Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

Internet

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 102

Full-Text Articles in Law

Law Library Blog (February 2024): Legal Beagle's Blog Archive, Roger Williams University School Of Law Feb 2024

Law Library Blog (February 2024): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


All The News That’S Fit To Be Identified: Facilitating Access To High-Quality News Through Internet Platforms, Sonja R. West, Jonathan Peters, Lefteris Jason Anastasopolous Aug 2023

All The News That’S Fit To Be Identified: Facilitating Access To High-Quality News Through Internet Platforms, Sonja R. West, Jonathan Peters, Lefteris Jason Anastasopolous

Scholarly Works

Roughly half of Americans get some of their news from social media, and nearly two-thirds get some of their news from search engines. As our modern information gatekeepers, these internet companies bear a special responsibility to consider the impact of their platform and site policies on users’ access to high-quality news sources. They should adopt policies that clear the digital pathway between the public and press by facilitating such access. To that end, the companies must first, address the threshold issue of how best to identify high-quality news sources. This article examines factors that would be useful, drawing from legal …


Law Library Blog (February 2023): Legal Beagle's Blog Archive, Roger Williams University School Of Law Feb 2023

Law Library Blog (February 2023): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Protecting Low-Income Consumers In The Era Of Digital Grocery Shopping: Implications For Wic Online Ordering, Qi Zhang, Priyanka Patel, Caitlin M. Lowery Jan 2023

Protecting Low-Income Consumers In The Era Of Digital Grocery Shopping: Implications For Wic Online Ordering, Qi Zhang, Priyanka Patel, Caitlin M. Lowery

Community & Environmental Health Faculty Publications

The Special Supplemental Nutrition Program for Women, Infants, and Children (WIC) is now expected to allow participants to redeem their food benefits online, i.e., via online ordering, rather than only in-store. However, it is unclear how this new benefit redemption model may impact participants’ welfare since vendors may have an asymmetric information advantage compared with WIC customers. The WIC online ordering environment may also change the landscape for WIC vendors, which will eventually affect WIC participants. To protect WIC consumers’ rights in the new online ordering model, policymakers need an appropriate legal and regulatory framework. This narrative review provides that …


Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara Apr 2022

Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara

Student Writing

Social media has evolved into an essential mode of communication in recent years, allowing people to express their thoughts with the audience of their choice by sending private messages, posting their thoughts, or sharing their opinions. Such audiences can come from all over the world because this online technology breaks down geographic, linguistic, and cultural barriers. As a result, social media has evolved into a powerful tool for self-expression, allowing anyone with an Internet connection to participate in global debates. However, its misuse has had disastrous consequences in the real world, such as the attack on the Capitol that occurred …


The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine Jan 2022

The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine

Catholic University Journal of Law and Technology

No abstract provided.


Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2022

Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


The New Bailments, Danielle D'Onfro Jan 2022

The New Bailments, Danielle D'Onfro

Scholarship@WashULaw

The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Law Library Blog (December 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Dec 2021

Law Library Blog (December 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Duality In Digital Discourse: The History And Future Of The American Public Forum, Nicholas Weaver May 2021

Duality In Digital Discourse: The History And Future Of The American Public Forum, Nicholas Weaver

Honors Theses

From the onset of the republic, the liberty to speak freely and debate openly has stood guard and helped preserve all other American rights. While this concept has endured, the means by which it exists in society has changed immensely. As the public forum has evolved to fit the modern needs of the citizenry, political discourse has become less a defense against tyranny and more a chaotic space of conflicting opinions.

In the United States, privately-owned social media companies have grown at an unprecedented rate, yet lawmakers have been slow to exercise any authority to regulate these corporations. For public …


Illuminating Regulatory Guidance, Cary Coglianese Jan 2020

Illuminating Regulatory Guidance, Cary Coglianese

All Faculty Scholarship

Administrative agencies issue many guidance documents each year in an effort to provide clarity and direction to the public about important programs, policies, and rules. But these guidance documents are only helpful to the public if they can be readily found by those who they will benefit. Unfortunately, too many agency guidance documents are inaccessible, reaching the point where some observers even worry that guidance has become a form of regulatory “dark matter.” This article identifies a series of measures for agencies to take to bring their guidance documents better into the light. It begins by explaining why, unlike the …


Iran, Diane M. Zorri Jan 2020

Iran, Diane M. Zorri

Publications

Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …


Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes Nov 2019

Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher May 2019

Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher

Technical Services Faculty Presentations

Slides from a presentation, "Reuse, Remix, and Create with Creative Commons Licenses," presented at the Rhode Island Library Association Annual Conference 2019, Get Informed!, on May 23, 2019 in North Smithfield, Rhode Island.

An openly-shared Google Slides version of this presentation is also available at https://bit.ly/2w6maqH.

