Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet

Discipline
Institution
Publication Year
Publication
File Type

Articles 181 - 210 of 445

Full-Text Articles in Law

Proposal For An International Convention On Online Gambling, Marketa Trimble Jun 2012

Proposal For An International Convention On Online Gambling, Marketa Trimble

Scholarly Works

The proposal, which will be published as a chapter in a volume from the Internet Gaming Regulation Symposium co-organized by the William S. Boyd School of Law of the University of Nevada, Las Vegas, in May 2012, presents the outline of an international convention ('Convention') that will facilitate cooperation among countries in enforcement of their online gambling regulations while allowing the countries to maintain their individual legal approaches to online gambling. Countries continue to vary in their approaches - some permit and regulate, and others prohibit online gambling, and even countries that permit and regulate online gambling approach the issue …


A Pragmatic Approach To Intellectual Property And Development: A Case Study Of The Jordanian Copyright Law In The Internet Age, Rami Olwan Apr 2012

A Pragmatic Approach To Intellectual Property And Development: A Case Study Of The Jordanian Copyright Law In The Internet Age, Rami Olwan

Joint PIJIP/TLS Research Paper Series

On October 4, 2004, Brazil and Argentina requested that WIPO adopt a development-oriented approach to IP and to reconsider its work in relation to developing countries. In October, 2007, WIPO member States adopted a historic decision for the benefit of developing countries, to establish a WIPO Development Agenda. Although there have been several studies related to IP and development that call for IP laws in developing countries to be development-friendly, there is little research that attempts to provide developing countries with practical measures to achieve that goal. This article takes the copyright law in Jordan as a case study and …


Open Secret: Why The Supreme Court Has Nothing To Fear From The Internet, Keith J. Bybee Jan 2012

Open Secret: Why The Supreme Court Has Nothing To Fear From The Internet, Keith J. Bybee

Institute for the Study of the Judiciary, Politics, and the Media at Syracuse University

The United States Supreme Court has an uneasy relationship with openness: it complies with some calls for transparency, drags its feet in response to others, and sometimes simply refuses to go along. I argue that the Court’s position is understandable given that the internet age of fluid information and openness has often been heralded in terms that are antithetical to the Court’s operations. Even so, I also argue the Court actually has little to fear from greater transparency. The understanding of the Court with the greatest delegitimizing potential is the understanding that the justices render decisions on the basis of …


Technology Drives The Law: A Foreword To Trends And Issues In Techology & The Law, Ralph D. Clifford Jan 2012

Technology Drives The Law: A Foreword To Trends And Issues In Techology & The Law, Ralph D. Clifford

Faculty Publications

Technology has always been a motivating force of change in the law. The creation of new machines and development of novel methods of achieving goals force the law to adapt with new and responsive rules. This is particularly true whenever a new technology transforms society. Whether it is increasing industrialization or computerization, pre-existing legal concepts rarely survive the transition unaltered - new prescriptions are announced while old ones disappear.


Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski Jan 2012

Incitement To Riot In The Age Of Flash Mobs, Margot E. Kaminski

Publications

As people increasingly use social media to organize both protests and robberies, government will try to regulate these calls to action. With an eye to this intensifying dynamic, this Article reviews First Amendment jurisprudence on incitement and applies it to existing statutes on incitement to riot at a common law, state, and federal level. The article suggests that First Amendment jurisprudence has a particularly tortuous relationship with regulating speech directed to crowds. It examines current crowd psychology to suggest which crowd behavior, if any, should as a matter of policy be subject to regulation. It concludes that many existing incitement-to-riot …


Taxing Facebook Code: Debugging The Tax Code And Software, Xuan-Thao Nguyen, Jeffrey A. Maine Jan 2012

Taxing Facebook Code: Debugging The Tax Code And Software, Xuan-Thao Nguyen, Jeffrey A. Maine

Articles

This article sets out to analyze both intellectual property laws and tax systems as applied to computer software. It analyzes software within intellectual property's established doctrinal framework, a difficult task due to the fact that software can encompass some combination of the traits of copyrights, trade dress, patents, and trade secrets. It then examines both the federal and state tax systems governing software. It shows that fitting software within current tax schemes presents unique challenges, as software contains both tangible and intangible elements, is subject to varying intellectual property protections, and can be delivered through various media. The article argues …


Chain-Link Confidentiality, Woodrow Hartzog Jan 2012

Chain-Link Confidentiality, Woodrow Hartzog

Faculty Scholarship

Disclosing personal information online often feels like losing control over one’s data forever; but this loss is not inevitable. This essay proposes a “chain-link confidentiality” approach to protecting online privacy. One of the most difficult challenges to guarding privacy in the digital age is the protection of information once it is exposed to other people. A chain-link confidentiality regime would contractually link the disclosure of personal information to obligations to protect that information as the information moves downstream. The system would focus on the relationships not only between the discloser of information and the initial recipient, but also between the …


