Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (182)
- Intellectual Property Law (95)
- Science and Technology Law (61)
- Computer Law (56)
- Social and Behavioral Sciences (51)
-
- First Amendment (48)
- Privacy Law (48)
- Communications Law (39)
- Constitutional Law (39)
- International Law (33)
- Law and Society (27)
- Legal Writing and Research (27)
- Legal Education (24)
- Business (19)
- Antitrust and Trade Regulation (18)
- Communication (18)
- Administrative Law (17)
- Criminal Law (15)
- Law and Economics (15)
- Public Affairs, Public Policy and Public Administration (15)
- Communication Technology and New Media (13)
- Contracts (13)
- Jurisdiction (13)
- Torts (13)
- Arts and Humanities (12)
- Business Organizations Law (12)
- Legal Profession (12)
- Civil Rights and Discrimination (11)
- Library and Information Science (11)
- Institution
-
- Boston University School of Law (31)
- American University Washington College of Law (25)
- Roger Williams University (20)
- University of Pennsylvania Carey Law School (16)
- University of Colorado Law School (15)
-
- University of Georgia School of Law (15)
- Maurer School of Law: Indiana University (14)
- University of Baltimore Law (13)
- University of Michigan Law School (13)
- Columbia Law School (12)
- George Washington University Law School (11)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (11)
- New York Law School (10)
- University of Florida Levin College of Law (10)
- University of Kentucky (10)
- University of New Hampshire (10)
- University of Pittsburgh School of Law (10)
- William & Mary Law School (10)
- Fordham Law School (9)
- University of Tennessee College of Law (9)
- Cleveland State University (8)
- University of Maryland Francis King Carey School of Law (8)
- University of Missouri School of Law (8)
- University of Richmond (7)
- Pace University (6)
- Schulich School of Law, Dalhousie University (6)
- Saint Louis University School of Law (5)
- St. John's University School of Law (5)
- The University of Akron (5)
- University of Miami Law School (5)
- Publication Year
- Publication
-
- Faculty Scholarship (72)
- All Faculty Scholarship (36)
- Faculty Publications (36)
- Articles (29)
- Scholarly Works (26)
-
- Articles in Law Reviews & Other Academic Journals (20)
- Articles by Maurer Faculty (14)
- Publications (14)
- Law Faculty Scholarship (13)
- GW Law Faculty Publications & Other Works (11)
- Law Faculty Scholarly Articles (10)
- UF Law Faculty Publications (10)
- Articles & Chapters (9)
- Law Faculty Publications (8)
- Law Faculty Articles and Essays (7)
- Law Library Newsletters/Blog (7)
- Life of the Law School (1993- ) (7)
- Elisabeth Haub School of Law Faculty Publications (6)
- Akron Law Faculty Publications (5)
- Articles, Book Chapters, & Popular Press (5)
- Boyd Briefs / Road Scholars (5)
- Faculty of Law, Humanities and the Arts - Papers (Archive) (5)
- Joint PIJIP/TLS Research Paper Series (5)
- Journal Articles (5)
- LLM Theses and Essays (5)
- Faculty Articles (4)
- Faculty Journal Articles and Book Chapters (4)
- Faculty Works (4)
- Faculty Publications & Other Works (3)
- Popular Media (3)
- File Type
Articles 151 - 180 of 446
Full-Text Articles in Law
Technology And Client Communications: Preparing Law Students And New Lawyers To Make Choices That Comply With The Ethical Duties Of Confidentiality, Competence, And Communication, Kristin J. Hazelwood
Technology And Client Communications: Preparing Law Students And New Lawyers To Make Choices That Comply With The Ethical Duties Of Confidentiality, Competence, And Communication, Kristin J. Hazelwood
Law Faculty Scholarly Articles
That the use of technology has radically changed the legal profession is beyond dispute. Through technology, lawyers can now represent clients in faraway states and countries, and they can represent even local clients through a “virtual law office.” Gone are the times in which the lawyer’s choices for communicating with clients primarily involve preparing formal business letters to convey advice, holding in-person client meetings in the office, or conducting telephone calls with clients on landlines from the confines of the lawyer’s office. Not only do lawyers have choices about how to communicate with their clients, but they also frequently choose …
Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson
Trial By Google: Judicial Notice In The Information Age, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
This Article presents a theory of judicial notice for the information age. It argues that the ease of accessing factual data on the Internet allows judges and litigants to expand the use of judicial notice in ways that raise significant concerns about admissibility, reliability, and fair process. State and federal courts are already applying the surprisingly pliant judicial notice rules to bring websites ranging from Google Maps to Wikipedia into the courtroom, and these decisions will only increase in frequency in coming years. This rapidly emerging judicial phenomenon is notable for its ad hoc and conclusory nature – attributes that …
The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello
The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello
Faculty Scholarship
This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …
Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll
Pinterest And Copyright's Safe Harbors For Internet Providers, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
Has the time come to substantially revise the Copyright Act to better adapt the law to the ever-evolving digital environment? A number of influential sources appear to think so. If their initiatives gain momentum, it will be important to consider lessons learned from the first such effort fifteen years ago when Congress made far-reaching changes to copyright law by extending the term of copyright for twenty years and by enacting a package of reform proposals known as the Digital Millennium Copyright Act (“DMCA”). This Article intertwines the story of one important provision of the DMCA - safe harbors for Internet …
