Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Santa Clara Law (10)
- University of Maryland Francis King Carey School of Law (5)
- Columbia Law School (4)
- Brooklyn Law School (3)
- University of Pittsburgh School of Law (3)
-
- Boston University School of Law (2)
- Cornell University Law School (2)
- Georgetown University Law Center (2)
- Georgia State University College of Law (2)
- Notre Dame Law School (2)
- Villanova University Charles Widger School of Law (2)
- Florida A&M University College of Law (1)
- Maurer School of Law: Indiana University (1)
- University of Colorado Law School (1)
- University of Dayton (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- Keyword
-
- Adwords (9)
- Google (9)
- Trademark (9)
- Rosetta Stone (6)
- Coalition (4)
-
- Lobby (4)
- Privacy (4)
- Cyberlaw (3)
- First Amendment (3)
- Internet (3)
- Surveillance (3)
- Cybersquatting (2)
- E-mail (2)
- Electronic mail (2)
- Fourth Amendment (2)
- Internet domain name (2)
- Law and Technology (2)
- Policy change (2)
- SSRN (2)
- Search engine (2)
- Access control (1)
- Administrative Law (1)
- Ads quality (1)
- Adsense (1)
- Antitrust law (1)
- Approval (1)
- Broadband (1)
- Business models (1)
- Columbia Law Review (1)
- Common carrier (1)
- Publication
-
- Faculty Scholarship (13)
- Rosetta Stone v. Google (Joint Appendix) (10)
- Articles (4)
- Cornell Law Faculty Publications (2)
- Faculty Publications By Year (2)
-
- Journal Articles (2)
- Working Paper Series (2)
- Articles by Maurer Faculty (1)
- Center for Contract and Economic Organization (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Journal Publications (1)
- Law Librarian Scholarship (1)
- Publications (1)
- School of Law Faculty Publications (1)
- Testimony Before Congress (1)
Articles 31 - 43 of 43
Full-Text Articles in Law
Homes With Tails: What If You Could Own Your Internet Connection?, Tim Wu, Derek Slater
Homes With Tails: What If You Could Own Your Internet Connection?, Tim Wu, Derek Slater
Faculty Scholarship
America's communications infrastructure is stuck at a copper wall. For the vast majority of homes, copper wires remain the principal means of getting broadband services. The deployment of fiber optic connections to the home would enable exponentially faster connections, and few dispute that upgrading to more robust infrastructure is essential to America's economic growth. However, the costs of such an upgrade are daunting for private sector firms and even for governments. These facts add up to a public policy challenge.
Our intuition is that an innovative model holds unrealized promise: household investments in fiber. Consumers may one day purchase and …
Manipulating And Hiding Terrorist Content On The Internet: Legal And Tradecraft Issues, Jack F. Williams
Manipulating And Hiding Terrorist Content On The Internet: Legal And Tradecraft Issues, Jack F. Williams
Faculty Publications By Year
No abstract provided.
Property And Probable Cause: The Fourth Amendment's Principled Protection Of Privacy, Ricardo J. Bascuas
Property And Probable Cause: The Fourth Amendment's Principled Protection Of Privacy, Ricardo J. Bascuas
Articles
No abstract provided.
Government Data Mining: The Need For A Legal Framework, Fred H. Cate
Government Data Mining: The Need For A Legal Framework, Fred H. Cate
Articles by Maurer Faculty
The article examines the government's growing appetite for collecting personal data. Often justified on the basis of protecting national security, government data mining programs sweep up data collected through hundreds of regulatory and administrative programs, and combine them with huge datasets obtained from industry. The result is an aggregation of personal data - the "digital footprints" of individual lives - never before seen. These data warehouses are then used to determine who can work and participate in Social Security programs, who can board airplanes and enter government buildings, and who is likely to pose a threat in the future, even …
Asterisk Revisited: Debating A Right Of Reply On Search Results, Frank Pasquale
Asterisk Revisited: Debating A Right Of Reply On Search Results, Frank Pasquale
Faculty Scholarship
No abstract provided.
Privacy, Visibility, Transparency, And Exposure, Julie E. Cohen
Privacy, Visibility, Transparency, And Exposure, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
This essay considers the relationship between privacy and visibility in the networked information age. Visibility is an important determinant of harm to privacy, but a persistent tendency to conceptualize privacy harms and expectations in terms of visibility has created two problems. First, focusing on visibility diminishes the salience and obscures the operation of nonvisual mechanisms designed to render individual identity, behavior, and preferences transparent to third parties. The metaphoric mapping to visibility suggests that surveillance is simply passive observation, rather than the active production of categories, narratives, and, norms. Second, even a broader conception of privacy harms as a function …
Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton
Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton
Articles
When the Oscar-winning actress, Julia Roberts, fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual's persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …
Intellectual Property And Americana, Or Why Ip Gets The Blues, Michael J. Madison
Intellectual Property And Americana, Or Why Ip Gets The Blues, Michael J. Madison
Articles
This essay, prepared as part of a Symposium on intellectual property law and business models, suggests the re-examination of the role of intellectual property law in the persistence of cultural forms of all sorts, including (but not limited to) business models. Some argue that the absence of intellectual property law inhibits the emergence of durable or persistent cultural forms; copyright and patent regimes are justified precisely because they supply foundations for durability. The essay tests that proposition via brief reviews of three persistent but very different cultural models, each of which represents a distinct form of American culture: The Rocky …
The Next Frontier For Network Neutrality, Philip J. Weiser
The Next Frontier For Network Neutrality, Philip J. Weiser
Publications
The challenge for policymakers evaluating calls to institute some form of network neutrality regulation is to bring reasoned analysis to bear on a topic that continues to generate more heat than light and that many telecommunications companies appear to believe will just fade away. Over the fall of 2007, the hopes of broadband providers that broadband networks could escape any form of regulatory oversight were dealt a blow when it was revealed that Comcast had degraded the experience of some users of Bittorent (a peer-to-peer application) and engaged in an undisclosed form of network management. This incident, as well as …
Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher
Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher
Faculty Scholarship
This Essay explores the enforceability and presence of pro-seller contract terms in internet retail contracts. Analyzing case law on internet contract enforceability and a survey of 500 firms'websites, it demonstrates that even the enforceability of many internet contracts is questionable. It then presents new data that suggest that the prevalence of pro-seller contract terms is far less than usually assumed. It suggests that the benefit of making these terms enforceable is outweighed by the loss of user friendliness required for the necessary interface changes. Finally, it uses fresh statistical analyses to determine what relationship, if any, exists between enforceability, pro-seller …
Information Policy For The Library Of Babel, James Grimmelmann
Information Policy For The Library Of Babel, James Grimmelmann
Cornell Law Faculty Publications
The image of Borges's Library of Babel, which contains all possible books, is haunting and suggestive. This essay asks what we would do if we were advising a Federal Library Commission on how to deal with the Library's vast holdings and overwhelming disorganization. This thought exercise provides a set of sensible principles for information policy in an age of extreme informational abundance.
Technological Due Process, Danielle K. Citron
Technological Due Process, Danielle K. Citron
Faculty Scholarship
Distinct and complementary procedures for adjudications and rulemaking lie at the heart of twentieth-century administrative law. Due process required agencies to provide individuals notice and an opportunity to be heard. Agencies could foreclose policy issues that individuals might otherwise raise in adjudications through public rulemaking. One system allowed focused advocacy; the other featured broad participation. Each procedural regime compensated for the normative limits of the other. Both depended on clear statements of reason.
The dichotomy between these procedural regimes has become outmoded. This century's automated decision-making systems collapse individual adjudications into rulemaking while adhering to the procedural safeguards of neither. …
Open Code Governance, Danielle K. Citron
Open Code Governance, Danielle K. Citron
Faculty Scholarship
Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person's eligibility for public benefits. Computer systems store sensitive personal information. These systems' closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program's source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …