Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (64)
- SelectedWorks (30)
- UIC School of Law (27)
- Schulich School of Law, Dalhousie University (17)
- Maurer School of Law: Indiana University (16)
-
- Pepperdine University (16)
- University of Michigan Law School (13)
- University of Richmond (11)
- University of Wollongong (9)
- University of California, Irvine School of Law (7)
- University of Florida Levin College of Law (7)
- Vanderbilt University Law School (7)
- Brigham Young University Law School (6)
- Pace University (6)
- Seton Hall University (6)
- University of Pennsylvania Carey Law School (6)
- New York Law School (5)
- Chicago-Kent College of Law (4)
- Singapore Management University (4)
- University of Colorado Law School (4)
- University of Maryland Francis King Carey School of Law (4)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (4)
- University of Washington School of Law (4)
- Duke Law (3)
- Florida A&M University College of Law (3)
- Southern Methodist University (3)
- Touro University Jacob D. Fuchsberg Law Center (3)
- University of Arkansas at Little Rock William H. Bowen School of Law (3)
- American University Washington College of Law (2)
- Boston University School of Law (2)
- Keyword
-
- Internet (44)
- Privacy (28)
- Copyright (22)
- Copyright Law (14)
- First Amendment (14)
-
- Facebook (13)
- Social media (12)
- Internet Law (11)
- Technology (11)
- Twitter (11)
- Intellectual Property (10)
- Emerging Technologies (9)
- Google (8)
- Law and Technology (8)
- Surveillance (8)
- Communications Law (7)
- Cyberspace (7)
- Ethics (7)
- Intellectual property (7)
- National Security (7)
- Social Media (7)
- Bullying (6)
- Cyberbullying (6)
- Cyberlaw (6)
- Digital Millennium Copyright Act (6)
- Free speech (6)
- Freedom of speech (6)
- Information (6)
- Intellectual Property Law (6)
- Regulation (6)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (19)
- Matthew Rimmer (16)
- Professor Katina Michael (16)
- Canadian Journal of Law and Technology (11)
- Pepperdine Law Review (10)
-
- All Faculty Scholarship (9)
- Associate Professor Katina Michael (9)
- Federal Communications Law Journal (9)
- Richmond Journal of Law & Technology (9)
- Faculty Scholarship (8)
- Warren Bartholomew Chik (8)
- UC Irvine Law Review (7)
- Vanderbilt Journal of Entertainment & Technology Law (7)
- Rodolfo C. Rivas (6)
- Student Works (6)
- University of Michigan Journal of Law Reform Caveat (6)
- Articles, Book Chapters, & Popular Press (5)
- Daniel Lyons (5)
- Florida Law Review (4)
- Pepperdine Dispute Resolution Law Journal (4)
- Research Collection Yong Pung How School Of Law (4)
- Scholarly Works (4)
- UIC Review of Intellectual Property Law (4)
- Warren Bartholomew CHIK (4)
- Washington Journal of Law, Technology & Arts (4)
- Articles (3)
- Articles & Chapters (3)
- Articles by Maurer Faculty (3)
- BYU Law Review (3)
- Journal Publications (3)
- Publication Type
Articles 1 - 30 of 323
Full-Text Articles in Law
An Elegy For Greg Ham: Copyright Law, The Kookaburra Case, And Remix Culture, Matthew Rimmer
An Elegy For Greg Ham: Copyright Law, The Kookaburra Case, And Remix Culture, Matthew Rimmer
Matthew Rimmer
The ‘Kookaburra’ case was a tragic and controversial copyright dispute, highlighting the need for copyright law reform by the Australian Parliament. In the Kookaburra case, a copyright action was brought by Larrikin Records against Men at Work’s song ‘Down Under’, alleging copyright infringement of the ‘Kookaburra’ song composed by Marion Sinclair. The dispute raised a host of doctrinal matters. There was disquiet over the length of the copyright term. There were fierce contests as to the copyright ownership of the ‘Kookaburra’ song. The litigation raised questions about copyright infringement and substantiality – particularly in relation to musical works. The ‘Kookaburra’ …
Cyber Deterrence, Eric Talbot Jensen
Cyber Deterrence, Eric Talbot Jensen
Faculty Scholarship
Cyber operations by both state actors and non-state actors are increasing in frequency and severity. As nations struggle to defend their networks and infrastructure, their ability to apply the principles of deterrence to cyber activities correspondingly increases in importance. Cyber deterrence offers much more flexibility and increased options from traditional deterrence methodologies developed in the Cold War’s nuclear age. In addition to traditional retaliation, cyber deterrence includes options such as taking legal action; and making networks invisible, resilient, and interdependent. It also presents new ways to view and apply accepted methodologies such as invulnerability. As the U.S. continues to develop …
23andme Inc.: Patent Law And Lifestyle Genetics, Matthew Rimmer
23andme Inc.: Patent Law And Lifestyle Genetics, Matthew Rimmer
Matthew Rimmer
The venture, 23andMe Inc., raises a host of issues in respect of patent law, policy, and practice in respect of lifestyle genetics and personalised medicine. The company observes: ‘We recognize that the availability of personal genetic information raises important issues at the nexus of ethics, law, and public policy’. 23andMe Inc. has tested the boundaries of patent law, with its patent applications, which cut across information technology, medicine, and biotechnology. The company’s research raises fundamental issues about patentability, especially in light of the litigation in Bilski v. Kappos, Mayo Collaborative Services v. Prometheus Laboratories Inc. and Association for Molecular Pathology …
La Industria Del Libro 3.0 Y J.K. Rowling, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.
