Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (5)
- First Amendment (4)
- Privacy Law (4)
- Communications Law (2)
- Administrative Law (1)
-
- Antitrust and Trade Regulation (1)
- Business Organizations Law (1)
- Communication (1)
- Computer Law (1)
- Consumer Protection Law (1)
- Criminal Law (1)
- Criminal Procedure (1)
- Dispute Resolution and Arbitration (1)
- Family Law (1)
- Juvenile Law (1)
- Law and Economics (1)
- Legal Education (1)
- Legal Writing and Research (1)
- Public Law and Legal Theory (1)
- Science and Technology Law (1)
- Social Media (1)
- Social and Behavioral Sciences (1)
- Institution
Articles 1 - 18 of 18
Full-Text Articles in Law
Comment On Part 4 Essays: Goodwin And Dailey And Rosenbury, Elizabeth S. Scott
Comment On Part 4 Essays: Goodwin And Dailey And Rosenbury, Elizabeth S. Scott
Faculty Scholarship
Professors Michelle Goodwin and Anne Dailey and President Laura Rosenbury have written two compelling essays on Part 4 of the Restatement of Children and the Law, dealing with Children in Society. Goodwin’s essay, She’s So Exceptional: Rape and Incest Exceptions Post-Dobbs, focuses on § 19.02 of the Restatement, dealing with the right of minors to reproductive health treatments. This Section was approved by the American Law Institute before the Supreme Court decided Dobbs v. Jackson Women’s Health Organization, overturning Roe v. Wade. In her essay, Goodwin explores the harms that will follow if minors’ right of access …
Platform Realism, Informational Inequality, And Section 230 Reform, Olivier Sylvain
Platform Realism, Informational Inequality, And Section 230 Reform, Olivier Sylvain
Faculty Scholarship
Online companies bear few duties under law to tend to the discrimination that they facilitate or the disinformation that they deliver. Consumers and members of historically marginalized groups are accordingly the likeliest to be harmed. These companies should bear the same, if not more, responsibility to guard against such inequalities.
“Cancel Culture” And Criminal Justice, Steven Arrigg Koh
“Cancel Culture” And Criminal Justice, Steven Arrigg Koh
Faculty Scholarship
This Article explores the relationship between two normative systems in modern society: “cancel culture” and criminal justice. It argues that cancel culture—a ubiquitous phenomenon in contemporary life—may rectify deficiencies of over- and under-enforcement in the U.S. criminal justice system. However, the downsides of cancel culture’s structure—imprecise factfinding, potentially disproportionate sanctions leading to collateral consequences, a “thin” conception of the wrongdoer as beyond rehabilitation, and a broader cultural anxiety that “chills” certain human conduct—reflect problematic U.S. punitive impulses that characterize our era of mass incarceration. This Article thus argues that social media reform proposals obscure a deeper necessity: transcendence of blame …
Federal Rules Of Platform Procedure, Rory Van Loo
Federal Rules Of Platform Procedure, Rory Van Loo
Faculty Scholarship
Tech platforms serve as private courthouses for disputes about speech, lodging, commerce, elections, and reputation. After receiving allegations of defamatory content in top search results, Google must decide between protecting one person's public image and another's profits or speech. Amazon adjudicates disputes between consumers and third-party merchants about defective or counterfeit items. For many small businesses, layoffs and bankruptcy hang in the balance. This Article begins to uncover the processes that these platforms use to resolve disputes and proposes reforms. Other important businesses that intermediate, such as credit card companies ruling on a disputed charge between a merchant and consumer, …
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Deep Fakes: A Looming Challenge For Privacy, Democracy, And National Security, Danielle K. Citron, Robert Chesney
Faculty Scholarship
Harmful lies are nothing new. But the ability to distort reality has taken an exponential leap forward with “deep fake” technology. This capability makes it possible to create audio and video of real people saying and doing things they never said or did. Machine learning techniques are escalating the technology’s sophistication, making deep fakes ever more realistic and increasingly resistant to detection. Deep-fake technology has characteristics that enable rapid and widespread diffusion, putting it into the hands of both sophisticated and unsophisticated actors. While deep-fake technology will bring with it certain benefits, it also will introduce many harms. The marketplace …
