Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
-
- Seattle University Law Review (6)
- Federal Communications Law Journal (4)
- Fordham Intellectual Property, Media and Entertainment Law Journal (3)
- Georgia State University Law Review (3)
- Northern Illinois University Law Review (3)
-
- Cornell Journal of Law and Public Policy (2)
- Villanova Environmental Law Journal (2)
- American University Law Review (1)
- Cleveland State Law Review (1)
- Duke Law Journal (1)
- Fordham Law Review (1)
- Indiana Law Journal (1)
- Michigan Telecommunications & Technology Law Review (1)
- Richmond Journal of Law & Technology (1)
- Touro Law Review (1)
- Villanova Law Review (1)
Articles 31 - 32 of 32
Full-Text Articles in Law
Cyberspace Must Exceed Its Grasp, Or What's A Metaphor? Tropes, Trips And Stumbles On The Info Highway, Robert C. Cumbow
Cyberspace Must Exceed Its Grasp, Or What's A Metaphor? Tropes, Trips And Stumbles On The Info Highway, Robert C. Cumbow
Seattle University Law Review
This Essay will focus on three metaphors, and show briefly how the arguments that copyright law is “unworkable” in the Internet context are based on a misreading of these metaphors. The first metaphor is the use of the term “cyberspace” to apply to the Internet; the second is the tendency to describe Internet communication as “going” somewhere. Both of these metaphors mistakenly suggest a space in which enforcement—and, indeed, violation—of any law is impossible. The third metaphor is the “wine and bottles” analogy, set forth by John Perry Barlow in his widely circulated article, “The Economy of Ideas," to show …
Diogenes Wanders The Superhighway: A Proposal For Authentication Of Publicly Disseminated Documents On The Internet, Kelly Kunsch
Diogenes Wanders The Superhighway: A Proposal For Authentication Of Publicly Disseminated Documents On The Internet, Kelly Kunsch
Seattle University Law Review
On the national level, there are proposals to make the Internet the primary, and even the exclusive, means of disseminating certain government information. Concurrently, corporations and other private organizations may adopt a similar approach for their reports and other documents. Intertwined with these official and quasi-official documents are innumerable others created by individuals around the world. With so many documents, there is potential for dissemination of false, biased, and even fraudulent information. This is the source of the authentication problem.