La Industria Del Libro 3.0 Y J.K. Rowling, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.
Rodolfo C. Rivas
The authors provide a brief overview of what could be called the 3.0 version of the book industry. Under the 3.0 book industry, the author’s role in exploiting their creations has to embrace new and creative business models, which may often come into conflict with publisher’s old business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others. ///////////////////////////////////////////////////////////////////////////////////////////////////// Los autores proporcionan una breve descripción de lo que podría llamarse la versión 3.0 de la industria del libro. En la industria del libro 3.0, …
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …
Virtual Parentalism, Joshua A.T. Fairfield
Virtual Parentalism, Joshua A.T. Fairfield
Joshua A.T. Fairfield
Parents, not Laws, ultimately protect children both online and offline. If legislation places adults at legal risk because of the presence of children in virtual worlds, adults will exit those worlds, and children will be isolated into separate spaces. This will not improve safety for children. Instead, this Article suggests that Congress enact measures that encourage filtering technology and parental tools that will both protect children in virtual worlds, and protectfree speech online.
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Professor Katina Michael
This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …
The Destruction Of An Empire: Will Viacom End Youtube's Reign?, Adam Shatzkes
The Destruction Of An Empire: Will Viacom End Youtube's Reign?, Adam Shatzkes
Touro Law Review
In a pre-Napster world Congress sought to promote theadvancement and development of the Internet. To facilitate this expansion, Congress enacted the Digital Millennium Copyright Act ("DMCA"), which protects internet service providers from copyright infringement liability. Due, in part, to the DMCA, the Internet has expanded beyond Congress' expectations. With the growth of the Internet, however, inequities have been created. YouTube epitomizes these inequities and Viacom's suit highlights the injustices that have been created. The ease with which copyrighted materials are published on the Internet has made it impossible for copyright owners to adequately protect their works. It is time for …
Do Students Turn Over Their Rights When They Turn In Their Papers? A Case Study Of Turnitin.Com, Stephen Sharon
Do Students Turn Over Their Rights When They Turn In Their Papers? A Case Study Of Turnitin.Com, Stephen Sharon
Touro Law Review
Turnitin is a rapidly growing online anti-plagiarism service subscribed to by thousands of schools in the United States. Though the pursuit of honesty and integrity are at the heart of our academic institutions and the Turnitin anti-plagiarism service, there is a fatal flaw in its execution. This comment examines the copyright and fair use arguments presented by four Virginia students asserting that Turnitin violated their intellectual property rights. This comment goes beyond the facts of the four Virginia students to explore the root issues of a service that collects and distributes the copyrighted works submitted to it by hundreds of …
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom
Professor Katina Michael
Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
Simon Chesterman
This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …
The Evolving Internet: Patterns In Usage And Pricing, Daniel Lyons
The Evolving Internet: Patterns In Usage And Pricing, Daniel Lyons
Daniel Lyons
No abstract provided.
Podcast, Usage-Based Pricing In Broadband, Daniel Lyons
Podcast, Usage-Based Pricing In Broadband, Daniel Lyons
Daniel Lyons
No abstract provided.
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Ieee T&S Magazine: Undergoing Transformation, Katina Michael
Professor Katina Michael
Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.
Cambio De Perspectiva: El Nuevo Papel De Los Creadores En El Entorno Digital, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.