Incendiary Speech And Social Media, Lyrissa Barnett Lidsky Jan 2012

Incendiary Speech And Social Media, Lyrissa Barnett Lidsky

UF Law Faculty Publications

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker, even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble Jan 2012

The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble

Scholarly Works

Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location—a territorial partitioning of the Internet. One of these attempts, for example, is the recent Stop Online Piracy Act (“SOPA”) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of erecting borders in cyberspace, focuses on …


All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman Jan 2012

All Those Like You: Identity Aggression And Student Speech, Ari Ezra Waldman

Articles & Chapters

Online and face-to-face harassment in schools requires a coordinated response from the school, parents, students, and government. In this Article, I address a particular subset of online and face-to-face harassment, or identity-based harassment. Identity-based aggressors highlight a quality intrinsic to someone’s personhood and demean it, deprive it of value, and use it as a weapon. They attack women, racial minorities, religious minorities, and other traditionally victimized groups. And, as such, they attack not only their particular victims but also their victims’ communities. Identity-based aggressors com- mit a constitutional evil not only because their behavior interferes with victims’ access to education, …


Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh Jan 2012

Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh

Faculty Scholarship

Patent infringement litigation has not only increased dramatically in frequency over the past few decades,1 but also has also seen striking growth in both stakes and cost.2 Although a relatively rich literature has added much to our understanding of the nature, causes, and consequences of patent litigation during the past two decades,3 many interesting questions remain inadequately addressed. The nuances of and trends in patent litigation in different technology fields and industries, for example, are still understudied.4 Litigation of patents on new technologies has likewise received a dearth of attention. Here we seek to help begin …


Antibiotic Resistance, Jessica D. Litman Jan 2012

Antibiotic Resistance, Jessica D. Litman

Articles

Ten years ago, when I wrote War Stories,' copyright lawyers were fighting over the question whether unlicensed personal, noncommercial copying, performance or display would be deemed copyright infringement. I described three strategies that lawyers for book publishers, record labels, and movie studios had deployed to try to assure that the question was answered the way they wanted it to be. First, copyright owners were labeling all unlicensed uses as "piracy" on the ground that any unlicensed use might undermine copyright owners' control. That epithet helped to obscure the difference between unlicensed uses that invaded defined statutory exclusive rights and other …


Search Neutrality As An Antitrust Principle, Daniel A. Crane Jan 2012

Search Neutrality As An Antitrust Principle, Daniel A. Crane

Articles

Given the Internet's designation as "the great equalizer,"' it is unsurprising that nondiscrimination has emerged as a central aspiration of web governance.2 But, of course, bias, discrimination, and neutrality are among the slipperiest of regulatory principles. One person's bias is another person's prioritization. Fresh on the heels of its initial success in advocating a net neutrality principle,' Google is in the uncomfortable position of trying to stave off a corollary principle of search neutrality.' Search neutrality has not yet coalesced into a generally understood principle, but at its heart is some idea that Internet search engines ought not to prefer …


Vol. 3 No. 1, Fall 2011; The Fcc's Net Neutrality Rules And Mobile Networks: Who Really Rules The Air?, Joseph Pumilia Dec 2011

Vol. 3 No. 1, Fall 2011; The Fcc's Net Neutrality Rules And Mobile Networks: Who Really Rules The Air?, Joseph Pumilia

Northern Illinois Law Review Supplement

The Internet has become an essential part of almost every American's life. The livelihood of many people and business are tied directly to the availability of the Internet. The Internet gives small businesses access to a market that allows them to reach customers all around the world. Many of these businesses have survived only because they are able to reach markets outside of their geographical area. More importantly, the Internet has become the primary platform for the expression and dissemination of ideas. Using the Internet, literally anyone can express themselves while reaching an audience that is unparalleled by any other …


Google’S China Problem: A Case Study On Trade, Technology And Human Rights Under The Gats, Henry S. Gao Dec 2011

Google’S China Problem: A Case Study On Trade, Technology And Human Rights Under The Gats, Henry S. Gao

Research Collection Yong Pung How School Of Law

Trade and human rights have long had a troubled relationship. The advent of new technologies such as internet further complicates the relationship. This article reviews the relationship between trade, technology and human rights in light of the recent dispute between Google and China from both theoretical and practical perspectives. Starting with an overview of the internet censorship regime in China, the article goes on to assess the legal merits of a WTO challenge in this case. First, the article discusses which service sector or subsectors might be at issue. Second, the article analyzes whether and to what extent China has …


Misogynistic Cyber Hate Speech, Danielle Keats Citron Oct 2011

Misogynistic Cyber Hate Speech, Danielle Keats Citron

Faculty Scholarship

In her testimony, Professor Citron provided a picture of misogynistic cyber hate, from the very worst abuses involving the harassment of individuals to less virulent forms of misogyny.


