Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (8)
- Communications Law (4)
- Intellectual Property Law (4)
- Legal Writing and Research (4)
- Science and Technology Law (4)
-
- Social and Behavioral Sciences (4)
- Anthropology (3)
- Business (3)
- Civil Rights and Discrimination (3)
- E-Commerce (3)
- Law and Society (3)
- Social and Cultural Anthropology (3)
- Communication (2)
- Communication Technology and New Media (2)
- Constitutional Law (2)
- International Law (2)
- Science and Technology Studies (2)
- Technology and Innovation (2)
- Antitrust and Trade Regulation (1)
- Community-Based Research (1)
- Comparative and Foreign Law (1)
- Computer Sciences (1)
- Criminal Law (1)
- Databases and Information Systems (1)
- Entertainment, Arts, and Sports Law (1)
- Entrepreneurial and Small Business Operations (1)
- First Amendment (1)
- Gender and Sexuality (1)
- Law and Economics (1)
Articles 1 - 18 of 18
Full-Text Articles in Law
Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Akron Law Faculty Publications
In January of 2010 a United States District Court granted an injunction against a Twilight fan magazine for unauthorized use of copyrighted publicity stills . No surprise there. Intellectual property laws deal effectively – some would argue too effectively – with such cases. Nevertheless, recent Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright …
From Opera To Real Democracy: Popular Constitutionalism And Web 2.0, Elizabeth Dale
From Opera To Real Democracy: Popular Constitutionalism And Web 2.0, Elizabeth Dale
UF Law Faculty Publications
On March 17, 2011 the conductor Riccardo Muti stood in the orchestra pit at the Teatro dell’Opera di Roma and, in the presence of the Italian Prime Minister, Silvio Berlusconi, and the Italian President, Giorgio Napolitano, denounced the Italian government’s cuts to funding for the arts and culture. He then invited the entire audience to join the opera’s chorus in an encore of Va’ Pensiero, the hymn of the Hebrew slaves in Nabucco, to protest the cuts. Within two days of the sing-a-long, the Italian government reversed the course it set more than ten months before and agreed to a …
Public Forum 2.1: Public Higher Education Institutions And Social Media, Robert H. Jerry Ii, Lyrissa Barnett Lidsky
Public Forum 2.1: Public Higher Education Institutions And Social Media, Robert H. Jerry Ii, Lyrissa Barnett Lidsky
UF Law Faculty Publications
Like most of us, public colleges and universities increasingly are communicating via Facebook, Second Life, YouTube, Twitter and other social media. Unlike most of us, public colleges and universities are government actors, and their social media communications present complex administrative and First Amendment challenges. The authors of this article — one the dean of a major public university law school responsible for directing its social media strategies, the other a scholar of social media and the First Amendment — have combined their expertise to help public university officials address these challenges. To that end, this article first examines current and …
Public Forum 2.0, Lyrissa Lidsky
Public Forum 2.0, Lyrissa Lidsky
Faculty Publications
Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …
The (Im)Possibility Of "Standard Technical Measures" For Ugc Websites, Laura G. Gallo
The (Im)Possibility Of "Standard Technical Measures" For Ugc Websites, Laura G. Gallo
Kernochan Center for Law, Media, and the Arts
In today’s highly litigious legal landscape, one might doubt that there could ever be an “open, fair, voluntary” agreement between copyright owners and service providers to police infringement. Congress nevertheless envisioned such a consensus when it developed § (i) of the Digital Millennium Copyright Act (DMCA): “Conditions for [Safe Harbor] Eligibility.” An often-overlooked provision of the DMCA, § 512(i) directs right holders and Internet service providers to work together and agree on “standard technical measures” to “identify or protect copyrighted works.” In addition to being the product of consensus, these measures must be “available ... on reasonable and nondiscriminatory terms” …
Public Forum 2.0, Lyrissa Barnett Lidsky
Public Forum 2.0, Lyrissa Barnett Lidsky
UF Law Faculty Publications
Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …
Cyber Civil Rights: Looking Forward, Danielle Keats Citron
Cyber Civil Rights: Looking Forward, Danielle Keats Citron
Faculty Scholarship
The Cyber Civil Rights conference raised many important questions about the practical and normative value of seeing online harassment as a discrimination problem. In these remarks, I highlight and address two important issues that must be tackled before moving forward with a cyber civil rights agenda. The first concerns the practical—whether we, in fact, have useful antidiscrimination tools at the state and federal level and, if not, how we might conceive of new ones. The second involves the normative—whether we should invoke technological solutions, such as traceability anonymity, as part of a cyber civil rights agenda given their potential risks.
