Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2010

Internet

Articles 1 - 30 of 31

Full-Text Articles in Law

Digital Discrimination, Danielle Citron Nov 2010

Digital Discrimination, Danielle Citron

Danielle Keats Citron

Social network sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women and minorities. The attacks include rape threats, privacy invasions, defamation, and technological attacks that silence victims. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Although social and legal norms have dampened offline discrimination, the internet’s Wild West culture and architecture invites bigots to move their hatred to cyberspace. The Internet facilitates anonymity, loosening social norms that constrain noxious behavior. It brings people together …


The Corporatization Of Communication, Eric Chiappinelli, Adam Candeub, Jeffrey Chester, Lawrence Soley Oct 2010

The Corporatization Of Communication, Eric Chiappinelli, Adam Candeub, Jeffrey Chester, Lawrence Soley

Lawrence Soley

Our next panel discusses the corporatization of communication.


Ending The Power To Say No: The Case For Extending Compulsory Licensing To Cover Digital Music Reproduction And Distribution Rights, Patrick A. Mckay Sep 2010

Ending The Power To Say No: The Case For Extending Compulsory Licensing To Cover Digital Music Reproduction And Distribution Rights, Patrick A. Mckay

Patrick A McKay

This paper argues that the recording industry has abused its power to deny uses of copyrighted music and has failed to satisfy the constitutional purpose of copyright of providing for the public benefit. As a result, this power should be removed and replaced with a compulsory license system similar to the Section 115 Reform Act of 2006 (SIRA), which would create a blanket collective license covering digital reproduction and distribution rights for musical works. Additionally, in order to remove the cloud of uncertainty which surrounds music used in user-generated videos, Congress should consider extending the compulsory license regime to cover …


La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano Aug 2010

La Libertad De Expresión En Internet Y Sus Garantías Constitucionales En El Control De Contenidos De Páginas Web, Germán M. Teruel Lozano

Germán M. Teruel Lozano

Master's thesis about freedom of speech in Internet and the constitutional guarantees in the control of websides content.


Jury 2.0, Caren Myers Morrison Aug 2010

Jury 2.0, Caren Myers Morrison

Caren Myers Morrison

When the Framers drafted the Sixth Amendment and provided that the accused in a criminal case would have the right to a speedy and public trial by an “impartial jury,” it is unlikely that they imagined the members of that impartial jury becoming Facebook friends during deliberations, or Googling the defendant’s name during trial. But in the past few years, such cases have increasingly been making headlines. The impact of the Internet on the functioning of the jury has generated a lot of press, but has not yet attracted scholarly attention. This article is the first to focus legal discourse …


Jury 2.0, Caren Myers Morrison Aug 2010

Jury 2.0, Caren Myers Morrison

Caren Myers Morrison

When the Framers drafted the Sixth Amendment and provided that the accused in a criminal case would have the right to a speedy and public trial by an “impartial jury,” it is unlikely that they imagined the members of that impartial jury becoming Facebook friends during deliberations, or Googling a defendant’s name during trial. But in the past few years, such cases have increasingly been making headlines. The impact of the Internet on the functioning of the jury has generated a lot of press, but has not yet attracted scholarly attention. This article is the first to focus legal discourse …


Jurors In The Digital Age, Thaddeus Hoffmeister Aug 2010

Jurors In The Digital Age, Thaddeus Hoffmeister

Thaddeus Hoffmeister

ABSTRACT: Improper use of new technology by jurors inside and outside the courtroom has become so pervasive that commentators have coined new phrases to describe it: “Google Mistrials,” the “Twitter Effect,” and “Internet-Tainted Jurors.” Yet, despite the attention garnered, few legal scholars, to date, have examined this area in-depth. The articles addressing this topic primarily focus on the benefits of technology and how to harness it to aid in juror comprehension. This dearth of legal scholarship may be due in large part to the fact that the Digital Age is fairly new and still evolving and juror misconduct is historically …


The Law And Policy Of Online Privacy: Regulation, Self-Regulation Or Co-Regulation?, Dennis D. Hirsch Aug 2010

The Law And Policy Of Online Privacy: Regulation, Self-Regulation Or Co-Regulation?, Dennis D. Hirsch

Dennis D Hirsch

The Internet poses grave new threats to information privacy. Search engines collect and store our search queries; Web sites track our online activity and then sell this information to others; and Internet Search Providers read the very packets of information through which we interact with the Internet. Yet the debate over how best to address this problem has ground to a halt, stuck between those who call for a vigorous legislative response and those who advocate for market solutions and self-regulation. In 1995, the European Union member states began to build a third approach into their data protection laws, one …


Combating Cyber-Victimization, Jacqueline Lipton Aug 2010

Combating Cyber-Victimization, Jacqueline Lipton

Jacqueline D Lipton

In today’s interconnected society, high profile examples of online victimization abound. Cyber-bullies, stalkers and harassers launch attacks on the less powerful, causing a variety of harms. Recent scholarship has identified some of the more salient damage, including reputational harms, severe emotional distress, loss of employment, and physical assault. Extreme cases of online abuse have resulted in death through suicide or as a result of targeted attacks. This article makes two major contributions to the cyber-victimization literature. It proposes specific reforms to criminal and tort laws to address this conduct more effectively. Further, it situates those reforms within a new multi-modal …


Decentralizing Culture: The Effect Of Digital Networks On Copyright And Music Distribution, Benjamin Gibert Aug 2010

Decentralizing Culture: The Effect Of Digital Networks On Copyright And Music Distribution, Benjamin Gibert

Benjamin Gibert

The advance of technology profoundly impacts how people interact with culture as the proliferation of digital networks transforms the effects of copyright in modern societies. This paper argues that the oligopolistic conditions of content markets and the legal discourse of intellectual property law have historically enabled copyright holders to promote a limited conception of art and obscure the complexities of copyright theory. While conceptual ambiguity is inevitable in the construction of aesthetic legal categories, current practices impose too many restrictions. The practical choices made concerning copyright in cyberspace will determine the evolution of culture in increasingly networked societies. The music …


Barricading The Digital Frontier: Copyright, Technology And The War On Music Piracy, Benjamin Gibert Aug 2010

Barricading The Digital Frontier: Copyright, Technology And The War On Music Piracy, Benjamin Gibert

Benjamin Gibert

The Internet is changing the way vast numbers of people experience culture today. Providing tools to interact with, manipulate and freely redistribute content, technology is dissolving conventional divisions between creators and consumers of cultural artefacts. As new technological and legislative mechanisms are deployed to stop digital piracy, there is a need to reflect on the meaning of copyright, piracy and culture in the context of digital technologies. This paper discusses the relationship between copyright and cultural participation. It refers to the music industry in order to depict the changing patterns of consumption behavior precipitated by the rise of digital networks …


Facebook, Paulo Ferreira Da Cunha Jun 2010

Facebook, Paulo Ferreira Da Cunha

Paulo Ferreira da Cunha

Fascínios, possibilidades e perigos do Facebook e de tecnologias afins e seu uso. Sobretudo, a pseudo-democracia electrónica, tentação dos demagogos.


Net Neutrality Regulation: The Economic Evidence, Vernon Smith, Jerry Brito, Martin Cave, Robert Crandall, Larry Darby, Jeffrey Eisenbach, Jerry Ellig, Henry Ergas, David Farber, Gerald Faulhaber, Robert Hahn, Alfred Kahn, Wayne Leighton, Robert Litan, Glen Robinson, Hal Singer, William Taylor, Timothy Tardiff, Leonard Waverman, Dennis Weisman Apr 2010

Net Neutrality Regulation: The Economic Evidence, Vernon Smith, Jerry Brito, Martin Cave, Robert Crandall, Larry Darby, Jeffrey Eisenbach, Jerry Ellig, Henry Ergas, David Farber, Gerald Faulhaber, Robert Hahn, Alfred Kahn, Wayne Leighton, Robert Litan, Glen Robinson, Hal Singer, William Taylor, Timothy Tardiff, Leonard Waverman, Dennis Weisman

