Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (10)
- University of Pennsylvania Carey Law School (10)
- SelectedWorks (9)
- University of Rhode Island (6)
- Embry-Riddle Aeronautical University (5)
-
- Roger Williams University (5)
- University of New Hampshire (5)
- University of Pittsburgh School of Law (4)
- BLR (3)
- Maurer School of Law: Indiana University (3)
- Old Dominion University (3)
- US Army War College (3)
- University of Colorado Law School (3)
- University of Georgia School of Law (3)
- University of Nebraska - Lincoln (3)
- Kennesaw State University (2)
- Montclair State University (2)
- University of Denver (2)
- Boise State University (1)
- Brigham Young University (1)
- Chapman University (1)
- City University of New York (CUNY) (1)
- Cleveland State University (1)
- Columbia Law School (1)
- Eastern Kentucky University (1)
- Florida International University (1)
- Penn State Dickinson Law (1)
- San Jose State University (1)
- Seattle University School of Law (1)
- Singapore Management University (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (10)
- Dignity: A Journal of Analysis of Exploitation and Violence (5)
- Law Library Newsletters/Blog (5)
- Articles (4)
- Articles by Maurer Faculty (3)
-
- ExpressO (3)
- Journal of Digital Forensics, Security and Law (3)
- Law Faculty Scholarship (3)
- The US Army War College Quarterly: Parameters (3)
- raphael cohen-almagor (3)
- Benjamin Gibert (2)
- Donna M. Hughes (2)
- Geoff Sharp (2)
- Gillian K Hadfield (2)
- Human Rights & Human Welfare (2)
- LLM Theses and Essays (2)
- Library Philosophy and Practice (e-journal) (2)
- Michael D. Mann (2)
- 2012 Energy Justice Conference and Technology Exposition (September 17-18) (1)
- Allocating and Managing Water for a Sustainable Future: Lessons from Around the World (Summer Conference, June 11-14) (1)
- American Indian Law Journal (1)
- Brian D Anderson (1)
- Catholic University Journal of Law and Technology (1)
- Community & Environmental Health Faculty Publications (1)
- Copyright, Fair Use, Scholarly Communication, etc. (1)
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
- Department of Political Science and Law Faculty Scholarship and Creative Works (1)
- Dickinson Law Review (2017-Present) (1)
- Donald J. Kochan (1)
- Faculty Publications (1)
- Publication Type
Articles 1 - 30 of 102
Full-Text Articles in Law
Law Library Blog (February 2024): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (February 2024): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
All The News That’S Fit To Be Identified: Facilitating Access To High-Quality News Through Internet Platforms, Sonja R. West, Jonathan Peters, Lefteris Jason Anastasopolous
All The News That’S Fit To Be Identified: Facilitating Access To High-Quality News Through Internet Platforms, Sonja R. West, Jonathan Peters, Lefteris Jason Anastasopolous
Scholarly Works
Roughly half of Americans get some of their news from social media, and nearly two-thirds get some of their news from search engines. As our modern information gatekeepers, these internet companies bear a special responsibility to consider the impact of their platform and site policies on users’ access to high-quality news sources. They should adopt policies that clear the digital pathway between the public and press by facilitating such access. To that end, the companies must first, address the threshold issue of how best to identify high-quality news sources. This article examines factors that would be useful, drawing from legal …
Law Library Blog (February 2023): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (February 2023): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Protecting Low-Income Consumers In The Era Of Digital Grocery Shopping: Implications For Wic Online Ordering, Qi Zhang, Priyanka Patel, Caitlin M. Lowery
Protecting Low-Income Consumers In The Era Of Digital Grocery Shopping: Implications For Wic Online Ordering, Qi Zhang, Priyanka Patel, Caitlin M. Lowery
Community & Environmental Health Faculty Publications
The Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) is now expected to allow participants to redeem their food benefits online, i.e., via online ordering, rather than only in-store. However, it is unclear how this new benefit redemption model may impact participants’ welfare since vendors may have an asymmetric information advantage compared with WIC customers. The WIC online ordering environment may also change the landscape for WIC vendors, which will eventually affect WIC participants. To protect WIC consumers’ rights in the new online ordering model, policymakers need an appropriate legal and regulatory framework. This narrative review provides that …
Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara
Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara
Student Writing
Social media has evolved into an essential mode of communication in recent years, allowing people to express their thoughts with the audience of their choice by sending private messages, posting their thoughts, or sharing their opinions. Such audiences can come from all over the world because this online technology breaks down geographic, linguistic, and cultural barriers. As a result, social media has evolved into a powerful tool for self-expression, allowing anyone with an Internet connection to participate in global debates. However, its misuse has had disastrous consequences in the real world, such as the attack on the Capitol that occurred …
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
The New Bailments, Danielle D'Onfro
The New Bailments, Danielle D'Onfro
Scholarship@WashULaw
The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Law Library Blog (December 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (December 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Duality In Digital Discourse: The History And Future Of The American Public Forum, Nicholas Weaver
Duality In Digital Discourse: The History And Future Of The American Public Forum, Nicholas Weaver
Honors Theses
From the onset of the republic, the liberty to speak freely and debate openly has stood guard and helped preserve all other American rights. While this concept has endured, the means by which it exists in society has changed immensely. As the public forum has evolved to fit the modern needs of the citizenry, political discourse has become less a defense against tyranny and more a chaotic space of conflicting opinions.
In the United States, privately-owned social media companies have grown at an unprecedented rate, yet lawmakers have been slow to exercise any authority to regulate these corporations. For public …
Illuminating Regulatory Guidance, Cary Coglianese
Illuminating Regulatory Guidance, Cary Coglianese
All Faculty Scholarship
Administrative agencies issue many guidance documents each year in an effort to provide clarity and direction to the public about important programs, policies, and rules. But these guidance documents are only helpful to the public if they can be readily found by those who they will benefit. Unfortunately, too many agency guidance documents are inaccessible, reaching the point where some observers even worry that guidance has become a form of regulatory “dark matter.” This article identifies a series of measures for agencies to take to bring their guidance documents better into the light. It begins by explaining why, unlike the …
Iran, Diane M. Zorri
Iran, Diane M. Zorri
Publications
Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …
Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes
Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher
Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher
Technical Services Faculty Presentations
Slides from a presentation, "Reuse, Remix, and Create with Creative Commons Licenses," presented at the Rhode Island Library Association Annual Conference 2019, Get Informed!, on May 23, 2019 in North Smithfield, Rhode Island.
An openly-shared Google Slides version of this presentation is also available at https://bit.ly/2w6maqH.
=====
REUSE, REMIX, AND CREATE WITH CREATIVE COMMONS LICENSES | ROOM 2A
What are Creative Commons (CC) licenses and how do they work? What is the difference between something that is free online and something that is truly “open”? Did you know that it is often a Creative Commons license that puts …
Social Media Warriors: Leveraging A New Battlespace, Buddhika B. Jayamaha, Jahara Matisek
Social Media Warriors: Leveraging A New Battlespace, Buddhika B. Jayamaha, Jahara Matisek
The US Army War College Quarterly: Parameters
No abstract provided.
Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem
Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem
Library Philosophy and Practice (e-journal)
In this paper, we explore the socio-economic effects of internet use at the community information centres (CICs) on livelihoods in three regions of Ghana. Sustainable livelihood framework was used as a lens to understand the phenomena being studied. Primary and secondary data collection methods were used. Three CICs in three regions were purposively selected and qualitative research method was adopted for the study. The data were analysed using Nvivo. The findings showed that sending email information was largely the reason why people used the Internet. We found that through the Internet, people learn, develop new business ideas and expand the …
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Faculty Publications
Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …
The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati
The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati
Library Philosophy and Practice (e-journal)
Globalization has influenced many human life scopes with a variety of tools, which the cyberspace playing the most role. Although both cyberspace and globalization have had many benefits to human life, both as a tool and as a process, they have been able to assist offenders to bring crime into the cyberspace without any trouble. Therefore, today criminologists discuss the globalized world of crime. Although, the processes of homogenization and globalization have been precious to human beings, should not be overlooked. In this article, the author has tried to explain the cybercrime in the age of globalization, with an emphasis …
Law Library Blog (April 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (April 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Laws On Erasure Of Online Information: Canada, France, European Union, Germany, Israel, Japan, New Zealand, Norway, Portugal, Russia, Spain, United Kingdom, Luis Acosta
Copyright, Fair Use, Scholarly Communication, etc.
Comparative Summary by Luis Acosta, Chief, Foreign, Comparative, and International Law Division II, Law Library of Congress (United States), Global Legal Research Center
This report describes the laws of twelve jurisdictions that have some form of remedy available enabling the removal of online data based on harm to individuals’ privacy or reputational interests, including but not limited to defamation. Six of the countries surveyed are within the European Union (EU) or the European Economic Area, and therefore have implemented EU law. Five non-EU jurisdictions are also surveyed.
Comparative analysis across jurisdictions presents terminological challenges, because legal language across jurisdictions seems …
Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman
Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins
It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
No Connection: The Issue Of Internet On The Reservation, Emily S. Donnellan
No Connection: The Issue Of Internet On The Reservation, Emily S. Donnellan
American Indian Law Journal
No abstract provided.
Surveying The Landscape As Technology Revolutionizes Media Coverage Of Appellate Courts, Howard J. Bashman
Surveying The Landscape As Technology Revolutionizes Media Coverage Of Appellate Courts, Howard J. Bashman
The Journal of Appellate Practice and Process
No abstract provided.
Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael
Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
Aeham, Aeham, Tsos
Aeham, Aeham, Tsos
TSOS Interview Gallery
Aeham Ahmad is a pianist from Yarmouk, Syria who gained internet fame from videos posted of him performing on the streets. Because of this, he was targeted and forced to flee to Germany, leaving his wife and two sons behind. Since this interview, his family has joined him.
Aeham’s talent and fame opened up opportunities to perform in various cities in Germany. To share his story during these performances, he learned English. He wants to use music to make a difference in the world. During his time in Yarmouk, there was an underground area where children practiced music because it …
Anonymity, Cybercrime, And The Connection To Cryptocurrency, Jesse D. Bray
Anonymity, Cybercrime, And The Connection To Cryptocurrency, Jesse D. Bray
Online Theses and Dissertations
Cybercrime currently poses a significant threat to the infrastructure of the United States. It can exploit vulnerabilities within the Critical Infrastructure or (CI) systems that are increasingly interconnected. Although the increased interconnectedness allows for easier and more efficient communication it creates vulnerabilities that did not exist ten years ago. A lack of a standardized definition of cybercrime has made it increasingly difficult to create policy that will allow for more efficient interagency cooperation and concrete laws regarding cybercrime. Cybercrime thrives on the anonymity of the Internet with the use of specific browsers, The Onion Router for example, to access information …