Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Internet Law

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 210

Full-Text Articles in Law

Indonesia And Its Reluctance To Ratify The United Nations Convention On Contracts For The International Sale Of Goods (Cisg), Surya Oktaviandra Dec 2018

Indonesia And Its Reluctance To Ratify The United Nations Convention On Contracts For The International Sale Of Goods (Cisg), Surya Oktaviandra

Indonesia Law Review

There is still a huge debate on business policy in Indonesia pertaining the fact that the Government of Indonesia is still reluctance to ratify one of the important conventions for the business world namely CISG (Convention on Contracts for the International Sale of Goods). This paper attempts to discuss the issues which will deliver inter-disciplinary areas such as law, economics, and public policy. By analyzing this matter with a comprehensive measure, it will ensure an appropriate understanding and thus create more precise analysis to serve a contribution in suggesting solve-problem. Despite having its particular point of view, the author based …


Ancaman Pidana Bagi Intellectuel Dader Black Campaign: Studi Putusan Nomor 17/Pid.Sus/2014/Pn.Bul, Rafli Fadilah Achmad Dec 2018

Ancaman Pidana Bagi Intellectuel Dader Black Campaign: Studi Putusan Nomor 17/Pid.Sus/2014/Pn.Bul, Rafli Fadilah Achmad

Jurnal Hukum & Pembangunan

Black Campaign is a prohibited campaign method conducted based on agitation, slander, pit fighting, lies or hoaxes. The vast growth of social media platform has emerged as a distinct challenge in Black Campaign eradication. The popular form of Black Campaign nowadays constitutes reality bending photo and video editing, candidate discussing a fake issue, whatsapp broadcasting, hoax news creation and distribution, and fake polls. As such, Black Campaign law enforcement in the end that focuses not only on the strafbaarfeit element but also narrowing to the intellectuele dader element. Black Campaign regulation has been administrated in several regulation concerning Election in …


Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo Dec 2018

Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo

All Faculty Scholarship

Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the Internet …


Defining And Regulating Cryptocurrency: Fake Internet Money Or Legitimate Medium Of Exchange?, Susan Alkadri Dec 2018

Defining And Regulating Cryptocurrency: Fake Internet Money Or Legitimate Medium Of Exchange?, Susan Alkadri

Duke Law & Technology Review

Digitalization makes almost everything quicker, sleeker, and more efficient. Many argue cryptocurrency is the future of money and payment transfers. This paper explores how the unique nature of cryptocurrencies creates barriers to a strict application of traditional regulatory strategies. Indeed, state and federal regulators remain uncertain if and how they can regulate this cutting-edge technology. Cryptocurrency businesses face difficulty navigating the unclear regulatory landscape, and consumers frequently fall prey to misinformation. To reconcile these concerns, this paper asserts cryptocurrency functions as “currency” or “money” and should be treated as such for regulatory purposes. It also proposes each state implement a …


Net Neutrality, Antitrust, And Startups In The European Union, Megan Sacher Dec 2018

Net Neutrality, Antitrust, And Startups In The European Union, Megan Sacher

San Diego International Law Journal

The problem of internet traffic has now entered the personal sphere for individual users, and has gained attention in popular culture and politics. This was inevitable: from fitness tracking, to sending emails, automated surgeries, social media, and everything in between, more and more is happening on the internet. There are so many people using the internet that controlling the traffic and maintaining manageable speeds for users has become a real problem…For years, the European Union and the United States have found themselves in an uphill battle to maintain the open nature of the Internet, or as it was coined in …


Prophylactic Merger Policy, Herbert J. Hovenkamp Dec 2018

Prophylactic Merger Policy, Herbert J. Hovenkamp

All Faculty Scholarship

An important purpose of the antitrust merger law is to arrest certain anticompetitive practices or outcomes in their “incipiency.” Many Clayton Act decisions involving both mergers and other practices had recognized the idea as early as the 1920s. In Brown Shoe the Supreme Court doubled down on the idea, attributing to Congress a concern about a “rising tide of economic concentration” that must be halted “at its outset and before it gathered momentum.” The Supreme Court did not explain why an incipiency test was needed to address this particular problem. Once structural thresholds for identifying problematic mergers are identified there …


Forbidden Friending: A Framework For Assessing The Reasonableness Of Nonsolicitation Agreements And Determining What Constitutes A Breach On Social Media, Erin Brendel Mathews Dec 2018

Forbidden Friending: A Framework For Assessing The Reasonableness Of Nonsolicitation Agreements And Determining What Constitutes A Breach On Social Media, Erin Brendel Mathews