Mapping Online Privacy, Jacqueline D. Lipton
Mapping Online Privacy, Jacqueline D. Lipton
Articles
Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Copyright’S Twilight Zone: Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Articles
Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright works, or engaging in acts of digital copyright piracy and plagiarism. As online conduct becomes more interactive, copyright laws are less effective in creating clear signals about proscribed conduct. This article examines the application of copyright law to Web 2.0 technologies. It suggests that social …
What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton
What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton
Articles
Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Articles
“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …
Cyber Civil Rights, Danielle K. Citron
Cyber Civil Rights, Danielle K. Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …
From Domain Names To Video Games: The Rise Of The Internet In Presidential Politics, Jacqueline D. Lipton
From Domain Names To Video Games: The Rise Of The Internet In Presidential Politics, Jacqueline D. Lipton
Articles
Senator Barack Obama's historic victory in the 2008 election marks some important milestones - notably that this country is ready for its first African-American president. His win also underscores the importance of understanding today's Internet as a campaign tool. No longer is the Internet a one-way communications medium between candidate and electorate. It is now a powerful multi-directional networking tool. It can bridge physical and virtual spaces in a way never before possible, bringing previously latent social and political groups together. Senator Obama's campaign strategists understood and capitalized on the capabilities of what has recently become known as Web 2.0 …
Cyber Civil Rights, Danielle Keats Citron
Cyber Civil Rights, Danielle Keats Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …
Law Library 2.0: New Roles For Law Librarians In The Information Overload Era, Sasha Skenderija
Law Library 2.0: New Roles For Law Librarians In The Information Overload Era, Sasha Skenderija
Cornell Law Faculty Working Papers
WWW has rapidly evolved from a technological into a social medium. Web 2.0 has become a metaphor for the distributed and decentralized collaboration networks on a global scale. With the recent trends of new media development, the sources available have reached a critical mass resulting in an unprecedented information overload. The urgent challenge to all information professionals, in this case law librarians, is no longer availability and direct provision of resources, but rather the filtering and highlighting the ubiquitous Infosphere. The recent transformation of legal information has had more drastic consequences than in many other cases. The Cornell Law Library …
Where Web 2.0 And Legal Information Intersect: Adjusting Course Without Getting Lost, Matthew M. Morrison
Where Web 2.0 And Legal Information Intersect: Adjusting Course Without Getting Lost, Matthew M. Morrison
Cornell Law Faculty Working Papers
For more than a century, the process of legal research remained unchanged. This process was rooted in an established legal information structure. The law was published in standard texts, such as the West reporters, annotated codes, treatises, and the West Key Number Digest. While the advent of computer-assisted legal research was a departure from the print-based model, it did not fundamentally change the structure of legal information or the nature of authority. In fact, in its conservative beginnings, computer-assisted legal research provided a mere format shift as case texts were transcribed to simple online databases. More recently, Web 2.0 technologies …
Have You Seen The New Library Bar?: Designing A Legal Research Toolbar, Jennifer L. Wondracek
Have You Seen The New Library Bar?: Designing A Legal Research Toolbar, Jennifer L. Wondracek
UF Law Faculty Publications
It seems like more and more people today are selecting their legal research results based on ease of access rather than the completeness of the results. After hearing one too many third-year law students say "I researched my entire paper on Google," I set off to create a tool that would satisfy both the desire for speed and the need for complete and authoritative research results. The tool is a legal research toolbar that integrates into a web browser and provides constant and quick access to library-sanctioned websites and databases. This paper walks readers through the design process of the …
Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain
Legal Information Management In A Global And Digital Age: Revolution And Tradition, Claire M. Germain
UF Law Faculty Publications
This article presents an overview of the public policy issues surrounding digital libraries, and describes some current trends, such as Web 2.0, the social network. It discusses the impact of globalization and the Internet on international and foreign law information, the free access to law movement and open access scholarship, and mass digitization projects, then turns to some concerns, focusing on preservation and long term access to born digital legal information and authentication of official digital legal information. It finally discusses new roles for librarians, called upon to evaluate the quality of information teach legal research methodology and be advocates …