Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Chasing Shadows: The Human Face Behind The Cyber Threat, Jim Chirsty Dec 2000

Chasing Shadows: The Human Face Behind The Cyber Threat, Jim Chirsty

Federal Communications Law Journal

Book Review: Tangled Web: Tales of Digital Crime From the Shadows of Cyberspace, Richard Power, Que, 2000, 450 pages.

Richard Power’s Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace presents a comprehensive account of computer crime. The book unveils and explores in meticulous detail the nature and scope, and—more importantly—the tremendous potential that common criminals, terrorists, and nation-states now have at their fingertips. This Review describes Tangled Web as a must-read for all cyber cops, prosecutors, and information technology heads and policy-makers.


Expressive Commerce In Cyberspace: Public Goods, Network Effects, And Free Speech, Daniel C. Farber Jun 2000

Expressive Commerce In Cyberspace: Public Goods, Network Effects, And Free Speech, Daniel C. Farber

Georgia State University Law Review

No abstract provided.


Our Data, Ourselves: Privacy, Propertization, And Gender , Ann Bartow Apr 2000

Our Data, Ourselves: Privacy, Propertization, And Gender , Ann Bartow

Ann Bartow

This Article starts by providing an overview of the types of personal data that is collected via the Internet, and the ways in which this information is used. The author asserts that because women are more likely to shop and share information in cyberspace, the impact of commodification of personal data disproportionately impacts females, enabling them to be "targeted" by marketing campaigns, and stripping them of personal privacy. The author then surveys the legal terrain of personal information privacy, and concludes that it is unlikely that the government will step in to provide consumers with substantive privacy rights or protections. …


Virtual Reality: Can We Ride Trademark Law To Surf Cyberspace, David Yan Mar 2000

Virtual Reality: Can We Ride Trademark Law To Surf Cyberspace, David Yan

Fordham Intellectual Property, Media and Entertainment Law Journal

No abstract provided.


Complexity And Copyright In Contradiction, Michael J. Madison Jan 2000

Complexity And Copyright In Contradiction, Michael J. Madison

Michael J. Madison

The title of the article is a deliberate play on architect Robert Venturi?s classic of post-modern architectural theory, Complexity and Contradiction in Architecture. The article analyzes metaphorical ?architectures? of copyright and cyberspace using architectural and land use theories developed for the physical world. It applies this analysis to copyright law through the lens of the First Amendment. I argue that the ?simplicity? of digital engineering is undermining desirable ?complexity? in legal and physical structures that regulate expressive works.


Canadian Copyright Law In Cyberspace: An Examination Of The Copyright Act In The Context Of The Internet , Jeremy F. De Beer Jan 2000

Canadian Copyright Law In Cyberspace: An Examination Of The Copyright Act In The Context Of The Internet , Jeremy F. De Beer

Jeremy de Beer

This paper considers the application of Canada's Copyright Act to various online activities. I advocate for an evolutionary rather than revolutionary approach to digitial copyright reform.


Cyberspace And The "Devil's Hatband", Jonathan J. Rusch Jan 2000

Cyberspace And The "Devil's Hatband", Jonathan J. Rusch

Seattle University Law Review

In this Article, I maintain that while there is an ongoing conflict of legal traditions over the desirability of fences in cyberspace, there are definite virtues in the creation of such fences, so long as we understand the physical, psychological, and moral dimensions of that process. Part I will present a brief survey of the history of barbed wire in the Old West, paying particular attention to the contending legal traditions that affected the manner and extent of that growth in the West. These contending legal traditions, which related to "fencing in" versus "fencing out" cattle, played a key role …


Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post Jan 2000

Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post

Vanderbilt Journal of Entertainment & Technology Law

MAPS, the primary focus of this tale, is a California non-profit limited liability company. It coordinates a kind of group boycott by Internet service providers (ISPs) for the purpose of reducing the flow of what is commonly called "spam"- unsolicited bulk e-mail. It operates, roughly, as follows. The managers of MAPS create and maintain what they call the "Realtime Blackhole List" (RBL), which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows …


Exit, Voice, And Values On The Net, Dawn C. Nunziato Jan 2000

Exit, Voice, And Values On The Net, Dawn C. Nunziato

GW Law Faculty Publications & Other Works

Professor Lawrence Lessig makes the (rather dire) prediction in Code and Other Laws of Cyberspace that the Internet will be transformed from an unregulated medium into a highly regulated one. Lessig posits that the Net will largely be regulated not by the government but by commercial entities - in particular, by the software (or code) written by entities such as AOL and IBM. While the government's regulatory power is limited by the Constitution, regulation by commercial entities is not. For example, Internet service providers can censor "indecent" speech on the Net largely free of constitutional constraints. The "Net libertarians" applaud …


Much Ado About Spam: Unsolicited Advertising, The Internet, And You., Scot M. Graydon Jan 2000

Much Ado About Spam: Unsolicited Advertising, The Internet, And You., Scot M. Graydon

St. Mary's Law Journal

Internet users need protection from unsolicited commercial emails (UCEs), and this protection should come from federal legislation. Despite seventeen states having passed some sort of legislation regulating UCEs, this is insufficient to protect Internet users from UCEs. State laws are not uniformed and UCEs frequently cross state lines. Internet advertisers prefer commercial emails because of the ability to market to millions of consumers at a low cost. Consumers, however, suffer delays to their Internet access because of the amount of data UCEs accumulate, and in some cases may have to pay additional fees if they exceed the data limits of …


Our Data, Ourselves: Privacy, Propertization, And Gender, Ann Bartow Dec 1999

Our Data, Ourselves: Privacy, Propertization, And Gender, Ann Bartow

Ann Bartow

This Article starts by providing an overview of the types of personal data that is collected via the Internet, and the ways in which this information is used. The author asserts that because women are more likely to shop and share information in cyberspace, the impact of commodification of personal data disproportionately impacts females, enabling them to be "targeted" by marketing campaigns, and stripping them of personal privacy. The author then surveys the legal terrain of personal information privacy, and concludes that it is unlikely that the government will step in to provide consumers with substantive privacy rights or protections. …


Adr In Cyberspace, Stephen Ware, Sarah Rudolph Cole Dec 1999

Adr In Cyberspace, Stephen Ware, Sarah Rudolph Cole

Stephen Ware

Introduction to symposium on dispute resolution in cyberspace.