Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Law
Chasing Shadows: The Human Face Behind The Cyber Threat, Jim Chirsty
Chasing Shadows: The Human Face Behind The Cyber Threat, Jim Chirsty
Federal Communications Law Journal
Book Review: Tangled Web: Tales of Digital Crime From the Shadows of Cyberspace, Richard Power, Que, 2000, 450 pages.
Richard Power’s Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace presents a comprehensive account of computer crime. The book unveils and explores in meticulous detail the nature and scope, and—more importantly—the tremendous potential that common criminals, terrorists, and nation-states now have at their fingertips. This Review describes Tangled Web as a must-read for all cyber cops, prosecutors, and information technology heads and policy-makers.
Expressive Commerce In Cyberspace: Public Goods, Network Effects, And Free Speech, Daniel C. Farber
Expressive Commerce In Cyberspace: Public Goods, Network Effects, And Free Speech, Daniel C. Farber
Georgia State University Law Review
No abstract provided.
Our Data, Ourselves: Privacy, Propertization, And Gender , Ann Bartow
Our Data, Ourselves: Privacy, Propertization, And Gender , Ann Bartow
Ann Bartow
This Article starts by providing an overview of the types of personal data that is collected via the Internet, and the ways in which this information is used. The author asserts that because women are more likely to shop and share information in cyberspace, the impact of commodification of personal data disproportionately impacts females, enabling them to be "targeted" by marketing campaigns, and stripping them of personal privacy. The author then surveys the legal terrain of personal information privacy, and concludes that it is unlikely that the government will step in to provide consumers with substantive privacy rights or protections. …
Virtual Reality: Can We Ride Trademark Law To Surf Cyberspace, David Yan
Virtual Reality: Can We Ride Trademark Law To Surf Cyberspace, David Yan
Fordham Intellectual Property, Media and Entertainment Law Journal
No abstract provided.
Complexity And Copyright In Contradiction, Michael J. Madison
Complexity And Copyright In Contradiction, Michael J. Madison
Michael J. Madison
The title of the article is a deliberate play on architect Robert Venturi?s classic of post-modern architectural theory, Complexity and Contradiction in Architecture. The article analyzes metaphorical ?architectures? of copyright and cyberspace using architectural and land use theories developed for the physical world. It applies this analysis to copyright law through the lens of the First Amendment. I argue that the ?simplicity? of digital engineering is undermining desirable ?complexity? in legal and physical structures that regulate expressive works.
Canadian Copyright Law In Cyberspace: An Examination Of The Copyright Act In The Context Of The Internet , Jeremy F. De Beer
Canadian Copyright Law In Cyberspace: An Examination Of The Copyright Act In The Context Of The Internet , Jeremy F. De Beer
Jeremy de Beer
This paper considers the application of Canada's Copyright Act to various online activities. I advocate for an evolutionary rather than revolutionary approach to digitial copyright reform.
Cyberspace And The "Devil's Hatband", Jonathan J. Rusch
Cyberspace And The "Devil's Hatband", Jonathan J. Rusch
Seattle University Law Review
In this Article, I maintain that while there is an ongoing conflict of legal traditions over the desirability of fences in cyberspace, there are definite virtues in the creation of such fences, so long as we understand the physical, psychological, and moral dimensions of that process. Part I will present a brief survey of the history of barbed wire in the Old West, paying particular attention to the contending legal traditions that affected the manner and extent of that growth in the West. These contending legal traditions, which related to "fencing in" versus "fencing out" cattle, played a key role …
Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post
Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post
Vanderbilt Journal of Entertainment & Technology Law
MAPS, the primary focus of this tale, is a California non-profit limited liability company. It coordinates a kind of group boycott by Internet service providers (ISPs) for the purpose of reducing the flow of what is commonly called "spam"- unsolicited bulk e-mail. It operates, roughly, as follows. The managers of MAPS create and maintain what they call the "Realtime Blackhole List" (RBL), which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows …
Exit, Voice, And Values On The Net, Dawn C. Nunziato
Exit, Voice, And Values On The Net, Dawn C. Nunziato
GW Law Faculty Publications & Other Works
Professor Lawrence Lessig makes the (rather dire) prediction in Code and Other Laws of Cyberspace that the Internet will be transformed from an unregulated medium into a highly regulated one. Lessig posits that the Net will largely be regulated not by the government but by commercial entities - in particular, by the software (or code) written by entities such as AOL and IBM. While the government's regulatory power is limited by the Constitution, regulation by commercial entities is not. For example, Internet service providers can censor "indecent" speech on the Net largely free of constitutional constraints. The "Net libertarians" applaud …
Much Ado About Spam: Unsolicited Advertising, The Internet, And You., Scot M. Graydon
Much Ado About Spam: Unsolicited Advertising, The Internet, And You., Scot M. Graydon
St. Mary's Law Journal
Internet users need protection from unsolicited commercial emails (UCEs), and this protection should come from federal legislation. Despite seventeen states having passed some sort of legislation regulating UCEs, this is insufficient to protect Internet users from UCEs. State laws are not uniformed and UCEs frequently cross state lines. Internet advertisers prefer commercial emails because of the ability to market to millions of consumers at a low cost. Consumers, however, suffer delays to their Internet access because of the amount of data UCEs accumulate, and in some cases may have to pay additional fees if they exceed the data limits of …
Our Data, Ourselves: Privacy, Propertization, And Gender, Ann Bartow
Our Data, Ourselves: Privacy, Propertization, And Gender, Ann Bartow
Ann Bartow
This Article starts by providing an overview of the types of personal data that is collected via the Internet, and the ways in which this information is used. The author asserts that because women are more likely to shop and share information in cyberspace, the impact of commodification of personal data disproportionately impacts females, enabling them to be "targeted" by marketing campaigns, and stripping them of personal privacy. The author then surveys the legal terrain of personal information privacy, and concludes that it is unlikely that the government will step in to provide consumers with substantive privacy rights or protections. …
Adr In Cyberspace, Stephen Ware, Sarah Rudolph Cole
Adr In Cyberspace, Stephen Ware, Sarah Rudolph Cole
Stephen Ware
Introduction to symposium on dispute resolution in cyberspace.