Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Law

Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake Oct 2018

Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake

Faculty Publications

Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …


A New Taxonomy For Online Harms, Kate Klonick Jan 2015

A New Taxonomy For Online Harms, Kate Klonick

Faculty Publications

(Excerpt)

Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …


Incendiary Speech And Social Media, Lyrissa Lidsky Jan 2011

Incendiary Speech And Social Media, Lyrissa Lidsky

Faculty Publications

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman Jan 2010

Wikipedia's Labor Squeeze And Its Consequences, Eric Goldman

Faculty Publications

This Essay explains why Wikipedia will not be able to maintain a credible website while simultaneously letting anyone freely edit it. To date, Wikipedia editors have successfully defended against malicious attacks from spammers and vandals, but as editors turn over, Wikipedia will need to recruit replacements. However, Wikipedia will have difficulty with this recruiting task due to its limited incentives for participation. Faced with a potential labor squeeze, Wikipedia will choose to restrict users’ ability to contribute to the site as a way of preserving site credibility. Wikipedia’s specific configuration choices make it an interesting test case to evaluate the …


Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky Jan 2009

Anonymity In Cyberspace: What Can We Learn From John Doe?, Lyrissa Lidsky

Faculty Publications

This Article examines the evolution of the law governing libel suits against anonymous “John Doe” defendants based on Internet speech. Between 1999 and 2009, courts crafted new First Amendment doctrines to protect Internet speakers from having their anonymity automatically stripped away upon the filing of a libel action. Courts also adapted existing First Amendment protections for hyperbole, satire and other non-factual speech to protect the distinctive discourse of Internet message boards. Despite these positive developments, the current state of the law is unsatisfactory. Because the scope of protection for anonymous Internet speech varies greatly by jurisdiction, resourceful plaintiffs can make …


Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman Apr 2007

Social Isolation And American Workers: Employee "Blogging" And Legal Reform, Rafael Gely, Leonard Bierman

Faculty Publications

This article further demonstrates that state common law exceptions to the employment-at-will doctrine are not providing significant redress to employees fired or otherwise disciplined for blogging.


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …


Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer Jan 2006

Jurisdiction And The Internet: Returning To Traditional Principles To Analyze Network-Mediated Contacts, A. Benjamin Spencer

Faculty Publications

Courts have been evaluating the issue of personal jurisdiction based on Internet or "network-mediated" contacts for some time. The U.S. Supreme Court has remained silent on this issue, permitting the federal appeals courts to develop standards for determining when personal jurisdiction based on network-mediated contacts is appropriate. Unfortunately, the circuit approaches-which emphasize a Web site's "interactivity" and "target audience" -are flawed because they are premised on an outdated view of Internet activity as uncontrollably ubiquitous. This view has led courts to depart from traditional jurisdictional analysis and impose elevated and misguided jurisdictional standards. This article argues that courts should reinstitute …


The Constitutional Failing Of The Anticybersquatting Act, Ned Snow Jan 2005

The Constitutional Failing Of The Anticybersquatting Act, Ned Snow

Faculty Publications

Eminent domain and thought control are occurring in cyberspace. Through the Anticybersquatting Consumer Protection Act (ACPA), the government transfers domain names from domain-name owners to private parties based on the owners' bad-faith intent. The owners receive no just compensation. The private parties who are recipients of the domain names are trademark holders whose trademarks correspond with the domain names. Often the trademark holders have no property rights in those domain names: trademark law only allows mark holders to exclude others from making commercial use of their marks; it does not allow mark holders to reserve the marks for their own …


A Symposium Précis, Thomas E. Baker Jan 2001

A Symposium Précis, Thomas E. Baker

Faculty Publications

This article is an introduction to and overview of the Drake University Law School symposium The Constitution and the Internet, held in February of 2001. It highlights important issues including the Constitution and the Internet, civil liberty and the application of a 200 year old document to the modern age of rapidly changing technology.


Electronic Billboards Along The Information Superhighway: Liability Under The Lanham Act For Using Trademarks To Key Internet Banner Ads, Christine Galbraith Davik Jul 2000

Electronic Billboards Along The Information Superhighway: Liability Under The Lanham Act For Using Trademarks To Key Internet Banner Ads, Christine Galbraith Davik

Faculty Publications

With almost one billion web pages on the Internet today, a search engine is a necessity at times. But search engines are also for-profit ventures and the financial success of these sites hinges on advertising revenue. One of the ways in which these sites generate income is by selling “keywords” to advertisers. Although there has been only one judicial decision – Playboy Enterprises, Inc. v. Netscape Communications – involving banner ads keyed to trademarks, it will undoubtedly not be the last. This article argues that despite the invisible nature of this unauthorized trademark use, the common practice of keying a …


Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman Jan 2000

Symposium Presentation: Doing Internet Co-Branding Agreements, Eric Goldman

Faculty Publications

Co-brand agreements are what I do. I am the self-titled "King of CoBrands," as this is what I've been doing with my life.

So, let's talk a little about co-branding agreements and about why they might matter. First let's define our terms.

Now, where there used to be one site, the provider site, there will be two sites, the provider site and co-branded site, which contains the branding of the portal, but contains all the same functionality, or similar functionality, as is in the provider's site.

Then the portal will drive traffic to this co-branding site, for purposes that we'll …


Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky Jan 2000

Silencing John Doe: Defamation And Discourse In Cyberspace, Lyrissa Lidsky

Faculty Publications

John Doe has become a popular defamation defendant as corporations and their officers bring defamation suits for statements made about them in Internet discussion fora. These new suits are not even arguably about recovering money damages but instead are brought for symbolic reasons — some worthy, some not so worthy. If the only consequence of these suits were that Internet users were held accountable for their speech, the suits would be an unalloyed good. However, these suits threaten to suppress legitimate criticism along with intentional and reckless falsehoods, and existing First Amendment law doctrines are not responsive to the threat …


Congress, The Internet, And The Intractable Pornography Problem: The Child Online Protection Act Of 1998, Timothy Zick Jan 1999

Congress, The Internet, And The Intractable Pornography Problem: The Child Online Protection Act Of 1998, Timothy Zick

Faculty Publications

No abstract provided.


Copyright And "New-Use" Technologies, I. Trotter Hardy Jan 1999

Copyright And "New-Use" Technologies, I. Trotter Hardy

Faculty Publications

No abstract provided.


Computer Ram 'Copies:' Hit Or Myth? Historical Perspectives On Caching As A Microcosm Of Current Copyright Concerns, I. Trotter Hardy Apr 1997

Computer Ram 'Copies:' Hit Or Myth? Historical Perspectives On Caching As A Microcosm Of Current Copyright Concerns, I. Trotter Hardy

Faculty Publications

No abstract provided.


Property (And Copyright) In Cyberspace, I. Trotter Hardy Jan 1996

Property (And Copyright) In Cyberspace, I. Trotter Hardy

Faculty Publications

No abstract provided.


Comments On A Revised Filing System, R. Wilson Freyermuth Jan 1995

Comments On A Revised Filing System, R. Wilson Freyermuth

Faculty Publications

Professor Edward Adams's article, both in terms of its basic structure and the myriad of options it offers, neatly highlights the basic dilemma facing the Drafting Committee as it addresses the future Article 9 filing system. As he correctly notes, the filing system's shortcomings are largely due to its continued dependence on paper records, despite the increasing sophistication and availability of computerized information technology for both filing and searching. Should the Drafting Committee maintain the basics of the current system (a public, paper-based filing system) and merely attempt to identify and correct the existing shortcomings in that system, with some …