Do Objects Dream Of An Internet Of Things?, Teodor Mitew
Do Objects Dream Of An Internet Of Things?, Teodor Mitew
Faculty of Law, Humanities and the Arts - Papers (Archive)
This paper develops the notion of heteroclite sociable objects in the context of the emerging internet of things, and examines their transformative effect for understandings of sociability and agency. The notion of sociable objects attempts to capture the heterogeneous identity-shift occurring when heretofore obscure and mute objects ranging from toasters to thermostats acquire the agencies to leave semantically distinct traces online, and detour their human interlocutors into an object-mediated entanglement. Using a toolkit drawn from actor network theory and object oriented ontology, the paper discusses several examples illustrating the case for new parameters of sociability, better suited to a materiality …
Teenage Crowdfunding, Andrew A. Schwartz
Teenage Crowdfunding, Andrew A. Schwartz
Publications
Teenage startups are in the public interest and should be encouraged, yet the federal CARD Act of 2009 eliminated credit card financing for many such companies, cutting off an important source of early-stage business capital for teenage entrepreneurs. Since then, however, Congress passed the CROWDFUND Act of 2012 which will allow teenagers to raise early-stage financing through Internet crowdfunding. Teens, being masters of the Internet, are well positioned to exploit this new opportunity, with the upshot being that securities crowdfunding may become an important way for youthful entrepreneurs to fund their business dreams.
Reviving Implied Confidentiality, Woodrow Hartzog
Reviving Implied Confidentiality, Woodrow Hartzog
Faculty Scholarship
The law of online relationships has a significant flaw-it regularly fails to account for the possibility of an implied confidence. The established doctrine of implied confidentiality is, without explanation, almost entirely absent from online jurisprudence in environments where it has traditionally been applied offline, such as with sensitive data sets and intimate social interactions.
Courts' abandonment of implied confidentiality in online environments should have been foreseen. The concept has not been developed enough to be consistently applied in environments such as the Internet that lack obvious physical or contextual cues of confidence. This absence is significant because implied confidentiality could …
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Faculty Scholarship
This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Faculty Scholarship
This article discusses the intellectual property issues from "meatspace" to online services and the Internet. It further explores intellectual property issues from the Internet to the Cloud. Finally, it discusses the implications of cloud computing for trade secret protection.
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Regulating The Internet Of Things: First Steps Toward Managing Discrimination, Privacy, Security, And Consent, Scott R. Peppet
Publications
The consumer "Internet of Things" is suddenly reality, not science fiction. Electronic sensors are now ubiquitous in our smartphones, cars, homes, electric systems, health-care devices, fitness monitors, and workplaces. These connected, sensor-based devices create new types and unprecedented quantities of detailed, high-quality information about our everyday actions, habits, personalities, and preferences. Much of this undoubtedly increases social welfare. For example, insurers can price automobile coverage more accurately by using sensors to measure exactly how you drive (e.g., Progressive 's Snapshot system), which should theoretically lower the overall cost of insurance. But the Internet of Things raises new and difficult questions …
Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler
Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Failing Expectations: Fourth Amendment Doctrine In The Era Of Total Surveillance, Olivier Sylvain
Faculty Scholarship
Today’s reasonable expectation test and the third-party doctrine have little to nothing to offer by way of privacy protection if users today are at least conflicted about whether transactional noncontent data should be shared with third parties, including law enforcement officials. This uncertainty about how to define public expectation as a descriptive matter has compelled courts to defer to legislatures to find out what public expectation ought to be more as a matter of prudence than doctrine. Courts and others presume that legislatures are far better than courts at defining public expectations about emergent technologies.This Essay argues that the reasonable …
After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane
After Search Neutrality: Drawing A Line Between Promotion And Demotion, Daniel A. Crane
Articles
The Federal Trade Commission's (“FTC” or “the commission”) January 3, 2013 decision to close its longstanding investigation of Google1 brings to a close a flurry of discussion over the possibility that Google could become subject to a “search neutrality” principle in the United States. Although the Commission found against Google on several grounds, it rejected petitions from Google's critics to create a search neutrality principle as a matter of antitrust law. This essay briefly analyzes what remains of U.S. antitrust scrutiny of Internet search bias after the Google settlement. In particular, it suggests that a sensible line can be drawn …
Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman
Copyright’S Private Ordering And The 'Next Great Copyright Act', Jennifer E. Rothman
All Faculty Scholarship
Private ordering plays a significant role in the application of intellectual property laws, especially in the context of copyright law. In this Article, I highlight some of the dominant modes of private ordering and consider what formal copyright law should do, if anything, to engage with private ordering in the copyright space. I conclude that there is not one single approach that copyright law should take with regard to private ordering, but instead several different approaches. In some instances, the best option is for the law to get out of the way and simply continue to provide room for various …
"The Disorderly Conduct Of Words": Civil Liability For Injuries Caused By The Dissemination Of False Or Inaccurate Information, Richard C. Ausness
"The Disorderly Conduct Of Words": Civil Liability For Injuries Caused By The Dissemination Of False Or Inaccurate Information, Richard C. Ausness
Law Faculty Scholarly Articles
This Article is concerned with the potential liability of those who disseminate false or inaccurate information that causes physical injury or property damage to those who rely upon it. However, this Article will not address the question of whether those who advocate or depict violence or other antisocial activities should also be subject to liability. For the most part, such publications are considered to be a form of constitutionally protected speech, even when they directly cause physical harm to others. Although the issue of liability for the publication of factually inaccurate information is narrower in scope than liability for the …
Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande
Should The Internet Exempt The Media Sector From The Antitrust Laws?, Thomas J. Horton, Robert H. Lande
All Faculty Scholarship
This article examines whether the "old media" and the "new media", including the Internet, should be considered to be within the same relevant market for antitrust purposes. To do this the article first demonstrates that proper antitrust consideration of the role of non-price competition necessitates that “news” and “journalism” be analyzed in two distinct ways. First, every part of the operations of a newspaper (or other type of media source), including its investigative reporting and local coverage, should be assessed separately. We present empirical evidence collected for this study which demonstrates that the old media continues to win the vast …
The Implications Of Excluding State Crimes From 47 U.S.C. §230’S Immunity, Eric Goldman
The Implications Of Excluding State Crimes From 47 U.S.C. §230’S Immunity, Eric Goldman
Faculty Publications
In June 2013, the State Attorneys General signaled their intent to ask Congress to amend 47 U.S.C. 230, the federal law that says websites aren't liable for third party content. The State AGs want to exclude state criminal prosecutions from the immunity. This essay explains the problems such an amendment would create for the Internet user-generated content community.
Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park
Unauthorized Televised Debate Footage In Political Campaign Advertising: Fair Use And The Dmca, Susan Park
Management Faculty Publications and Presentations
No abstract provided.
The Referendum Process In Maryland: Balancing Respect For Representative Government With The Right To Direct Democracy, Steven G. Shapiro
The Referendum Process In Maryland: Balancing Respect For Representative Government With The Right To Direct Democracy, Steven G. Shapiro
Articles in Law Reviews & Other Academic Journals
This article will examine the Maryland referendum petition process to determine whether any changes in the current law should or could be made. This includes whether the legislature should reverse the holding in Whitley, whether it should add additional requirements to and restrictions on the signature gathering process, and whether the percentage of voters needed for a successful challenge should be increased.
First, as a matter of policy, should the law be changed? For example, does it strike the proper balance between respect for the legislative process and allowing for more voices in legislative matters by the public at large? …
Privacy, Antitrust, And Power, Frank Pasquale
Privacy, Antitrust, And Power, Frank Pasquale
Faculty Scholarship
When a dominant internet service collects information about its users, the situation is so far from the usual arm’s-length market transaction that neoclassical economic analysis is misleading. “Lack of surveillance” is not a product that individuals have varying preferences for and purchase accordingly. Rather, surveillance is an inevitable concomitant of life online. We need to tame the power that surveillance entails, rather than continuing to pursue illusory, surveillance-free alternatives on the platform level.
To the extent a company creates profiles of individuals and collects data on them, a third party ought to be collecting reports from the company on how …
The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga
The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga
Law Faculty Publications
Do metaphors influence our information policy preferences? Professor Osenga thinks so, which makes it especially important to choose the right one, as a metaphor is often the primary tool the general public uses to understand information policy. Using a five-point rubric, she evaluates, among others, understanding the Internet as “tubes,” “highway,” “space (cyberspace),” “coffee shop/bar” and “cloud.” Osenga finds them all lacking in important ways. However, she believes the metaphor of the Internet as “ecosystem” is very promising and deserves to be further developed.
