Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication Year
- Publication
-
- Ann Bartow (5)
- Juliet M. Moringiello (4)
- Juliet M Moringiello (3)
- Susan Freiwald (3)
- William L. Reynolds (3)
-
- Warren Bartholomew Chik (2)
- Catherine J. Lanctot (1)
- Gary C. Kessler (1)
- Germán M. Teruel Lozano (1)
- Lyrissa Barnett Lidsky (1)
- Professor Andrew D Murray (1)
- Rodolfo C. Rivas (1)
- Shlomit Yanisky-Ravid Professor of Law (1)
- Stephen Ware (1)
- Thomas E. Baker (1)
- Tom W. Bell (1)
- Tony Guo (1)
- Warren Bartholomew CHIK (1)
- File Type
Articles 1 - 30 of 32
Full-Text Articles in Law
Public Forum 2.0, Lyrissa Barnett Lidsky
Public Forum 2.0, Lyrissa Barnett Lidsky
Lyrissa Barnett Lidsky
Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of Digital Crime and Forensic Science in Cyberspace, by P. Kanellis, E. Kiountouzis, N. Kolokotronis, and D. Martakos. Idea Group Publishing, 2006. ISBN: 1-59140-873-3.
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Thomas E. Baker
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Shlomit Yanisky-Ravid Professor of Law
Increasingly, there has been a focus on creating democratic standards and procedures in order to best facilitate open exchange of information and communication online—a goal that fits neatly within the feminist aim to democratize content creation and community. Collaborative websites, such as blogs, social networks, and, as focused on in this Article, Wikipedia, represent both a Cyberspace community entirely outside the strictures of the traditional (intellectual) proprietary paradigm and one that professes to truly embody the philosophy of a completely open, free, and democratic resource for all. In theory, collaborative websites are the solution that social activists, Intellectual Property opponents …
Becoming A Competent 21st Century Legal Ethics Professor: Everything You Always Wanted To Know About Technology (But Were Afraid To Ask), Catherine Lanctot
Becoming A Competent 21st Century Legal Ethics Professor: Everything You Always Wanted To Know About Technology (But Were Afraid To Ask), Catherine Lanctot
Catherine J. Lanctot
This Article provides a roadmap for rebooting the legal ethics curriculum. It describes how to revise a traditional legal ethics class to respond to twenty-first century law practice, and provides a detailed overview of the landscape of technological issues currently affecting the practice of law, including many cautionary tales of lawyers who ignored their ethical responsibilities.
We have finally hit the tipping point with respect to the use of technology within the legal profession, as bar regulators have begun to warn attorneys that they may no longer plead ignorance of technological advances if such ignorance harms the interests of their …
Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati
Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati
Rodolfo C. Rivas
The authors provide a brief rundown of strategies to protect a wide range of IP rights in cyberspace. The strategies tackle practical advice and suggest a series of progressive actions in order to ensure maximum protection with an efficient use of resources.//////////////////////////////// Los autores proporcionan un breve resumen de las estrategias para proteger una amplia gama de derechos de propiedad intelectual en el ciberespacio. Las estrategias abordan consejos prácticos y sugieren una serie de acciones en orden progresivo con la finalidad de garantizar la máxima protección manteniendo un uso eficiente de los recursos.
Notice, Assent, And Form In A 140 Character World, Juliet Moringiello
Notice, Assent, And Form In A 140 Character World, Juliet Moringiello
Juliet M Moringiello
This essay is a contribution to a symposium on Professor Nancy Kim’s terrific book, Wrap Contracts: Foundations and Ramifications. In the book, Prof. Kim examines this explosion in volume of online contract terms and offers some suggestions for improving the judicial approach to these terms. Despite the ease of presenting online terms in a visually appealing format, today’s electronically presented terms are even less comprehensible than those of fifteen years ago. At the same time that individuals have become accustomed to receiving information in small doses due to the proliferation of social media platforms such as Twitter, Instagram, Facebook and …
Shaping Preventive Policy In “Cyber War” And Cyber Security: A Pragmatic Approach, Tony Guo
Shaping Preventive Policy In “Cyber War” And Cyber Security: A Pragmatic Approach, Tony Guo
Tony Guo
As the Egyptian government took the country offline—in an effort to squelch public dissent—the U.S. Senate considers a bill that would give the President the same emergency powers to shut off “critical” Internet infrastructure in the event of a “cyber emergency.” This bill, along with others like it, has been introduced in light of recent political rhetoric on “cyber war.” The proponents of “cyber war” evoke images of large explosions, poison gas clouds, and a high degree of mortality. In reality, cyber warfare is a misleading metaphor, and has long been confused with crime and espionage. "Cyber war" is not …
Uses And Abuses Of Cyberspace, Andrew D. Murray
Uses And Abuses Of Cyberspace, Andrew D. Murray
Professor Andrew D Murray
No abstract provided.
Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik
Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik
Warren Bartholomew Chik
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …
Harassment Through Digital Media: A Cross-Jurisdictional Comparative Analysis On The Law On Cyberstalking, Warren B. Chik
Harassment Through Digital Media: A Cross-Jurisdictional Comparative Analysis On The Law On Cyberstalking, Warren B. Chik
Warren Bartholomew Chik
The cyber world is an extension of the real world. It is another dimension where we can work, study and play. But people also tend to lose their inhibitions on the Internet, often while keeping their anonymity. Because of the perceived and real freedoms in the digital environment, people are emboldened to act in ways that they may not normally do in the real world. One recent phenomenon that is steadily becoming a problem in every country with a high level of electronic connectivity is the act of cyberstalking. The electronic medium is an important factor due to its very …
'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik
'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik
Warren Bartholomew CHIK
The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …
La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano
La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano
Germán M. Teruel Lozano
Master's thesis about freedom of speech in Internet and the constitutional guarantees in the control of websides content.
Survey Of The Law Of Cyberspace: Introduction, Juliet Moringiello
Survey Of The Law Of Cyberspace: Introduction, Juliet Moringiello
Juliet M Moringiello
No abstract provided.
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet Moringiello, William Reynolds
William L. Reynolds
In this annual survey, we discuss the electronic contracting cases decided between July 1, 2006 and June 30, 2007. In the article, we discuss issues involving contract formation, procedural unconscionability, the scope of UETA and E-SIGN, and contracts formed by automated agents. We conclude that whatever doctrinal doubt judges and scholars may once have had about applying standard contract law to electronic transactions, those doubts have now been largely resolved, and that the decisions involving electronic contracts are following the general law of contracts pretty closely.
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds
William L. Reynolds
This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds
William L. Reynolds
In this survey, we review electronic contracting cases decided between June 15, 2008 and June 15, 2009. During that period we found that there was not much action on the formation by click-wrap and browse-wrap front. We have previously observed that the law of electronic contracts has matured, and the fact that there have not been any decisions on whether click-wrap and browse-wrap are effective ways of forming contracts reflects that observation. This year brought us three modification cases, two cases in which a party alleged that it was not bound to the offered terms because an unauthorized party agreed …
Pornography, Coercion, And Copyright Law 2.0, Ann Bartow
Pornography, Coercion, And Copyright Law 2.0, Ann Bartow
Ann Bartow
The lack of regulation of the production of pornography in the United States leaves pornography performers exposed to substantial risks. Producers of pornography typically respond to attempts to regulate pornography as infringements upon free speech. At the same time, large corporations involved in the production and sale of pornography rely on copyright law's complex regulatory framework to protect their pornographic content from copying and unauthorized distribution. Web 2.0 also facilitates the production and distribution of pornography by individuals. These user-generators produce their own pornography, often looking to monetize their productions themselves via advertising revenues and subscription models. Much like their …
Electronic Surveillance At The Virtual Border, Susan Freiwald
Electronic Surveillance At The Virtual Border, Susan Freiwald
Susan Freiwald
A virtual border divides people into two groups: those subject to the Fourth Amendment’s protections when the U.S. government conducts surveillance of their communications and those who are not. The distinction derives from a separation in powers: inside the virtual border, U.S. citizens and others enjoy the extensive oversight of the judiciary of executive branch surveillance. Judges review such surveillance before, during, and after it transpires. Foreign persons subject to surveillance in foreign countries fall within the executive branch’s’ foreign affairs function. However, the virtual border does not exactly match the physical border of the United States. Some people inside …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds
Juliet M. Moringiello
Review Of Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow
Ann Bartow
In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2006-2007, Juliet M. Moringiello, William L. Reynolds
Juliet M. Moringiello
Contracts, Payments And What To Do With All That Data: Introduction To The 2006 Cyberspace Survey, Juliet Moringiello
Contracts, Payments And What To Do With All That Data: Introduction To The 2006 Cyberspace Survey, Juliet Moringiello
Juliet M Moringiello
No abstract provided.
