Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (181)
- Intellectual Property Law (95)
- Science and Technology Law (61)
- Computer Law (55)
- Social and Behavioral Sciences (51)
-
- First Amendment (48)
- Privacy Law (48)
- Constitutional Law (39)
- Communications Law (38)
- International Law (33)
- Law and Society (27)
- Legal Writing and Research (27)
- Legal Education (24)
- Business (19)
- Antitrust and Trade Regulation (18)
- Communication (18)
- Administrative Law (17)
- Law and Economics (15)
- Public Affairs, Public Policy and Public Administration (15)
- Criminal Law (14)
- Communication Technology and New Media (13)
- Contracts (13)
- Jurisdiction (13)
- Torts (13)
- Arts and Humanities (12)
- Business Organizations Law (12)
- Legal Profession (12)
- Civil Rights and Discrimination (11)
- Library and Information Science (11)
- Institution
-
- Boston University School of Law (31)
- American University Washington College of Law (25)
- Roger Williams University (20)
- University of Pennsylvania Carey Law School (16)
- University of Colorado Law School (15)
-
- University of Georgia School of Law (15)
- Maurer School of Law: Indiana University (14)
- University of Baltimore Law (13)
- University of Michigan Law School (13)
- Columbia Law School (12)
- George Washington University Law School (11)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (11)
- University of Florida Levin College of Law (10)
- University of Kentucky (10)
- University of New Hampshire (10)
- University of Pittsburgh School of Law (10)
- William & Mary Law School (10)
- Fordham Law School (9)
- New York Law School (9)
- University of Tennessee College of Law (9)
- Cleveland State University (8)
- University of Maryland Francis King Carey School of Law (8)
- University of Missouri School of Law (8)
- University of Richmond (7)
- Pace University (6)
- Saint Louis University School of Law (5)
- Schulich School of Law, Dalhousie University (5)
- The University of Akron (5)
- University of Miami Law School (5)
- University of Washington School of Law (5)
- Publication Year
- Publication
-
- Faculty Scholarship (72)
- All Faculty Scholarship (36)
- Faculty Publications (35)
- Articles (31)
- Scholarly Works (26)
-
- Articles in Law Reviews & Other Academic Journals (20)
- Articles by Maurer Faculty (14)
- Publications (14)
- Law Faculty Scholarship (13)
- GW Law Faculty Publications & Other Works (11)
- Law Faculty Scholarly Articles (10)
- UF Law Faculty Publications (10)
- Articles & Chapters (9)
- Law Faculty Publications (8)
- Law Faculty Articles and Essays (7)
- Law Library Newsletters/Blog (7)
- Life of the Law School (1993- ) (7)
- Elisabeth Haub School of Law Faculty Publications (6)
- Akron Law Faculty Publications (5)
- Articles, Book Chapters, & Popular Press (5)
- Boyd Briefs / Road Scholars (5)
- Faculty of Law, Humanities and the Arts - Papers (Archive) (5)
- Joint PIJIP/TLS Research Paper Series (5)
- Journal Articles (5)
- LLM Theses and Essays (5)
- Faculty Journal Articles and Book Chapters (4)
- Faculty Works (4)
- Faculty Publications & Other Works (3)
- Popular Media (3)
- Scholarly Articles (3)
- File Type
Articles 31 - 60 of 442
Full-Text Articles in Law
A Duty Of Loyalty For Privacy Law, Neil M. Richards, Woodrow Hartzog
A Duty Of Loyalty For Privacy Law, Neil M. Richards, Woodrow Hartzog
Faculty Scholarship
Data privacy law fails to stop companies from engaging in self-serving, opportunistic behavior at the expense of those who trust them with their data. This is a problem. Modern tech companies are so entrenched in our lives and have so much control over what we see and click that the self-dealing exploitation of people has become a major element of the internet’s business model.
Academics and policymakers have recently proposed a possible solution: require those entrusted with people’s data and online experiences to be loyal to those who trust them. But many have concerns about a duty of loyalty. What, …
The Covid-19 Pandemic And The Technology Trust Gap, Johanna Gunawan, David Choffnes, Woodrow Hartzog, Christo Wilson
The Covid-19 Pandemic And The Technology Trust Gap, Johanna Gunawan, David Choffnes, Woodrow Hartzog, Christo Wilson
Faculty Scholarship
Industry and government tried to use information technologies to respond to the COVID-19 pandemic, but using the internet as a tool for disease surveillance, public health messaging, and testing logistics turned out to be a disappointment. Why weren’t these efforts more effective? This Essay argues that industry and government efforts to leverage technology were doomed to fail because tech platforms have failed over the past few decades to make their tools trustworthy, and lawmakers have done little to hold these companies accountable. People cannot trust the interfaces they interact with, the devices they use, and the systems that power tech …
Inescapable Surveillance, Matthew Tokson
Inescapable Surveillance, Matthew Tokson
Utah Law Faculty Scholarship
Until recently, Supreme Court precedent dictated that a person waives their Fourth Amendment rights in information they disclose to another party. The Court reshaped this doctrine in Carpenter v. United States, establishing that the Fourth Amendment protects cell phone location data even though it is revealed to others. The Court emphasized that consumers had little choice but to disclose their data, because cell phone use is virtually inescapable in modern society.