Cambio De Perspectiva: El Nuevo Papel De Los Creadores En El Entorno Digital, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.
Rodolfo C. Rivas
The authors provide a brief overview of the author’s role in exploiting their creations and how new technologies have made authors and publishers explore new business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others./////////////////////////////////////////////////// Los autores proporcionan una breve descripción de la función del autor en la explotación de sus creaciones y cómo las nuevas tecnologías han obligado a los autores y editores explorar nuevos modelos de negocio. En el artículo, los autores echan un vistazo a los modelos de negocio innovadores …
Changing Places: A New Role For Creators In The Digital World, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.
Changing Places: A New Role For Creators In The Digital World, Rodolfo C. Rivas Rea Esq., Maria Alejandra Lopez Garcia Esq.
Rodolfo C. Rivas
The authors provide a brief overview of the author’s role in exploiting their creations and how new technologies have made authors and publishers explore new business models. In the article, the authors take a look at the innovative business models implemented by J.K. Rowling, Stephen King, Radiohead and Frank Ocean amongst others./////////////////////////////////////////////////// Los autores proporcionan una breve descripción de la función del autor en la explotación de sus creaciones y cómo las nuevas tecnologías han obligado a los autores y editores explorar nuevos modelos de negocio. En el artículo, los autores echan un vistazo a los modelos de negocio innovadores …
Copyright Developments In 2012 (Version 1.1), Laura Quilter
Copyright Developments In 2012 (Version 1.1), Laura Quilter
Laura Quilter
No abstract provided.
Possession Of Child Pornography: Should You Be Convicted When The Computer Cache Does The Saving For You?, Giannina Marin
Possession Of Child Pornography: Should You Be Convicted When The Computer Cache Does The Saving For You?, Giannina Marin
Florida Law Review
“For years, defense lawyers have argued the ‘young and stupid’ semidefense for their youthful clients. Now, we can have the ‘I didn’t know it was on the hard drive’ objection for the unsophisticated computer user in child pornography cases—or at least they can in the 9th Circuit.” This quote, appearing on the website of an East Texas criminal defense law firm, refers to the outcome of United States v. Kuchinski. In Kuchinski, the defendant’s computer contained, in various forms, more than 15,000 images of child pornography. There was no question that Kuchinski’s volitional viewing of the images on the Internet …
Clicking Away Confidentiality: Workplace Waiver Of Attorney-Client Privilege, Adam C. Losey
Clicking Away Confidentiality: Workplace Waiver Of Attorney-Client Privilege, Adam C. Losey
Florida Law Review
Barbara Hall, an administrative assistant, often arrives at work an hour and a half early solely to check her personal e-mails on her employer’s computer. Afterwards, “[i]n the grand tradition of Chekhov, or perhaps ‘Days of Our Lives,’ Barbara Hall carries on a dialogue throughout the workday with her two daughters, both of whom work at an event-planning company in Cleveland and use its e-mail system for such exchanges.” When she gets home from work, Barbara continues to use her workplace e-mail account to send personal e-mails. Barbara Hall and her daughters are not alone. The average employee is estimated …
Student Speech Rights In The Digital Age, Mary-Rose Papandrea
Student Speech Rights In The Digital Age, Mary-Rose Papandrea
Florida Law Review
For several decades courts have struggled to determine when, if ever, public schools should have the power to restrict student expression that does not occur on school grounds during school hours. In the last several years, courts have struggled with this same question in a new context—the digital media. The dramatic increase in the number of student speech cases involving the Internet, mobile phones, and video cameras begs for a closer examination of the scope of school officials’ authority to censor the expression of minors as well as the scope of juvenile speech rights generally. This Article takes a close …
Playing The Mysterious Game Of Online Love: Examining An Emerging Trend Of Limiting § 230 Immunity Of The Communications Decency Act And The Effects On E-Dating Websites, Matthew Altenberg
Playing The Mysterious Game Of Online Love: Examining An Emerging Trend Of Limiting § 230 Immunity Of The Communications Decency Act And The Effects On E-Dating Websites, Matthew Altenberg
Pace Law Review
No abstract provided.
Catch Me If You Can: An Analysis Of New Enforcement Measures And Proposed Legislation To Combat The Sale Of Counterfeit Products On The Internet, Jeffrey A. Lindenbaum, David Ewen
Catch Me If You Can: An Analysis Of New Enforcement Measures And Proposed Legislation To Combat The Sale Of Counterfeit Products On The Internet, Jeffrey A. Lindenbaum, David Ewen
Pace Law Review
No abstract provided.