=====

REUSE, REMIX, AND CREATE WITH CREATIVE COMMONS LICENSES | ROOM 2A

What are Creative Commons (CC) licenses and how do they work? What is the difference between something that is free online and something that is truly “open”? Did you know that it is often a Creative Commons license that puts …


Social Media Warriors: Leveraging A New Battlespace, Buddhika B. Jayamaha, Jahara Matisek Dec 2018

Social Media Warriors: Leveraging A New Battlespace, Buddhika B. Jayamaha, Jahara Matisek

The US Army War College Quarterly: Parameters

No abstract provided.


Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem Nov 2018

Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem

Library Philosophy and Practice (e-journal)

In this paper, we explore the socio-economic effects of internet use at the community information centres (CICs) on livelihoods in three regions of Ghana. Sustainable livelihood framework was used as a lens to understand the phenomena being studied. Primary and secondary data collection methods were used. Three CICs in three regions were purposively selected and qualitative research method was adopted for the study. The data were analysed using Nvivo. The findings showed that sending email information was largely the reason why people used the Internet. We found that through the Internet, people learn, develop new business ideas and expand the …


Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake Oct 2018

Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake

Faculty Publications

Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …


The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati Aug 2018

The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati

Library Philosophy and Practice (e-journal)

Globalization has influenced many human life scopes with a variety of tools, which the cyberspace playing the most role. Although both cyberspace and globalization have had many benefits to human life, both as a tool and as a process, they have been able to assist offenders to bring crime into the cyberspace without any trouble. Therefore, today criminologists discuss the globalized world of crime. Although, the processes of homogenization and globalization have been precious to human beings, should not be overlooked. In this article, the author has tried to explain the cybercrime in the age of globalization, with an emphasis …


Law Library Blog (April 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law Apr 2018

Law Library Blog (April 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Laws On Erasure Of Online Information: Canada, France, European Union, Germany, Israel, Japan, New Zealand, Norway, Portugal, Russia, Spain, United Kingdom, Luis Acosta Nov 2017

Laws On Erasure Of Online Information: Canada, France, European Union, Germany, Israel, Japan, New Zealand, Norway, Portugal, Russia, Spain, United Kingdom, Luis Acosta

Copyright, Fair Use, Scholarly Communication, etc.

Comparative Summary by Luis Acosta, Chief, Foreign, Comparative, and International Law Division II, Law Library of Congress (United States), Global Legal Research Center

This report describes the laws of twelve jurisdictions that have some form of remedy available enabling the removal of online data based on harm to individuals’ privacy or reputational interests, including but not limited to defamation. Six of the countries surveyed are within the European Union (EU) or the European Economic Area, and therefore have implemented EU law. Five non-EU jurisdictions are also surveyed.

Comparative analysis across jurisdictions presents terminological challenges, because legal language across jurisdictions seems …


Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman Jul 2017

Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins Jul 2017

The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins Jul 2017

It Can't Wait: Exposing The Connections Between Forms Of Sexual Exploitation, Dawn Hawkins

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


No Connection: The Issue Of Internet On The Reservation, Emily S. Donnellan Jul 2017

No Connection: The Issue Of Internet On The Reservation, Emily S. Donnellan

American Indian Law Journal

No abstract provided.


Surveying The Landscape As Technology Revolutionizes Media Coverage Of Appellate Courts, Howard J. Bashman Apr 2017

Surveying The Landscape As Technology Revolutionizes Media Coverage Of Appellate Courts, Howard J. Bashman

The Journal of Appellate Practice and Process

No abstract provided.


Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael Mar 2017

Denial Of Harm: Sex Trafficking, Backpage, And Free Speech Absolutism, Jody Raphael

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen Dec 2016

Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen

All Faculty Scholarship

Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …


Aeham, Aeham, Tsos Jul 2016

Aeham, Aeham, Tsos

TSOS Interview Gallery

Aeham Ahmad is a pianist from Yarmouk, Syria who gained internet fame from videos posted of him performing on the streets. Because of this, he was targeted and forced to flee to Germany, leaving his wife and two sons behind. Since this interview, his family has joined him.

Aeham’s talent and fame opened up opportunities to perform in various cities in Germany. To share his story during these performances, he learned English. He wants to use music to make a difference in the world. During his time in Yarmouk, there was an underground area where children practiced music because it …


Anonymity, Cybercrime, And The Connection To Cryptocurrency, Jesse D. Bray Jan 2016

Anonymity, Cybercrime, And The Connection To Cryptocurrency, Jesse D. Bray

Online Theses and Dissertations

Cybercrime currently poses a significant threat to the infrastructure of the United States. It can exploit vulnerabilities within the Critical Infrastructure or (CI) systems that are increasingly interconnected. Although the increased interconnectedness allows for easier and more efficient communication it creates vulnerabilities that did not exist ten years ago. A lack of a standardized definition of cybercrime has made it increasingly difficult to create policy that will allow for more efficient interagency cooperation and concrete laws regarding cybercrime. Cybercrime thrives on the anonymity of the Internet with the use of specific browsers, The Onion Router for example, to access information …