Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Maryland Francis King Carey School of Law (5)
- Cornell University Law School (4)
- Schulich School of Law, Dalhousie University (4)
- University of Colorado Law School (4)
- Fordham Law School (3)
-
- University of Pennsylvania Carey Law School (3)
- Boston University School of Law (2)
- Chicago-Kent College of Law (2)
- New York Law School (2)
- Singapore Management University (2)
- University of Missouri School of Law (2)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (2)
- University of New Hampshire (2)
- University of Pittsburgh School of Law (2)
- City University of New York (CUNY) (1)
- Cleveland State University (1)
- Columbia Law School (1)
- Georgetown University Law Center (1)
- Golden Gate University School of Law (1)
- Montclair State University (1)
- Old Dominion University (1)
- Penn State Law (1)
- Roger Williams University (1)
- Southern Methodist University (1)
- St. John's University School of Law (1)
- The Catholic University of America, Columbus School of Law (1)
- The Peter A. Allard School of Law (1)
- University of Baltimore Law (1)
- University of Florida Levin College of Law (1)
- University of Georgia School of Law (1)
- Keyword
-
- Privacy (13)
- Internet (12)
- Cybersecurity (4)
- NSA (4)
- Surveillance (4)
-
- Copyright (3)
- Crowdfunding (3)
- FTC (3)
- Regulation (3)
- Telecommunications (3)
- CROWDFUND Act (2)
- Charter (2)
- Choice of law (2)
- Communications Law (2)
- Conflict of laws (2)
- Cyberbullying (2)
- Cyberspace (2)
- E-commerce (2)
- Encryption (2)
- Entrepreneur (2)
- Equality (2)
- FDA (2)
- Facebook (2)
- Free speech (2)
- Governance (2)
- International law (2)
- JOBS Act (2)
- Law and Technology (2)
- National Security Agency (2)
- Online (2)
- Publication
-
- Faculty Scholarship (9)
- All Faculty Scholarship (6)
- Articles, Book Chapters, & Popular Press (4)
- Faculty Publications (4)
- Publications (4)
-
- Articles (3)
- Law Faculty Scholarship (3)
- Articles & Chapters (2)
- Cornell Law Faculty Publications (2)
- Cornell Law School J.D. Student Research Papers (2)
- Homeland Security Publications (2)
- Research Collection Yong Pung How School Of Law (2)
- Scholarly Articles (2)
- Boyd Briefs / Road Scholars (1)
- Department of Political Science and Law Faculty Scholarship and Creative Works (1)
- Faculty Journal Articles and Book Chapters (1)
- GGU Law Review Blog (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Journal Articles (1)
- Law Faculty Articles and Essays (1)
- Law Faculty Publications (1)
- Law Faculty Scholarly Articles (1)
- Law Student Publications (1)
- Occasional Papers Series (1)
- Politics Summer Fellows (1)
- Publications and Research (1)
- Scholarly Works (1)
- Sociology & Criminal Justice Faculty Publications (1)
- Transnational Business Governance Interactions Working Papers (1)
- UF Law Faculty Publications (1)
Articles 1 - 30 of 63
Full-Text Articles in Law
Reputation And Defamatory Meaning On The Internet: Communications, Contexts And Communities, Gary Kok Yew Chan
Reputation And Defamatory Meaning On The Internet: Communications, Contexts And Communities, Gary Kok Yew Chan
Research Collection Yong Pung How School Of Law
The determination of the appropriate scope of protection of reputation in the tort of defamation is crucially dependent on the construction of defamatory meaning. With the continuing rise of Internet publications, it is important to assess the impact of the various modes of Internet communications such as Internet websites, hyperlinking, blogs, emails, Twitter, Facebook and other forms of social media on defamatory meaning. Such defamatory meaning is being constructed based on the unique contexts and social expectations that have been generated by the various modes of Internet communications. The potential impact on defamatory meaning can also be assessed from the …
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
All Faculty Scholarship
The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.
Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …
Doj’S “All-Tools” Approach To Cyber And National Security, Peter Margulies
Doj’S “All-Tools” Approach To Cyber And National Security, Peter Margulies
Law Faculty Scholarship
No abstract provided.
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
The Continuing Battle Over Privacy Vs. Security, Ellen Cornelius
Homeland Security Publications
No abstract provided.
Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker
Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker
Homeland Security Publications
No abstract provided.
Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring
Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring
Sociology & Criminal Justice Faculty Publications
The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long …
Big Data Blacklisting, Margaret Hu
Big Data Blacklisting, Margaret Hu
Faculty Publications
“Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation …
Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas
Keeping Pace: The U.S. Supreme Court And Evolving Technology, Brian Thomas
Politics Summer Fellows
Contemporary mainstream discussions of the Supreme Court are often qualified with the warning that the nine justices are out of touch with everyday American life, especially when it comes to the newest and most popular technologies. For instance, during oral argument for City of Ontario v. Quon, a 2010 case that dealt with sexting on government-issued devices, Chief Justice John Roberts famously asked what the difference was “between email and a pager,” and Justice Antonin Scalia wondered if the “spicy little conversations” held via text message could be printed and distributed. While these comments have garnered a great deal of …
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Law Faculty Publications
Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …
The History And Future Of E-Commerce Patents, Dennis D. Crouch, Mitchell L. Terry
The History And Future Of E-Commerce Patents, Dennis D. Crouch, Mitchell L. Terry
Faculty Publications
The past two decades have seen a great rise in the patenting of e-commerce inventions. Now, those same patents are taking an equally great fall. In a series of four recent cases, the U.S. Supreme Court has shifted the doctrine of patent eligibility and, in the process, raised the bar for e-commerce and software patents - making it more difficult to obtain and enforce those types of patents.
Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues
Data Breaches And Privacy Law: Lawyers’ Challenges In Handling Personal Information, Charlotte Duc-Bragues
Cornell Law School J.D. Student Research Papers
Sharing personal information with a lawyer potentially represents the greatest source of vulnerability for an individual. Since the first major security breach in 2005, law firms have been pressed both by public authorities and clients to take action in order to protect confidential information from potential harmful breaches.
This paper seeks to provide an overview of the challenges faced by lawyers in handling personal information with regard to potential security breaches. The aim is to analyze this issue through the focal of privacy law; statistics on security breaches and tools to prevent this phenomenon, extensively studied in class, are given …
Future Of Ai And Law, Abby Cessna
Future Of Ai And Law, Abby Cessna
Cornell Law School J.D. Student Research Papers
Technology has already transformed the way that law is practiced. The use of computers and digital legal resources, such as LexisNexis and Westlaw have been around for decades, but these are just some of the major technological advancements that have transformed law. For instance, it was groundbreaking for a law firm as prestigious as Orrick, Herrington & Sutcliffe to have a website in the late 1990's, which was getting around 5000 visits a week. Now law firms not only have websites but also use a variety of social media services to promote their firm and services. In addition to promoting …
Youtube Kids – Luring Kids In, One App At A Time, Courtney Serrato
Youtube Kids – Luring Kids In, One App At A Time, Courtney Serrato
GGU Law Review Blog
Whether you’re an overnight sensation like Justin Bieber or you’re uploading a tutorial on how to apply the perfect make up; YouTube has become the go‑to site for watching all the hottest videos. Technologically speaking, the cyber world has significantly changed over the years, especially with the Internet now being easily accessible from mobile devices. But the most alarming and overlooked trend is the ubiquitous use of the Internet by children.
Today, children use iPhones, tablets and computers to access the Internet as early as three years‑old. With the amount of time children spend online, some have become skilled navigators. …
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
Occasional Papers Series
Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …
The Virtues Of Moderation, James Grimmelmann
The Virtues Of Moderation, James Grimmelmann
Cornell Law Faculty Publications
On a Friday in 2005, the Los Angeles Times launched an experiment: a “wikitorial” on the Iraq War that any of the paper’s readers could edit. By Sunday, the experiment had ended in abject failure: vandals overran it with crude profanity and graphic pornography. The wikitorial took its inspiration and its technology from Wikipedia, but missed something essential about how the “the free encyclopedia that anyone can edit” staves off abuse while maintaining its core commitment to open participation.
The difference is moderation: the governance mechanisms that structure participation in a community to facilitate cooperation and prevent abuse. Town meetings …
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
All Faculty Scholarship
Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …
A Government Of Laws Not Of Precedents 1776-1876: The Google Challenge To Common Law Myth, James Maxeiner
A Government Of Laws Not Of Precedents 1776-1876: The Google Challenge To Common Law Myth, James Maxeiner
All Faculty Scholarship
The United States, it is said, is a common law country. The genius of American common law, according to American jurists, is its flexibility in adapting to change and in developing new causes of action. Courts make law even as they apply it. This permits them better to do justice and effectuate public policy in individual cases, say American jurists.
Not all Americans are convinced of the virtues of this American common law method. Many in the public protest, we want judges that apply and do not make law. American jurists discount these protests as criticisms of naive laymen. They …
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Law Faculty Articles and Essays
We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …
Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame
Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame
Department of Political Science and Law Faculty Scholarship and Creative Works
The purpose of this study was to describe a sample of mental-health blogs, to determine the proportion of sampled blogs still posting several years after identification, and to identify the correlates of survival. One hundred eighty-eight mental-health blogs were identified in 2007–08 and revisited in 2014. Eligible blogs were U.S.-based, in English, and active. Baseline characteristics and survival status were described and variation based on blog focus and survival examined. Mental health bloggers tended to be females blogging as patients and caregivers focusing on specific mental illnesses/conditions. The proportion of blogs still active at follow-up ranged from 25.5 percent to …
At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld
At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld
Articles
On December 19, 2014, long-simmering tensions between Mississippi Attorney General Jim Hood and the search engine giant Google boiled over into federal court when Google filed suit against the Attorney General to enjoin him from bringing civil or criminal charges against it for alleged violations of the Mississippi Consumer Protection Act. Hood had been investigating and threatening legal action against Google for over a year for its alleged failure to do enough to prevent its search engine, advertisements, and YouTube website from facilitating public access to illegal, dangerous, or copyright protected goods. The case has garnered a great deal of …
Whither The Future Of Internet Streaming And Time-Shifting? Revisiting The Rights Of Reproduction And Communication To The Public In Copyright Law After Aereo, Cheng Lim Saw, Warren B. Chik
Whither The Future Of Internet Streaming And Time-Shifting? Revisiting The Rights Of Reproduction And Communication To The Public In Copyright Law After Aereo, Cheng Lim Saw, Warren B. Chik
Research Collection Yong Pung How School Of Law
New forms of communication technology often pose challenges to the copyright regime and have necessitated the rewriting of the scope of the exclusive rights and exceptions by the legislature, and, in some cases, by the courts in common law countries (as well as the Court of Justice of the European Union). These issues have arisen in different categories of digital technology, albeit with the same objective of streamlining and simplifying the delivery of copyright works to consumers. These categories include file storage and transfer operations offered by Peer-to-Peer technology, the space- and time-shifting functions of the early video and audio …
Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods
Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods
Law Faculty Scholarly Articles
The global nature of today’s Internet services presents a unique challenge to international law enforcement cooperation. On a daily basis, law enforcement agents in one country seek access to data that is beyond their jurisdictional reach; as one industry analyst put it, there has been, “an internationalization of evidence.” In order to gain lawful access to data that is subject to another state’s jurisdiction, law enforcement agents must request mutual legal assistance (MLA) from the country that can legally compel the data’s disclosure. But the MLA regime has not been updated to manage the enormous rise of requests for MLA. …
The Virtues Of Moderation, James Grimmelmann
The Virtues Of Moderation, James Grimmelmann
Faculty Scholarship
TL;DR—On a Friday in 2005, the Los Angeles Times launched an experiment: a “wikitorial” on the Iraq War that any of the paper’s readers could edit. By Sunday, the experiment had ended in abject failure: vandals overran it with crude profanity and graphic pornography. The wikitorial took its inspiration and its technology from Wikipedia, but missed something essential about how the “the free encyclopedia that anyone can edit” staves off abuse while maintaining its core commitment to open participation.
The difference is moderation: the governance mechanisms that structure participation in a community to facilitate cooperation and prevent abuse. Town meetings …
Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale
Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale
Faculty Scholarship
No abstract provided.
Anarchy, Status Updates, And Utopia, James Grimmelmann
Anarchy, Status Updates, And Utopia, James Grimmelmann
Faculty Scholarship
Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; Paypal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.
Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power there is also social power. Whenever people come together …
Personal Jurisdiction And The "Interwebs", Alan M. Trammell, Derek E. Bambauer
Personal Jurisdiction And The "Interwebs", Alan M. Trammell, Derek E. Bambauer
Scholarly Articles
For nearly twenty years, lower courts and scholars have struggled to figure out how personal jurisdiction doctrine should apply in the Internet age. When does virtual conduct make someone amenable to jurisdiction in any particular forum? The classic but largely discredited response by courts has been to give primary consideration to a commercial Web site’s interactivity. That approach distorts the current doctrine and is divorced from coherent jurisdictional principles. Moreover, scholars have not yielded satisfying answers. They typically have argued either that the Internet is thoroughly exceptional and requires its own rules, or that it is largely unexceptional and can …
Extraterritorial Enforcement Of National Laws In Connection With Online Commercial Activity, Marketa Trimble
Extraterritorial Enforcement Of National Laws In Connection With Online Commercial Activity, Marketa Trimble
Boyd Briefs / Road Scholars
Professor Marketa Trimble displayed this slideshow during her presentation at the Fifth Annual Internet Law Works-in-Progress conference, held at Santa Clara Law on March 7, 2015.
Is There Anybody Out There? Analyzing The Regulation Of Children’S Privacy Online In The United States Of America And The European Union According To The Tbgi Analytical Framework By Eberlein Et Al, Nachshon Goltz
Transnational Business Governance Interactions Working Papers
This article analyzes the regulation of children’s privacy online, especially in the context of personal information collection as a commodity, in the United States of America (USA) and the European Union (EU) according to the Transnational Business Governance Interactions analytical framework proposed by Eberlein et al. This article reviews the regulatory structure of the field in these two jurisdictions, including global organizations, according to Elberlein et al components and questions. In the analysis, a map of the regulatory interactions within this global realm will be presented and discussed. Analysis of the influence of each interacting party and the degree of …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
All Faculty Scholarship
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
Bridgefunding Crowdfunding And The Market For Entrepreneurial Finance, Seth C. Oranburg
Bridgefunding Crowdfunding And The Market For Entrepreneurial Finance, Seth C. Oranburg
Law Faculty Scholarship
This Article explores the business environment of entrepreneurial finance through the lens of securities regulations. It finds that regulators should be more concerned with protecting investors from startup failure than from crowdfunding fraud. It recommends an amendment to Regula- tion Crowdfunding that may enable startup success: the limit on fun- draising should be raised from $1 to $5 million.