Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

Cyber Civil Rights, Danielle Keats Citron Dec 2008

Cyber Civil Rights, Danielle Keats Citron

Faculty Scholarship

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …


Cyber Civil Rights, Danielle Keats Citron Dec 2008

Cyber Civil Rights, Danielle Keats Citron

Danielle Keats Citron

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …


Cyber Civil Rights, Danielle Keats Citron Oct 2008

Cyber Civil Rights, Danielle Keats Citron

Danielle Keats Citron

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …


Law Library 2.0: New Roles For Law Librarians In The Information Overload Era, Sasha Skenderija Jul 2008

Law Library 2.0: New Roles For Law Librarians In The Information Overload Era, Sasha Skenderija

Cornell Law Faculty Working Papers

WWW has rapidly evolved from a technological into a social medium. Web 2.0 has become a metaphor for the distributed and decentralized collaboration networks on a global scale. With the recent trends of new media development, the sources available have reached a critical mass resulting in an unprecedented information overload. The urgent challenge to all information professionals, in this case law librarians, is no longer availability and direct provision of resources, but rather the filtering and highlighting the ubiquitous Infosphere. The recent transformation of legal information has had more drastic consequences than in many other cases. The Cornell Law Library …


Where Web 2.0 And Legal Information Intersect: Adjusting Course Without Getting Lost, Matthew M. Morrison Jul 2008

Where Web 2.0 And Legal Information Intersect: Adjusting Course Without Getting Lost, Matthew M. Morrison

Cornell Law Faculty Working Papers

For more than a century, the process of legal research remained unchanged. This process was rooted in an established legal information structure. The law was published in standard texts, such as the West reporters, annotated codes, treatises, and the West Key Number Digest. While the advent of computer-assisted legal research was a departure from the print-based model, it did not fundamentally change the structure of legal information or the nature of authority. In fact, in its conservative beginnings, computer-assisted legal research provided a mere format shift as case texts were transcribed to simple online databases. More recently, Web 2.0 technologies …


Teaching With Technology: Is The Pedagogical Fulcrum Shifting?, Camille Broussard Jan 2008

Teaching With Technology: Is The Pedagogical Fulcrum Shifting?, Camille Broussard

NYLS Law Review

No abstract provided.


Throwing It All Away: Community, Data Privacy And The False Choices Of Web 2.0, Eli Edwards Dec 2007

Throwing It All Away: Community, Data Privacy And The False Choices Of Web 2.0, Eli Edwards

Eli Edwards

Online privacy has long been a challenge, but the rise of Web 2.0 technologies has made it easier for more people to share personal information about themselves. There is a particular concern that young people who have grown accustomed to baring their private information in the public Internet sphere are especially vulnerable to potential harms now and in the near future. There is even a recurrent meme that posits people today, especially young people immersed in the digital culture, no longer value the right to privacy; the assumption is that between the equal values of community and privacy, Web 2.0 …