Open Access. Powered by Scholars. Published by Universities.®
- Publication Year
- Publication
- File Type
Articles 1 - 22 of 22
Full-Text Articles in Law
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Thomas E. Baker
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Cynthia R. Farina
This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …
Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 2nd Edition., Patricia Bellia, David Post, Paul Schiff Berman
Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 2nd Edition., Patricia Bellia, David Post, Paul Schiff Berman
Patricia L. Bellia
This innovative casebookwhich has proved extremely popular with students and professors alikestarts from the premise that cyberlaw is not simply a set of legal rules governing online interaction, but a lens through which broader jurisprudential issues can be re-examined. Accordingly, this book goes beyond plugging Internet-related cases into a series of pre-existing doctrinal categoriesFirst Amendment, copyright, trademark, etc.and instead emphasizes the conceptual debates that cut across the areas of doctrine touched by cyberspace. Moreover, the casebook uses the rise of the Internet to encourage readers to reconsider various assumptions in traditional legal doctrine. This dual focus provides readers with broad-based …
Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 3rd Edition., Patricia Bellia, David Post, Paul Schiff Berman
Cyberlaw: Problems Of Policy And Jurisprudence In The Information Age. 3rd Edition., Patricia Bellia, David Post, Paul Schiff Berman
Patricia L. Bellia
This innovative casebookwhich has proved extremely popular with students and professors alikestarts from the premise that cyberlaw is not simply a set of legal rules governing online interaction, but a lens through which broader jurisprudential issues can be re-examined. Accordingly, this book goes beyond plugging Internet-related cases into a series of pre-existing doctrinal categoriesFirst Amendment, copyright, trademark, etc.and instead emphasizes the conceptual debates that cut across the areas of doctrine touched by cyberspace. Moreover, the casebook uses the rise of the Internet to encourage readers to reconsider various assumptions in traditional legal doctrine. This dual focus provides readers with broad-based …
Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively
Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively
Jesse D Lively
This Comment argues that the Supreme Court of Virginia should first reverse the Virginia Court of Appeal’s decision when it hears the Yelp case later this year. Secondly, the court hold that the Virginia statute for identifying persons communicating anonymously over the Internet violates the First Amendment's required showing of merit on both law and facts before a subpoena duces tecum to identify an anonymous speaker can be enforced. Lastly, it should adopt a new “unveiling standard” similar to the standards used in either Dendrite or Cahill. Part II examines the jurisprudential history of identifying anonymous Internet speakers in defamation …
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
Adam Thierer
This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …
Through A Prism Darkly: Surveillance And Speech Suppression In The Post-Democracy Electronic State", David Barnhizer
Through A Prism Darkly: Surveillance And Speech Suppression In The Post-Democracy Electronic State", David Barnhizer
David Barnhizer
Through a PRISM Darkly: Surveillance and Speech Suppression in the “Post-Democracy Electronic State” David Barnhizer There is no longer an American democracy. America is changing by the moment into a new political form, the “Post-Democracy Electronic State”. It has “morphed” into competing fragments operating within the physical territory defined as the United States while tenuously holding on to a few of the basic creeds that represent what we long considered an exceptional political experiment. That post-Democracy political order paradoxically consists of a combination of fragmented special interests eager to punish anyone that challenges their desires and a central government that …
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Decoding First Amendment Coverage Of Computer Source Code In The Age Of Youtube, Facebook And The Arab Spring, Jorge R. Roig
Jorge R Roig
Internet History, Raphael Cohen-Almagor
Internet History, Raphael Cohen-Almagor
raphael cohen-almagor
This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase (1984-1989). It was facilitated by the upgrading of backbone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different …
Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar
Licensing As Digital Rights Management, From The Advent Of The Web To The Ipad, Reuven Ashtar
Reuven Ashtar
This Article deals with the Digital Millennium Copyright Act’s anti-circumvention provision, Section 1201, and its relationship to licensing. It argues that not all digital locks and contractual notices qualify for legal protection under Section 1201, and attributes the courts’ indiscriminate protection of all Digital Rights Management (DRM) measures to the law’s incoherent formulation. The Article proposes a pair of filters that would enable courts to distinguish between those DRM measures that qualify for protection under Section 1201, and those that do not. The filters are shown to align with legislative intent and copyright precedent, as well as the approaches recently …
An Innovation-Centric Approach Of Telecommunications Infrastructure Regulation, Konstantinos Stylianou
An Innovation-Centric Approach Of Telecommunications Infrastructure Regulation, Konstantinos Stylianou
Konstantinos Stylianou
This paper considers the mechanics and role of innovation in telecommunications networks, and explains how regulation can be designed to maximize innovation. To better focus on the relationship between innovation and regulation an effort is made to distinguish innovation from competition, although the two concepts are closely related, and several reasons are presented on why the fast changing, networked and technical nature of telecommunications offers a very favorable environment for innovation to thrive, as well as why innovation benefits from a large number of actors. Moreover, the paper further explains that even small players are useful in the innovation process …
Workplace Consequences Of Electronic Exhibitionism And Voyeurism, William A. Herbert
Workplace Consequences Of Electronic Exhibitionism And Voyeurism, William A. Herbert
William A. Herbert
The popularity of email, blogging and social networking raises important issues for employers, employees and labor unions. This article will explore contemporary workplace issues resulting from the related social phenomena of electronic exhibitionism and voyeurism. It will begin with a discussion of the international social phenomenon of individuals electronically distributing their personal thoughts, opinions, and activities to a potential worldwide audience while at the same time retaining a subjective sense of privacy. The temptation toward such exhibitionism has been substantially enhanced by the advent of Web 2.0. The article then turns to the legal implications of electronic voyeurism including employer …
Responsibility Of And Trust In Isps, Raphael Cohen-Almagor
Responsibility Of And Trust In Isps, Raphael Cohen-Almagor
raphael cohen-almagor
This discussion is about the neglected concepts of trust and social responsibility on the Internet. I will discuss and explain the concepts and their implications to people and society. I then address the issue of moral and social responsibilities of ISPs and web-hosting companies. I argue that ISPs and web-hosting companies should aspire to take responsibility for content and that they should respect and abide by their own terms of conduct.
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds
William L. Reynolds
This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.
Networked Activism, Molly Land
Networked Activism, Molly Land
Molly K. Land
The same technologies that groups of ordinary citizens are using to write operating systems and encyclopedias are fostering a quiet revolution in another area – human rights advocacy. On websites such as Avaaz.org and Wikipedia, ordinary citizens are reporting on human rights violations and organizing email writing campaigns, activities formerly the prerogative of professionals. The involvement of amateurs has been heralded as revolutionizing a variety of industries, from journalism to photography. This article asks whether it has the potential to make human rights organizations irrelevant.
In contrast to much of the recent literature, this article provides a decidedly more skeptical …
Internet Killed The Copyright Law: Perfect 10 V. Google And The Devastating Impact On The Exclusiive Right To Display, Deborah B. Morse
Internet Killed The Copyright Law: Perfect 10 V. Google And The Devastating Impact On The Exclusiive Right To Display, Deborah B. Morse
Deborah Brightman Morse
Never has the dissonance between copyright and innovation been so extreme. The Internet provides enormous economic growth due to the strength of e-commerce, and affords an avenue for creativity and the wide dissemination of information. Nevertheless, the Internet has become a plague on copyright law. The advent of the digital medium has made the unlawful reproduction, distribution, and display of copyrighted works essentially effortless. The law has been unable to keep pace with the rapid advance of technology. For the past decade, Congress has been actively attempting to draft comprehensible legislation in an effort to afford copyright owners more protection …
Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron K. Perzanowski
Relative Access To Corrective Speech: A New Test For Requiring Actual Malice, Aaron K. Perzanowski
Aaron K. Perzanowski
This Article reexamines the First Amendment protections provided by the public figure doctrine. It suggests that the doctrine is rooted in a set of out-dated assumptions regarding the media landscape and, as a result, has failed to adapt in a manner that accounts for our changing communications environment. The public figure doctrine, which imposes the more rigorous actual malice standard of fault on defamation plaintiffs who enjoy greater access to mass media, was constructed in an era defined by one-to-many communications media. Newspapers, broadcasters, and traditional publishers exhausted the Court's understanding of the means of communicating with mass audiences. As …
The Blogosphere And The New Pamphleteers, Donald J. Kochan
The Blogosphere And The New Pamphleteers, Donald J. Kochan
Donald J. Kochan
The future of the free dissemination of information lies in the blog, some may say. The internet has entirely transformed how we receive and consume information. It’s the newest incarnation of information dissemination. From the insights of Alexis de Tocqueville, “Feelings and opinions are recruited, the heart is enlarged, and the human mind is developed only by the reciprocal influence of men upon one another.” Bloggers are a powerful force in the distribution of information and ideas and the creation of communities of conversation. Throughout history, the dissemination of information, news, opinions, and ideas has continuously transformed. In the 18th …
Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald
Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald
Susan Freiwald
This Article explores those features of electronic surveillance that have made it challenging to regulate effectively. In balancing interests, lawmakers must create a workable law for an exceedingly complex topic, rein in law enforcement agents without crippling them, and draw a line between prohibited and permitted conduct despite society's ambivalence about surveillance. This Article demonstrates that lawmakers met those challenges when they regulated traditional wiretapping, but they have failed to meet them in the online context. It argues that the law should extend the significant restrictions on wiretapping to online surveillance, just as judges did in the case of video …
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Stephen E Henderson
The Internet, already of major significance throughout much of the globe, is expected to become increasingly pervasive in diverse arenas, from health care, to commerce, to entertainment, and is expected to become increasingly critical to essential infrastructures, including banking, power, and telecommunications. Yet the medium is both inherently and unnecessarily insecure. In particular, today’s Internet can be crippled by distributed denial-of-service attacks launched by relatively unsophisticated and judgment-proof parties. Not every computing system involved in such attacks, however, is necessarily without resources. Application of traditional negligence liability, coupled with other government incentives and support institutions, will encourage better security and …
Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald
Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald
Susan Freiwald
Almost every day brings reports that Congress is considering new cyberspace-targeted laws and the courts are deciding novel cyberspace legal questions. These developments lend urgency to the question of whether a particular cyberspace legal change should come through operation of new statutes, judicial decisions, or the free market. If we can develop sophisticated analytical methods to evaluate institutional competence in cyberspace, we can vastly improve the development of cyberspace law and public policy.
Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation promotes just such an approach. By describing and extending a recently proposed model of comparative …