Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (67)
- UIC School of Law (34)
- Selected Works (18)
- SelectedWorks (15)
- University of Richmond (12)
-
- Schulich School of Law, Dalhousie University (11)
- University of Oklahoma College of Law (7)
- University of Maryland Francis King Carey School of Law (5)
- University of Pennsylvania Carey Law School (4)
- Maurer School of Law: Indiana University (3)
- University of Georgia School of Law (3)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (3)
- University of Pittsburgh School of Law (3)
- Boston University School of Law (2)
- Chicago-Kent College of Law (2)
- Seattle University School of Law (2)
- University of Michigan Law School (2)
- University of Nebraska - Lincoln (2)
- University of Washington School of Law (2)
- Vanderbilt University Law School (2)
- American University Washington College of Law (1)
- Cleveland State University (1)
- Columbia Law School (1)
- Georgia State University College of Law (1)
- Hamline University (1)
- Mitchell Hamline School of Law (1)
- Notre Dame Law School (1)
- Pace University (1)
- Pepperdine University (1)
- Salve Regina University (1)
- Keyword
-
- Computer Law (16)
- Law and Technology (16)
- Privacy (14)
- Science and Technology (12)
- Communications Law (9)
-
- Digital forensics (8)
- Internet (8)
- Social media (8)
- Copyright (7)
- Intellectual Property Law (7)
- American Bar Association (6)
- Administrative Law (5)
- Cyberspace (5)
- ESI (5)
- Electronically stored information (5)
- Intellectual property (5)
- Searches and seizures (5)
- Surveillance (5)
- Antitrust (4)
- Arts and Entertainment (4)
- Cloud computing (4)
- Cybersecurity (4)
- Digital evidence (4)
- First Amendment (4)
- Forensics (4)
- Law and Society (4)
- Network neutrality (4)
- Regulation (4)
- Antitrust and Trade Regulation (3)
- Consumer Protection Law (3)
- Publication
-
- Journal of Digital Forensics, Security and Law (50)
- UIC John Marshall Journal of Information Technology & Privacy Law (29)
- Annual ADFSL Conference on Digital Forensics, Security and Law (17)
- Richmond Journal of Law & Technology (11)
- Canadian Journal of Law and Technology (10)
-
- Oklahoma Law Review (7)
- All Faculty Scholarship (6)
- Faculty Scholarship (5)
- Journal of Business & Technology Law (4)
- Articles (3)
- Curtis J Neeley Jr (3)
- Georgia Journal of International & Comparative Law (3)
- Rob Frieden (3)
- UIC Review of Intellectual Property Law (3)
- William H. Page (3)
- Articles by Maurer Faculty (2)
- Elizabeth A Rowe (2)
- Richard Warner (2)
- Scholarly Works (2)
- Seattle University Law Review (2)
- Sharon K. Sandeen (2)
- Tejas N. Narechania (2)
- UIC Law Open Access Faculty Scholarship (2)
- United States Department of Justice: Publications and Materials (2)
- A. Michael Froomkin (1)
- Angela Goodrum (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Articles, Book Chapters, & Popular Press (1)
- Electronic Thesis and Dissertation Repository (1)
- Faculty and Staff - Articles & Papers (1)
Articles 1 - 30 of 215
Full-Text Articles in Law
How Not To Criminalize Cyberbullying, Lyrissa Barnett Lidsky, Andrea Garcia
How Not To Criminalize Cyberbullying, Lyrissa Barnett Lidsky, Andrea Garcia
Lyrissa Barnett Lidsky
This essay provides a sustained constitutional critique of the growing body of laws criminalizing cyberbullying. These laws typically proceed by either modernizing existing harassment and stalking laws or crafting new criminal offenses. Both paths are beset with First Amendment perils, which this essay illustrates through 'case studies' of selected legislative efforts. Though sympathetic to the aims of these new laws, this essay contends that reflexive criminalization in response to tragic cyberbullying incidents has led law-makers to conflate cyberbullying as a social problem with cyberbullying as a criminal problem, creating pernicious consequences. The legislative zeal to eradicate cyberbullying potentially produces disproportionate …
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian
Sean Brian
No abstract provided.
Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe
Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe
Elizabeth A Rowe
This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.
Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe
Saving Trade Secret Disclosures On The Internet Through Sequential Preservation, Elizabeth A. Rowe
Elizabeth A Rowe
When an employee discloses an employer's trade secrets to the public over the Internet, does our current trade secret framework appropriately address the consequences of that disclosure? What ought to be the rule that governs whether the trade secret owner has lost not only the protection status for the secret, but also any remedies against use by third parties? Should the ease with which the Internet permits instant and mass disclosure of secrets be taken into consideration in assessing the fairness of a rule that calls for immediate loss of the trade secret upon disclosure? Given that trade secret law …
The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu
The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu
Katrina Wu
The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …
Toward A Patent Exhaustion Regime For Sustainable Development, 32 Berkeley J. Int'l Law. 330 (2014), Benjamin Liu
Toward A Patent Exhaustion Regime For Sustainable Development, 32 Berkeley J. Int'l Law. 330 (2014), Benjamin Liu
UIC Law Open Access Faculty Scholarship
This Article argues that the current exhaustion doctrine, when applied to the refurbishing industry, fails to balance its mandate of promoting technological progress with the broader program of sustainable development and is therefore unsuitable for countries on the modernization path. First, what constitutes an infringing “making” remains underdetermined. Second, the evidentiary hurdle for proving legal refurbishment is too onerous for the low margin and under-resourced refurbishing industry. Finally, the all-or-nothing approach to judging infringement fails to account for the nuanced cost-benefit nexus that exists between patentees, refurbishers, and society at large and discourages private ordering. To recalibrate the balance between …
Bargaining In The Shadow Of The European Microsoft Decision: The Microsoft-Samba Protocol License, William H. Page, Seldon J. Childers
Bargaining In The Shadow Of The European Microsoft Decision: The Microsoft-Samba Protocol License, William H. Page, Seldon J. Childers
William H. Page
The Microsoft-Samba agreement is by far the most important tangible outcome of the European Microsoft case. The EC’s other remedial order in the case, which required Microsoft to create a version of Windows without Windows Media Player, was an embarrassing failure. The Samba agreement, however, is significant because it requires Microsoft to provide, to its most important rival in the server market, detailed documentation of its communications protocols, under terms that allow use of the information in open source development and distribution. There is good reason to believe that Samba will be able to use the information to compete more …
Software Development As An Antitrust Remedy: Lessons From The Enforcement Of The Microsoft Communications Protocol Licensing Requirement, William H. Page, Seldon J. Childers
Software Development As An Antitrust Remedy: Lessons From The Enforcement Of The Microsoft Communications Protocol Licensing Requirement, William H. Page, Seldon J. Childers
William H. Page
An important provision in each of the final judgments in the government's Microsoft antitrust case requires Microsoft to "make available" to software developers the communications protocols that Windows client operating systems use to interoperate "natively" (that is, without adding software) with Microsoft server operating systems in corporate networks or over the Internet. The short-term goal of the provision is to allow developers, as licensees of the protocols, to write applications for non-Microsoft server operating systems that interoperate with Windows client computers in the same ways that applications written for Microsoft's server operating systems interoperate with Windows clients. The long-term goal …
Internet Regulation And Consumer Welfare: Innovation, Speculation, And Cable Bundling, John E. Lopatka, William H. Page
Internet Regulation And Consumer Welfare: Innovation, Speculation, And Cable Bundling, John E. Lopatka, William H. Page
William H. Page
The goal of telecommunications policy has shifted from the control of natural monopoly to the promotion of competition. But the question remains how extensive and persistent the government's regulatory role should be in the operation of communications markets. One might think that regulators could find the answer to this question in antitrust law. But antitrust has itself been torn between interventionist and laissez-faire tendencies. Over the past two decades, the dominant Chicago School approach to antitrust has focused on economic efficiency, a standard that has led to the abandonment or contraction of some categories of liability. More recently, however, post-Chicago …
Conceptualizing Copyright Enforcement And Management In The Digital Age Through Two Models: The Right-Holder-Centric Model And Cooperative Model, Yang Sun
Maurer Theses and Dissertations
This dissertation focuses on the issues of copyright enforcement and management. Especially, the research looks into how the digital technology reshapes the general perceptions and landscape of the copyright system in terms of online enforcement and management. Stepping into the digital age, the interaction between copyright holders and other parties, including online users and the ISPs, establishes two coexisting models—the right-holder-centric model and the cooperative model. Therefore, the dissertation analyzes which model is more appropriate and efficient with respect to online copyright enforcement and management.
