Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (23)
- Computer Law (17)
- Science and Technology Law (11)
- Communications Law (8)
- Intellectual Property Law (6)
-
- First Amendment (4)
- Privacy Law (4)
- Health Law and Policy (3)
- International Law (3)
- Torts (3)
- Civil Law (2)
- Commercial Law (2)
- Constitutional Law (2)
- Consumer Protection Law (2)
- Criminal Law (2)
- Criminal Procedure (2)
- European Law (2)
- Marketing Law (2)
- Other Law (2)
- Public Law and Legal Theory (2)
- Sexuality and the Law (2)
- Transnational Law (2)
- Antitrust and Trade Regulation (1)
- Artificial Intelligence and Robotics (1)
- Civil Rights and Discrimination (1)
- Computer Sciences (1)
- Conflict of Laws (1)
- Contracts (1)
- Domestic and Intimate Partner Violence (1)
- Institution
-
- Duke Law (12)
- Case Western Reserve University School of Law (3)
- The Catholic University of America, Columbus School of Law (3)
- Maurer School of Law: Indiana University (2)
- Pepperdine University (2)
-
- Seattle University School of Law (2)
- St. John's University School of Law (2)
- William & Mary Law School (2)
- Florida International University College of Law (1)
- Fordham Law School (1)
- Pace University (1)
- University of Michigan Law School (1)
- University of Rhode Island (1)
- University of South Carolina (1)
- Publication
-
- Duke Law & Technology Review (12)
- Catholic University Journal of Law and Technology (2)
- Journal of Law, Technology, & the Internet (2)
- Seattle University Law Review (2)
- Case Western Reserve Journal of International Law (1)
-
- Catholic University Law Review (1)
- Dignity: A Journal of Analysis of Exploitation and Violence (1)
- FIU Law Review (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- IP Theory (1)
- Indiana Law Journal (1)
- Journal of Civil Rights and Economic Development (1)
- Journal of Law and Mobility (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Pace Law Review (1)
- Pepperdine Law Review (1)
- South Carolina Law Review (1)
- St. John's Law Review (1)
- William & Mary Bill of Rights Journal (1)
- William & Mary Law Review (1)
Articles 1 - 30 of 34
Full-Text Articles in Law
Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes
Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
The Internet Of Bodies, Andrea M. Matwyshyn
The Internet Of Bodies, Andrea M. Matwyshyn
William & Mary Law Review
This Article introduces the ongoing progression of the Internet of Things (IoT) into the Internet of Bodies (IoB)—a network of human bodies whose integrity and functionality rely at least in part on the Internet and related technologies, such as artificial intelligence. IoB devices will evidence the same categories of legacy security flaws that have plagued IoT devices. However, unlike most IoT, IoB technologies will directly, physically harm human bodies—a set of harms courts, legislators, and regulators will deem worthy of legal redress. As such, IoB will herald the arrival of (some forms of) corporate software liability and a new legal …
Internet (Re)Search By Judges, Jurors, And Lawyers, H. Albert Liou, Jasper L. Tran
Internet (Re)Search By Judges, Jurors, And Lawyers, H. Albert Liou, Jasper L. Tran
IP Theory
How can Internet research be used properly and reliably in law? This paper analyzes several key and very different issues affecting judges, jurors, and lawyers. With respect to judges, this paper discusses the rules of judicial conduct and how they guide the appropriate use of the Internet for research; the standards for judicial notice; and whether judges can consider a third category of non-adversarially presented, non-judicially noticed factual evidence. With respect to jurors, this paper discusses causes of and deterrents to jurors conducting Internet research during trials; and the recourse available to parties who are adversely impacted by such behavior. …
When "Things" Go Wrong: Redefining Liability For The Internet Of Medical Things, Bethany A. Corbin
When "Things" Go Wrong: Redefining Liability For The Internet Of Medical Things, Bethany A. Corbin
South Carolina Law Review
No abstract provided.
Barlow's Legacy, Cory Doctorow
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle
The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle
Duke Law & Technology Review
No abstract provided.
Is The Internet Over?! (Again?), James Boyle
Is The Internet Over?! (Again?), James Boyle
Duke Law & Technology Review
No abstract provided.
Inventing The Future: Barlow And Beyond, Cindy Cohn
Inventing The Future: Barlow And Beyond, Cindy Cohn
Duke Law & Technology Review
No abstract provided.
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Duke Law & Technology Review
No abstract provided.
A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson
A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson
Duke Law & Technology Review
No abstract provided.
Revisiting Barlow's Misplaced Optimism, Benjamin Edelman
Revisiting Barlow's Misplaced Optimism, Benjamin Edelman
Duke Law & Technology Review
No abstract provided.
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Duke Law & Technology Review
No abstract provided.
John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain
John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain
Duke Law & Technology Review
No abstract provided.
What Didn’T Happen: An Essay In Speculation, Peter Jaszi
What Didn’T Happen: An Essay In Speculation, Peter Jaszi
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow
The Past And Future Of The Internet: A Symposium For John Perry Barlow
Duke Law & Technology Review
No abstract provided.
Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell
Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell
Journal of the National Association of Administrative Law Judiciary
This article argues that one of the ways to appropriately fight online human trafficking is through governmental regulation of the Dark Web. Specifically, this article argues that a new Attaching Criminal Dark Web Statute is the best method to combat human trafficking because it can incentivize prosecutors to use current human trafficking statutes to prosecute traffickers. This proposal can deter traffickers from enslaving people. Additionally, this article shows the evolution of online human trafficking laws, investigation, and prosecution (Section II); demonstrates why current and proposed laws do not effectively address the online human trafficking issue (Sections III and IV); introduces …
Prior Restraint In The Digital Age, Ariel L. Bendor, Michal Tamir
Prior Restraint In The Digital Age, Ariel L. Bendor, Michal Tamir
William & Mary Bill of Rights Journal
In this Article we argue that the digital revolution requires a reshaping of the Doctrine of Prior Restraint, which prohibits the implementation of any regulations that prevent the publication of speech prior to its distribution. We describe the prohibition on prior restraint of speech, its rationales and its exceptions; present the characteristics of the media in the digital age; suggest that the traditional design of the Doctrine does not fit these characteristics; and describe the reshaping that we propose in order to adapt the Doctrine to the age of the Internet and social networking.
Protecting Personal Data: A Model Data Security And Breach Notifications Statute, Michael Bloom
Protecting Personal Data: A Model Data Security And Breach Notifications Statute, Michael Bloom
St. John's Law Review
(Excerpt)
This Note argues that current law is inadequate to protect consumers in light of the prevalence and severity of data breaches in recent years, and that a unifying federal legislation combining portions of state law and the DSBNA should be enacted. Part I of this Note analyzes the DSBNA for notification requirements when data breaches occur, the requirements for the implementation of security policies, regulatory mechanisms for monitoring compliance with these requirements, and criminal penalties for failing to comply. Part II summarizes the various state laws that exist for notification of data breaches. Part III proposes a model federal …
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Seattle University Law Review
Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Seattle University Law Review
The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …
The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano
The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano
Pace Law Review
The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to …
The Airwaves Meet The Highways, David Redl
The Airwaves Meet The Highways, David Redl
Journal of Law and Mobility
I applaud and congratulate the University of Michigan for launching the Journal of Law and Mobility. The timing is perfect. The information superhighway is no longer just a clever metaphor. We are living in an era where internet connectivity is a critical part of making transportation safer and more convenient. Internet connectivity has powered the U.S. and global economies for years now. In the early stages, dial-up connections enabled users to access a vast store of digital information. As the internet and its usage grew, so did the demand for faster broadband speeds. Finally, wireless networks untethered the power of …
Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.
Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.
