Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Copyright (24)
- Internet (13)
- Intellectual property (10)
- Fair use (8)
- Governance (7)
-
- Privacy (7)
- Trademark (7)
- Commons (6)
- ICANN (6)
- Intellectual Property (6)
- Knowledge (6)
- Regulation (6)
- Information (5)
- Technology (5)
- Creativity (4)
- Cybersecurity (4)
- Cybersquatting (4)
- Innovation (4)
- Internet Corporation for Assigned Names & Numbers (4)
- Patent (4)
- Web 2.0 (4)
- Blockchain (3)
- Common pools (3)
- Copyright law (3)
- Cyberspace (3)
- E-commerce (3)
- File sharing (3)
- Google (3)
- Internet domain name (3)
- Knowledge commons (3)
Articles 1 - 30 of 112
Full-Text Articles in Law
Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang
Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang
Articles
In the early 2000s, shortly before the September 11 attacks, Daniel J. Solove noted that computer databases in the United States were controlled by public as well as private bureaucracies. In that sense, Solove argued, the "Big Brother" metaphor "fails to capture the most important dimension of the database problem." In his 2008 Lockhart lecture, constitutional law scholar Jack M. Balkin argued that the United States has gradually transformed from a welfare and national security state to a National Surveillance State: "a new form of governance that features the collection, collation, and analysis of information about populations both in the …
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang
Articles
Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …
Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg
Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg
Articles
The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …
Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss
Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss
Articles
Studies of blockchain governance can be divided into analyses of the governance of blockchains (such as rules and power dynamics within a given network) and governance by blockchains (such as how blockchains can be implemented to improve self-governance of community-based peer production networks). Less emphasis has been placed on applications of distributed ledgers to public sector governance. Our review clarifies that the decentralization and distributive features that enable blockchains to link up loosely connected private organizations and public agencies to improve efficiency and transparency of government transactions. However, most blockchain applications lack clear advantages over the conventional digital recording of …
Institutional Considerations For The Regulation Of Internet Service Providers, Daniel Deacon
Institutional Considerations For The Regulation Of Internet Service Providers, Daniel Deacon
Articles
Written to commemorate the twenty-fifth anniversary of the Telecommunications Act of 1996, this Essay looks forward at possible settlements regarding the nagging question of whether and how best to regulate Internet service providers. Rather than start from the standpoint that this or that policy, such as net neutrality, is good or bad, I ask more broadly who should regulate ISPs and under what general framework. I assess and critique various frameworks, including reliance on markets and antitrust; state-level regulation under a federal Title I regime; various frameworks set forward in Republican sponsored bills; and the Save the Internet Act. I …
Blockchain Networks As Knowledge Commons, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Martin B. H. Weiss, Michael J. Madison
Blockchain Networks As Knowledge Commons, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Martin B. H. Weiss, Michael J. Madison
Articles
Researchers interested in blockchains are increasingly attuned to questions of governance, including how blockchains relate to government, the ways blockchains are governed, and ways blockchains can improve prospects for successful self-governance. Our paper joins this research by exploring the implications of the Governing Knowledge Commons (GKC) framework to analyze governance of blockchains. Our novel contributions are making the case that blockchain networks represent knowledge commons governance, in the sense that they rely on collectively-managed technologies to pool and manage distributed information, illustrating the usefulness and novelty of the GCK methodology with an empirical case study of the evolution of Bitcoin, …
Intragovernmental Speech And Sanction, Katherine A. Shaw
Intragovernmental Speech And Sanction, Katherine A. Shaw
Articles
This Essay, prepared as part of a symposium on Professor Helen Norton’s The Government’s Speech and the Constitution, asks what role, if any, we should understand the Constitution to play in mediating disputes over speech between and among government entities. Focusing on the examples of impeachment and censure, the piece considers scenarios in which one arm of government takes action in response to the speech of another arm or entity of government, exploring what role the Constitution should play in shaping or constraining those responses.
Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison
Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison
Articles
The soccer referee stands in for a judge. Soccer’s Video Assistant Referee (“VAR”) system stands in for algorithms that augment human deciders. Fair play stands in for justice. They are combined and set in a polycentric system of governance, with implications for designing, administering, and assessing human-machine combinations.
The Virtual Law School, 2.0, A. Michael Froomkin
The Virtual Law School, 2.0, A. Michael Froomkin
Articles
Just over twenty years ago I gave a talk to the AALS called The Virtual Law School? Or, How the Internet Will De-skill the Professoriate, and Turn Your Law School Into a Conference Center. I came to the subject because I had been working on internet law, learning about virtual worlds and e-commerce, and about the power of one-to-many communications, and it struck me that a lot of what I had learned applied to education in general and to legal education in particular.
It didn't happen. Or at least, it has not happened yet. In this essay I want …
Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran
Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran
Articles
This article presents an in-depth analysis of the latent methodological issues that are as much a cause of U.S. federal court avoidance of foreign law as are judicial difficulties in obtaining foreign legal materials and difficulties in understanding foreign legal orders and languages. It explores Rule 44.1’s inadvertent introduction of a civil-law method into a common-law framework, and the results that have ensued, including an incomplete transition of foreign law from being an issue of fact to becoming an issue of law. It addresses the ways in which courts obtain information about foreign law today, suggesting among others the methodological …
Fraudulent Malattributed Comments In Agency Rulemaking, Michael Herz
Fraudulent Malattributed Comments In Agency Rulemaking, Michael Herz
Articles
A specter is haunting notice-and-comment rulemaking—the specter of fraudulent comments. The stand-out example—the apotheosis—was the Federal Communications Commission’s (FCC) net neutrality rulemaking in 2017. Well over twenty million comments were submitted, but millions of those were highly suspect. It turns out only about 800,000 of those comments were unique—that is, not written by a computer and not a pre-written form letter or variation thereof. And of the rest, perhaps half were submitted by computers (bots) using fictitious names or the names of real people, living and dead, who had no connection to the comment.
Exploring The Esports Approach Of America's Three Major Leagues, Peter A. Carfagna
Exploring The Esports Approach Of America's Three Major Leagues, Peter A. Carfagna
Articles
No abstract provided.
Tools For Data Governance, Michael J. Madison
Tools For Data Governance, Michael J. Madison
Articles
This article describes the challenges of data governance in terms of the broader framework of knowledge commons governance, an institutional approach to governing shared knowledge, information, and data resources. Knowledge commons governance highlights the potential for effective community- and collective-based governance of knowledge resources. The article focuses on key concepts within the knowledge commons framework rather than on specific law and public policy questions, directing the attention of researchers and policymakers to critical inquiry regarding relevant social groups and relevant data “things.” Both concepts are key tools for effective data governance.
Media Literacy Beyond The National Security Frame, Lili Levi
Media Literacy Beyond The National Security Frame, Lili Levi
Articles
No abstract provided.
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Articles
In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …
Is Blockchain The Next Step In The Evolution Chain Of [Market] Intermediaries?, Marcela Gomez, Pedro Bustamante, Martin B. H. Weiss, Ilia Murtazashvili, Michael J. Madison, Wilson Law, Tymofiy Mylovanov, Herminio Bodon, Prashabnt Krishnamurthy
Is Blockchain The Next Step In The Evolution Chain Of [Market] Intermediaries?, Marcela Gomez, Pedro Bustamante, Martin B. H. Weiss, Ilia Murtazashvili, Michael J. Madison, Wilson Law, Tymofiy Mylovanov, Herminio Bodon, Prashabnt Krishnamurthy
Articles
The blockchain is a decentralized solution for handling transactions where we are concerned (among other aspects) with the accuracy and verification of transactions. One of its main promises is to eliminate the need for centralized entities or intermediaries and legal enforcement. Rather than trusting self-interested human intermediaries, the blockchain provides an alternative that relies on transparent computational protocols (Werbach 2018).
In this paper, we delve into this broker-less claim and analyze whether the blockchain needs an intermediary to allow for widespread access to its functionality and whether the blockchain itself is an intermediary. The latter would turn the blockchain into …
Ostrom Amongst The Machines: Blockchain As A Knowledge Commons, Herminio Bodon, Pedro Bustamante, Marcela Gomez, Prashabnt Krishnamurthy, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Martin B. H. Weiss
Ostrom Amongst The Machines: Blockchain As A Knowledge Commons, Herminio Bodon, Pedro Bustamante, Marcela Gomez, Prashabnt Krishnamurthy, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Martin B. H. Weiss
Articles
Blockchains are distributed ledger technologies that allow the recording of any data structure, including money, property titles, and contracts. In this paper, we suggest that Hayekian political economy is especially well suited to explain how blockchain emerged, but that Elinor Ostrom’s approach to commons governance is particularly useful to understand why blockchain anarchy is successful. Our central conclusions are that the blockchain can be thought of as a spontaneous order, as Hayek anticipated, as well as a knowledge commons, as Ostrom’s studies of self-governance anticipated.
Administrative Truth: Comments On Cortez’S Information Mischief, David Thaw
Administrative Truth: Comments On Cortez’S Information Mischief, David Thaw
Articles
This short essay responds to Professor Nathan Cortez’s argument describing an emerging “information policy” reflecting on the practices of President Donald J. Trump’s executive administration (the “Trump Administration”) regarding the development, release, and management of official information. Professor Cortez argues that viewed holistically, this information policy suggests a shift toward the use of information practices by administrative agencies for purposes other than “neutral principles” and rather focusing on a “more cynical [use] of government information.”
This argument may be well-founded, and the Trump Administration certainly has been criticized widely for the relationship between its public statements and widespread media interpretation …
Antitrust In Digital Markets, John M. Newman
Antitrust In Digital Markets, John M. Newman
Articles
Antitrust law has largely failed to address the challenges posed by digital markets. At the turn of the millennium, the antitrust enterprise engaged in intense debate over whether antitrust doctrine, much of it developed during a bygone era of smokestack industries, could or should evolve to address digital markets. Eventually, a consensus emerged: although the basic doctrine is supple enough to apply to new technologies, courts and enforcers should adopt a defendant-friendly, hands-off approach.
But this pro-defendant position is deeply- and dangerously- flawed. Economic theory, empirical research, and extant judicial and regulatory authority all contradict the prevailing views regarding power, …
Justice Beyond Dispute, Mary Anne Franks
Beyond Norms: Using International Economic Tools To Deter Malicious State-Sponsored Cyber Activities, Kathleen Claussen
Beyond Norms: Using International Economic Tools To Deter Malicious State-Sponsored Cyber Activities, Kathleen Claussen
Articles
In thinking about strategy and doctrine for cyberspace, one cannot ignore either the cyber domain's interaction with other domains or the applicability of existing legal tools to address cyberspace issues. This Comment focuses on the latter and argues that any discussion regarding deterrence and a playbook for consequences for cyber incidents by state actors ought necessarily to include a careful examination of existing plays, particularly where those incidents have an economic component as many do. Focusing on multilateral institutions, regional and bilateral trade and investment agreements, and unilateral tariff and non-tariff trade and investment tools, this Comment maintains that current …
Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott
Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott
Articles
Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions toward …
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …
U.S. Discovery In A Transnational And Digital Age And The Increasing Need For Comparative Analysis, Vivian Grosswald Curran
U.S. Discovery In A Transnational And Digital Age And The Increasing Need For Comparative Analysis, Vivian Grosswald Curran
Articles
U.S. Courts generally prefer applying the Federal Rules of Civil Procedure over The Hague Evidence Convention for the taking of documentary evidence located abroad. With respect to the French blocking statute with which the Supreme Court was dealing in the seminal case of Aérospatiale, and under the powerful influence of stare decisis, a line of cases developed dismissing the French blocking statute for having been intended by its legislature principally to thwart the sovereignty of the U.S. trial court, and never having been intended to be enforced. Criteria for the general assessment of blocking statutes have emerged from the courts’ …
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …
Ip Things As Boundary Objects: The Case Of The Copyright Work, Michael J. Madison
Ip Things As Boundary Objects: The Case Of The Copyright Work, Michael J. Madison
Articles
My goal is to explore the meanings and functions of the objects of intellectual property: the work of authorship (or copyright work) in copyright, the invention in patent, and the mark and the sign in trademark. This paper takes up the example of the copyright work.
It is usually argued that the central challenge in understanding the work is to develop a sensible method for appreciating its boundaries. Those boundaries, conventionally understood as the metaphorical "metes and bounds" of the work, might be established by deferring to the intention of the author, or by searching for authorship (creativity or originality) …
Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello
Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello
Articles
There are more than one billion websites available online. Many are useful tools for attorneys, so it makes sense to review and refresh your favorite bookmarks regularly. While none of the many free sites offer the sophisticated search abilities of fee-based research services, a few minutes spent exploring free sites can help researchers significantly narrow their searches once they turn to a fee-based system. Remember to always take advantage of the advancesearch option when available on a free site. Free sites are offering increasingly sophisticated search options, such as Boolean and proximity searches, which were previously exclusive to paid services.
The Desert Of The Unreal: Inequality In Virtual And Augmented Reality, Mary Anne Franks
The Desert Of The Unreal: Inequality In Virtual And Augmented Reality, Mary Anne Franks
Articles
The world we live in is structured by inequality: of gender, race, class, sexual orientation, disability, and more. Virtual and augmented reality technologies hold out the promise of a more perfect world, one that offers us more stimulation, more connection, more freedom, more equality than the "real" world. But for such technologies to be truly innovative, they must move us beyond our current limitations and prejudices. When existing inequalities are unacknowledged and unaddressed in the "real" world, they tend to be replicated and augmented in virtual realities. We make new worlds based on who we are and what we do …
"Revenge Porn" Reform: A View From The Front Lines, Mary Anne Franks
"Revenge Porn" Reform: A View From The Front Lines, Mary Anne Franks
Articles
The legal and social landscape of "revenge porn" has changed dramatically in the last few years. Before 2013, only three states criminalized the unauthorized disclosure of sexually explicit images of adults and few people had ever heard the ternm "revenge porn." As of July 2017, thirty-eight states and Washington, D.C. had criminalized the conduct; federal criminal legislation on the issue had been introduced in Congress; Google, Facebook, and Twitter had banned nonconsensual pornography from their platforms; and the term "revenge porn" had been added to the Merriam- Webster Dictionary. I have had the privilege of playing a role in many …
Authority And Authors And Codes, Michael J. Madison
Authority And Authors And Codes, Michael J. Madison
Articles
Contests over the meaning and application of the federal Computer Fraud and Abuse Act (“CFAA”) expose long-standing, complex questions about the sources and impacts of the concept of authority in law and culture. Accessing a computer network “without authorization” and by “exceeding authorized access” is forbidden by the CFAA. Courts are divided in their interpretation of this language in the statute. This Article first proposes to address the issue with an insight from social science research. Neither criminal nor civil liability under the CFAA should attach unless the alleged violator has transgressed some border or boundary that is rendered visible …