As a matter of fact, the coexistences of two models provides copyright holders and other …
E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk
E-Books, Collusion, And Antitrust Policy: Protecting A Dominant Firm At The Cost Of Innovation, Nicholas Timchalk
Seattle University Law Review
Amazon’s main rival, Apple, went to great lengths and took major risks to enter the e-book market. Why did Apple simply choose not to compete on the merits of its product and brand equity (the iPad and iBookstore) as it does with its other products? Why did Apple decide not to continue to rely on its earlier success of situating its products differently in the market than other electronics and working hard to be different and cutting-edge with its e-book delivery? This Note argues that the combination of Amazon’s 90% market share, network externalities, and an innovative technology market creates …
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
All Faculty Scholarship
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
Georgia Journal of International & Comparative Law
No abstract provided.
Digital Music Sampling And Copyright Policy - A Bittersweet Symphony? Assessing The Continued Legality Of Music Sampling In The United Kingdom, The Netherlands, And The United States, Melissa Hahn
Georgia Journal of International & Comparative Law
No abstract provided.
Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders
Voice Over Internet Protocol: An International Approach To Regulation, Jimar Sanders
Georgia Journal of International & Comparative Law
No abstract provided.
Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas
Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas
Pace Law Review
This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some …
The Software Licensing Dilemma, Nancy S. Kim
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden
Rob Frieden
The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …
Email, Metadata, And Clouds, Oh My! Recent Changes To The Model Rules Of Professional Conduct, Joyce Manna Janto
Email, Metadata, And Clouds, Oh My! Recent Changes To The Model Rules Of Professional Conduct, Joyce Manna Janto
Law Faculty Publications
A discussion of how the 2012 revisions to the Model Rules of Professional Conduct affect the attorney's duties in handling email: encryption, storage, metadata, and confidentiality.
“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves
Roger M. Groves
Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …
The Lab's First Year, University Of Washington School Of Law
The Lab's First Year, University Of Washington School Of Law
Tech Policy Lab
The Tech Policy Lab at the University of Washington is off to an energetic start, thanks to a transformative founding gift from Microsoft and the efforts of our staff, students, and colleagues. We have hosted important policy conversations, carefully put into place the methods of procedure for true interdisciplinary research, and completed or initiated a variety of important projects around emerging technology policy.
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Faculty and Staff - Articles & Papers
This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …
From The Editor-In-Chief, Ibrahim A. Baggili
From The Editor-In-Chief, Ibrahim A. Baggili
Journal of Digital Forensics, Security and Law
We are proud to share with you this special edition issue of the JDFSL. This year, JDFSL partnered with both the 6th International Conference on Digital Forensics and Cyber Crime (ICDF2C) and Systematic Approaches to Digital Forensic Engineering (SADFE)–two prominent conferences in our field that were co-hosted. Fifty-three papers were submitted, and the Technical Program Committee accepted only 17 after a rigorous review process.