Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers Jan 2013

From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …


Protecting Children On The Internet: Mission Impossible?, Audrey Rogers Jan 2009

Protecting Children On The Internet: Mission Impossible?, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article posits that the Williams Court properly upheld Congress' shift in focus from the images to the speech pandering them. The majority ruled that the inability to complete a crime because of a factual error is not a defense. Its reasoning should lay to rest lingering claims that child protection statutes require an actual child. Nevertheless, the Article explains that the Williams dissent essentially relied on legal impossibility in its finding that the PROTECT Act's pandering provision was unconstitutionally overbroad. In so doing, the dissent reflects the reluctance of many to accept the extent to which adults are seeking …


The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson Jan 2006

The Privacy Gambit: Toward A Game Theoretic Approach To International Data Protection, Horace E. Anderson

Elisabeth Haub School of Law Faculty Publications

This article briefly explores several scenarios in which economic actors compete and cooperate in order to capture the value in personal information. The focus then shifts to one particular scenario: the ongoing interaction between the United States and the European Union in attempting to construct data protection regimes that serve the philosophies and citizens of each jurisdiction as well as provide a strategic economic advantage. A game theoretic model is presented to explain the course of dealings between the two actors, including both unilateral and bilateral actions. Part I ends with an exploration of opportunities for seizing competitive advantage, and …


Playing Hide And Seek: How To Protect Virtual Pornographers And Actual Children On The Internet, Audrey Rogers Jan 2005

Playing Hide And Seek: How To Protect Virtual Pornographers And Actual Children On The Internet, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This Article considers the Supreme Court's suggestion and recommends a mechanism to regulate the virtual pornography market in a manner that balances the rights of virtual pornographers with the prosecution of actual child pornographers. Part II traces the events leading up to the Free Speech decision, commencing with the enactment of the Child Pornography Prevention Act of 1996 (CPPA). Part III discusses the Free Speech opinion and the post-Free Speech cases. Part IV examines the PROTECT Act--the legislative response to the Supreme Court's decision. Part V concludes that regulation of the virtual pornography industry is the most effective method of …


New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers Jan 2004

New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers

Elisabeth Haub School of Law Faculty Publications

This article addresses the general principles of attempt liability, including a description of the doctrines of factual and legal impossibility and the rationale behind the historical treatment of these defenses. Part III describes recent Internet attempt cases, and Part IV analyzes issues raised by such cases. This article suggests that the new Internet cases provide further rationale for rejecting a distinction between factual and legal impossibility that would allow the latter to be a defense. This article also discusses issues surrounding the appropriate mens rea for attempt, and its applicability to Internet cases, where the defendants claim ignorance or indifference …


Evaluation Criteria And Quality Control For Legal Knowledge Systems On The Internet: A Case Study, Marie Stefanini Newman Jan 1999

Evaluation Criteria And Quality Control For Legal Knowledge Systems On The Internet: A Case Study, Marie Stefanini Newman

Elisabeth Haub School of Law Faculty Publications

Professor Newman discusses evaluation criteria for law-oriented Internet sites and how to use these criteria when launching new sites or improving existing sites. She also discusses the use of quality control procedures to ensure accuracy and reliability in Internet sites, and concludes with a case study of the Pace University School of Law's Web site on the United Nations Convention on Contracts for the International Sale of Goods (CISG).