In the wake of Carpenter, many scholars and lower courts have endorsed inescapability as an important factor for determining Fourth Amendment rights. Under this approach, surveillance that people cannot …
Rescuing Our Democracy By Rethinking New York Times Co. V. Sullivan, David A. Logan
Rescuing Our Democracy By Rethinking New York Times Co. V. Sullivan, David A. Logan
Law Faculty Scholarship
No abstract provided.
Making Open Access Viable Economically, Andrew Hyde, Russell A. Miller, Emanuel V. Towfigh
Making Open Access Viable Economically, Andrew Hyde, Russell A. Miller, Emanuel V. Towfigh
Scholarly Articles
The Editors-in-Chief have decided that we will provide our much-cherished readers with an editorial every so often as a way of sharing insights from the “machine room” where so much of the thinking and work is done to publish the German Law Journal. We want to let you in on the ideas that are on our minds, share with you our observations, and include you in the conversations we are having that might be of interest to you. We begin this tradition with this issue, Volume 21 – Number 6. Andrew Hyde, a member of the editorial team with which …
Iran, Diane M. Zorri
Iran, Diane M. Zorri
Publications
Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …
The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks
The Internet As A Speech Machine And Other Myths Confounding Section 230 Reform, Danielle K. Citron, Mary Anne Franks
Faculty Scholarship
A robust public debate is currently underway about the responsibility of online platforms. We have long called for this discussion, but only recently has it been seriously taken up by legislators and the public. The debate begins with a basic question: should platforms should be responsible for user-generated content? If so, under what circumstances? What exactly would such responsibility look like? Under consideration is Section 230 of the Communications Decency Act—a provision originally designed to encourage tech companies to clean up “offensive” online content. The public discourse around Section 230, however, is riddled with misconceptions. As an initial matter, many …
Illuminating Regulatory Guidance, Cary Coglianese
Illuminating Regulatory Guidance, Cary Coglianese
All Faculty Scholarship
Administrative agencies issue many guidance documents each year in an effort to provide clarity and direction to the public about important programs, policies, and rules. But these guidance documents are only helpful to the public if they can be readily found by those who they will benefit. Unfortunately, too many agency guidance documents are inaccessible, reaching the point where some observers even worry that guidance has become a form of regulatory “dark matter.” This article identifies a series of measures for agencies to take to bring their guidance documents better into the light. It begins by explaining why, unlike the …
The Problems With Decision-Making, Joanna K. Sax
The Problems With Decision-Making, Joanna K. Sax
Faculty Scholarship
Our society faces major challenges in numerous areas, including climate change and healthcare. Addressing these problems with technological advances are of great importance. Increasingly, however, consumers are resisting or rejecting such technological interventions based on inappropriate assignment of risk. In other words, the consumer assessment of risk is not in line with evidence-based assessment of risk. This article focuses on two controversial areas, vaccines and genetically engineered food, as examples in which consumers assign a high risk despite an evidence-based assessment of low risk. This article describes how empirically tested decision-making theories explain why consumers inappropriately assign risk. While these …
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford
Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford
Scholarly Publications
No abstract provided.
Brief Amici Curiae Of Electronic Frontier Foundation, 1851 Center For Constitutional Law, And Profs. Jonathan Entin, David F. Forte, Andrew Geronimo, Raymond Ku, Stephen Lazarus, Kevin Francis O’Neill, Margaret Tarkington, Aaron H. Caplan, And Eugene Volokh In Support Of Respondent-Appellant, Joni Bey And Rebecca Rasawehr V. Jeffrey Rasawehr, Supreme Court Of Ohio (Case No. 2019-0295), David Forte, Stephen R. Lazarus, Kevin F. O'Neill, Jonathan L. Entin, Andrew Geronimo, Raymond Ku, Margaret Tarkington, Aaron H. Kaplan, Eugene Volokh
Brief Amici Curiae Of Electronic Frontier Foundation, 1851 Center For Constitutional Law, And Profs. Jonathan Entin, David F. Forte, Andrew Geronimo, Raymond Ku, Stephen Lazarus, Kevin Francis O’Neill, Margaret Tarkington, Aaron H. Caplan, And Eugene Volokh In Support Of Respondent-Appellant, Joni Bey And Rebecca Rasawehr V. Jeffrey Rasawehr, Supreme Court Of Ohio (Case No. 2019-0295), David Forte, Stephen R. Lazarus, Kevin F. O'Neill, Jonathan L. Entin, Andrew Geronimo, Raymond Ku, Margaret Tarkington, Aaron H. Kaplan, Eugene Volokh
Law Faculty Briefs and Court Documents
The brief argues that the Third District Court of Appeals, in violation of the First Amendment, erred in upholding an injunction that barred defendant from any online postings regarding plaintiff, whether or not those postings were to plaintiff or to third parties.
Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher
Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher
Technical Services Faculty Presentations
Slides from a presentation, "Reuse, Remix, and Create with Creative Commons Licenses," presented at the Rhode Island Library Association Annual Conference 2019, Get Informed!, on May 23, 2019 in North Smithfield, Rhode Island.
An openly-shared Google Slides version of this presentation is also available at https://bit.ly/2w6maqH.
=====
REUSE, REMIX, AND CREATE WITH CREATIVE COMMONS LICENSES | ROOM 2A
What are Creative Commons (CC) licenses and how do they work? What is the difference between something that is free online and something that is truly “open”? Did you know that it is often a Creative Commons license that puts …
The Internet Adopts Two-Way Radio, Henry Perritt
The Internet Adopts Two-Way Radio, Henry Perritt
All Faculty Scholarship
The Internet, having displaced conventional correspondence with email, having displaced traditional libraries with online ones, having revolutionized shopping, having uprooted television and movies, now is absorbing police, fire, ambulance, and public utility two-radio systems.Digital radio technologies combine with Internet switching of transmitters, receivers, and networks, so that a police officer can talk to an ambulance driver or a train dispatcher across the state or across the country. Specialized cellphones are becoming indistinguishable from walkie-talkies. Cellular telephone channels replace two-way-radio air links.Integration of “private mobile radio” into the Internet is the result of specific advances in radio and networking technology that …
Law Library Blog (February 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (February 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Blockchain-Based Token Sales, Initial Coin Offerings, And The Democratization Of Public Capital Markets, Jonathan Rohr, Aaron Wright
Blockchain-Based Token Sales, Initial Coin Offerings, And The Democratization Of Public Capital Markets, Jonathan Rohr, Aaron Wright
Articles
Best known for their role in the creation of cryptocurrencies like bitcoin, blockchains are revolutionizing the way technology entrepreneurs finance their business enterprises. In 2017 alone, tech entrepreneurs raised over $6 billion through the sale of blockchain-based digital tokens, with some sales lasting mere seconds before selling out. In a token sale, also referred to as an “initial coin offering” or “ICO,” organizers of a project sell digital tokens to members of the public to finance the development of new technological platforms and services. After the initial sale, cryptocurrency exchanges scattered across the globe list tokens for trading and facilitate …
Speech Across Borders, Jennifer Daskal
Speech Across Borders, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
As both governments and tech companies seek to regulate speech online, these efforts raise critical, and contested, questions about how far those regulations can and should extend. Is it enough to take down or delink material in a geographically segmented way? Or can and should tech companies be ordered to takedown or delink unsavory content across their entire platforms—no matter who is posting the material or where the unwanted content is viewed? How do we deal with conflicting speech norms across borders? And how do we protect against the most censor-prone nation effectively setting global speech rules? These questions were …
Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan
Internet Of Infringing Things: The Effect Of Computer Interface Copyrights On Technology Standards, Charles Duan
Articles in Law Reviews & Other Academic Journals
You connect to the Internet via your Wi-Fi access point. You surf the Web using a browser and send emails through your email server. You probably use some USB peripherals-say a mouse, keyboard, or printer. Maybe you even watch cable or broadcast television.
Under current case law, each of those computer systems and devices may very well be copyright-infringing contraband. This is through no fault of your own-you need not be pirating music or streaming illegal movies to infringe a copyright. The infringement simply exists, hard-wired within each of those devices and many more that you use, a result of …
Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis
Marketplace Of Ideas, Privacy, And The Digital Audience, Alexander Tsesis
Faculty Publications & Other Works
The availability of almost limitless sets of digital information has opened a vast marketplace of ideas. Information service providers like Facebook and Twitter provide users with an array of personal information about products, friends, acquaintances, and strangers. While this data enriches the lives of those who share content on the internet, it comes at the expense of privacy. Social media companies disseminate news, advertisements, and political messages, while also capitalizing on consumers' private shopping, surfing, and traveling habits. Companies like Cambridge Analytica, Amazon, and Apple rely on algorithmic programs to mash up and scrape enormous amounts of online and otherwise …
#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel
#Personaljurisdiction: A New Age Of Internet Contacts, Zoe Niesel
Faculty Articles
No abstract provided.
Embedding Content Or Interring Copyright: Does The Internet Need The "Server Rule"?, Jane C. Ginsburg, Luke Ali Budiardjo
Embedding Content Or Interring Copyright: Does The Internet Need The "Server Rule"?, Jane C. Ginsburg, Luke Ali Budiardjo
Faculty Scholarship
The “server rule” holds that online displays or performances of copyrighted content accomplished through “in-line” or “framing” hyperlinks do not trigger the exclusive rights of public display or performance unless the linker also possesses a copy of the underlying work. As a result, the rule shields a vast array of online activities from claims of direct copyright infringement, effectively exempting those activities from the reach of the Copyright Act. While the server rule has enjoyed relatively consistent adherence since its adoption in 2007, some courts have recently suggested a departure from that precedent, noting the doctrinal and statutory inconsistencies underlying …
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton
Articles
In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …
Babashook: The Babadook, Gay Iconography And Internet Cultures, Renee Middlemost
Babashook: The Babadook, Gay Iconography And Internet Cultures, Renee Middlemost
Faculty of Law, Humanities and the Arts - Papers (Archive)
Upon its 2014 release, Australian film The Babadook (Kent, 2014), gained critical acclaim worldwide. While the film gathered high praise, its domestic release was impeded by a lack of marketing support and ongoing debate about the quality of Australian horror films. By 2015, The Babadook was available to stream on Netflix in the United States, and one would imagine, to gradually fade from view. Yet a seemingly innocent categorization error on Netflix in 2016, which listed The Babadook as an LGBT interest film, resulted in a revival of the film's popularity as a cult film and the emergence of the …
Poverty, Privacy, And Living Out Of Reach [Reviews], Wendy A. Bach
Poverty, Privacy, And Living Out Of Reach [Reviews], Wendy A. Bach
Scholarly Works
No abstract provided.
Coding For Cultural Competency: Expanding Access To Justice With Technology, Sherley Cruz
Coding For Cultural Competency: Expanding Access To Justice With Technology, Sherley Cruz
Scholarly Works
Innovations in legal technology are revolutionizing access to justice for individuals who previously had little or no ability to obtain legal assistance. This Article explores how the lack of culturally competent designs within legal technology negatively impacts diverse communities, thereby hindering the ability to expand access to justice. An examination of the underlying theories of access to justice and cultural competency illustrates why it is necessary for legal professionals and technology designers to incorporate culturally competent designs when developing legal technology. In light of ongoing changes in United States’ demographics, and the heightened need to provide access to justice given …
Control Over Contemporary Photography: A Tangle Of Copyright, Right Of Publicity, And The First Amendment, Jessica Silbey
Control Over Contemporary Photography: A Tangle Of Copyright, Right Of Publicity, And The First Amendment, Jessica Silbey
Faculty Scholarship
Professional photographers who make photographs of people negotiate a tense relationship between their own creative freedoms and the right of their subjects to control their images. This negotiation formally takes place over the terrain of copyright, right of publicity, and the First Amendment. Informally, photographers describe implied understandings and practice norms guiding their relationship with subjects, infrequently memorialized in short, boilerplate contractual releases. This short essay explores these formal and informal practices described by contemporary professional photographers. Although the evidence for this essay comes from professional photographic practice culled from interviews with contemporary photographers, the analysis of the evidence speaks …
Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green
Digitizing Brandenburg: Common Law Drift Toward A Causal Theory Of Imminence, J. Remy Green
Faculty Scholarship
The Supreme Court’s Brandenburg v. Ohio test provides an exception to the First Amendment’s broad guarantee of freedom of speech. Where speech is (1) directed to inciting or producing imminent lawless action, and (2) is likely to incite or produce such action, the First Amendment withdraws its promise of protection. Thus, where the “imminence” of lawless action cannot be shown, free speech cannot be restricted. Since Brandenburg, Courts have applied a test for imminence that turns on proximity in space and in time — that is, the test evaluates how spatiotemporally imminent lawless activity is. In this Article, I argue …
Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem
Examining Internet Usage Patterns On Socio-Economic Benefits Of Marginalised Communities: The Case Of Community Information Centres In Ghana, Stephen Bekoe, Kodjo Atiso, Daniel Azerikatoa Ayoung, Lucy Dzandu, Kennedy Kubuga Kumangkem
Library Philosophy and Practice (e-journal)
In this paper, we explore the socio-economic effects of internet use at the community information centres (CICs) on livelihoods in three regions of Ghana. Sustainable livelihood framework was used as a lens to understand the phenomena being studied. Primary and secondary data collection methods were used. Three CICs in three regions were purposively selected and qualitative research method was adopted for the study. The data were analysed using Nvivo. The findings showed that sending email information was largely the reason why people used the Internet. We found that through the Internet, people learn, develop new business ideas and expand the …
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Life of the Law School (1993- )
No abstract provided.
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Faculty Publications
Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …