trademark (70)
- Information (69)
- Free speech (65)
- Law (65)
- Constitutional Law (63)
- Intellectual Property (63)
- Copyright law (60)
- DMCA (60)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (794)
- Canadian Journal of Law and Technology (249)
- Faculty Scholarship (247)
- Richmond Journal of Law & Technology (191)
- Seattle University Law Review (151)
-
- All Faculty Scholarship (126)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (123)
- Duke Law & Technology Review (118)
- Rosetta Stone v. Google (Joint Appendix) (116)
- Articles (115)
- Federal Communications Law Journal (112)
- ExpressO (107)
- Catholic University Journal of Law and Technology (104)
- SMU Science and Technology Law Review (77)
- Vanderbilt Journal of Entertainment & Technology Law (76)
- DePaul Journal of Art, Technology & Intellectual Property Law (71)
- Michigan Telecommunications & Technology Law Review (71)
- Publications (66)
- Washington Journal of Law, Technology & Arts (64)
- Daniel Lyons (62)
- UIC Law Review (57)
- Faculty Publications (52)
- Research Collection Yong Pung How School Of Law (48)
- Indiana Law Journal (47)
- NYLS Law Review (46)
- Articles, Book Chapters, & Popular Press (38)
- BYU Law Review (38)
- Michigan Law Review (35)
- UIC Review of Intellectual Property Law (34)
- Fordham Law Review (32)
- Publication Type
Articles 5311 - 5340 of 6086
Full-Text Articles in Law
The Crime Of "Interruption Of Computer Services To Authorized Users" Have You Ever Heard Of It?, Jeff Nemerofsky
The Crime Of "Interruption Of Computer Services To Authorized Users" Have You Ever Heard Of It?, Jeff Nemerofsky
Richmond Journal of Law & Technology
The "interruption of computer services to authorized users," involves a violation of a series of federal and state computer-related crime laws which are designed to protect the authorized users of computer systems.Because most of these laws have only recently been legislated, and since few people have ever actually been charged with such violations, there is very little history or case law in this area. However, as computer-related crimes continue to escalate, these statutes could prove to be a positive force in efforts to catch the electronic criminals of the future. "Although there has never been accurate nationwide reporting of computer …
Consumer Privacy On The Internet, Andrew Shen
Consumer Privacy On The Internet, Andrew Shen
Richmond Journal of Law & Technology
If we do not bear the loss of this privacy then the prices would be passed along to consumers anyway. We're between a rock and a hard place there's nowhere that we can go. But I think we can be more optimistic than that and I think we can preserve privacy and I think we can further growth of electronic commerce. So let me begin with the consumer perspective. I would like to start with a trend that Mike has already done a good job of starting us out on, and that is the current popularity of personalization and customization. …
Understanding Internet Co-Branding Deals, Eric Goldman, Candice Lee
Understanding Internet Co-Branding Deals, Eric Goldman, Candice Lee
Faculty Publications
The Internet has spawned new business practices regarding the ways users access and obtain information and services. Because linking can create a network of web pages that appear integrated and seamless to users, many Internet companies enter what are known as co-branding relationships. This article addresses a common type of co-branding relationship in which a "provider" maintains a set of pages ("the co-branded site") that looks and feels like the "brander's" web site. The co-branded site is promoted on the brander's web site through linking.
Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman
Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman
Faculty Publications
Co-brand agreements are what I do. I am the self-titled "King of CoBrands," as this is what I've been doing with my life.
So, let's talk a little about co-branding agreements and about why they might matter. First let's define our terms.
Now, where there used to be one site, the provider site, there will be two sites, the provider site and co-branded site, which contains the branding of the portal, but contains all the same functionality, or similar functionality, as is in the provider's site.
Then the portal will drive traffic to this co-branding site, for purposes that we'll …
Web Word War (Www): A New Approach To Trademark Infringement And Unfair Competition Claims Under The Lanham Act In Brookfield Communications, Inc. V. West Coast Entertainment Corp., Melissa M. Mcgann
Jeffrey S. Moorad Sports Law Journal
No abstract provided.
Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post
Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post
Vanderbilt Journal of Entertainment & Technology Law
MAPS, the primary focus of this tale, is a California non-profit limited liability company. It coordinates a kind of group boycott by Internet service providers (ISPs) for the purpose of reducing the flow of what is commonly called "spam"- unsolicited bulk e-mail. It operates, roughly, as follows. The managers of MAPS create and maintain what they call the "Realtime Blackhole List" (RBL), which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows …
How To Can Spam, Gary Miller
How To Can Spam, Gary Miller
Vanderbilt Journal of Entertainment & Technology Law
Receiving unsolicited commercial email, also known as "Spam," is like receiving junk mail, postage due. Spam shifts the cost of advertising from the advertiser to the consumer. This imposes enormous costs on Internet Service Providers (ISPs) and their customers. The Spam problem cries out for a legislative solution, and that is why I introduced H.R. 2162, the "Can Spam Act." The source of the Spam moniker for unsolicited commercial e-mail is apparently attributed to an annoying song in a Monty Python skit. In the skit, actors dressed like Vikings sing the word "Spam" over and over again, becoming louder and …
The Wrong Tool For The Right Job: Are Commercial Websites Places Of Public Accommodation Under The Americans With Disabilities Act Of 1990?, Patrick Maroney
The Wrong Tool For The Right Job: Are Commercial Websites Places Of Public Accommodation Under The Americans With Disabilities Act Of 1990?, Patrick Maroney
Vanderbilt Journal of Entertainment & Technology Law
The text of the ADA does not support such an extension. The interpretative canons of "noscitur a sociis" and "ejusdem generis" dictate that "places of public accommodation" refer exclusively to physical facilities. The canons also sufficiently resolve any possible statutory ambiguities, thereby foreclosing the opportunity for contrary agency interpretations. Although the intentionally broad purpose and design of the ADA make the statute an attractive avenue for advocates of online expansion, that same purpose and design limit the ADA to physical facilities. This note addresses the issues in two parts. First, it presents the arguments just listed. Second, it recognizes the …
Resolving Tensions Between Copyright And The Internet, Walter Effross
Resolving Tensions Between Copyright And The Internet, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
"I See What You're Saying": Trademarked Terms And Symbols As Protected Consumer Commentary In Consumer Opinion Websites, Leslie C. Rochat
"I See What You're Saying": Trademarked Terms And Symbols As Protected Consumer Commentary In Consumer Opinion Websites, Leslie C. Rochat
Seattle University Law Review
Although there are a wide array of unresolved trademark issues with regard to the Internet, this Comment will not address disputes involving anything beyond the visible content of an individual's website. Domain name and meta-tag issues, though often referenced in order to demonstrate trends in analysis, are not the subjects of this inquiry. Rather, this Comment will focus on the triumvirate of claims most frequently asserted against individual web masters in the battle over the propriety of consumer commentary: trademark infringement, unfair competition, and trademark dilution. A recent court decision, Bally Total Fitness v. Faber, provides an example of the …
Wrong Turn In Cyberspace: Using Icann To Route Around The Apa And The Constitution, A. Michael Froomkin
Wrong Turn In Cyberspace: Using Icann To Route Around The Apa And The Constitution, A. Michael Froomkin
Articles
The Internet relies on an underlying centralized hierarchy built into the domain name system (DNS) to control the routing for the vast majority of Internet traffic. At its heart is a single data file, known as the "root." Control of the root provides singular power in cyberspace.
