Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (20)
- Internet Law (11)
- Communications Law (8)
- Computer Law (6)
- Legislation (5)
-
- Administrative Law (4)
- Supreme Court of the United States (4)
- Antitrust and Trade Regulation (3)
- Consumer Protection Law (3)
- Legal History (3)
- Computer Engineering (2)
- Engineering (2)
- Law and Society (2)
- Social and Behavioral Sciences (2)
- Agency (1)
- Common Law (1)
- Communication (1)
- Communication Technology and New Media (1)
- Computer Sciences (1)
- Courts (1)
- Criminal Law (1)
- Digital Communications and Networking (1)
- Electrical and Computer Engineering (1)
- Entertainment, Arts, and Sports Law (1)
- Forensic Science and Technology (1)
- Information Security (1)
- Law and Economics (1)
- Law and Race (1)
- Legal Remedies (1)
- Institution
- Publication
-
- Northwestern Journal of Technology and Intellectual Property (13)
- Michigan Telecommunications & Technology Law Review (8)
- Federal Communications Law Journal (4)
- Cleveland State Law Review (3)
- Saint Louis University Law Journal (3)
-
- The University of New Hampshire Law Review (2)
- Fordham Law Review (1)
- Indiana Law Journal (1)
- Journal of Digital Forensics, Security and Law (1)
- Marquette Intellectual Property Law Review (1)
- Missouri Law Review (1)
- NYLS Law Review (1)
- South Carolina Law Review (1)
- University of Michigan Journal of Law Reform (1)
Articles 1 - 30 of 41
Full-Text Articles in Law
The Five Indicia Of Virtual Property, Charles Blazer
The Five Indicia Of Virtual Property, Charles Blazer
The University of New Hampshire Law Review
[Excerpt] “Many Americans use “it” every day. Although it is intangible, it may be worth thousands of dollars. Because we can both control it and prevent other people from controlling it, we assume, without much thought, that we own it. Sometimes we pay someone a monthly fee to hold it for us. Sometimes, simply by using it, we increase its value. When we finish using it, we often sell it.
“It” is virtual property, and it may take the form of an email address, a website, a bidding agent, a video game character, or any number of other intangible, digital …
Three Reactions To Mgm V. Grokster, Pamela Samuelson
Three Reactions To Mgm V. Grokster, Pamela Samuelson
Michigan Telecommunications & Technology Law Review
It was prescient of the Michigan Telecommunications and Technology Law Review to have organized a conference to discuss the Supreme Court's decision in Metro-Goldwyn-Mayer, Inc. v. Grokster, Inc. As the articles in this issue reveal, commentators have had somewhat mixed reactions to the Grokster decision. Perhaps I am the most mixed (or mixed up) about Grokster among its commentators, for I have had not just one but three reactions to the Grokster decision. My first reaction was to question whether MGM and its co-plaintiffs really won the Grokster case, or at least won it in the way they had hoped. …
File Sharing, Copyright, And The Optimal Production Of Music, Gerald R. Faulhaber
File Sharing, Copyright, And The Optimal Production Of Music, Gerald R. Faulhaber
Michigan Telecommunications & Technology Law Review
Much economic, political, judicial and legal attention has been showered on the significant changes currently taking place within the music production and distribution business forced by the use of the Internet for both file sharing (of unauthorized copyrighted material) and more recent online (legal) music distribution. The strong demand for music, coupled with the low cost of distributing illegal copies via peer-to-peer (P2P) systems, is unraveling the business model by which music has traditionally been created, developed, and distributed. Application of traditional copyright law has been ineffective in stopping the loss of business in the traditional channels. Producers have implemented …
The Intent Element Of Inducement To Infringe Under Patent Law: Reflections On Grokster, Lynda J. Oswald
The Intent Element Of Inducement To Infringe Under Patent Law: Reflections On Grokster, Lynda J. Oswald
Michigan Telecommunications & Technology Law Review
In June, 2005, the United States Supreme Court set forth an "inducement" rule in MGM Studios, Inc. v. Grokster, Ltd. that imposes secondary liability on "one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement." The Court emphasized the limitations of the liability standard it was setting forth, stating that the target was only "purposeful, culpable expression and conduct, and thus does nothing to compromise legitimate commerce or discourage innovation having a lawful promise." Yet, the liability standard set forth in Grokster …
The Temporal Dynamics Of Capable Of Substantial Noninfringing Uses, R. Anthony Reese
The Temporal Dynamics Of Capable Of Substantial Noninfringing Uses, R. Anthony Reese
Michigan Telecommunications & Technology Law Review
The copyright issues raised by "dual-use" technologies--equipment that can be used both in ways that infringe copyright and in ways that do not--first gained prominence in connection with the litigation over videocassette recorders that culminated in the Supreme Court's decision in Sony in 1984. Copyright owners had asserted that Sony's manufacture and distribution of VCRs rendered it liable for copyright infringement committed by customers using their Sony VCRs. The Supreme Court in Sony concluded that copyright law did not impose such secondary liability where the device in question was capable of substantial noninfringing uses (and that the VCR was such …
The Half-Fairness Of Google's Plan To Make The World's Collection Of Books Searchable, Steven Hetcher
The Half-Fairness Of Google's Plan To Make The World's Collection Of Books Searchable, Steven Hetcher
Michigan Telecommunications & Technology Law Review
Google's major new initiative is to undertake the task of digitizing the world's collection of books so as to make them searchable. The very idea is audacious, but what is more so is that Google plans to copy without first seeking the permission of the owners of these works. Google Print would make available what is, by conventional measures at least, the highest grade of information--books produced by millions of the world's leading scholars. This is in stark contrast to the inconsistent quality spectrum one encounters through other online sources such as peer-to-peer networks and blogs, where there currently exists …
21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists
21st Century Copyright Law In The Digital Domain Symposium Transcript, Symposium Panelists
Michigan Telecommunications & Technology Law Review
21st Century Copyright Law in the Digital Domain Symposium held at Universtiy of Michigan Law School Friday, March 24, 2006
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
Michigan Telecommunications & Technology Law Review
By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh
Michigan Telecommunications & Technology Law Review
The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …
What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley
What’S The Hang Up? The Future Of Voip Regulation And Taxation In New Hampshire, Kate Winstanley
The University of New Hampshire Law Review
Alice in Austria wishes to call her friend Bob in Boston, using a Boston area code to avoid charges for an international call. Using VoIP, Alice may initiate her call from any location in Austria where she may find Internet access. Once Alice connects to the Internet, she can transmit her call with the aid of a VoIP service provider, such as Skype. In order to hear and communicate with Bob, Alice can rely on a microphone and a headset that she can plug into her computer. Through VoIP, not only may Alice carry on a telephone conversation, but most …
All Rights Reserved? Cultural Monopoly And The Troubles With Copyright , Michael Geist
All Rights Reserved? Cultural Monopoly And The Troubles With Copyright , Michael Geist
Marquette Intellectual Property Law Review
With an increasing ease for one to download, trade and share information, there is also an increasing desire by companies, corporations and private interests to protect their works. In a time where everything can be commoditized and ideas can be bought and sold at a price, a question we must answer is - Who owns our creativity? Must all rights be reserved? This lecture explores the growth of the citizen journalist and the blossoming of independent creativity online. He also examines the concerns with copyright: how lobby groups have consistently pushed for ever stronger rules. Finally, Dr. Geist presents the …
The Law Of Unintended Consequences, Susan Ness
The Law Of Unintended Consequences, Susan Ness
Federal Communications Law Journal
No abstract provided.
Interconnection Policy And Technological Progress, Gerald W. Brock
Interconnection Policy And Technological Progress, Gerald W. Brock
Federal Communications Law Journal
No abstract provided.
The Failure Of Competition Under The 1996 Telecommunications Act, Gene Kimmelman, Mark Cooper, Magda Herra
The Failure Of Competition Under The 1996 Telecommunications Act, Gene Kimmelman, Mark Cooper, Magda Herra
Federal Communications Law Journal
No abstract provided.
The 1996 Telecommunications Act, Jim Robbins
The 1996 Telecommunications Act, Jim Robbins
Federal Communications Law Journal
No abstract provided.
Protecting Speech V. Protecting Children: An Examination Of The Judicial Refusal To Allow Legislative Action In The Realm Of Minors And Internet Pornography, William H. Jordan
Protecting Speech V. Protecting Children: An Examination Of The Judicial Refusal To Allow Legislative Action In The Realm Of Minors And Internet Pornography, William H. Jordan
South Carolina Law Review
No abstract provided.
Toward A Unified Test Of Personal Jurisdiction In An Era Of Widely Diffused Wrongs: The Relevance Of Purpose And Effects, C. Douglas Floyd, Shima Baradaran-Robison
Toward A Unified Test Of Personal Jurisdiction In An Era Of Widely Diffused Wrongs: The Relevance Of Purpose And Effects, C. Douglas Floyd, Shima Baradaran-Robison
Indiana Law Journal
No abstract provided.
The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox
The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox
Journal of Digital Forensics, Security and Law
The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet …
Race, Media Consolidation, And Online Content: The Lack Of Substitutes Available To Media Consumers Of Color, Leonard M. Baynes
Race, Media Consolidation, And Online Content: The Lack Of Substitutes Available To Media Consumers Of Color, Leonard M. Baynes
University of Michigan Journal of Law Reform
In its 2003 media ownership proceedings, the FCC relied on the existence of the Internet to provide justification for radically relaxing the FCC ownership rules. These rules limited the national audience reach of the broadcast licensees and the cross-ownership of different media properties by broadcasters and newspapers. In relaxing these rules, the FCC failed to recognize that a media submarket for African Americans and Latinos/as existed. This separate market is evidenced by the different television viewing habits of African Americans and Latinos/as as compared to Whites and Billboard magazine's delineation of R&B/urban music radio stations as a separate radio station …
First Amendment As Last Resort: The Internet Gambling Industry’S Bid To Advertise In The United States, Anne Lindner
First Amendment As Last Resort: The Internet Gambling Industry’S Bid To Advertise In The United States, Anne Lindner
Saint Louis University Law Journal
No abstract provided.
Internet Taxation Without Physical Representation?: States Seek Solution To Stop E-Commerce Sales Tax Shortfall, Eric A. Ess
Internet Taxation Without Physical Representation?: States Seek Solution To Stop E-Commerce Sales Tax Shortfall, Eric A. Ess
Saint Louis University Law Journal
No abstract provided.
Censors In Cyberspace: Can Congress Protect Children From Internet Pornography Despite Ashcroft V. Aclu?, Amy Wanamaker
Censors In Cyberspace: Can Congress Protect Children From Internet Pornography Despite Ashcroft V. Aclu?, Amy Wanamaker
Saint Louis University Law Journal
No abstract provided.
Oh. What A Tangled Web...The Continuing Evolution Of Personal Jurisdiction Derived From Internet-Based Contacts, Scott T. Jansen
Oh. What A Tangled Web...The Continuing Evolution Of Personal Jurisdiction Derived From Internet-Based Contacts, Scott T. Jansen
Missouri Law Review
The explosive impact of the Internet has, by its very existence and lack of defining boundaries, opened the door to a fundamental shift in our traditional conceptions of commerce, interaction and accessibility to information. As the law struggles to address this medium of communication - as a realm unto itself requiring new law or simply as another method of communication to which we will apply traditional notions - technology continues to march forward. New conundrums seem to pop up each year, as the World Wide Web further invades daily life. Of course, the usual suspects are involved: free speech, privacy, …
Imposing Geographical “Locateability” For Voice Over Internet Protocol, Andrea W.M. Louie
Imposing Geographical “Locateability” For Voice Over Internet Protocol, Andrea W.M. Louie
NYLS Law Review
No abstract provided.
Whose Candy Are We Really Taking? An Exploration Of The Candyman Cases And The Divide Within The Second Circuit, Lauren E. Curry
Whose Candy Are We Really Taking? An Exploration Of The Candyman Cases And The Divide Within The Second Circuit, Lauren E. Curry
Fordham Law Review
No abstract provided.
Evaluating The Proposed Changes To Federal Rule Of Civil Procedure 37: Spoliation, Routine Operation And The Rules Enabling Act, Nathan D. Larsen
Evaluating The Proposed Changes To Federal Rule Of Civil Procedure 37: Spoliation, Routine Operation And The Rules Enabling Act, Nathan D. Larsen
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
A New Tool For Analyzing Intellectual Property, Stephen M. Mcjohn
A New Tool For Analyzing Intellectual Property, Stephen M. Mcjohn
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
"Consumer Protection:" Consumer Strategies And The European Market In Genetically Modified Foods, Johanna Gibson
"Consumer Protection:" Consumer Strategies And The European Market In Genetically Modified Foods, Johanna Gibson
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Piracy: Twelve Year-Olds, Grandmothers, And Other Good Targets For The Recording Industry's File Sharing Litigation, Matthew Sag
Piracy: Twelve Year-Olds, Grandmothers, And Other Good Targets For The Recording Industry's File Sharing Litigation, Matthew Sag
Northwestern Journal of Technology and Intellectual Property
No abstract provided.
Electronically Stored Information: The December 2006 Amendments To The Federal Rules Of Civil Procedure, Kenneth J. Withers
Electronically Stored Information: The December 2006 Amendments To The Federal Rules Of Civil Procedure, Kenneth J. Withers
Northwestern Journal of Technology and Intellectual Property
No abstract provided.