Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (12)
- Privacy Law (7)
- Computer Law (5)
- Intellectual Property Law (5)
- Social and Behavioral Sciences (5)
-
- Legal Education (3)
- Public Affairs, Public Policy and Public Administration (3)
- Science and Technology Law (3)
- Business Organizations Law (2)
- Contracts (2)
- Economics (2)
- Law and Society (2)
- National Security Law (2)
- Political Science (2)
- Administrative Law (1)
- American Politics (1)
- Antitrust and Trade Regulation (1)
- Behavioral Economics (1)
- Civil Procedure (1)
- Commercial Law (1)
- Communication (1)
- Communication Technology and New Media (1)
- Communications Law (1)
- Computer Engineering (1)
- Computer Sciences (1)
- Conflict of Laws (1)
- Courts (1)
- Criminal Law (1)
- Databases and Information Systems (1)
- Institution
-
- Roger Williams University (3)
- Maurer School of Law: Indiana University (2)
- New York Law School (2)
- University of Baltimore Law (2)
- American University Washington College of Law (1)
-
- California Western School of Law (1)
- City University of New York (CUNY) (1)
- Cleveland State University (1)
- Montclair State University (1)
- Ohio Northern University (1)
- Old Dominion University (1)
- Penn State Law (1)
- St. John's University School of Law (1)
- The University of Notre Dame Australia (1)
- University of Arkansas, Fayetteville (1)
- University of Denver (1)
- University of Kentucky (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of Missouri-Kansas City School of Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Tennessee College of Law (1)
- Valparaiso University (1)
- Vanderbilt University Law School (1)
- Publication
-
- All Faculty Scholarship (2)
- Articles (2)
- Articles & Chapters (2)
- Articles by Maurer Faculty (2)
- Life of the Law School (1993- ) (2)
-
- Articles in Law Reviews & Other Academic Journals (1)
- College of Law Faculty Scholarship (1)
- Department of Political Science and Law Faculty Scholarship and Creative Works (1)
- Faculty Publications (1)
- Faculty Scholarship (1)
- Faculty Works (1)
- Journal Articles (1)
- Law Faculty Articles and Essays (1)
- Law Faculty Publications (1)
- Law Faculty Scholarly Articles (1)
- Law Faculty Scholarship (1)
- Law Papers and Journal Articles (1)
- Policy Briefs (1)
- Publications and Research (1)
- Scholarly Works (1)
- School of Law Conferences, Lectures & Events (1)
- Sociology & Criminal Justice Faculty Publications (1)
- Sturm College of Law: Faculty Scholarship (1)
- Vanderbilt Law School Faculty Publications (1)
Articles 1 - 29 of 29
Full-Text Articles in Law
Newsroom: Practicing Law With Amazon.Com, Roger Williams University School Of Law
Newsroom: Practicing Law With Amazon.Com, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Analysis Of Freedom Of Information For Its Effect On Society By Considering 2011, The Year Of The Arab Spring, Paul D. Callister, Kimberlee Everson
Analysis Of Freedom Of Information For Its Effect On Society By Considering 2011, The Year Of The Arab Spring, Paul D. Callister, Kimberlee Everson
Faculty Works
2011, the year of the Arab Spring, presents a unique opportunity to look back and study how the relative freedom and development of information environments affect stability in nations throughout the Middle East and world. Such study raises interesting questions about whether freedom of information and speech are ultimately stabilizing influences for society in terms of loyalty, violence and political unrest — questions all the more important as societies face the onslaught of the internet, mobile devices and cell phones. Are non-democratic regimes “better off” by monopolizing and controlling the flow of information over new information channels? Are democratic societies, …
Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring
Economies Of The Internet I: Intersections, Kylie Jarrett, Julia Velkova, Peter Jakobsson, Roderick Graham, David Gehring
Sociology & Criminal Justice Faculty Publications
The internet has increasingly been conceptualized as a space of economic activity. This contemporary imaginary has been particularly influenced by insights from the school of Autonomist Marxism in the foundational work of Tiziana Terranova and through the dominance of Christian Fuchs’ application of Marxist economic concepts. While this has generated great insight into the political economy of the internet, and in particular allowed for the conceptualization of user activity as labor, this approach is only one paradigm for considering the economic activities and implications of the internet. For internet research, there is also the need to move beyond the long …
Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law
Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman
Law Faculty Publications
Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …
Broadband Access In Arkansas Schools, Sarah C. Mckenzie, Gary W. Ritter
Broadband Access In Arkansas Schools, Sarah C. Mckenzie, Gary W. Ritter
Policy Briefs
With the computer-based Partnership for Assessment of Readiness for College and Career (PARCC) test, the Arkansas Digital Learning Act, and Governor Hutchinson’s efforts to increase participation in computer science courses, the Arkansas Legislature is discussing actions to take in order to close the “digital divide” in the state. This brief will explore the technological requirements of providing the recommended bandwidth to schools, the barriers to the provision of that service, and potential steps for the Arkansas Department of Education to take in order to ensure that every Arkansas student has fast, consistent access to the Internet to support their learning.
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Are They Worth Reading? An In-Depth Analysis Of Online Trackers’ Privacy Policies, Candice Hoke, Lorrie Faith Cranor, Pedro Giovanni Leon, Alyssa Au
Law Faculty Articles and Essays
We analyzed the privacy policies of 75 online tracking companies with the goal of assessing whether they contain information relevant for users to make privacy decisions. We compared privacy policies from large companies, companies that are members of self-regulatory organizations, and nonmember companies and found that many of them are silent with regard to important consumer-relevant practices including the collection and use of sensitive information and linkage of tracking data with personally-identifiable information. We evaluated these policies against self-regulatory guidelines and found that many policies are not fully compliant. Furthermore, the overly general requirements established in those guidelines allow companies …
Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame
Life And Death In The Mental-Health Blogosphere: An Analysis Of Blog Content And Survival, Edward Alan Miller, Antoinette Pole, Bukola Usidame
Department of Political Science and Law Faculty Scholarship and Creative Works
The purpose of this study was to describe a sample of mental-health blogs, to determine the proportion of sampled blogs still posting several years after identification, and to identify the correlates of survival. One hundred eighty-eight mental-health blogs were identified in 2007–08 and revisited in 2014. Eligible blogs were U.S.-based, in English, and active. Baseline characteristics and survival status were described and variation based on blog focus and survival examined. Mental health bloggers tended to be females blogging as patients and caregivers focusing on specific mental illnesses/conditions. The proportion of blogs still active at follow-up ranged from 25.5 percent to …
At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld
At The Fontier Of The Younger Doctrine: Reflections On Google V. Hood, Gil Seinfeld
Articles
On December 19, 2014, long-simmering tensions between Mississippi Attorney General Jim Hood and the search engine giant Google boiled over into federal court when Google filed suit against the Attorney General to enjoin him from bringing civil or criminal charges against it for alleged violations of the Mississippi Consumer Protection Act. Hood had been investigating and threatening legal action against Google for over a year for its alleged failure to do enough to prevent its search engine, advertisements, and YouTube website from facilitating public access to illegal, dangerous, or copyright protected goods. The case has garnered a great deal of …
Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods
Data Beyond Borders: Mutual Legal Assistance In The Internet Era, Andrew K. Woods
Law Faculty Scholarly Articles
The global nature of today’s Internet services presents a unique challenge to international law enforcement cooperation. On a daily basis, law enforcement agents in one country seek access to data that is beyond their jurisdictional reach; as one industry analyst put it, there has been, “an internationalization of evidence.” In order to gain lawful access to data that is subject to another state’s jurisdiction, law enforcement agents must request mutual legal assistance (MLA) from the country that can legally compel the data’s disclosure. But the MLA regime has not been updated to manage the enormous rise of requests for MLA. …
Googling Down The Cost Of Low Sanctions, Gregory Dolin
Googling Down The Cost Of Low Sanctions, Gregory Dolin
All Faculty Scholarship
This brief solicited response addresses Prof. Irina Manta's article "The High Cost of Low Sanctions," which appeared in 66 Florida Law Review 157 (2014). Prof. Manta argued argues that to the extent the substantive law is unjust, low sanctions, in the long run, potentially create more problems and are more likely to perpetuate injustice than high sanctions would. She demonstrates that the general theory is applicable to the world of copyright, and then explains why as of late, the public has become more aware of and more resistant to the imposition of additional sanctions. In Professor Manta's view, the reason …
Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman
Privacy As Trust: Sharing Personal Information In A Networked World, Ari Ezra Waldman
Articles & Chapters
This Article is the first in a series on the legal and sociological aspects of privacy, arguing that private contexts are defined by relationships of trust among individuals. The argument reorients privacy scholarship from an individual right to social relationships of disclosure. This has implications for a wide variety of vexing problems of modern privacy law, from limited disclosures to “revenge porn.”
The common everyday understanding is that privacy is about choice, autonomy, and individual freedom. It encompasses the individual’s right to determine what he will keep hidden and what, how, and when he will disclose to the public. Privacy …
Redefining Attention (And Revamping The Legal Profession?) For The Digital Generation, Lauren A. Newell
Redefining Attention (And Revamping The Legal Profession?) For The Digital Generation, Lauren A. Newell
Law Faculty Scholarship
With computers, text messages, Facebook, cell phones, smartphones, tablets, iPods, and other information and communication technologies (“ICTs”) constantly competing for our attention, we live in an age of perpetual distraction. Educators have long speculated that constant exposure to ICTs is eroding our ability to stay focused, and recent research supports these speculations. This raises particularly troubling implications for the practice of law, in which being able to pay sustained attention to the task at hand is crucial.
Research also indicates that the brains of today’s young people, the “Digital Generation,” may function differently than the brains of their elders because …
Cyberbullying - When Does A School Authority's Liability In Tort End?, Robert Pelletier, Boris Handal, Jessica Khalil, Tryon Francis
Cyberbullying - When Does A School Authority's Liability In Tort End?, Robert Pelletier, Boris Handal, Jessica Khalil, Tryon Francis
Law Papers and Journal Articles
Cyberbullying in schools is increasing on an alarming rate. The development of the Internet and smartphone technology have increased the potential scope of a school authority’s duty of care for its students. A question frequently asked by educators is “Where does a school authority’s duty of care end in the interconnected, 24/7 world of the Internet?” This paper argues that a duty of care will be owed where the school is in a school/student relationship with its students. That relationship can exist outside the school gates and outside of school hours.
There are no decisions of senior appellate courts that …
Trust And Social Commerce, Julia Y. Lee
Trust And Social Commerce, Julia Y. Lee
Journal Articles
Internet commerce has transformed the marketing of goods and services. The separation between point of sale and seller, and the presence of geographically dispersed sellers who do not engage in repeated transactions with the same customers challenge traditional mechanisms for building the trust required for commercial exchanges. In this changing environment, legal rules and institutions play a diminished role in building trust. Instead, new systems and methods are emerging to foster trust in one-shot commercial transactions in cyberspace.
The Article focuses on the rise of “social commerce,” a socio-economic phenomenon centered on the use of social media and other modes …
Internet Freedom With Teeth, Charles Duan
Internet Freedom With Teeth, Charles Duan
Articles in Law Reviews & Other Academic Journals
"You make the very salient statement that we shouldn't lose sight of the fact that this is a case about teeth. Well, Markman was a case about dry cleaning. But nobody thinks of Markman as standing for anything about dry cleaning."
So went what was Chief Judge Prost's perhaps most striking question to the attorney for the International Trade Commission at oral argument in ClearCorrect Operating, LLC v. International Trade Commission, which is the focus of Professor Sapna Kumar's recent article Regulating Digital Trade. Yet this is what remains so fascinating about ClearCorrect: an administrative agency decision about idiosyncratic facts …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble
The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble
Scholarly Works
From the early days of the Internet, commentators have warned that it would be impossible for those who act on the Internet (“Internet actors”) to comply with the copyright laws of all Internet-connected countries if the national copyright laws of all those countries were to apply simultaneously to Internet activity. A multiplicity of applicable copyright laws seems plausible at least when the Internet activity is ubiquitous — i.e., unrestricted by geoblocking or by other means — given the territoriality principle that governs international copyright law and the choice-of-law rules that countries typically use for copyright infringements.
This Article posits that …
Authors, Online, Daniel J. Gervais
Authors, Online, Daniel J. Gervais
Vanderbilt Law School Faculty Publications
The fate of professional creators is a major cultural issue. While specific copyright rules are obviously contingent and should be adapted to the new realities of online distribution and easy reuse, professional authorship remains necessary. I also believe that to be a professional author, creators need time, which, in turn, does require some form of payment. We need healthy financial flows to allow professional authors to make a decent, market-based living. This requires a move away from one-size-fits-all copyright and the resulting "tug of norms" that requires a shift of the entire policy package to the benefit of one category …
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, Nancy Kim, D.A. Jeremy Telman
Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, Nancy Kim, D.A. Jeremy Telman
Faculty Scholarship
Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …
A New Taxonomy For Online Harms, Kate Klonick
A New Taxonomy For Online Harms, Kate Klonick
Faculty Publications
(Excerpt)
Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Articles by Maurer Faculty
Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …
Communication In Cyberspace, Nancy Leong, Joanne Morando
Communication In Cyberspace, Nancy Leong, Joanne Morando
Sturm College of Law: Faculty Scholarship
This Article examines a problem in cybercrime law that is both persistent and pervasive. What counts as “communication” on the Internet? Defining the term is particularly important for crimes such as cyberstalking, cyberharassment, and cyberbullying, where most statutes require a showing that the alleged perpetrator “communicated” with the victim or impose a similar requirement through slightly different language.
This Article takes up the important task of defining communication. As a foundation to our discussion, we provide the first comprehensive survey of state statutes and case law relating to cyberstalking, cyberharassment, and cyberbullying. We then examine the realities of the way …
From Anonymity To Identification, A. Michael Froomkin
From Anonymity To Identification, A. Michael Froomkin
Articles
This article examines whether anonymity online has a future. In the early days of the Internet, strong cryptography, anonymous remailers, and a relative lack of surveillance created an environment conducive to anonymous communication. Today, the outlook for online anonymity is poor. Several forces combine against it: ideologies that hold that anonymity is dangerous, or that identifying evil-doers is more important than ensuring a safe mechanism for unpopular speech; the profitability of identification in commerce; government surveillance; the influence of intellectual property interests and in requiring hardware and other tools that enforce identification; and the law at both national and supranational …
Integrating The Internet, Brad Areheart
Integrating The Internet, Brad Areheart
College of Law Faculty Scholarship
This Article argues that the paradigmatic right of people with disabilities “to live in the world” naturally encompasses the right “to live in the Internet.” It further argues that the Internet is rightly understood as a place of public accommodation under antidiscrimination law. Because public accommodations are indispensable to integration, civil rights advocates have long argued that marginalized groups must have equal access to the physical institutions that enable one to learn, socialize, transact business, find jobs, and attend school. The Web now provides all of these opportunities and more, but people with disabilities are unable to traverse vast stretches …
The 95 Theses: Legal Research In The Internet Age, Amy E. Sloan
The 95 Theses: Legal Research In The Internet Age, Amy E. Sloan
All Faculty Scholarship
No abstract provided.
Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman
Amplifying Abuse: The Fusion Of Cyberharassment And Discrimination, Ari Ezra Waldman
Articles & Chapters
Cyberharassment devastates its victims. Anxiety, panic attacks, and fear are common effects; post-traumatic stress disorder, anorexia and bulimia, and clinical depression are common diagnoses. Targets of online hate and abuse have gone into hiding, changed schools, and quit jobs to prevent further abuse. Some lives are devastated in adolescence and are never able to recover. Some lives come to tragic, premature ends. Danielle Keats Citron not only teases out these effects in her masterful work, Hate Crimes in Cyberspace; she also makes the profound conclusion that these personal effects are part of a larger social cancer that breeds sexism, subjugation, …