Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 18 of 18
Full-Text Articles in Law
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Faculty Publications
Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …
A New Taxonomy For Online Harms, Kate Klonick
A New Taxonomy For Online Harms, Kate Klonick
Faculty Publications
(Excerpt)
Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …
Incendiary Speech And Social Media, Lyrissa Lidsky
Incendiary Speech And Social Media, Lyrissa Lidsky
Faculty Publications
Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …
Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman
Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman
Faculty Publications
This Essay explains why Wikipedia will not be able to maintain a credible website while simultaneously letting anyone freely edit it. To date, Wikipedia editors have successfully defended against malicious attacks from spammers and vandals, but as editors turn over, Wikipedia will need to recruit replacements. However, Wikipedia will have difficulty with this recruiting task due to its limited incentives for participation. Faced with a potential labor squeeze, Wikipedia will choose to restrict users’ ability to contribute to the site as a way of preserving site credibility. Wikipedia’s specific configuration choices make it an interesting test case to evaluate the …
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky
Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky
Faculty Publications
This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …
Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman
Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman
Faculty Publications
This article further demonstrates that state common law exceptions to the employment-at-will doctrine are not providing significant redress to employees fired or otherwise disciplined for blogging.
Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman
Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman
Faculty Publications
In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …
Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer
Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer
Faculty Publications
Courts have been evaluating the issue of personal jurisdiction based on Internet or "network-mediated" contacts for some time. The U.S. Supreme Court has remained silent on this issue, permitting the federal appeals courts to develop standards for determining when personal jurisdiction based on network-mediated contacts is appropriate. Unfortunately, the circuit approaches-which emphasize a Web site's "interactivity" and "target audience" -are flawed because they are premised on an outdated view of Internet activity as uncontrollably ubiquitous. This view has led courts to depart from traditional jurisdictional analysis and impose elevated and misguided jurisdictional standards. This article argues that courts should reinstitute …
The Constitutional Failing Of The Anticybersquatting Act, Ned Snow
The Constitutional Failing Of The Anticybersquatting Act, Ned Snow
Faculty Publications
Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …
A Symposium Précis, Thomas E. Baker
A Symposium Précis, Thomas E. Baker
Faculty Publications
This article is an introduction to and overview of the Drake University Law School symposium The Constitution and the Internet, held in February of 2001. It highlights important issues including the Constitution and the Internet, civil liberty and the application of a 200 year old document to the modern age of rapidly changing technology.
Electronic Billboards Along The Information Superhighway: Liability Under The Lanham Act For Using Trademarks To Key Internet Banner Ads, Christine Galbraith Davik
Electronic Billboards Along The Information Superhighway: Liability Under The Lanham Act For Using Trademarks To Key Internet Banner Ads, Christine Galbraith Davik
Faculty Publications
With almost one billion web pages on the Internet today, a search engine is a necessity at times. But search engines are also for-profit ventures and the financial success of these sites hinges on advertising revenue. One of the ways in which these sites generate income is by selling “keywords” to advertisers. Although there has been only one judicial decision – Playboy Enterprises, Inc. v. Netscape Communications – involving banner ads keyed to trademarks, it will undoubtedly not be the last. This article argues that despite the invisible nature of this unauthorized trademark use, the common practice of keying a …
Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman
Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman
Faculty Publications
Co-brand agreements are what I do. I am the self-titled "King of CoBrands," as this is what I've been doing with my life.
So, let's talk a little about co-branding agreements and about why they might matter. First let's define our terms.
Now, where there used to be one site, the provider site, there will be two sites, the provider site and co-branded site, which contains the branding of the portal, but contains all the same functionality, or similar functionality, as is in the provider's site.
Then the portal will drive traffic to this co-branding site, for purposes that we'll …
Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky
Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky
Faculty Publications
John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons — some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat …
Congress, The Internet, And The Intractable Pornography Problem: The Child Online Protection Act Of 1998, Timothy Zick
Congress, The Internet, And The Intractable Pornography Problem: The Child Online Protection Act Of 1998, Timothy Zick
Faculty Publications
No abstract provided.
Copyright And "New-Use" Technologies, I. Trotter Hardy
Copyright And "New-Use" Technologies, I. Trotter Hardy
Faculty Publications
No abstract provided.
Computer Ram 'Copies:' Hit Or Myth? Historical Perspectives On Caching As A Microcosm Of Current Copyright Concerns, I. Trotter Hardy
Computer Ram 'Copies:' Hit Or Myth? Historical Perspectives On Caching As A Microcosm Of Current Copyright Concerns, I. Trotter Hardy
Faculty Publications
No abstract provided.
Property (And Copyright) In Cyberspace, I. Trotter Hardy
Property (And Copyright) In Cyberspace, I. Trotter Hardy
Faculty Publications
No abstract provided.
Comments On A Revised Filing System, R. Wilson Freyermuth
Comments On A Revised Filing System, R. Wilson Freyermuth
Faculty Publications
Professor Edward Adams's article, both in terms of its basic structure and the myriad of options it offers, neatly highlights the basic dilemma facing the Drafting Committee as it addresses the future Article 9 filing system. As he correctly notes, the filing system's shortcomings are largely due to its continued dependence on paper records, despite the increasing sophistication and availability of computerized information technology for both filing and searching. Should the Drafting Committee maintain the basics of the current system (a public, paper-based filing system) and merely attempt to identify and correct the existing shortcomings in that system, with some …