Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2015

Internet Law

Institution
Keyword
Publication

Articles 31 - 60 of 63

Full-Text Articles in Law

The Virtues Of Moderation, James Grimmelmann Jan 2015

The Virtues Of Moderation, James Grimmelmann

Faculty Scholarship

TL;DR—On a Friday in 2005, the Los Angeles Times launched an experiment: a “wikitorial” on the Iraq War that any of the paper’s readers could edit. By Sunday, the experiment had ended in abject failure: vandals overran it with crude profanity and graphic pornography. The wikitorial took its inspiration and its technology from Wikipedia, but missed something essential about how the “the free encyclopedia that anyone can edit” staves off abuse while maintaining its core commitment to open participation.

The difference is moderation: the governance mechanisms that structure participation in a community to facilitate cooperation and prevent abuse. Town meetings …


Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale Jan 2015

Privacy, Autonomy, And Internet Platforms, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


Trust And Social Commerce, Julia Y. Lee Jan 2015

Trust And Social Commerce, Julia Y. Lee

Journal Articles

Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace.

The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …


The Nonfinancial Returns Of Crowdfunding, Andrew A. Schwartz Jan 2015

The Nonfinancial Returns Of Crowdfunding, Andrew A. Schwartz

Publications

Securities crowdfunding — the sale of unregistered securities to the public over the Internet — has come under attack before it has even begun. Legal scholars in particular have expressed concern that investors will lose any money they invest in crowdfunding companies. Even assuming that this may be true from a purely financial perspective, these critics are missing an important point: Crowdfund investors with negative returns will not simply have lost their money, but rather they will have spent it (at least in part) on nonpecuniary benefits, including entertainment, political expression and community building. These nonfinancial returns of crowdfunding are …


Personal Jurisdiction And The "Interwebs", Alan M. Trammell, Derek E. Bambauer Jan 2015

Personal Jurisdiction And The "Interwebs", Alan M. Trammell, Derek E. Bambauer

Scholarly Articles

For nearly twenty years, lower courts and scholars have struggled to figure out how personal jurisdiction doctrine should apply in the Internet age. When does virtual conduct make someone amenable to jurisdiction in any particular forum? The classic but largely discredited response by courts has been to give primary consideration to a commercial Web site’s interactivity. That approach distorts the current doctrine and is divorced from coherent jurisdictional principles. Moreover, scholars have not yielded satisfying answers. They typically have argued either that the Internet is thoroughly exceptional and requires its own rules, or that it is largely unexceptional and can …


Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher Jan 2015

Danger In The Dmca Safe Harbors: The Need To Narrow What Constitutes Red Flag Knowledge, Hank Fisher

Law Student Publications

This comment considers recent cases interpreting the Digital Millennium Copyright Act ("DMCA") and urges Congress to expand the protection of service providers through the DMCA safe harbors. The comment proceeds in six parts. Part I explains contributory and vicarious liability, the applicable sections of the DMCA to this comment, and the fair use doctrine. Part II provides a brief overview of video-sharing websites. It further observes the impact that video-sharing websites have had on digital media, focusing on the impact on the music industry. Part III looks at the recent cases interpreting the DMCA's red flag exception to safe harbor …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


Does Google Content Degrade Google Search? Experimental Evidence, Michael Luca, Tim Wu, Sebastian Couvidat, Daniel Frank Jan 2015

Does Google Content Degrade Google Search? Experimental Evidence, Michael Luca, Tim Wu, Sebastian Couvidat, Daniel Frank

Faculty Scholarship

While Google is known primarily as a search engine, it has increasingly developed and promoted its own content as an alternative to results from other websites. By prominently displaying Google content in response to search queries, Google is able to use its dominance in search to gain customers for this content. This may reduce consumer welfare if the internal content is inferior to organic search results. In this paper, we provide a legal and empirical analysis of this practice in the domain of online reviews. We first identify the conditions under which universal search would be considered anticompetitive. We then …


The Digital Shareholder, Andrew A. Schwartz Jan 2015

The Digital Shareholder, Andrew A. Schwartz

Publications

Crowdfunding, a new Internet-based securities market, was recently authorized by federal and state law in order to create a vibrant, diverse, and inclusive system of entrepreneurial finance. But will people really send their money to strangers on the Internet in exchange for unregistered securities in speculative startups? Many are doubtful, but this Article looks to first principles and finds reason for optimism.

Well-established theory teaches that all forms of startup finance must confront and overcome three fundamental challenges: uncertainty, information asymmetry, and agency costs. This Article systematically examines this “trio of problems” and potential solutions in the context of crowdfunding. …


Cyberharassment And Workplace Law, Helen Norton Jan 2015

Cyberharassment And Workplace Law, Helen Norton

Publications

No abstract provided.


Bridgefunding Crowdfunding And The Market For Entrepreneurial Finance, Seth C. Oranburg Jan 2015

Bridgefunding Crowdfunding And The Market For Entrepreneurial Finance, Seth C. Oranburg

Law Faculty Scholarship

This Article explores the business environment of entrepreneurial finance through the lens of securities regulations. It finds that regulators should be more concerned with protecting investors from startup failure than from crowdfunding fraud. It recommends an amendment to Regula- tion Crowdfunding that may enable startup success: the limit on fun- draising should be raised from $1 to $5 million.


The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble Jan 2015

The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble

Scholarly Works

From the early days of the Internet, commentators have warned that it would be impossible for those who act on the Internet (“Internet actors”) to comply with the copyright laws of all Internet-connected countries if the national copyright laws of all those countries were to apply simultaneously to Internet activity. A multiplicity of applicable copyright laws seems plausible at least when the Internet activity is ubiquitous — i.e., unrestricted by geoblocking or by other means — given the territoriality principle that governs international copyright law and the choice-of-law rules that countries typically use for copyright infringements.

This Article posits that …


Authors, Online, Daniel J. Gervais Jan 2015

Authors, Online, Daniel J. Gervais

Vanderbilt Law School Faculty Publications

The fate of professional creators is a major cultural issue. While specific copyright rules are obviously contingent and should be adapted to the new realities of online distribution and easy reuse, professional authorship remains necessary. I also believe that to be a professional author, creators need time, which, in turn, does require some form of payment. We need healthy financial flows to allow professional authors to make a decent, market-based living. This requires a move away from one-size-fits-all copyright and the resulting "tug of norms" that requires a shift of the entire policy package to the benefit of one category …


A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian Jan 2015

A Conceptual Framework For The Regulation Of Cryptocurrencies, Omri Y. Marian

UF Law Faculty Publications

This Essay proposes a conceptual framework for the regulation of transactions involving cryptocurrencies. Cryptocurrencies offer tremendous opportunities for innovation and development but are also uniquely suited to facilitate illicit behavior. The regulatory framework suggested herein is intended to support (or at least not impair) cryptocurrencies’ innovative potential. At the same time, it aims to disrupt cryptocurrencies’ criminal utility. To achieve these purposes, this Essay proposes a regulatory framework that imposes costs on the characteristics of cryptocurrencies that make them especially useful for criminal behavior (in particular, anonymity) but does not impose costs on characteristics that are at the core of …


The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney Jan 2015

The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney

Articles, Book Chapters, & Popular Press

Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …


Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Wayne Mackay Jan 2015

Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Wayne Mackay

Articles, Book Chapters, & Popular Press

This article focuses on the role and limits of law as a response to cyberbullying. The problem of cyberbullying engages many of our most fundamental legal concepts and provides an interesting case study. Even when there is general agreement that the problem merits a legal response, there are significant debates about what that response should be. Which level and what branch of government can and should best respond? What is the most appropriate legal process for pursuing cyberbullies—traditional legal avenues or more creative restorative approaches? How should the rights and responsibilities of perpetrators, victims and even bystanders be balanced? Among …


Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay Jan 2015

Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay

Articles, Book Chapters, & Popular Press

This article focuses on the role and limits of law as a response to cyberbullying. The problem of cyberbullying engages many of our most fundamental legal concepts and provides an interesting case study. Even when there is general agreement that the problem merits a legal response, there are significant debates about what that response should be. Which level and what branch of government can and should best respond? What is the most appropriate legal process for pursuing cyberbullies—traditional legal avenues or more creative restorative approaches? How should the rights and responsibilities of perpetrators, victims and even bystanders be balanced? Among …


The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney Jan 2015

The Cycles Of Global Telecommunication Censorship And Surveillance, Jonathon Penney

Articles, Book Chapters, & Popular Press

Internet censorship and surveillance is on the rise globally and cyber-warfare increasing in scope and intensity. To help understand these new threats commentators have grasped at historical analogies often with little regard for historical complexity or international perspective. Unfortunately, helpful new works on telecommunications history have focused primarily on U.S. history with little focus on international developments. There is thus a need for further internationally oriented investigation of telecommunications technologies, and their history. This essay attempts to help fill that void, drawing on case studies wherein global telecommunications technologies have been disrupted or censored — telegram censorship and surveillance, high …


Agency Publicity In The Internet Era, Nathan Cortez Jan 2015

Agency Publicity In The Internet Era, Nathan Cortez

Faculty Journal Articles and Book Chapters

This Report, prepared for the Administrative Conference of the United States (ACUS), details how federal agencies use modern forms of publicity - including press releases, agency web sites, searchable online databases, and social media - to achieve regulatory ends. It evaluates the benefits and burdens of modern agency publicity practices, using three agencies as case studies: the Food and Drug Administration (FDA); the Federal Trade Commission (FTC); and the Consumer Financial Protection Bureau (CFPB). Part V recommends a series of largely procedural reforms that balance the need for public disclosure with the need to protect those potentially injured by adverse …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Who Regulates The Robots, Margot Kaminski Jan 2015

Who Regulates The Robots, Margot Kaminski

Publications

No abstract provided.