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Ii
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Ii
Juliet M. Moringiello
Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow
Women In The Web Of Secondary Copyright Liability And Internet Filtering, Ann Bartow
Ann Bartow
This Essay suggests possible explanations for why there is not very much legal scholarship devoted to gender issues on the Internet; and it asserts that there is a powerful need for Internet legal theorists and activists to pay substantially more attention to the gender-based differences in communicative style and substance that have been imported from real space to cyberspace. Information portals, such as libraries and web logs, are "gendered" in ways that may not be facially apparent. Women are creating and experiencing social solidarity online in ways that male scholars and commentators do not seem to either recognize or deem …
Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello
Survey Of The Law Of Cyberspace: Internet Contracting Cases 2004-2005, William L. Reynolds, Juliet M. Moringiello
Juliet M. Moringiello
Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald
Online Surveillance: Remembering The Lessons Of The Wiretap Act, Susan Freiwald
Susan Freiwald
This Article explores those features of electronic surveillance that have made it challenging to regulate effectively. In balancing interests, lawmakers must create a workable law for an exceedingly complex topic, rein in law enforcement agents without crippling them, and draw a line between prohibited and permitted conduct despite society's ambivalence about surveillance. This Article demonstrates that lawmakers met those challenges when they regulated traditional wiretapping, but they have failed to meet them in the online context. It argues that the law should extend the significant restrictions on wiretapping to online surveillance, just as judges did in the case of video …
Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald
Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald
Susan Freiwald
Almost every day brings reports that Congress is considering new cyberspace-targeted laws and the courts are deciding novel cyberspace legal questions. These developments lend urgency to the question of whether a particular cyberspace legal change should come through operation of new statutes, judicial decisions, or the free market. If we can develop sophisticated analytical methods to evaluate institutional competence in cyberspace, we can vastly improve the development of cyberspace law and public policy.
Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation promotes just such an approach. By describing and extending a recently proposed model of comparative …
Our Data, Ourselves: Privacy, Propertization, And Gender , Ann Bartow
Our Data, Ourselves: Privacy, Propertization, And Gender , Ann Bartow
Ann Bartow
This Article starts by providing an overview of the types of personal data that is collected via the Internet, and the ways in which this information is used. The author asserts that because women are more likely to shop and share information in cyberspace, the impact of commodification of personal data disproportionately impacts females, enabling them to be "targeted" by marketing campaigns, and stripping them of personal privacy. The author then surveys the legal terrain of personal information privacy, and concludes that it is unlikely that the government will step in to provide consumers with substantive privacy rights or protections. …
Our Data, Ourselves: Privacy, Propertization, And Gender, Ann Bartow
Our Data, Ourselves: Privacy, Propertization, And Gender, Ann Bartow
Ann Bartow
This Article starts by providing an overview of the types of personal data that is collected via the Internet, and the ways in which this information is used. The author asserts that because women are more likely to shop and share information in cyberspace, the impact of commodification of personal data disproportionately impacts females, enabling them to be "targeted" by marketing campaigns, and stripping them of personal privacy. The author then surveys the legal terrain of personal information privacy, and concludes that it is unlikely that the government will step in to provide consumers with substantive privacy rights or protections. …