Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Articles

Communications Law

Technology

Articles 1 - 6 of 6

Full-Text Articles in Law

Freedom From Speech, Mary Anne Franks Jul 2022

Freedom From Speech, Mary Anne Franks

Articles

The importance of freedom of speech in a democratic society is usually taken as a given, but freedom from speech is no less important in safeguarding the values of truth, autonomy, and democracy. Freedom from speech includes both the right of the individual to not be forced to speak and the freedom to avoid the speech of others. This essay attempts to highlight the significance of freedom from speech in order to clarify the importance of the First Amendment right against compelled speech; provide an explanation for when the right of free speech yields to other rights; and offer a …


Racialized, Judaized, Feminized: Identity-Based Attacks On The Press, Lili Levi Jan 2022

Racialized, Judaized, Feminized: Identity-Based Attacks On The Press, Lili Levi

Articles

No abstract provided.


How The Internet Unmakes Law, Mary Anne Franks Jan 2020

How The Internet Unmakes Law, Mary Anne Franks

Articles

No abstract provided.


The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Mary Anne Franks, Danielle Citron Jan 2020

The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Mary Anne Franks, Danielle Citron

Articles

No abstract provided.


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Mapping Online Privacy, Jacqueline D. Lipton Jan 2010

Mapping Online Privacy, Jacqueline D. Lipton

Articles

Privacy scholars have recently outlined difficulties in applying existing concepts of personal privacy to the maturing Internet. With Web 2.0 technologies, more people have more opportunities to post information about themselves and others online, often with scant regard for individual privacy. Shifting notions of 'reasonable expectations of privacy' in the context of blogs, wikis, and online social networks create challenges for privacy regulation. Courts and commentators struggle with Web 2.0 privacy incursions without the benefit of a clear regulatory framework. This article offers a map of privacy that might help delineate at least the outer boundaries of Web 2.0 privacy. …