Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Law
Cyber Civil Rights, Danielle Keats Citron
Cyber Civil Rights, Danielle Keats Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …
Cyber Civil Rights, Danielle Keats Citron
Cyber Civil Rights, Danielle Keats Citron
Danielle Keats Citron
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …
Cyber Civil Rights, Danielle Keats Citron
Cyber Civil Rights, Danielle Keats Citron
Danielle Keats Citron
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …
Law Library 2.0: New Roles For Law Librarians In The Information Overload Era, Sasha Skenderija
Law Library 2.0: New Roles For Law Librarians In The Information Overload Era, Sasha Skenderija
Cornell Law Faculty Working Papers
WWW has rapidly evolved from a technological into a social medium. Web 2.0 has become a metaphor for the distributed and decentralized collaboration networks on a global scale. With the recent trends of new media development, the sources available have reached a critical mass resulting in an unprecedented information overload. The urgent challenge to all information professionals, in this case law librarians, is no longer availability and direct provision of resources, but rather the filtering and highlighting the ubiquitous Infosphere. The recent transformation of legal information has had more drastic consequences than in many other cases. The Cornell Law Library …
Where Web 2.0 And Legal Information Intersect: Adjusting Course Without Getting Lost, Matthew M. Morrison
Where Web 2.0 And Legal Information Intersect: Adjusting Course Without Getting Lost, Matthew M. Morrison
Cornell Law Faculty Working Papers
For more than a century, the process of legal research remained unchanged. This process was rooted in an established legal information structure. The law was published in standard texts, such as the West reporters, annotated codes, treatises, and the West Key Number Digest. While the advent of computer-assisted legal research was a departure from the print-based model, it did not fundamentally change the structure of legal information or the nature of authority. In fact, in its conservative beginnings, computer-assisted legal research provided a mere format shift as case texts were transcribed to simple online databases. More recently, Web 2.0 technologies …
Teaching With Technology: Is The Pedagogical Fulcrum Shifting?, Camille Broussard
Teaching With Technology: Is The Pedagogical Fulcrum Shifting?, Camille Broussard
NYLS Law Review
No abstract provided.
Throwing It All Away: Community, Data Privacy And The False Choices Of Web 2.0, Eli Edwards
Throwing It All Away: Community, Data Privacy And The False Choices Of Web 2.0, Eli Edwards
Eli Edwards
Online privacy has long been a challenge, but the rise of Web 2.0 technologies has made it easier for more people to share personal information about themselves. There is a particular concern that young people who have grown accustomed to baring their private information in the public Internet sphere are especially vulnerable to potential harms now and in the near future. There is even a recurrent meme that posits people today, especially young people immersed in the digital culture, no longer value the right to privacy; the assumption is that between the equal values of community and privacy, Web 2.0 …