Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- The Catholic University of America, Columbus School of Law (18)
- Selected Works (12)
- American University Washington College of Law (10)
- Schulich School of Law, Dalhousie University (9)
- Boston University School of Law (8)
-
- Seattle University School of Law (8)
- University of Minnesota Law School (8)
- Pepperdine University (7)
- Singapore Management University (7)
- Brooklyn Law School (6)
- Duke Law (6)
- Maurer School of Law: Indiana University (6)
- New York Law School (6)
- Southern Methodist University (6)
- University of Michigan Law School (6)
- University of Pennsylvania Carey Law School (5)
- Cornell University Law School (4)
- UIC School of Law (4)
- University of Colorado Law School (4)
- University of Maine School of Law (4)
- University of Maryland Francis King Carey School of Law (4)
- University of Miami Law School (4)
- University of Missouri School of Law (4)
- Nova Southeastern University (3)
- Texas A&M University School of Law (3)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (3)
- University of Richmond (3)
- Vanderbilt University Law School (3)
- Columbia Law School (2)
- Fordham Law School (2)
- Keyword
-
- Internet (16)
- Privacy (15)
- Technology (13)
- Cybersecurity (8)
- Free speech (8)
-
- Social media (8)
- Intellegence (7)
- Blockchain (6)
- Copyright (6)
- Cyber (6)
- Data (6)
- First Amendment (6)
- Artificial intelligence (5)
- Cryptocurrency (5)
- International (5)
- Artificial (4)
- Contracts (4)
- Cyberspace (4)
- First amendment (4)
- Free expression (4)
- GDPR (4)
- Insurance (4)
- Intellectual property (4)
- Security (4)
- Singularity (4)
- AI (3)
- Ai (3)
- Antitrust (3)
- Article 9 (3)
- Artifical (3)
- Publication
-
- Catholic University Journal of Law and Technology (18)
- Faculty Scholarship (16)
- Minnesota Journal of Law, Science & Technology (8)
- Seattle University Law Review (8)
- Research Collection Yong Pung How School Of Law (7)
-
- Canadian Journal of Law and Technology (6)
- Duke Law & Technology Review (6)
- All Faculty Scholarship (5)
- Articles in Law Reviews & Other Academic Journals (5)
- SMU Science and Technology Law Review (5)
- Faculty Publications (4)
- Indiana Law Journal (4)
- Maine Law Review (4)
- NYLS Law Review (4)
- Pepperdine Law Review (4)
- Brooklyn Law Review (3)
- Michigan Law Review (3)
- Nova Law Review (3)
- Publications (3)
- Scholarly Works (3)
- UIC John Marshall Journal of Information Technology & Privacy Law (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Articles (2)
- Articles, Book Chapters, & Popular Press (2)
- Brooklyn Journal of Corporate, Financial & Commercial Law (2)
- Cornell International Law Journal (2)
- Cornell Law Review (2)
- Dickinson Law Review (2017-Present) (2)
- Georgia State University Law Review (2)
- H. Brian Holland (2)
- Publication Type
Articles 1 - 30 of 210
Full-Text Articles in Law
Indonesia And Its Reluctance To Ratify The United Nations Convention On Contracts For The International Sale Of Goods (Cisg), Surya Oktaviandra
Indonesia And Its Reluctance To Ratify The United Nations Convention On Contracts For The International Sale Of Goods (Cisg), Surya Oktaviandra
Indonesia Law Review
There is still a huge debate on business policy in Indonesia pertaining the fact that the Government of Indonesia is still reluctance to ratify one of the important conventions for the business world namely CISG (Convention on Contracts for the International Sale of Goods). This paper attempts to discuss the issues which will deliver inter-disciplinary areas such as law, economics, and public policy. By analyzing this matter with a comprehensive measure, it will ensure an appropriate understanding and thus create more precise analysis to serve a contribution in suggesting solve-problem. Despite having its particular point of view, the author based …
Ancaman Pidana Bagi Intellectuel Dader Black Campaign: Studi Putusan Nomor 17/Pid.Sus/2014/Pn.Bul, Rafli Fadilah Achmad
Ancaman Pidana Bagi Intellectuel Dader Black Campaign: Studi Putusan Nomor 17/Pid.Sus/2014/Pn.Bul, Rafli Fadilah Achmad
Jurnal Hukum & Pembangunan
Black Campaign is a prohibited campaign method conducted based on agitation, slander, pit fighting, lies or hoaxes. The vast growth of social media platform has emerged as a distinct challenge in Black Campaign eradication. The popular form of Black Campaign nowadays constitutes reality bending photo and video editing, candidate discussing a fake issue, whatsapp broadcasting, hoax news creation and distribution, and fake polls. As such, Black Campaign law enforcement in the end that focuses not only on the strafbaarfeit element but also narrowing to the intellectuele dader element. Black Campaign regulation has been administrated in several regulation concerning Election in …
Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo
Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo
All Faculty Scholarship
Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the Internet …
Defining And Regulating Cryptocurrency: Fake Internet Money Or Legitimate Medium Of Exchange?, Susan Alkadri
Defining And Regulating Cryptocurrency: Fake Internet Money Or Legitimate Medium Of Exchange?, Susan Alkadri
Duke Law & Technology Review
Digitalization makes almost everything quicker, sleeker, and more efficient. Many argue cryptocurrency is the future of money and payment transfers. This paper explores how the unique nature of cryptocurrencies creates barriers to a strict application of traditional regulatory strategies. Indeed, state and federal regulators remain uncertain if and how they can regulate this cutting-edge technology. Cryptocurrency businesses face difficulty navigating the unclear regulatory landscape, and consumers frequently fall prey to misinformation. To reconcile these concerns, this paper asserts cryptocurrency functions as “currency” or “money” and should be treated as such for regulatory purposes. It also proposes each state implement a …
Net Neutrality, Antitrust, And Startups In The European Union, Megan Sacher
Net Neutrality, Antitrust, And Startups In The European Union, Megan Sacher
San Diego International Law Journal
The problem of internet traffic has now entered the personal sphere for individual users, and has gained attention in popular culture and politics. This was inevitable: from fitness tracking, to sending emails, automated surgeries, social media, and everything in between, more and more is happening on the internet. There are so many people using the internet that controlling the traffic and maintaining manageable speeds for users has become a real problem…For years, the European Union and the United States have found themselves in an uphill battle to maintain the open nature of the Internet, or as it was coined in …
Prophylactic Merger Policy, Herbert J. Hovenkamp
Prophylactic Merger Policy, Herbert J. Hovenkamp
All Faculty Scholarship
An important purpose of the antitrust merger law is to arrest certain anticompetitive practices or outcomes in their “incipiency.” Many Clayton Act decisions involving both mergers and other practices had recognized the idea as early as the 1920s. In Brown Shoe the Supreme Court doubled down on the idea, attributing to Congress a concern about a “rising tide of economic concentration” that must be halted “at its outset and before it gathered momentum.” The Supreme Court did not explain why an incipiency test was needed to address this particular problem. Once structural thresholds for identifying problematic mergers are identified there …
Forbidden Friending: A Framework For Assessing The Reasonableness Of Nonsolicitation Agreements And Determining What Constitutes A Breach On Social Media, Erin Brendel Mathews
Forbidden Friending: A Framework For Assessing The Reasonableness Of Nonsolicitation Agreements And Determining What Constitutes A Breach On Social Media, Erin Brendel Mathews
Fordham Law Review
Social media has changed the way people conduct their day-to-day lives, both socially and professionally. Prior to the proliferation of social media, it was easier for people to keep their work lives and social lives separate if they so wished. What social media has caused people to do in recent years is to blend their personal and professional personas into one. People can choose to fill their LinkedIn connections with both their clients and their college classmates, they can be Facebook friends with their coworkers right along with their neighbors, and they can utilize social media sites to market themselves …
Privacy Spaces, Bert-Jaap Koops
Privacy Spaces, Bert-Jaap Koops
West Virginia Law Review
Privacy literature contains conceptualizations of privacy in relation to role-playing and identity construction, and in relation to access control and boundary-management. In this paper, I combine both strands to introduce the concept of privacy spaces: spaces in which you can play, in your own way, the relevant role(s) you have in social life. Drawing from privacy conceptions in legal scholarship, philosophy, sociology, anthropology, human geography, and psychology, a systematic overview of traditional privacy spaces is offered, including mental bubbles, the body, personal space, personal writings, the home, private conversation space, cars, stalls, intimacy bubbles, professional black boxes, coffee house spaces, …
Better Late Than Never: Bringing The Data Security Regulatory Environment Into The Modern Era, Jacob Holden
Better Late Than Never: Bringing The Data Security Regulatory Environment Into The Modern Era, Jacob Holden
West Virginia Law Review
No abstract provided.
