Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring Oct 2015

Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring

Sociology & Criminal Justice Faculty Publications

The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long …


Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman Jul 2015

Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman

Law Faculty Publications

Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …


Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au Apr 2015

Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au

Law Faculty Articles and Essays

We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …


Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame Mar 2015

Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame

Department of Political Science and Law Faculty Scholarship and Creative Works

The purpose of this study was to describe a sample of mental-health blogs, to determine the proportion of sampled blogs still posting several years after identification, and to identify the correlates of survival. One hundred eighty-eight mental-health blogs were identified in 2007–08 and revisited in 2014. Eligible blogs were U.S.-based, in English, and active. Baseline characteristics and survival status were described and variation based on blog focus and survival examined. Mental health bloggers tended to be females blogging as patients and caregivers focusing on specific mental illnesses/conditions. The proportion of blogs still active at follow-up ranged from 25.5 percent to …


At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld Mar 2015

At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld

Articles

On December 19, 2014, long-simmering tensions between Mississippi Attorney General Jim Hood and the search engine giant Google boiled over into federal court when Google filed suit against the Attorney General to enjoin him from bringing civil or criminal charges against it for alleged violations of the Mississippi Consumer Protection Act. Hood had been investigating and threatening legal action against Google for over a year for its alleged failure to do enough to prevent its search engine, advertisements, and YouTube website from facilitating public access to illegal, dangerous, or copyright protected goods. The case has garnered a great deal of …


Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods Jan 2015

Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods

Law Faculty Scholarly Articles

The global nature of today’s Internet services presents a unique challenge to international law enforcement cooperation. On a daily basis, law enforcement agents in one country seek access to data that is beyond their jurisdictional reach; as one industry analyst put it, there has been, “an internationalization of evidence.” In order to gain lawful access to data that is subject to another state’s jurisdiction, law enforcement agents must request mutual legal assistance (MLA) from the country that can legally compel the data’s disclosure. But the MLA regime has not been updated to manage the enormous rise of requests for MLA. …


Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman Jan 2015

Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman

Articles & Chapters

This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.”

The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy …


Trust And Social Commerce, Julia Y. Lee Jan 2015

Trust And Social Commerce, Julia Y. Lee

Journal Articles

Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace.

The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble Jan 2015

The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble

Scholarly Works

From the early days of the Internet, commentators have warned that it would be impossible for those who act on the Internet (“Internet actors”) to comply with the copyright laws of all Internet-connected countries if the national copyright laws of all those countries were to apply simultaneously to Internet activity. A multiplicity of applicable copyright laws seems plausible at least when the Internet activity is ubiquitous — i.e., unrestricted by geoblocking or by other means — given the territoriality principle that governs international copyright law and the choice-of-law rules that countries typically use for copyright infringements.

This Article posits that …


Authors, Online, Daniel J. Gervais Jan 2015

Authors, Online, Daniel J. Gervais

Vanderbilt Law School Faculty Publications

The fate of professional creators is a major cultural issue. While specific copyright rules are obviously contingent and should be adapted to the new realities of online distribution and easy reuse, professional authorship remains necessary. I also believe that to be a professional author, creators need time, which, in turn, does require some form of payment. We need healthy financial flows to allow professional authors to make a decent, market-based living. This requires a move away from one-size-fits-all copyright and the resulting "tug of norms" that requires a shift of the entire policy package to the benefit of one category …


A New Taxonomy For Online Harms, Kate Klonick Jan 2015

A New Taxonomy For Online Harms, Kate Klonick

Faculty Publications

(Excerpt)

Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …