Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Internet Law (13)
- First Amendment (12)
- Censorship (9)
- Child welfare (8)
- Law and Technology (7)
-
- Computer Law (6)
- Parental rights (6)
- Science and Technology (5)
- Administrative Law (4)
- Courts (4)
- Freedom of speech (4)
- Obscenity (4)
- Air and Space Law (3)
- Copyright (3)
- Drones (3)
- Information Technology (3)
- Informational norms (3)
- International Law (3)
- Internet filters (3)
- Internet speech (3)
- Norms (3)
- Privacy (3)
- Social media (3)
- Children's Internet Protection Act (2)
- Children's Internet Protection Act of 1996 (2)
- Communications Law (2)
- Labor Law (2)
- Libraries (2)
- Privacy in public (2)
- Social value (2)
- Publication Year
- Publication Type
Articles 1 - 30 of 55
Full-Text Articles in Law
Bipa: What Does It Stand For?, Paige Smith
Bipa: What Does It Stand For?, Paige Smith
Chicago-Kent Law Review
No abstract provided.
Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski
Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski
All Faculty Scholarship
With millions of small drones in private hands, the FAA continues its struggle to develop an effective regulatory regime to comply with Congress’s mandate to integrate them into the national airspace system. Thousands of individuals and small businesses have obtained authorization from the FAA—"section 333 exemptions"—allowing them to fly their drones commercially. Farmers, TV stations, surveyors, construction-site supervisors, real estate agents, people selling their properties, and managers seeking cheaper and safer ways to inspect their facilities, want to hire the exemption holders, but many are holding back until the FAA clarifies the groundrules.The FAA understands that its traditional approach for …
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
All Faculty Scholarship
The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.
Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …
Preventing Juror Misconduct In A Digital World, Thaddeus Hoffmeister
Preventing Juror Misconduct In A Digital World, Thaddeus Hoffmeister
Chicago-Kent Law Review
This article examines the reform efforts employed by common law countries to address internet-related juror misconduct, which generally arises when jurors use technology to improperly research or discuss a case. The three specific areas of reform are (1) punishment, (2) oversight, and (3) education. The first measure can take various forms ranging from fines to public embarrassment to incarceration. The common theme with all punishments is that once imposed, they make citizens less inclined to want to serve as jurors. Therefore, penalties should be a last resort in preventing juror misconduct.
The second reform measure is oversight, which occurs in …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
All Faculty Scholarship
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
All Faculty Scholarship
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …
Sharing Public Safety Helicopters, Henry H. Perritt Jr.
Sharing Public Safety Helicopters, Henry H. Perritt Jr.
All Faculty Scholarship
No abstract provided.
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
All Faculty Scholarship
Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
All Faculty Scholarship
Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.
Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …
Dueling Values: The Clash Of Cyber Suicide Speech And The First Amendment, Thea E. Potanos
Dueling Values: The Clash Of Cyber Suicide Speech And The First Amendment, Thea E. Potanos
Chicago-Kent Law Review
On March 15, 2011, William Melchert-Dinkel, a Minnesota nurse, was convicted of two counts of assisted suicide, based solely on things he said in emails and online chat rooms. This note examines whether cyber speech encouraging suicide, such as Melchert-Dinkel's, should be protected by the First Amendment. States have compelling interests in preserving life, preventing suicide, and protecting vulnerable persons from abuse, and the majority of them have assisted suicide statutes that could be applied to cyber-suicide speech. However, because cyber- suicide speech does not fit neatly into recognized categories of "low-value" or unprotected speech, punishment may be foreclosed by …
Digital Originality, Edward Lee
Digital Originality, Edward Lee
All Faculty Scholarship
This Article examines the doctrine of originality in U.S. copyright law and proposes a reconfigured, three-part test that can better analyze issues of first impression involving works created with new digital technologies. The proposed test, encapsulated by the concept of digital originality, provides much needed guidance to courts to address the increasing complexities of digital creations in the twenty-first century.
The Conundrum Of Cameras In The Courtroom, Nancy S. Marder
The Conundrum Of Cameras In The Courtroom, Nancy S. Marder
All Faculty Scholarship
In spite of a communications revolution that has given the public access to new media in new places, the revolution has been stopped cold at the steps to the U.S. federal courthouse. The question whether to allow television cameras in federal courtrooms has aroused strong passions on both sides, and Congress keeps threatening to settle the debate and permit cameras in federal courts. Proponents of cameras in federal courtrooms focus mainly on the need to educate the public and to make judges accountable, whereas opponents focus predominantly on the ways in which cameras can affect participants’ behavior and compromise the …
The Internet At 20: Evolution Of A Constitution For Cyberspace, Henry H. Perritt Jr.
The Internet At 20: Evolution Of A Constitution For Cyberspace, Henry H. Perritt Jr.