#I U: Considering The Context Of Online Threats, Lyrissa Lidsky
#I U: Considering The Context Of Online Threats, Lyrissa Lidsky
Faculty Publications
The United States Supreme Court has failed to grapple with the unique interpretive difficulties presented by social media threats cases. Social media make hateful and threatening speech more common but also magnify the potential for a speaker's innocent words to be misunderstood People speak differently on different social media platforms, and architecturalf eatures ofplatforms, such as character limits, affect the meaning of speech. The same is true of other contextual clues unique to social media, such as gifs, hashtags, and emojis. Only by understanding social media contexts can legal decision-makers avoid overcriminalization of speech protected by the First Amendment. This …
Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire
Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire
Duke Law & Technology Review
The ubiquity of cell phones in today’s society has forced courts to change or dismiss established, but inapplicable analytical frameworks. Two such frameworks in the school setting are regulations of student speech and of student searches. This Article traces the constitutional jurisprudence of both First Amendment off-campus speech protection and Fourth Amendment search standards as applied to the school setting. It then analyzes how the Supreme Court’s ruling in Riley v. California complicates both areas. Finally, it proposes a pragmatic solution: by recognizing a categorical First Amendment exception for “substantial threats” against the school community, courts could accommodate students’ constitutional …
A Cognitive Theory Of The Third-Party Doctrine And Digital Papers, H. Brian Holland
A Cognitive Theory Of The Third-Party Doctrine And Digital Papers, H. Brian Holland
H. Brian Holland
Three Questions That Will Make You Rethink The U.S.-China Intellectual Property Debate, 7 J. Marshall Rev. Intell. Prop. L. 412 (2008), Peter K. Yu
Peter K. Yu
Commentators have attributed China’s piracy and counterfeiting problems to the lack of political will on the part of Chinese authorities. They have also cited the many political, social, economic, cultural, judicial, and technological problems that have arisen as a result of the country’s rapid economic transformation and accession to the WTO. This provocative essay advances a third explanation. It argues that the failure to resolve piracy and counterfeiting problems in China can be partly attributed to the lack of political will on the part of U.S. policymakers and the American public to put intellectual property protection at the very top …
Four Common Misconceptions About Copyright Piracy, Peter K. Yu
Four Common Misconceptions About Copyright Piracy, Peter K. Yu
Peter K. Yu
Copyright piracy is one of the most difficult, yet important, transnational problems in the twenty-first century. Although legal literature has discussed copyright piracy extensively, commentators rarely offer a "grand unified theory" on this global problem. Rather, they give nuanced analyses, discussing the many aspects of the problem-political, social, economic, cultural, and historical.
This nuanced discussion, however, is missing in the current public debate. To capture the readers' emotion and to generate support for proposed legislative and executive actions, the debate often oversimplifies the complicated picture by overexagerrating a particular aspect of the piracy problem or by offering an abbreviated, easy-to-understand, …
Symposium: Truth, Trust And The First Amendment In The Digital Age: Foreword: Whither The Fourth Estate?, Lyrissa Lidsky
Symposium: Truth, Trust And The First Amendment In The Digital Age: Foreword: Whither The Fourth Estate?, Lyrissa Lidsky
Missouri Law Review
As a professor of Media Law, I have devoted my career over the past quarter of a century to the idea that the press plays a special role in our democracy. That role is largely encapsulated by the concept of the press as Fourth Estate – an unofficial branch of government in our scheme of separation of powers that checks the power of the three official branches. In our constitutional scheme, the press is the watchdog that informs us what the legislative, executive, and judicial branches of government are up to and continually replenishes the stock of news – real …
Whole-Of-Society Approach Needed Against Truth Decay, Tan K. B. Eugene
Whole-Of-Society Approach Needed Against Truth Decay, Tan K. B. Eugene
Research Collection Yong Pung How School Of Law
In a commentary, SMU Associate Professor of Law Eugene Tan opined that technology has compounded the problem of fake news and that governments and legislation are not the only means to curb them. This is especially so when blunt legislation may end up eroding the fundamental liberty of freedom of speech and expression. He sought the use of a multi-pronged, multi-stakeholder approach against disinformation campaigns and with trusted sources of information being boosted to produce real information for the public.
Whole-Of-Society Approach Needed Against Truth Decay, Eugene K. B. Tan
Whole-Of-Society Approach Needed Against Truth Decay, Eugene K. B. Tan
Research Collection Yong Pung How School Of Law
In an age of pervasive informationflows, governments do not defeat fake news. It's the people as a society whodo.The threatof deliberate falsehoods, or more popularly "fake news", posesserious threats to the democratic wellbeing of societies. The marketplace ofideas increasingly suffers from truth decay, propagated online or offline,imperilling an already vulnerable information ecosystem. In turn,this compromises the functioning of a democracy, which is premised on citizenshaving a shared reality rather than multiple distorted realities.