This Article first describes how the United States government found itself in control of the root. It then describes how, in an attempt to meet concerns that the United States could so dominate an Internet chokepoint, the U.S. Department of Commerce (DoC) summoned into being the Internet Corporation for Assigned Names and Numbers …
The Marketplace Of Ideas In Cyberspace, Margaret Chon
The Marketplace Of Ideas In Cyberspace, Margaret Chon
Faculty Articles
In the Panel Discussion on The Marketplace Of Ideas In Cyberspace at the 1999-2000 Oliver Wendell Holmes Symposium And Lectureship At Mercer University, Professor Margaret Chon discusses censorship and hate speech on the internet. Professor Chon questions the exporting of our First Amendment jurisprudence in this particular area, since we are the only democratic country to speak of, that protects what we've been referring to as hate speech.
An Analysis Of California's Common And Statutory Law Dealing With Unsolicited Commercial Electronic Mail: An Argument For Revision, Calvin Whang
San Diego Law Review
This Comment will examine the law governing unsolicited commercial electronic mail in California. Part II details the growth of the Internet and unsolicited commercial electronic mail. Part III examines the law of trespass to chattel as applied to unsolicited commercial electronic mail in California. Part IV examines recent legislative efforts to regulate spam in California. Part V analyzes the implications of the new unsolicited electronic mail legislation in California. Finally, Part VI details some suggested revisions to the California statute dealing with unsolicited commercial electronic mail.
Cyberspace And The "Devil's Hatband", Jonathan J. Rusch
Cyberspace And The "Devil's Hatband", Jonathan J. Rusch
Seattle University Law Review
In this Article, I maintain that while there is an ongoing conflict of legal traditions over the desirability of fences in cyberspace, there are definite virtues in the creation of such fences, so long as we understand the physical, psychological, and moral dimensions of that process. Part I will present a brief survey of the history of barbed wire in the Old West, paying particular attention to the contending legal traditions that affected the manner and extent of that growth in the West. These contending legal traditions, which related to "fencing in" versus "fencing out" cattle, played a key role …
Computer Network Trespasses: Solving New Problems With Old Solutions, Susan M. Ballantine
Computer Network Trespasses: Solving New Problems With Old Solutions, Susan M. Ballantine
Washington and Lee Law Review
No abstract provided.
Going Private: Technology, Due Process, And Internet Dispute Resolution, Elizabeth G. Thornburg
Going Private: Technology, Due Process, And Internet Dispute Resolution, Elizabeth G. Thornburg
Faculty Journal Articles and Book Chapters
Despite cliches about Internet speed, disputes that arise on and about the Internet can be time-consuming to resolve, legally murky, and factually complex. In response, Internet players with market power are opting out: mandatory arbitration is replacing both substantive law and court procedure, and technological remedies are providing self-help without any dispute resolution at all. These alternative procedures tend to move faster than courts and to cost their corporate creators less than lawsuits. They are also structured to maximize the success of the powerful. But faster is not always better. Cheap is not always fair or accurate. Market power is …
Internet Gambling Policy: Prohibition Versus Regulation, Theresa E. Loscalzo
Internet Gambling Policy: Prohibition Versus Regulation, Theresa E. Loscalzo
Jeffrey S. Moorad Sports Law Journal
No abstract provided.
Internet Gambling: Is It Worth The Risk, James R. Hobbs
Internet Gambling: Is It Worth The Risk, James R. Hobbs
Jeffrey S. Moorad Sports Law Journal
No abstract provided.
Gambling And The Law: The Future Of Internet Gambling, I. Nelson Rose
Gambling And The Law: The Future Of Internet Gambling, I. Nelson Rose
Jeffrey S. Moorad Sports Law Journal
No abstract provided.
The Electronic Self-Help Provisions Of Ucita: A Virtual Repo Man?, 33 J. Marshall L. Rev. 663 (2000), Craig Dolly
The Electronic Self-Help Provisions Of Ucita: A Virtual Repo Man?, 33 J. Marshall L. Rev. 663 (2000), Craig Dolly
UIC Law Review
No abstract provided.