Name Calling On The Internet: The Problems Faced By Victims Of Defamatory Content In Cyberspace, Sarudzai Chitsa Apr 2011

Name Calling On The Internet: The Problems Faced By Victims Of Defamatory Content In Cyberspace, Sarudzai Chitsa

Cornell Law School Inter-University Graduate Student Conference Papers

In the past decade or so, internet libel has become one of the hot topics in internet law. Internationally, courts have dealt with an enormous amount of cases brought by both the suppliers and consumers of the internet services. Although the advent of the World Wide Web has come with many legal problems; this paper will only focus at the problems that are being faced by the victims of defamatory speech on the internet in trying to seek compensation through the courts. These problems include, inter alia, the reluctance of the courts in unmasking the identity of the authors of …


They Do Teach That In Law School: Incorporating Best Practices Into Land Use Law, Patricia E. Salkin Jan 2011

They Do Teach That In Law School: Incorporating Best Practices Into Land Use Law, Patricia E. Salkin

Scholarly Works

This article, prepared as a follow-up to Salkin & Nolon, Practically Grounded: Convergence of Land Use Pedagogy and Best Practice, 60 J.Legal Education 519 (2011), describes how practice-based assignments can supplement the traditional casebook method of instruction to meet goals and measure outcome assessments for students in the course. The article is based on my own course goals and explains how each assignment relates to individual outcome assessments.


Social Networking And Land Use Planning And Regulation: Practical Benefits, Pitfalls And Ethical Considerations, Patricia E. Salkin Jan 2011

Social Networking And Land Use Planning And Regulation: Practical Benefits, Pitfalls And Ethical Considerations, Patricia E. Salkin

Scholarly Works

This article explores how social networking sites have been used or might be used in the land use context. Part I focuses on the use of social networking for land use planning and zoning. It includes a discussion of the pros and cons of the use of social networking sites to present public information and to gather public input and invite general participation in the process, as well as to provide notice to the public of forthcoming government decision-making. This section offers concrete examples of how this technology is currently being used in the land use context. Part II focuses …


Incendiary Speech And Social Media, Lyrissa Lidsky Jan 2011

Incendiary Speech And Social Media, Lyrissa Lidsky

Faculty Publications

Incidents illustrating the incendiary capacity of social media have rekindled concerns about the "mismatch" between existing doctrinal categories and new types of dangerous speech. This Essay examines two such incidents, one in which an offensive tweet and YouTube video led a hostile audience to riot and murder, and the other in which a blogger urged his nameless, faceless audience to murder federal judges. One incident resulted in liability for the speaker even though no violence occurred; the other did not lead to liability for the speaker even though at least thirty people died as a result of his words. An …


Restoring Transparency To Automated Authority, Frank Pasquale Jan 2011

Restoring Transparency To Automated Authority, Frank Pasquale

Faculty Scholarship

Leading finance, health care, and internet firms shroud key operations in secrecy. Our markets, research, and life online are increasingly mediated by institutions that suffer serious transparency deficits. When a private entity grows important enough, it should be subject to transparency requirements that reflect its centrality. The increasing intertwining of governmental, business, and academic entities should provide some leverage for public-spirited appropriators and policymakers to insist on more general openness.

However well an "invisible hand" coordinates economic activity generally, markets depend on reliable information about the practices of core firms that finance, rank, and rate entities in the rest of …


From Bricks And Mortar To Mega-Bytes And Mega-Pixels: The Changing Landscape Of The Impact Of Technology And Innovation On Urban Development, Patricia E. Salkin Jan 2011

From Bricks And Mortar To Mega-Bytes And Mega-Pixels: The Changing Landscape Of The Impact Of Technology And Innovation On Urban Development, Patricia E. Salkin

Scholarly Works

This article reflects upon the impact that technology and innovation has had on urban development. From NASA's Landstat program, to Google maps and GPS, technology has had a significant impact on urban planning and land use law. The article begins with a discussion of the impact of the elevator and steel technologies on urban architecture and density, and then moves to changes in transportation such as the automobile and the development of public transportation systems. Green buildings, GIS, satellite data, online mapping, personal computers, the Internet and cell phones are all examined.


Public Forum 2.0, Lyrissa Lidsky Jan 2011

Public Forum 2.0, Lyrissa Lidsky

Faculty Publications

Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …


Downstream Copyright Infringers, Yvette Joy Liebesman Jan 2011

Downstream Copyright Infringers, Yvette Joy Liebesman

All Faculty Scholarship

The advent of on-line music sales has been a boon to the recording industry as well as for musicians and the general public. Previously unknown artists have found new avenues to showcase their work, and consumers have easy access to an enormous variety of musical genres.

Yet an unintended consequence of the ability to sell songs through internet downloads is a novel, and until now, unnoticed way to infringe on copyrights - which, unless remedied, could lead to new classes of defendants never contemplated or desired to be ensnared in the Copyright Act’s protections for artists, musicians and authors. Unlike …


Not In My Atlantic Yards: Examining Netroots’ Role In Eminent Domain Reform, Kate Klonick Jan 2011

Not In My Atlantic Yards: Examining Netroots’ Role In Eminent Domain Reform, Kate Klonick

Faculty Publications

(Excerpt)

Since the Supreme Court's decision in Kelo v. City of New London, which expanded the state's power to condemn private property and transfer it to other private owners under the Fifth Amendment, there have been significant calls to curb the power of eminent domain through statutory reform. Scholars and jurists in favor of eminent domain reform have asserted that legislation is needed to protect private property rights against the rising tide of state power, with many arguing that such reform should incorporate a public approval process into land use decisions. Those opposed to eminent-domain reform argue that empowering …


Website Design As Contract, Woodrow Hartzog Jan 2011

Website Design As Contract, Woodrow Hartzog

Faculty Scholarship

Few website users actually read or rely upon terms of use or privacy policies. Yet users regularly take advantage of and rely upon website design features like privacy settings. To reconcile the disparity between boilerplate legalese and website design, this article develops a theory of website design as contract. The ability to choose privacy settings, un-tag photos, and delete information is part of the negotiation between websites and users regarding their privacy. Yet courts invariably recognize only the boilerplate terms when analyzing online agreements. In this article, I propose that if significant website features are incorporated into the terms of …


New First Principles? Assessing The Internet's Challenges To Jurisdiction, Teresa Scassa, Robert J. Currie Jan 2011

New First Principles? Assessing The Internet's Challenges To Jurisdiction, Teresa Scassa, Robert J. Currie

Articles, Book Chapters, & Popular Press

The globalized and decentralized Internet has become the new locus for a wide range of human activity, including commerce, crime, communications and cultural production. Activities which were once at the core of domestic jurisdiction have moved onto the Internet, and in doing so, have presented numerous challenges to the ability of states to exercise jurisdiction. In writing about these challenges, some scholars have characterized the Internet as a separate “space” and many refer to state jurisdiction over Internet activities as “extraterritorial.” This article examines these challenges in the context of the overall international law of jurisdiction, rather than focusing on …


Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney Jan 2011

Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney

Articles, Book Chapters, & Popular Press

If there is anything we have learned from recent protest movements around the world, and the heavy-handed government efforts to block, censor, suspend, and manipulate Internet connectivity, it is that access to the Internet, and its content, is anything but certain, especially when governments feel threatened. Despite these hard truths, the notion that people have a "right" to Internet access gained high-profile international recognition last year. In a report to the United Nations General Assembly in early 2011, Frank La Rue, the UN Special Rapporteur on Freedom of Expression, held that Internet access should be recognized as a "human right". …


Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney Jan 2011

Internet Access Rights: A Brief History And Intellectual Origins, Jonathon Penney

Articles, Book Chapters, & Popular Press

If there is anything we have learned from recent protest movements around the world, and the heavy-handed government efforts to block, censor, suspend, and manipulate Internet connectivity, it is that access to the Internet, and its content, is anything but certain, especially when governments feel threatened. Despite these hard truths, the notion that people have a "right" to Internet access gained high-profile international recognition last year. In a report to the United Nations General Assembly in early 2011, Frank La Rue, the UN Special Rapporteur on Freedom of Expression, held that Internet access should be recognized as a "human right". …


Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown Jan 2011

Make Your Life Easier: Free Online Productivity Tools And Resources, Kincaid C. Brown

Law Librarian Scholarship

CiteGenie works primarily for caselaw and Internet resource research but is experimenting with the ability to add citations for statutes and regulations. CiteGenie provides a number of formatting options and allows you to choose citation rules for a particular state, use parallel citations, remove star-pagination marks from quoted texts, and personalize abbreviations. This tool is easy to use; when researching in Firefox, select CiteGenie from the right-click menu and a pop-up displays the copied text and citation to be pasted.