Maps: Scaling Privacy Compliance Analysis To A Million Apps, Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel R. Reidenberg, N. Cameron Russell, Norman Sadeh
Maps: Scaling Privacy Compliance Analysis To A Million Apps, Sebastian Zimmeck, Peter Story, Daniel Smullen, Abhilasha Ravichander, Ziqi Wang, Joel R. Reidenberg, N. Cameron Russell, Norman Sadeh
Faculty Scholarship
The app economy is largely reliant on data collection as its primary revenue model. To comply with legal requirements, app developers are often obligated to notify users of their privacy practices in privacy policies. However, prior research has suggested that many developers are not accurately disclosing their apps’ privacy practices. Evaluating discrepancies between apps’ code and privacy policies enables the identification of potential compliance issues. In this study, we introduce the Mobile App Privacy System (MAPS) for conducting an extensive privacy census of Android apps. We designed a pipeline for retrieving and analyzing large app populations based on code analysis …
Apis And Your Privacy, N. Cameron Russell
Apis And Your Privacy, N. Cameron Russell
Faculty Scholarship
Application programming interfaces, or APIs, have been the topic of much recent discussion. Newsworthy events, including those involving Facebook’s API and Cambridge Analytica obtaining information about millions of Facebook users, have highlighted the technical capabilities of APIs for prominent websites and mobile applications. At the same time, media coverage of ways that APIs have been misused has sparked concern for potential privacy invasions and other issues of public policy. This paper seeks to educate consumers on how APIs work and how they are used within popular websites and mobile apps to gather, share, and utilize data.
APIs are used in …
A Skeptical View Of Information Fiduciaries, Lina M. Khan, David E. Pozen
A Skeptical View Of Information Fiduciaries, Lina M. Khan, David E. Pozen
Faculty Scholarship
The concept of “information fiduciaries” has surged to the forefront of debates on online-platform regulation. Developed by Professor Jack Balkin, the concept is meant to rebalance the relationship between ordinary individuals and the digital companies that accumulate, analyze, and sell their personal data for profit. Just as the law imposes special duties of care, confidentiality, and loyalty on doctors, lawyers, and accountants vis-à-vis their patients and clients, Balkin argues, so too should it impose special duties on corporations such as Facebook, Google, and Twitter vis-à-vis their end users. Over the past several years, this argument has garnered remarkably broad support …
Blind Spot: The Attention Economy And The Law, Tim Wu
Blind Spot: The Attention Economy And The Law, Tim Wu
Faculty Scholarship
Human attention, valuable and limited in supply, is a resource. It has become commonplace, especially in the media and technology industries, to speak of an "attention economy" and of competition in "attention markets.” There is even an attentional currency, the "basic attention token," which purports to serve as a medium of exchange for user attention. Firms like Facebook and Google, which have emerged as two of the most important firms in the global economy, depend nearly exclusively on attention markets as a business model.
Yet despite the well-recognized commercial importance of attention markets, antitrust and consumer protection authorities have struggled …
Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle K. Citron
Extremist Speech, Compelled Conformity, And Censorship Creep, Danielle K. Citron
Faculty Scholarship
Silicon Valley has long been viewed as a full-throated champion of First Amendment values. The dominant online platforms, however, have recently adopted speech policies and processes that depart from the U.S. model. In an agreement with the European Commission, tech companies have pledged to respond to reports of hate speech within twenty-four hours, a hasty process that may trade valuable expression for speedy results. Plans have been announced for an industry database that will allow the same companies to share hashed images of banned extremist content for review and removal elsewhere.
These changes are less the result of voluntary market …
Digital Hollywood 2.0: Reimagining Film, Music, Television And Publishing Distribution As A Global Artist Collaborative, Jon M. Garon
Digital Hollywood 2.0: Reimagining Film, Music, Television And Publishing Distribution As A Global Artist Collaborative, Jon M. Garon
Faculty Scholarship
Jon M. Garon, Digital Hollywood 2.0: Reimagining Film, Music, Television and Publishing Distribution as a Global Artist Collaborative, 21 Mich. St. Int'l L. Rev. 563 (2013).
The seven largest U.S. motion picture distributors control as much as ninety percent of the U.S. domestic box office and the majority of the global theatrical box office revenues. This economic dominance in gross revenue, however, undervalues the success of financially and artistically successful works budgeted for smaller audiences. Similar economics also drive music and publishing economies. Measured solely from gross revenue, the Hollywood model of distribution dominates most markets around the world. …
Social Data, Woodrow Hartzog
Social Data, Woodrow Hartzog
Faculty Scholarship
As online social media grow, it is increasingly important to distinguish between the different threats to privacy that arise from the conversion of our social interactions into data. One well-recognized threat is from the robust concentrations of electronic information aggregated into colossal databases. Yet much of this same information is also consumed socially and dispersed through a user interface to hundreds, if not thousands, of peer users.
In order to distinguish relationally shared information from the threat of the electronic database, this essay identifies the massive amounts of personal information shared via the user interface of social technologies as “social …
Obscurity By Design, Woodrow Hartzog, Frederic D. Stutzman
Obscurity By Design, Woodrow Hartzog, Frederic D. Stutzman
Faculty Scholarship
Design-based solutions to confront technological privacy threats are becoming popular with regulators. However, these promising solutions have left the full potential of design untapped. With respect to online communication technologies, design-based solutions for privacy remain incomplete because they have yet to successfully address the trickiest aspect of the Internet — social interaction. This Article posits that privacy-protection strategies such as “Privacy by Design” face unique challenges with regard to social software and social technology due to their interactional nature.
This Article proposes that design-based solutions for social technologies benefit from increased attention to user interaction, with a focus on the …
Free Speech Versus Free Education: First Amendment Considerations In Limiting Student Athletes' Use Of Social Media, Mary Margaret Penrose
Free Speech Versus Free Education: First Amendment Considerations In Limiting Student Athletes' Use Of Social Media, Mary Margaret Penrose
Faculty Scholarship
This article considers the First Amendment implications regarding limitations placed on student athletes' use of social media. Schools have a vested interest in controlling their athletes' public expressions, whether such expressions are found in tattoos, public interviews or tweets. Like it or not, a great deal of damage can occur in "140 words or less." And, displeased student-athletes have choices. Twitter or touchdowns. Facebook from your dorm or facetime on television hitting three-pointers. While universities are generally places that encourage robust speech and debate, there are defensible, and arguably lawful, reasons why schools should limit student-athletes' use of social media. …
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron
Faculty Scholarship
The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers.
To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Faculty Scholarship
The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …
Government Speech 2.0, Danielle K. Citron, Helen Norton
Government Speech 2.0, Danielle K. Citron, Helen Norton
Faculty Scholarship
New expressive technologies continue to transform the ways in which members of the public speak to one another. Not surprisingly, emerging technologies have changed the ways in which government speaks as well. Despite substantial shifts in how the government and other parties actually communicate, however, the Supreme Court to date has developed its government speech doctrine – which recognizes “government speech” as a defense to First Amendment challenges by plaintiffs who claim that the government has impermissibly excluded their expression based on viewpoint – only in the context of disputes involving fairly traditional forms of expression. In none of these …
About Facebook - Change At The Social-Networking Juggernaut Creates New Opportunities For Law Library Outreach, Jennifer L. Behrens
About Facebook - Change At The Social-Networking Juggernaut Creates New Opportunities For Law Library Outreach, Jennifer L. Behrens
Faculty Scholarship
No abstract provided.