You Can’T Say That!: Public Forum Doctrine And Viewpoint Discrimination In The Social Media Era, Micah Telegen
You Can’T Say That!: Public Forum Doctrine And Viewpoint Discrimination In The Social Media Era, Micah Telegen
University of Michigan Journal of Law Reform
The growing prevalence of privately-owned social media platforms is changing the way Americans and their governments communicate. This shift offers new opportunities, but also requires a reinterpretation of the First Amendment’s proscription of government limitations of speech. The public forum doctrine and its proscription of viewpoint discrimination seem particularly stretched by the digital revolution and the development of social media. In ongoing cases, litigants and courts have invoked the doctrine to limit the government’s ability to ‘block’ those who comment critically on government pages—much to the chagrin of those who note the private status of the companies hosting the pages …
Brief For The R Street Institute And Engine Advocacy As Amici Curiae In Support Of Respondents, Charles Duan
Brief For The R Street Institute And Engine Advocacy As Amici Curiae In Support Of Respondents, Charles Duan
Amicus Briefs
Under 35 U.S.C. § 102, an inventor may not obtain a patent on an invention that has been “on sale” for more than a year. The question is whether, from this so-called on-sale bar, certain classes of sales should be exempted— sales under a confidentiality agreement, in Petitioner’s view; and sales to those other than the ultimate customers, according to the government.
The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny
The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny
Brooklyn Journal of Corporate, Financial & Commercial Law
What happens when one’s sensitive information falls into the wrong hands? With the twenty-first century’s advancement of technology comes the increasing problem of data breaches wherein sensitive information is exposed. On September 7, 2017, Equifax, one of three major United States credit reporting agencies announced one of the largest data breaches in the history of the United States. The data breach affected approximately 145 million consumers and subsequently a wave of consumer class actions followed. This Note clarifies why class action lawsuits and arbitration are not viable legal remedies for massive data breaches where entities like credit reporting agencies are …
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake
Faculty Publications
Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …
What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius
What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius
Homeland Security Publications
No abstract provided.
The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips
The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips
Dickinson Law Review (2017-Present)
Despite global condemnation, sex trafficking continues to plague our world. Even in developed countries, the problem persists. Technological advancements, like the Internet, have spurred the development of organized sex trafficking networks and have made “transactions” easier. Although law enforcement agencies have tried to adapt their investigative techniques to combat the problem, developments in technology move at a much quicker rate.
Autonomous vehicles (AVs) will present a new set of challenges for law enforcement agencies in the fight against sex trafficking. In the not-too-distant future, AVs, or “self-driving cars,” will dominate the roadways. An AV will be completely aware of the …
A Fixed Game: The Frustrations Of Ticket Scalping And The Realities Of Its Solutions, Dylan C. Porcello
A Fixed Game: The Frustrations Of Ticket Scalping And The Realities Of Its Solutions, Dylan C. Porcello
Brooklyn Law Review
Due to the rapid growth of the secondary resale market, purchasing tickets at their face-value price is becoming a fleeting expectation. While ticket scalping has existed quite possibly as long as tickets themselves have, innovations in invasive purchasing practices are leading to unprecedented profit margins for ticket scalpers and a greater distance between consumers and the original ticket sale. With ticket scalpers employing advanced ticket purchasing software, referred to as bots, consumers are left with no option but to surrender to steep resale prices, which often have no ceiling. Though ticket scalping regulation has developed, these legislative efforts have been …
Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney
Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney
Pepperdine Law Review
In 2018, many believe that slavery is an antiquated concept. But as with anything else, if it has not become extinct, it has evolved with time. Human trafficking is no different. Each year, millions of men, women and children are trafficked in the United States, and internationally, and forced to work against their will. Through the rise of technology and an increasingly globalized world, traffickers have learned to use technology as a tool to help facilitate the trafficking of persons and to sell those victims to others they never could have reached before. But what are we doing about it? …
Territorialization Of The Internet Domain Name System, Marketa Trimble
Territorialization Of The Internet Domain Name System, Marketa Trimble
Pepperdine Law Review
Territorialization of the internet—the linking of the internet to physical geography—is a growing trend. Internet users have become accustomed to the conveniences of localized advertising, have enjoyed location-based services, and have witnessed an increasing use of geolocation and geoblocking tools by service and content providers who—for various reasons— either allow or block access to internet content based on users’ physical locations. This article analyzes whether, and if so how, the trend toward territorialization has affected the internet Domain Name System (DNS). As a hallmark of cyberspace governance that aimed to be detached from the territorially-partitioned governance of the physical world, …
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
San Diego International Law Journal
This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.
Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, David E. Sorkin
Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, David E. Sorkin
David E. Sorkin
No abstract provided.
Mining For Children’S Data In Today’S Digital World, Damin Park
Mining For Children’S Data In Today’S Digital World, Damin Park
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover
Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover
Seattle University Law Review
Transcript of the panel discussion at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law.” The panel is moderated by Seattle University School of Law Professor Gregory Silverman, and discusses the forthcoming book Robotica, by David M. Skover and Ronald K. L. Collins. The panelists are Bruce E. H. Johnson, Helen Norton, and David M. Skover.