Journal of Civil Rights and Economic Development
(Excerpt)
Part I of this Note will briefly discuss the key components of a Connected Car, identify who collects the data from the Car, and examine the various uses for the data. Part I also explores whether Car owners consent to the collection of their Car’s data. Part II-A will trace the historical development of the automobile exception to the Fourth Amendment, which generally permits law-enforcement officers to conduct a warrantless search of a vehicle. Part II-B will discuss how the Supreme Court has applied the Fourth Amendment to pre-Internet technologies. Part II-C will discuss two recent Fourth Amendment Supreme …
When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman
When You Give A Terrorist A Twitter: Holding Social Media Companies Liable For Their Support Of Terrorism, Anna Elisabeth Jayne Goodman
Pepperdine Law Review
In the electronic age, the internet—and—social media specifically, can be a tool for good but, abused and unchecked, can lead to great harm. Terrorist organizations utilize social media as a means of recruiting and training new members, urging them to action, and creating public terror. These platforms serve as the catalyst for equipping the growing number of “lone wolf” attackers taking action across the United States. Under civil liability provisions created under JASTA and the ATA, material supporters of terrorism can be held liable for their actions, and with the key role social media sites now play in supporting terrorism, …
#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel
#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel
Indiana Law Journal
This Article explores the complicated relationship between minimum contacts and the modern internet. Part I traces the development of modern personal jurisdiction analyses in the areas of both specific and general jurisdiction. Interesting in this historical overview is the increased reliance on predictability, even as courts have recognized that advanced technologies and infrastructure have made the maintenance of lawsuits infinitely easier than in the days before International Shoe.7 Part II then explores the intersection between personal jurisdiction and the internet as well as the rise of the so-called Zippo “interactivity” test for jurisdiction in cases involving websites. Although Zippo has …
The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman
The Direct Purchaser Requirement In Clayton Act Private Litigation: The Case Of Apple Inc. V. Pepper , Konstantin G. Vertsman
Catholic University Journal of Law and Technology
More than fifty years after the Supreme Court’s decision in Hanover Shoe, Inc. v. United Shoe Machinery Corp. established the direct purchaser rule, the Supreme Court was provided with an opportunity in Apple Inc. v. Pepper to reevaluate and update the proximate cause standing requirement for litigation under § 4 of the Clayton Act. In the Supreme Court’s 5-4 decision, the majority opinion established a rule that consumers who purchase directly from a monopolist satisfy the direct purchaser standing requirement notwithstanding the internal business structure of the monopolist. This interpretation of the direct purchaser rule, along with the recent reformulation …
Forget Me, Forget Me Not: Elements Of Erasure To Determine The Sufficiency Of A Gdpr Article 17 Request, Haya Yaish
Forget Me, Forget Me Not: Elements Of Erasure To Determine The Sufficiency Of A Gdpr Article 17 Request, Haya Yaish
Journal of Law, Technology, & the Internet
The data subject’s (or the individual to whom the data relates) right to erasure under the new EU’s data protection law is likely to cause tensions with the right to freedom of expression. Using Article 17(1)(d)-(e) of the General Data Protection Regulation as a nexus to trigger and apply the right to privacy in EU law to the right to erasure, this Note presents a balancing test of four factors that can be used to consistently determine whether individual cases that request a right to erasure for published material are entitled to privacy protections. The proposed balancing test “Elements of …
"Sheer Force Of Tweet:" Testing The Limits Of Executive Power On Twitter, Kristina T. Bodnar
"Sheer Force Of Tweet:" Testing The Limits Of Executive Power On Twitter, Kristina T. Bodnar
Journal of Law, Technology, & the Internet
President Donald Trump’s affinity for Twitter has raised novel issues of constitutional law, tested the norms for presidential etiquette, and opened up a dialogue about whether tweets are considered the actual directives of the President. This note explores four subject areas that the President has tweeted about: judicial legitimacy, executive orders, removal of appointees, and entering into armed conflicts. Then, these topics will be considered in terms of whether presidential speech on social media should be regulated to protect against the risks of posting on the Internet and to ensure the preservation of the principles of democracy embedded in the …
The Trouble With Tinker: An Examination Of Student Free Speech Rights In The Digital Age, Allison N. Sweeney
The Trouble With Tinker: An Examination Of Student Free Speech Rights In The Digital Age, Allison N. Sweeney
Fordham Intellectual Property, Media and Entertainment Law Journal
The boundaries of the schoolyard were once clearly delineated by the physical grounds of the school. In those days, it was relatively easy to determine what sort of student behavior fell within an educator’s purview, and what lay beyond the school’s control. Technological developments have all but erased these confines and extended the boundaries of the school environment somewhat infinitely, as the internet and social media allow students to interact seemingly everywhere and at all times. As these physical boundaries of the schoolyard have disappeared, so too has the certainty with which an educator might supervise a student’s behavior.
Because …