Vernon L. Smith

In the authors' shared opinion, the economic evidence does not support the regulations proposed in the Commission’s Notice of Proposed Rulemaking Regarding Preserving the Open Internet and Broadband Industry Practices (the “NPRM”). To the contrary, the economic evidence provides no support for the existence of market failure sufficient to warrant ex ante regulation of the type proposed by the Commission, and strongly suggests that the regulations, if adopted, would reduce consumer welfare in both the short and long run. To the extent the types of conduct addressed in the NPRM may, in isolated circumstances, have the potential to harm competition …


Fighting Homogenization: The Global Infiltration Of Technology And The Struggle To Preserve Cultural Distinctiveness., Saptarishi Bandopadhyay Apr 2010

Fighting Homogenization: The Global Infiltration Of Technology And The Struggle To Preserve Cultural Distinctiveness., Saptarishi Bandopadhyay

Saptarishi Bandopadhyay

While technology and globalization continue to pervade every aspect of the world, the scope for the sustenance of national or regional culture is rapidly disappearing. This paper will seek to use the lessons and experiences obtained through the controversies in the use of Direct Broadcasting Satellites in its more initial years and apply the same to the Internet to assess its effect on the culture of developing States. The eventual thesis proposed here argues that the freedom of information upheld through technology, and the human right to culture need not be seen as perpendicular interests, but that the latter may …


Cyberspace Is Outside The Schoolhouse Gate: Offensive Online Student Speech Receives First Amendment Protection, Joseph Tomain Mar 2010

Cyberspace Is Outside The Schoolhouse Gate: Offensive Online Student Speech Receives First Amendment Protection, Joseph Tomain

Joseph A Tomain

Doctrinal and normative analysis show that schools do not possess jurisdiction over offensive online student speech, at least when it does not cause a substantial disruption of the school environment. This article is a timely analysis on the limits of school jurisdiction over offensive online student speech.

On February 4, 2010, two different Third Circuit panels issued opinions reaching opposite conclusions on whether schools may punish students based on online speech created by students when they are off-campus; one of these cases may be heard en banc. Another case addressing this same issue is currently pending before the Second Circuit. …


Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton Feb 2010

Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton

Jacqueline D Lipton

In January of 2010 a United States District Court granted an injunction against a Twilight fan magazine for unauthorized use of copyrighted publicity stills . No surprise there. Intellectual property laws deal effectively – some would argue too effectively – with such cases. Nevertheless, recent Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright …


The Need For Better Analysis Of High Capacity Services, George S. Ford, Lawrence J. Spiwak Feb 2010

The Need For Better Analysis Of High Capacity Services, George S. Ford, Lawrence J. Spiwak

GEORGE S FORD

In 1999, the Federal Communications Commission (“FCC”) began to grant incumbent local exchange carriers (“LECs”) pricing flexibility on special access services in some Metropolitan Statistical Areas (“MSAs”) when specific evidence of competitive alternatives is present. The propriety of that deregulatory move by the FCC has been criticized by the purchasers of such services ever since. Proponents of special access price regulation rely on three central arguments to support a retreat to strict price regulation: (1) the market(s) for special access and similar services is unduly concentrated; (2) rates of return on special access services, computed using FCC ARMIS data, are …


Voodoo Information: Authenticating Web Pages In Federal Court, M. Anderson Berry, David Kiernan Jan 2010

Voodoo Information: Authenticating Web Pages In Federal Court, M. Anderson Berry, David Kiernan

M. Anderson Berry

For many litigators, one of the first things they do is see what is available about the opposing party, searching Google, social networking sites and the party’s websites. And during the life of the case, there will likely be other valuable information obtained from the Internet that will be used at deposition or trial. Commonly, the proponent of online evidence will present a “screen shot” of the webpage, which was either downloaded as a .pdf or printed directly from the website. If proper steps are not taken to admit the evidence, the value of this information may be lost.

As …


Introduction, Symposium, Internet Expression In The 21st Century: Where Technology & Law Collide, Tonya M. Evans, Michael R. Dimino, Nicole M. Santo Jan 2010

Introduction, Symposium, Internet Expression In The 21st Century: Where Technology & Law Collide, Tonya M. Evans, Michael R. Dimino, Nicole M. Santo

Tonya M. Evans

No abstract provided.


Predicting The Enforceability Of Browse-Wrap Agreements In Ohio, Sam S. Han Jan 2010

Predicting The Enforceability Of Browse-Wrap Agreements In Ohio, Sam S. Han

Sam Han

Internet-based commerce has now reached a level where Internet-based businesses, such as amazon.com or ebay.com, sometimes generate more revenue than their brick-and-mortar counterparts. In view of the growth in Internet-based businesses, the courts have been forced to address unconventional contracting mechanisms, such as shrink-wrap, click-wrap, and browse-wrap agreements. Much of the scholarly writing, as well as court opinions, reach a consensus that browse-wrap agreements will be enforceable if there is: (a) sufficient notice of the agreement terms; and (b) clear manifestation of assent to the terms. However, there is very little guidance on how much notice will constitute "sufficient notice." …


Incentivize Me!—How Incumbent Carriers In The United States Attempt To Extract Greater Deregulation And Incentives In Exchange For Making Next Generation Network Investment, Rob M. Frieden Jan 2010

Incentivize Me!—How Incumbent Carriers In The United States Attempt To Extract Greater Deregulation And Incentives In Exchange For Making Next Generation Network Investment, Rob M. Frieden

Rob Frieden

Incumbent carriers often vilify the regulatory process as a drain on efficiency and an unnecessary burden in light of robust marketplace competition. Some claim that regulation creates disincentives for investing in expensive next generation networks (“NGNs”), particularly if regulations mandate unbundling of services into composite parts, with burdensome interconnection and below market pricing of access by competitors. Both incumbents, prospective market entrants and recent market entrants may seek to tilt the competitive playing field to their advantage typically by securing a regulatory sanction that helps them reduce investment costs, delay having to make an investment, or secure a competitive advantage …


Responsibility Of And Trust In Isps, Raphael Cohen-Almagor Jan 2010

Responsibility Of And Trust In Isps, Raphael Cohen-Almagor

raphael cohen-almagor

This discussion is about the neglected concepts of trust and social responsibility on the Internet. I will discuss and explain the concepts and their implications to people and society. I then address the issue of moral and social responsibilities of ISPs and web-hosting companies. I argue that ISPs and web-hosting companies should aspire to take responsibility for content and that they should respect and abide by their own terms of conduct.


Free Speech Unmoored In Copyright’S Safe Harbor: Chilling Effects Of The Dmca On The First Amendment, Wendy Seltzer Jan 2010

Free Speech Unmoored In Copyright’S Safe Harbor: Chilling Effects Of The Dmca On The First Amendment, Wendy Seltzer

Wendy Seltzer

Each week, more blog posts are redacted, more videos deleted, and more web pages removed from Internet search results based on private claims of copyright infringement. Under the “safe harbors” of the Digital Millennium Copyright Act (DMCA), Internet service providers are encouraged to respond to copyright complaints with content takedowns, assuring their immunity from liability while diminishing the rights of their subscribers and users. Paradoxically, the law’s shield for service providers becomes a sword against the public who depend upon these providers as platforms for speech.

Under the DMCA, process for an accused infringer is limited. The law offers Internet …


Applying Nuisance Law To Internet Obscenity, Michael J. Gray Jan 2010

Applying Nuisance Law To Internet Obscenity, Michael J. Gray

Michael J. Gray

The current use of criminal law to prosecute Internet obscenity is ineffective and at the same time unfair. While prosecution of obscenity over the internet is extremely rare, when a prosecution does occur the punishment is extremely harsh. This paper advocates the use of nuisance law injunctions as a better alternative to responding to Internet obscenity. Nuisance law provides the advantage of allowing for wider enforcement of obscenity law on the Internet, while at the same time reducing the penalty for violating the subjective Miller test for obscenity. This paper also explores recent applications of nuisance law to the Internet …


An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson Jan 2010

An Interpretive Framework For Narrower Immunity Under Section 230 Of The Communications Decency Act, Gregory M. Dickinson

Gregory M Dickinson

Almost all courts to interpret Section 230 of the Communications Decency Act have construed its ambiguously worded immunity provision broadly, shielding Internet intermediaries from tort liability so long as they are not the literal authors of offensive content. Although this broad interpretation effects the basic goals of the statute, it ignores several serious textual difficulties and mistakenly extends protection too far by immunizing even direct participants in tortious conduct.

This analysis, which examines the text and history of Section 230 in light of two strains of pre-Internet vicarious liability defamation doctrine, concludes that the immunity provision of Section 230, though …


Electronic Contracting Cases 2009-2010, Juliet Moringiello, William Reynolds Dec 2009

Electronic Contracting Cases 2009-2010, Juliet Moringiello, William Reynolds

Juliet M Moringiello

This article, our sixth annual survey of electronic contracting cases, discusses the significant electronic contracting cases decided between June 15, 2009 and June 15, 2010. Over the past six years, the law of electronic contracts has matured, and the cases we discuss in this article show this maturation. The survey covers contract formation by the use of shrinkwrap, clickwrap and browsewrap terms, and contract formation by the exchange of e-mail messages.


Electronic Contracting Cases 2009-2010, Juliet M. Moringiello, William L. Reynolds Dec 2009

Electronic Contracting Cases 2009-2010, Juliet M. Moringiello, William L. Reynolds

William L. Reynolds

This article, our sixth annual survey of electronic contracting cases, discusses the significant electronic contracting cases decided between June 15, 2009 and June 15, 2010. Over the past six years, the law of electronic contracts has matured, and the cases we discuss in this article show this maturation. The survey covers contract formation by the use of shrinkwrap, clickwrap and browsewrap terms, and contract formation by the exchange of e-mail messages.


Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm Dec 2009

Dr. Generative Or: How I Learned To Stop Worrying And Love The Iphone, James Grimmelmann, Paul Ohm

James Grimmelmann

In The Future of the Internet--And How to Stop It, Jonathan Zittrain argues that the Internet has succeeded because it is uniquely "generative": individuals can use it in ways its creators never imagined. This Book Review uses the Apple II and the iPhone--the hero and the villain of the story as Zittrain tells it--to show both the strengths and the weaknesses of his argument. Descriptively and normatively, Zittrain has nailed it. Generativity elegantly combines prior theories into a succinct explanation of the technical characteristics that make the Internet what it is, and the book offers a strong argument that preserving …


Symposium, Internet Expression In The 21st Century: Where Technology & Law Collide: Introduction, Michael R. Dimino, Tonya M. Evans-Walls, Nicole M. Santo Dec 2009

Symposium, Internet Expression In The 21st Century: Where Technology & Law Collide: Introduction, Michael R. Dimino, Tonya M. Evans-Walls, Nicole M. Santo

Michael R Dimino

The Widener Law Journal has assembled a dynamic and diverse group of preeminent legal scholars to evaluate and discuss the many engaging, perplexing, and unanswered legal and ethical questions presented by Internet expression. These scholars have focused on two primary topics: (1) issues of constitutional law and criminal procedure that arise with Internet expression, including whether the Internet has increased concerns about invasions of other persons' rights and what regulations are necessary to protect privacy rights; (2) the intersection of Internet expression and property law, including issues of ownership, protectable interests,
and fair use in the realm of intellectual property …


Apuntes Generales Sobre La Libertad De Expresión En Internet, Germán M. Teruel Lozano Dec 2009

Apuntes Generales Sobre La Libertad De Expresión En Internet, Germán M. Teruel Lozano

Germán M. Teruel Lozano

GENERAL NOTES ABOUT THE FREEDOM OF SPEECH IN INTERNET: This paper presents an overview of how Internet has revolutionized the setting of freedom of speech. In particular, it is focused in to main aspects: On one hand, the delimitation of freedom of expression in the new media, differentiating in particular between web pages dedicated to the dissemination of information, protected by the freedom of speech; and those that are intended to provide other telematics services, which should not have this protection. Secondly, it is also studied the legal status of this freedom when it is exercised through Internet.