Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (15)
- Intellectual Property Law (13)
- Entertainment, Arts, and Sports Law (7)
- Communications Law (6)
- First Amendment (5)
-
- International Law (5)
- Science and Technology Law (5)
- Computer Law (4)
- Dispute Resolution and Arbitration (4)
- Privacy Law (4)
- Comparative and Foreign Law (3)
- Constitutional Law (3)
- Antitrust and Trade Regulation (2)
- Fourth Amendment (2)
- Social and Behavioral Sciences (2)
- Civil Rights and Discrimination (1)
- Consumer Protection Law (1)
- Criminal Law (1)
- Economics (1)
- Election Law (1)
- Environmental Sciences (1)
- Labor and Employment Law (1)
- Law and Economics (1)
- Legal Remedies (1)
- Legal Writing and Research (1)
- Legislation (1)
- National Security Law (1)
- Natural Resources Management and Policy (1)
- Natural Resources and Conservation (1)
- Institution
-
- Fordham Law School (7)
- Maurer School of Law: Indiana University (5)
- University of Michigan Law School (5)
- Nova Southeastern University (2)
- Schulich School of Law, Dalhousie University (2)
-
- Selected Works (2)
- University of Colorado Law School (2)
- University of Miami Law School (2)
- William & Mary Law School (2)
- Boston University School of Law (1)
- Duke Law (1)
- George Washington University Law School (1)
- Northwestern Pritzker School of Law (1)
- Saint Louis University School of Law (1)
- Santa Clara Law (1)
- SelectedWorks (1)
- Southern Methodist University (1)
- Texas A&M University School of Law (1)
- University of Missouri-Kansas City School of Law (1)
- University of South Carolina (1)
- Vanderbilt University Law School (1)
- Villanova University Charles Widger School of Law (1)
- Publication
-
- Federal Communications Law Journal (5)
- Fordham Intellectual Property, Media and Entertainment Law Journal (5)
- Michigan Telecommunications & Technology Law Review (5)
- Faculty Scholarship (3)
- Fordham Law Review (2)
-
- ILSA Journal of International & Comparative Law (2)
- Allocating and Managing Water for a Sustainable Future: Lessons from Around the World (Summer Conference, June 11-14) (1)
- Articles (1)
- Canadian Journal of Law and Technology (1)
- Faculty Journal Articles and Book Chapters (1)
- Faculty Works (1)
- GW Law Faculty Publications & Other Works (1)
- Gillian K Hadfield (1)
- Innis Christie Collection (1)
- Jeffrey S. Moorad Sports Law Journal (1)
- Northwestern Journal of International Law & Business (1)
- Paul D. Callister (1)
- Publications (1)
- Saint Louis University Law Journal (1)
- Santa Clara Law Review (1)
- South Carolina Law Review (1)
- Stephen E Henderson (1)
- University of Miami International and Comparative Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- William & Mary Bill of Rights Journal (1)
- William & Mary Journal of Race, Gender, and Social Justice (1)
- Publication Type
Articles 31 - 42 of 42
Full-Text Articles in Law
Access And Aggregation: Privacy, Public Records, And The Constitution, Daniel J. Solove
Access And Aggregation: Privacy, Public Records, And The Constitution, Daniel J. Solove
GW Law Faculty Publications & Other Works
In this article, Professor Solove develops a theory to reconcile the tension between transparency and privacy in the context of public records. Federal and state governments maintain public records containing personal information spanning an individual's life from birth to death. The web of state and federal regulation that governs the accessibility of these records generally creates a default rule in open access to information. Solove contends that the ready availability of public records creates a significant problem for privacy because various bits of information when aggregated paint a detailed portrait of a person's life that Solove refers to as a …
Choice Of Law In Online Legal Ethics: Changing A Vague Standard For Attorney Advertising On The Internet, Daniel Backer
Choice Of Law In Online Legal Ethics: Changing A Vague Standard For Attorney Advertising On The Internet, Daniel Backer
Fordham Law Review
No abstract provided.
Who Was That Masked Man? Online Defamation, Freedom Of Expression, And The Right To Speak Anonymously, Jonathon T. Feasby
Who Was That Masked Man? Online Defamation, Freedom Of Expression, And The Right To Speak Anonymously, Jonathon T. Feasby
Canadian Journal of Law and Technology
As the internet continues to reach into the lives of people around the world, it facilitates interaction and the exchange of ideas between far-flung individuals and groups to an extent unprecedented in communications history. However, with this positive effect, the potential of the internet as a forum for defamation and other malfeasance has increased as well. Words online can be heard or read in places conventional forms of speech might never reach. As the United States Supreme Court put it, with the aid of the internet ". . . any person with a phone line can become a town crier …
The Managing Lawmaker In Cyberspace: A Power Model, Tamar Frankel
The Managing Lawmaker In Cyberspace: A Power Model, Tamar Frankel
Faculty Scholarship
This Article is about power - the ability to gain obedience whether by captivating followers, persuading skeptics or awarding and withdrawing economic benefits. The purpose of this Article is to analyze how the power of the Internet Corporation for Names and Numbers ("ICANN") was created, augmented, strengthened and reined in. Many controversies surround ICANN, including the very foundation of its existence - the need for a single "root" in the Internet naming infrastructure - its organizational form and accountability, and the utterances, policies and actions of its management.
The purpose of this Article is not to argue and prescribe but …
Putting A Face To A (Screen) Name: The First Amendment Implications Of Compelling Isps To Reveal The Identities Of Anonymous Internet Speakers In Online Defamation Cases, Jennifer O'Brien
Fordham Law Review
No abstract provided.
Introduction, Gregory P. Magarian
Introduction, Gregory P. Magarian
Jeffrey S. Moorad Sports Law Journal
No abstract provided.
How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos
How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos
Northwestern Journal of International Law & Business
The TRIPS agreement made significant advances over the pre-TRIPS international regime with respect to the protection of computer software. There are at least two significant advances. First, computer software protections have been embedded into the new dispute resolution procedures. Second, both object and source code are protected under the copyright sections of the Agreement. The dispute resolution procedures provide back-end protection (protection after offenses have occurred), while new copyright provisions provide affirmative front-end protection (protection deterring such offenses). However, the Agreement could have, and should have, gone farther to protect the software industry. By not formally deciding on the ability …
Oh No, Grandma Has A Computer: How Internet Fraud Will Take The Place Of Telemarketing Fraud Targeting The Elderly, Leda Mouallem
Oh No, Grandma Has A Computer: How Internet Fraud Will Take The Place Of Telemarketing Fraud Targeting The Elderly, Leda Mouallem
Santa Clara Law Review
No abstract provided.
Fencing Off Ideas: Enclosure & The Disappearance Of The Public Domain, James Boyle
Fencing Off Ideas: Enclosure & The Disappearance Of The Public Domain, James Boyle
Faculty Scholarship
No abstract provided.
The Internet, Regulation And The Market For Loyalties: An Economic Analysis Of Transborder Information Flow, Paul D. Callister
The Internet, Regulation And The Market For Loyalties: An Economic Analysis Of Transborder Information Flow, Paul D. Callister
Faculty Works
As the Internet has gained prevalence, attention has turned to its regulation. Indeed, regulation proves to be a unique and complex problem, given the Internet's lack of traditional borders and boundaries. Highlighting possible avenues of regulation, the author discusses neo-classical economic theory, specifically Monroe E. Price's market for loyalties theory. Although originally applied to the regulation of broadcasting, the author contends that the market for loyalties theory can also be applied to the Internet. Building on Professor Price's pioneering analysis, the article extends the theory to examine market elasticity's effect on the loss of monopoly control over information flow (as …
Fast, Cheap & Out Of Control: Lessons From The Icann Dispute Resolution Process, Elizabeth G. Thornburg
Fast, Cheap & Out Of Control: Lessons From The Icann Dispute Resolution Process, Elizabeth G. Thornburg
Faculty Journal Articles and Book Chapters
Some people have argued that the uniform dispute resolution process used by ICANN to resolve domain name disputes would be a good model for internet disputes generally. This article argues the opposite: the UDRP teaches sobering lessons about the consequences of privatized dispute resolution processes. The lessons include: the questionable legitimacy of privately-adopted substantive standards; the danger of unprincipled choice of law decisions to fill in the gaps in that private law; unreconciled splits among arbitrators as to the meaning of the standards; and a tendency to expand beyond the narrow jurisdictional limits of the policy. The UDRP also demonstrates …
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Stephen E Henderson
The Internet, already of major significance throughout much of the globe, is expected to become increasingly pervasive in diverse arenas, from health care, to commerce, to entertainment, and is expected to become increasingly critical to essential infrastructures, including banking, power, and telecommunications. Yet the medium is both inherently and unnecessarily insecure. In particular, today’s Internet can be crippled by distributed denial-of-service attacks launched by relatively unsophisticated and judgment-proof parties. Not every computing system involved in such attacks, however, is necessarily without resources. Application of traditional negligence liability, coupled with other government incentives and support institutions, will encourage better security and …