Electronically Stored Information And The Ancient Documents Exception To The Hearsay Rule: Fix It Before People Find Out About It, Daniel J. Capra Jan 2015

Electronically Stored Information And The Ancient Documents Exception To The Hearsay Rule: Fix It Before People Find Out About It, Daniel J. Capra

Faculty Scholarship

The first website on the Internet was posted in 1991. While there is not much factual content on the earliest websites, it did not take long for factual assertions—easily retrievable today—to flood the Internet. Now, over one hundred billion emails are sent, and ten million static web pages are added to the Internet every day. In 2006 alone, the world produced electronic information that was equal to three million times the amount of information stored in every book ever written. The earliest innovations in electronic communication are now over twenty years old—meaning that the factual assertions made by way of …


Legitimacy And Expertise In Global Internet Governance, Olivier Sylvain Jan 2015

Legitimacy And Expertise In Global Internet Governance, Olivier Sylvain

Faculty Scholarship

Over the course of the past decade or so, attention among Internet policymakers and scholars has shifted gradually from substantive design principles to the structure of Internet governance. The Internet Corporation for Assigning Names and Numbers in particular now faces a new skepticism about its legitimacy to administer the essential Internet Assigned Numbers Authority function. ICANN has responded to these doubts by proposing a series of major governance reforms that would bring nation-states more into the organization's decisionmaking. After all, transnational governance institutions in other substantive areas privilege nation-states as a matter of course. This Symposium Essay shows that these …


Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub Jan 2015

Disagreeable Privacy Policies: Mismatches Between Meaning And Users’ Understanding, Joel R. Reidenberg, Travis Breaux, Lorrie F. Cranor, Brian M. French, Amanda Grannis, James T. Graves, Fei Liu, Aleecia Mcdonald, Thomas B. Norton, Rohan Ramanath, N. Cameron Russell, Norman Sadeh, Florian Schaub

Faculty Scholarship

Privacy policies are verbose, difficult to understand, take too long to read, and may be the least-read items on most websites even as users express growing concerns about information collection practices. For all their faults, though, privacy policies remain the single most important source of information for users to attempt to learn how companies collect, use, and share data. Likewise, these policies form the basis for the self-regulatory notice and choice framework that is designed and promoted as a replacement for regulation. The underlying value and legitimacy of notice and choice depends, however, on the ability of users to understand …


A New Taxonomy For Online Harms, Kate Klonick Jan 2015

A New Taxonomy For Online Harms, Kate Klonick

Faculty Publications

(Excerpt)

Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …


Confronting Big Data: Applying The Confrontation Clause To Government Big Data Collection, Chad Squitieri Jan 2015

Confronting Big Data: Applying The Confrontation Clause To Government Big Data Collection, Chad Squitieri

Scholarly Articles

When government investigators request data from companies such as Google, they obtain data on targeted individuals with a guarantee that the data has been collected, stored, and analyzed properly. These guarantees constitute a testimonial statement under the Confrontation Clause. Similar to lab analysts who submit test results of cocaine samples or blood alcohol levels, this Note argues that analysts involved with the collection, storage, and analysis of big data must be available for confrontation under the Sixth Amendment.


Charitable Organization Oversight: Rules V. Standards, Philip Hackney Jan 2015

Charitable Organization Oversight: Rules V. Standards, Philip Hackney

Articles

Congress has traditionally utilized standards as a means of communicating charitable tax law in the Code. In the past fifteen years, however, Congress has increasingly turned to rules to stop fraud and abuse in the charitable sector. I review the rules versus standards debate to evaluate this trend. Are Congressional rules the best method for regulating the charitable sector? While the complex changing nature of charitable purpose would suggest standards are better, the inadequacy of IRS enforcement and the large number of unsophisticated charitable organizations both augur strongly in favor of rules. Congress, however, is not the ideal institution to …


Data Breach (Regulatory) Effects, David Thaw Jan 2015

Data Breach (Regulatory) Effects, David Thaw

Articles

No abstract provided.


Increasing The Transaction Costs Of Harassment, Woodrow Hartzog, Evan Selinger Jan 2015

Increasing The Transaction Costs Of Harassment, Woodrow Hartzog, Evan Selinger

Faculty Scholarship

Wouldn’t it be nice if the rules, agreements, and guidelines designed to prevent online harassment were sufficient to curb improper behavior? As if. Wrongdoers are not always so easily deterred. Sometimes these approaches are about as effective as attacking tanks with toothpicks.

As Danielle Citron contends in her critically important work, Hate Crimes in Cyberspace, the design of the Internet facilitates vitriol and abuse, even when it is legally, contractually, and normatively prohibited. Communicating almost effortlessly at distance—sometimes anonymously and typically with minimized body language—can heighten emotional detachment and blunt moral sensitivity. Tragically, when a mediated environment makes it …


Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo Jan 2015

Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo

All Faculty Scholarship

Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.