All Faculty Scholarship
This Article looks back over the Internet’s first twenty years, highlighting the crucial legal decisions by the executive, legislative, and judicial branches that have led to the Internet’s success, and which now frame its constitution. I participated in many of these decisions and wrote more than a dozen law review articles and reports suggesting directions for public policy and law. This Article uses this foundation to consider the future, focusing on major legal controversies, the resolution of which will define the Internet’s third decade—either strengthening or undermining its constitution.
Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung
Twittering Away The Right Of Publicity: Personality Rights And Celebrity Impersonation On Social Networking Websites, Andrew M. Jung
Chicago-Kent Law Review
Within the past couple of years, social networking websites have become an immensely popular destination for people from all walks of life. Websites like Facebook and Twitter now count tens of millions of worldwide users, including world leaders and a number of celebrities. Eventually, users realized that social networking websites lent themselves to the quick and easy impersonation of celebrities through the creation of fake social networking accounts, often as a form of parody. One subject of such impersonation was professional baseball manager Tony La Russa, who took the then-unprecedented step of suing his impersonators and Twitter over the incident. …
Remixing Lessig (Reviewing Lawrence Lessig, Remix (2008)), Edward Lee
Remixing Lessig (Reviewing Lawrence Lessig, Remix (2008)), Edward Lee
All Faculty Scholarship
This book review analyzes - and remixes - Lawrence Lessig's last copyright-related book, "Remix." It takes the central ideas, including some quotations, from Remix, and transforms them with some new examples and commentary of my own. Part I summarizes and critiques Lessig’s discussion of (1) the remix and read-write (RW) culture, and (2) its relationship to the sharing, commercial, and hybrid economies. Part II discusses some of Lessig’s reform proposals for our copyright system to foster a remix culture.
Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce
Reasons Why We Should Amend The Constitution To Protect Privacy, Deborah Pierce
Chicago-Kent Law Review
Threats to consumer privacy are many, and varied. Some threats come from corporate entities such as data aggregators and social networking sites; while others come from panoptics government surveillance systems such as Secure Flight. Not only can the data be compromised, but consumers may be adversely affected by incorrect information in their files. The time may be right to explicitly protect privacy via a constitutional amendment to the U.S. Constitution.
Coding Privacy, Lilian Edwards
Coding Privacy, Lilian Edwards
Chicago-Kent Law Review
Lawrence Lessig famously and usefully argues that cyberspace is regulated not just by law but also by norms, markets and architecture or "code." His insightful work might also lead the unwary to conclude, however, that code is inherently anti-privacy, and thus that an increasingly digital world must therefore also be increasingly devoid of privacy. This paper argues briefly that since technology is a neutral tool, code can be designed as much to fight for privacy as against it, and that what matters now is to look at what incentivizes the creation of pro- rather than anti-privacy code in the mainstream …
Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder
Peer-To-Peering Beyond The Horizon: Can A P2p Network Avoid Liability By Adapting Its Technological Structure?, Matthew G. Minder
Chicago-Kent Law Review
Peer-to-peer networks are often used to infringe copyrights, but they also serve some legitimate purposes consistent with copyright law. In attempting to find a satisfactor solution, this note develops and analyzes two models that future peer-to-peer networks could employ to attempt to avoid liability for copyright infringement. The note then analyzes the law, applies the two models to the relevant legal tests, and analyzes whether a peer-to-peer network operating on each model could avoid liability for copyright infringement. It concludes that modifying their technological structure may help peer-to-peer networks avoid liability, but that some risks remain.
Cyberjuries: A New Role As Online Mock Juries, Nancy S. Marder
Cyberjuries: A New Role As Online Mock Juries, Nancy S. Marder
All Faculty Scholarship
No abstract provided.
The Speech-Enhancing Effect Of Internet Regulation, Emily Buss
The Speech-Enhancing Effect Of Internet Regulation, Emily Buss
Chicago-Kent Law Review
In this Article, the author suggests that certain speech-reducing regulations will, in fact, be speech-enhancing for children. This is because children are vulnerable to far greater censorship at the hands of their parents than at the hands of Internet regulators. Regulations that inspire parents to relax their grip on their children's access to information are likely to produce significant net speech gains for children. Viewed this way, regulations designed to protect children can be conceived as pitting the speech interests of adults against the speech interests of children. The Article suggests a number of reasons we might value the children's …
When Well-Being Trumps Liberty: Political Theory, Jurisprudence, And Children's Rights, William Galston
When Well-Being Trumps Liberty: Political Theory, Jurisprudence, And Children's Rights, William Galston
Chicago-Kent Law Review
Compared to most adults, children are dependent and vulnerable and therefore require special protection. Efforts to safeguard their well-being often collide with one or more of the liberty guarantees of the First Amendment. Professor Etzioni fears that current jurisprudence has tipped the balance too far towards individual liberty, making it difficult to extend children the legal protection they need. Drawing on a theoretical account of constitutionalism as well as existing case law, the author argues that mainstream jurisprudence is up to the task of balancing the well-being of children against the liberty of adults. The Supreme Court's recent decision in …
On Protecting Children From Speech, Amitai Etzioni
On Protecting Children From Speech, Amitai Etzioni
Chicago-Kent Law Review
Are children entitled to the same First Amendment rights as adults? This Article explores the constitutionality of limiting children's access to objectionable materials assuming that both free speech rights and the protection of children are two core values that, like all other social values, must be balanced. When used to assess specific court cases and public policies, the balancing principle is a helpful guide in determining whether voluntary or incentives-based programs are sufficient to remedy the problems at hand or whether government regulation of free speech is necessary. The Article analyzes five court cases involving Internet filters in libraries, the …
The Liberal Theory Of Freedom Of Expression For Children, Colin M. Macleod
The Liberal Theory Of Freedom Of Expression For Children, Colin M. Macleod
Chicago-Kent Law Review
This Article develops a liberal theory of freedom of expression which is sensitive to the interests of children as distinct, vulnerable but developing members of society. I argue that children have, in addition to welfare interests, interests in the development and exercise of basic moral powers. In virtue of such interests, children acquire, well before they become adults, nontrivial rights of free expression. Respecting children's rights to free expression entails limits on the prerogatives of parents and others to determine the sorts of cultural materials children should be permitted access. Nonetheless children's rights are importantly different from those of adults. …
Free Speech And Children's Interests, David Archard
Free Speech And Children's Interests, David Archard
Chicago-Kent Law Review
This Article endorses the conclusion of Etzioni's article that the First Amendment right of free speech should not trump the interests of children. However the picture is more complicated once we recognize that parents have a "basic" right to bring up their children as they see fit that may conflict with the state's duty to protect children in its jurisdiction.
Moreover there is an important difference between protecting children now from harms and safeguarding the interests of the adults they will grow into. Society has an interest in protecting children based upon its fundamental interest in ensuring the conditions of …
Toward A Constitutional Regulation Of Minors' Access To Harmful Internet Speech, Dawn C. Nunziato
Toward A Constitutional Regulation Of Minors' Access To Harmful Internet Speech, Dawn C. Nunziato
Chicago-Kent Law Review
In this Article, Prof. Nunziato scrutinizes Congress's recent efforts to regulate access to sexually-themed Internet speech. The first such effort, embodied in the Communications Decency Act, failed to take into account the Supreme Court's carefully-honed obscenity and obscenity-for-minors jurisprudence. The second, embodied in the Child Online Protection Act, attended carefully to Supreme Court precedent, but failed to account for the geographic variability in definitions of obscene speech. Finally, the recently-enacted Children's Internet Protection Act apparently remedies the constitutional deficiencies identified in these two prior legislative efforts, but runs the risk of being implemented in a manner that fails to protect …
Shielding Children: The European Way, Michael D. Birnhack, Jacob H. Rowbottom
Shielding Children: The European Way, Michael D. Birnhack, Jacob H. Rowbottom
Chicago-Kent Law Review
The Internet crosses physical borders, and carries with it both its promises and its harms to many different countries and societies. These countries thus share the same technology, but they do not necessarily share the same set of values or legal system. This Article compares the legal response in the United States and in Europe to one important issue: the exposure of children to certain materials, which are deemed harmful to them but not harmful to adults.
This US-European comparison, in which the experience in the United Kingdom serves as a leading example, illustrates the traits of various kinds of …
On Protecting Children—From Censorship: A Reply To Amitai Etzioni, Marjorie Heins
On Protecting Children—From Censorship: A Reply To Amitai Etzioni, Marjorie Heins
Chicago-Kent Law Review
Etzioni's argument for censorship of minors ignores the fundamental problem with Internet filters, misstates the results of media-effects research, and uses emotional terms like "protection" and "harm" to mask moral judgments about what is appropriate for youth.
Given the size and constantly changing character of the Internet, filters necessarily rely on key words and phrases. As a result, thousands of valuable Web pages are mistakenly blocked by filters, even at their narrowest settings. The problem is inherent in the system.
Most media-effects studies do not show a causal link between violent content and violent (or "aggressive") behavior. The studies that …
The Need For A Two (Or More) Tiered First Amendment To Provide For The Protection Of Children, Kevin W. Saunders
The Need For A Two (Or More) Tiered First Amendment To Provide For The Protection Of Children, Kevin W. Saunders
Chicago-Kent Law Review
This Article addresses the two sorts of problems raised by Professor Etzioni, while also responding to the earlier articles in this Symposium. With regard to the spillover effect, the author argues that there are ways to limit the effect on adults of restrictions designed to protect children, even on the Internet. Furthermore, some spillover effect is allowed and may leave open the possibility of protecting children from tobacco or alcohol advertisements. The Article also addresses areas in which material has been seen as protected even for children. While agreeing that depictions of violence pose an important problem, the Article also …
Response, Amitai Etzioni
Towards A Hybrid Regulatory Scheme For The Internet, Henry H. Perritt Jr.
Towards A Hybrid Regulatory Scheme For The Internet, Henry H. Perritt Jr.
All Faculty Scholarship
No abstract provided.