Liability Issues Facing Online Businesses, David E. Shipley
Liability Issues Facing Online Businesses, David E. Shipley
Scholarly Works
Online businesses are confronted by a wide variety of liability issues covering almost the full range of the standard law school curriculum. The liability problems that face a small business in Vidalia, Georgia, which is selling Vidalia onion products at specialty stores, through print advertising, and by mail, do not go away when the business starts marketing through a Web site. In fact, there might be more exposure doing business online, and there are variations depending upon the nature of the business in question. For example, as discussed below, an Internet Service Provider ("ISP") like America Online has worries that …
State Taxation Of Electronic Commerce: Perspectives On Proposals For Change And Their Constitutionality, Kendall L. Houghton, Walter Hellerstein
State Taxation Of Electronic Commerce: Perspectives On Proposals For Change And Their Constitutionality, Kendall L. Houghton, Walter Hellerstein
Scholarly Works
Over the past few years, an enormous amount of attention has been devoted to the problems raised by state taxation of electronic commerce, possible solutions to those problems, and, more recently, the question of whether there is a ‘problem‘ at all. We have both been, and continue to be, deeply involved in the debate over these issues -- a debate that has sometimes generated more heat than light. We view this forum as furnishing us an opportunity to take a step back from the fray and to offer our views not only on the critical issues that are dominating the …
Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky
Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky
Faculty Publications
John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons — some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat …
Taxing The Reticulum Taxation And Tariff Issues In Electronic Commerce, Neil Lovett Wilkinson
Taxing The Reticulum Taxation And Tariff Issues In Electronic Commerce, Neil Lovett Wilkinson
LLM Theses and Essays
This thesis will explore, first within a historical context, and second, in a contemporary model, the impact and effect of electronic commerce in both a general and Electronic magazines. The thesis will explore governmental and legal responses, from a taxation and tariff point of view to the challenges posed by commercial transactions initiated and completed via the Internet and the World Wide Web. The broad question is therefore presented: How should governments, primarily American state and local governments, but also governments worldwide, respond to changes in technology that have a direct effect on the way business is conducted within their …
The Internet And Public International Law, John M. Rogers
The Internet And Public International Law, John M. Rogers
Law Faculty Scholarly Articles
It is perhaps commonplace to observe that recent developments in information technology are revolutionizing most aspects of our lives. Anything that affects our lives so profoundly will, of necessity, have a significant effect on the law. We can expect that the information revolution will have a comparably significant impact on the international system of binding obligations often called public international law. Just what that will be is of course extremely difficult to predict. Compounding that difficulty is the lack of consensus on just what actually amounts to the public international legal system. Scholars and lawyers still debate fundamental questions regarding …
Cyber-Nations, Ruth Wedgwood
The Internet Is Changing The Public International Legal System, Henry H. Perritt Jr.
The Internet Is Changing The Public International Legal System, Henry H. Perritt Jr.
Kentucky Law Journal
No abstract provided.
Law On A Boundless Frontier: The Internet And International Law, Heather Mcgregor
Law On A Boundless Frontier: The Internet And International Law, Heather Mcgregor
Kentucky Law Journal
No abstract provided.
Online Service Provider Copyright Liability: Is The Digital Millennium Copyright Act The Answer?, Justin Williamson
Online Service Provider Copyright Liability: Is The Digital Millennium Copyright Act The Answer?, Justin Williamson
Kentucky Law Journal
No abstract provided.
Examined Lives: Informational Privacy And The Subject As Object, Julie E. Cohen
Examined Lives: Informational Privacy And The Subject As Object, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
In the United States, proposals for informational privacy have proved enormously controversial. On a political level, such proposals threaten powerful data processing interests. On a theoretical level, data processors and other data privacy opponents argue that imposing restrictions on the collection, use, and exchange of personal data would ignore established understandings of property, limit individual freedom of choice, violate principles of rational information use, and infringe data processors' freedom of speech. In this article, Professor Julie Cohen explores these theoretical challenges to informational privacy protection. She concludes that categorical arguments from property, choice, truth, and speech lack weight, and mask …