Safe Harbor For The Innocent Infringer In The Digital Age, Tonya M. Evans
Safe Harbor For The Innocent Infringer In The Digital Age, Tonya M. Evans
Law Faculty Scholarship
The primary goal of this Article is three-fold: (1) to explore the role of the innocent infringer archetype historically and in the digital age; (2) to highlight the tension between customary and generally accepted online uses and copyright law that compromise efficient use of technology and progress of the digital technologies, the Internet, and society at large; and (3) to offer a legislative fix in the form of safe harbor for direct innocent infringers. Such an exemption seems not only more efficient but also more just in the online environment where unwitting infringement for the average copyright consumer is far …
A Fork In The Stream: The Unjustified Failure Of The Concurrence In J. Mcintyre Machinery Ltd. V. Nicastro To Clarify The Stream Of Commerce Doctrine, Cody Jacobs
Faculty Scholarship
This article critiques the concurring opinion in the recent United States Supreme Court personal jurisdiction decision in J. McIntyre Machinery Ltd. v. Nicastro. That opinion declined to choose between the competing approaches to the stream of commerce doctrine because of perceived flaws in those approaches and because the facts of Nicastro did not involve modern technology.
Consumer products are increasingly distributed through international distribution chains. Whether foreign manufacturers who utilize such chains are amenable to personal jurisdiction in states where their products are distributed has become a hotly litigated issue because of the Supreme Court’s 4-4-1 split decision over 20 …
From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers
From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers
Elisabeth Haub School of Law Faculty Publications
This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …
Digital Planning: The Future Of Elder Law, Naomi R. Cahn
Digital Planning: The Future Of Elder Law, Naomi R. Cahn
GW Law Faculty Publications & Other Works
More than half of individuals over the age of 65 use the Internet or e-mail — and they are a fast-growing population on the Internet. Like most people, however, they have probably not considered how to dispose of their digital life if they become incapacitated or when they die, even though they are in the most likely age group to have drafted a will. Indeed, even if they do engage in planning, they cannot be confident that their wishes will be carried out: only a few states have laws covering probate and digital assets, there is no generally accepted method …
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Durkheim's Internet: Social And Political Theory In Online Society, Ari Ezra Waldman
Articles & Chapters
While the Internet has changed dramatically since the early 1990s, the legal regime governing the right to privacy online and Internet speech is still steeped in a myth of the Internet user, completely hidden from others, in total control of his online experience, and free to come and go as he pleases. This false image of the “virtual self” has also contributed to an ethos of lawlessness, irresponsibility, and radical individuation online, allowing the evisceration of online privacy and the proliferation of hate and harassment.
I argue that the myth of the online anonym is not only false as a …
An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen
An Ethical Duty To Protect One’S Own Information Privacy?, Anita L. Allen
All Faculty Scholarship
People freely disclose vast quantities of personal and personally identifiable information. The central question of this Meador Lecture in Morality is whether they have a moral (or ethical) obligation (or duty) to withhold information about themselves or otherwise to protect information about themselves from disclosure. Moreover, could protecting one’s own information privacy be called for by important moral virtues, as well as obligations or duties? Safeguarding others’ privacy is widely understood to be a responsibility of government, business, and individuals. The “virtue” of fairness and the “duty” or “obligation” of respect for persons arguably ground other-regarding responsibilities of confidentiality and …
Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky
Slides: Impacts Of Energy Deficits In Cooking, Illumination, Water, Sanitation, And Motive Power, Paul S. Chinowsky
2012 Energy Justice Conference and Technology Exposition (September 17-18)
Presenter: Dr. Paul Chinowsky, Director, Mortenson Center in Engineering for Developing Communities; Professor, University of Colorado
25 slides
Crowdsourcing Indie Movies, Henry H. Perritt Jr.
Crowdsourcing Indie Movies, Henry H. Perritt Jr.
All Faculty Scholarship
Crowdsourcing Indie Movies Henry H. Perritt, Jr. Abstract Internet-centered technology developments are revolutionizing the ways in which movies can be made. The use of crowdsourcing to make indie movies is a possibility that has not yet been explored fully, although the use of crowdsourcing to raise money for artistic works is growing. Crowdsourcing can be used for every step of making a movie, increasing the range of collaboration available to creators and reducing capital requirements. The article uses a fictional account of a team of young moviemakers to explain how they can use crowdsourcing for each step of making their …
Finding Legal, Factual, And Other Information In A Digital World, Timothy L. Coggins
Finding Legal, Factual, And Other Information In A Digital World, Timothy L. Coggins
Law Faculty Publications
This updated listing of Internet sites for legal, factual, and other research offers a combination of more established sites and newer sites developed since the publication of the previous listing. The article began as a comprehensive bibliography of research and other sites for an Advanced Legal Research course and a series of continuing education sessions for legal assistants and paralegals.1 The current version includes sites for primary authorities, both federal and state, as well as URLs for other types of information, such as sites that assist in finding expert witnesses and biographical and background information about individuals.