Cybercrime And The Law: Challenges, Issues, And Outcomes, Susan W. Brenner
Cybercrime And The Law: Challenges, Issues, And Outcomes, Susan W. Brenner
School of Law Faculty Publications
The exponential increase in cybercrimes in the past decade has raised new issues and challenges for law and law enforcement. Based on case studies drawn from her work as a lawyer, Susan W. Brenner identifies a diverse range of cybercrimes, including crimes that target computers (viruses, worms, Trojan horse programs, malware and DDoS attacks) and crimes in which the computer itself is used as a tool (cyberstalking, cyberextortion, cybertheft, and embezzlement). Illuminating legal issues unique to investigations in a digital environment, Brenner examines both national law enforcement agencies and transnational crime, and shows how cyberspace erodes the functional and empirical …
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
San Diego International Law Journal
The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …
A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Remix Culture, Matthew Rimmer
A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Remix Culture, Matthew Rimmer
Matthew Rimmer
RECOMMENDATIONSIn its issues paper, the Australian Law Reform Commission asks a number of inter-connected questions about transformative use, fair dealing, and fair use:Transformative useQuestion 14. How are copyright materials being used in transformative and collaborative ways—for example, in ‘sampling’, ‘remixes’ and ‘mashups’. For what purposes—for example, commercial purposes, in creating cultural works or as individual self-expression?Question 15. Should the use of copyright materials in transformative uses be more freely permitted? Should the Copyright Act 1968 (Cth) be amended to provide that transformative use does not constitute an infringement of copyright? If so, how should such an exception be framed?Question 16. …
A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: 3d Printing, Matthew Rimmer
A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: 3d Printing, Matthew Rimmer
Matthew Rimmer
RECOMMENDATIONSThe Australian Law Reform Commission poses a number of questions on the defence of fair use in Copyright and the Digital Economy.Question 52. Should the Copyright Act 1968 (Cth) be amended to include a broad, flexible exception? If so, how should this exception be framed? For example, should such an exception be based on ‘fairness’, ‘reasonableness’ or something else? Question 53. Should such a new exception replace all or some existing exceptions or should it be in addition to existing exceptions?The case study of 3D printing highlights how Australia would benefit from a defence of fair use.Recommendation 1 The narrow, …
A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Disability Rights, Matthew Rimmer Dr
A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Disability Rights, Matthew Rimmer Dr
Matthew Rimmer
RECOMMENDATIONS
Recommendation 1 The Australian Government should take legislative action to implement Article 30 (3) of the United Nations Convention on the Rights of Persons with Disabilities 2006, which provides that ‘States Parties shall take all appropriate steps, in accordance with international law, to ensure that laws protecting intellectual property rights do not constitute an unreasonable or discriminatory barrier to access by persons with disabilities to cultural materials’. This will involve revising the Copyright Act 1968 (Cth) – and addressing any direct or indirect disability discrimination.
Recommendation 2 The Australian Law Reform Commission should consider revising the Copyright Act 1968 …
A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: International Law, Matthew Rimmer Dr
A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: International Law, Matthew Rimmer Dr
Matthew Rimmer
The Australian Law Reform Commission poses a question in respect of international law in the issues paper on Copyright and the Digital Economy.Question 1. The ALRC is interested in evidence of how Australia’s copyright law is affecting participation in the digital economy. For example, is there evidence about how copyright law: a. affects the ability of creators to earn a living, including through access to new revenue streams and new digital goods and services; b. affects the introduction of new or innovative business models; c. imposes unnecessary costs or inefficiencies on creators or those wanting to access or make use …
A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Consumer Rights, Matthew Rimmer
A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: Consumer Rights, Matthew Rimmer
Matthew Rimmer
RECOMMENDATIONSThe Australian Law Reform Commission poses a number of inter-related questions about copyright law, personal use, consumer rights, and cloud computing:Cloud computingQuestion 5. Is Australian copyright law impeding the development or delivery of cloud computing services?Question 6. Should exceptions in the Copyright Act 1968 (Cth) be amended, or new exceptions created, to account for new cloud computing services, and if so, how?Copying for private useQuestion 7. Should the copying of legally acquired copyright material, including broadcast material, for private and domestic use be more freely permitted?Question 8. The format shifting exceptions in the Copyright Act 1968 (Cth) allow users to …