Fordham Law Review

Social media has changed the way people conduct their day-to-day lives, both socially and professionally. Prior to the proliferation of social media, it was easier for people to keep their work lives and social lives separate if they so wished. What social media has caused people to do in recent years is to blend their personal and professional personas into one. People can choose to fill their LinkedIn connections with both their clients and their college classmates, they can be Facebook friends with their coworkers right along with their neighbors, and they can utilize social media sites to market themselves …


Privacy Spaces, Bert-Jaap Koops Dec 2018

Privacy Spaces, Bert-Jaap Koops

West Virginia Law Review

Privacy literature contains conceptualizations of privacy in relation to role-playing and identity construction, and in relation to access control and boundary-management. In this paper, I combine both strands to introduce the concept of privacy spaces: spaces in which you can play, in your own way, the relevant role(s) you have in social life. Drawing from privacy conceptions in legal scholarship, philosophy, sociology, anthropology, human geography, and psychology, a systematic overview of traditional privacy spaces is offered, including mental bubbles, the body, personal space, personal writings, the home, private conversation space, cars, stalls, intimacy bubbles, professional black boxes, coffee house spaces, …


Better Late Than Never: Bringing The Data Security Regulatory Environment Into The Modern Era, Jacob Holden Dec 2018

Better Late Than Never: Bringing The Data Security Regulatory Environment Into The Modern Era, Jacob Holden

West Virginia Law Review

No abstract provided.


#I U: Considering The Context Of Online Threats, Lyrissa Lidsky Dec 2018

#I U: Considering The Context Of Online Threats, Lyrissa Lidsky

Faculty Publications

The United States Supreme Court has failed to grapple with the unique interpretive difficulties presented by social media threats cases. Social media make hateful and threatening speech more common but also magnify the potential for a speaker's innocent words to be misunderstood People speak differently on different social media platforms, and architecturalf eatures ofplatforms, such as character limits, affect the meaning of speech. The same is true of other contextual clues unique to social media, such as gifs, hashtags, and emojis. Only by understanding social media contexts can legal decision-makers avoid overcriminalization of speech protected by the First Amendment. This …


Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire Nov 2018

Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire

Duke Law & Technology Review

The ubiquity of cell phones in today’s society has forced courts to change or dismiss established, but inapplicable analytical frameworks. Two such frameworks in the school setting are regulations of student speech and of student searches. This Article traces the constitutional jurisprudence of both First Amendment off-campus speech protection and Fourth Amendment search standards as applied to the school setting. It then analyzes how the Supreme Court’s ruling in Riley v. California complicates both areas. Finally, it proposes a pragmatic solution: by recognizing a categorical First Amendment exception for “substantial threats” against the school community, courts could accommodate students’ constitutional …


A Cognitive Theory Of The Third-Party Doctrine And Digital Papers, H. Brian Holland Nov 2018

A Cognitive Theory Of The Third-Party Doctrine And Digital Papers, H. Brian Holland

H. Brian Holland

For nearly 200 years, an individual’s personal papers enjoyed near-absolute protection from government search and seizure. That is no longer the case. With the widespread adoption of cloud-based information processing and storage services, the third-party doctrine operates to effectively strip our digital papers of meaningful Fourth Amendment protections.

This Article presents a new approach to reconciling current third-party doctrine with the technological realities of modern personal information processing. Our most sensitive data is now processed and stored on cloud computing systems owned and operated by third parties.  Although we may consider these services to be private and generally secure, the …


Three Questions That Will Make You Rethink The U.S.-China Intellectual Property Debate, 7 J. Marshall Rev. Intell. Prop. L. 412 (2008), Peter K. Yu Nov 2018

Three Questions That Will Make You Rethink The U.S.-China Intellectual Property Debate, 7 J. Marshall Rev. Intell. Prop. L. 412 (2008), Peter K. Yu

Peter K. Yu

Commentators have attributed China’s piracy and counterfeiting problems to the lack of political will on the part of Chinese authorities. They have also cited the many political, social, economic, cultural, judicial, and technological problems that have arisen as a result of the country’s rapid economic transformation and accession to the WTO. This provocative essay advances a third explanation. It argues that the failure to resolve piracy and counterfeiting problems in China can be partly attributed to the lack of political will on the part of U.S. policymakers and the American public to put intellectual property protection at the very top …


Four Common Misconceptions About Copyright Piracy, Peter K. Yu Nov 2018

Four Common Misconceptions About Copyright Piracy, Peter K. Yu

Peter K. Yu

Copyright piracy is one of the most difficult, yet important, transnational problems in the twenty-first century. Although legal literature has discussed copyright piracy extensively, commentators rarely offer a "grand unified theory" on this global problem. Rather, they give nuanced analyses, discussing the many aspects of the problem-political, social, economic, cultural, and historical.

This nuanced discussion, however, is missing in the current public debate. To capture the readers' emotion and to generate support for proposed legislative and executive actions, the debate often oversimplifies the complicated picture by overexagerrating a particular aspect of the piracy problem or by offering an abbreviated, easy-to-understand, …


Symposium: Truth, Trust And The First Amendment In The Digital Age: Foreword: Whither The Fourth Estate?, Lyrissa Lidsky Nov 2018

Symposium: Truth, Trust And The First Amendment In The Digital Age: Foreword: Whither The Fourth Estate?, Lyrissa Lidsky

Missouri Law Review

As a professor of Media Law, I have devoted my career over the past quarter of a century to the idea that the press plays a special role in our democracy. That role is largely encapsulated by the concept of the press as Fourth Estate – an unofficial branch of government in our scheme of separation of powers that checks the power of the three official branches. In our constitutional scheme, the press is the watchdog that informs us what the legislative, executive, and judicial branches of government are up to and continually replenishes the stock of news – real …


Whole-Of-Society Approach Needed Against Truth Decay, Tan K. B. Eugene Nov 2018

Whole-Of-Society Approach Needed Against Truth Decay, Tan K. B. Eugene

Research Collection Yong Pung How School Of Law

In a commentary, SMU Associate Professor of Law Eugene Tan opined that technology has compounded the problem of fake news and that governments and legislation are not the only means to curb them. This is especially so when blunt legislation may end up eroding the fundamental liberty of freedom of speech and expression. He sought the use of a multi-pronged, multi-stakeholder approach against disinformation campaigns and with trusted sources of information being boosted to produce real information for the public.


Whole-Of-Society Approach Needed Against Truth Decay, Eugene K. B. Tan Nov 2018

Whole-Of-Society Approach Needed Against Truth Decay, Eugene K. B. Tan

Research Collection Yong Pung How School Of Law

In an age of pervasive informationflows, governments do not defeat fake news. It's the people as a society whodo.The threatof deliberate falsehoods, or more popularly "fake news", posesserious threats to the democratic wellbeing of societies. The marketplace ofideas increasingly suffers from truth decay, propagated online or offline,imperilling an already vulnerable information ecosystem. In turn,this compromises the functioning of a democracy, which is premised on citizenshaving a shared reality rather than multiple distorted realities.


You Can’T Say That!: Public Forum Doctrine And Viewpoint Discrimination In The Social Media Era, Micah Telegen Oct 2018

You Can’T Say That!: Public Forum Doctrine And Viewpoint Discrimination In The Social Media Era, Micah Telegen

University of Michigan Journal of Law Reform

The growing prevalence of privately-owned social media platforms is changing the way Americans and their governments communicate. This shift offers new opportunities, but also requires a reinterpretation of the First Amendment’s proscription of government limitations of speech. The public forum doctrine and its proscription of viewpoint discrimination seem particularly stretched by the digital revolution and the development of social media. In ongoing cases, litigants and courts have invoked the doctrine to limit the government’s ability to ‘block’ those who comment critically on government pages—much to the chagrin of those who note the private status of the companies hosting the pages …


Brief For The R Street Institute And Engine Advocacy As Amici Curiae In Support Of Respondents, Charles Duan Oct 2018

Brief For The R Street Institute And Engine Advocacy As Amici Curiae In Support Of Respondents, Charles Duan

Amicus Briefs

Under 35 U.S.C. § 102, an inventor may not obtain a patent on an invention that has been “on sale” for more than a year. The question is whether, from this so-called on-sale bar, certain classes of sales should be exempted— sales under a confidentiality agreement, in Petitioner’s view; and sales to those other than the ultimate customers, according to the government.


The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny Oct 2018

The Equifax Data Breach And The Resulting Legal Recourse, Caitlin Kenny

Brooklyn Journal of Corporate, Financial & Commercial Law

What happens when one’s sensitive information falls into the wrong hands? With the twenty-first century’s advancement of technology comes the increasing problem of data breaches wherein sensitive information is exposed. On September 7, 2017, Equifax, one of three major United States credit reporting agencies announced one of the largest data breaches in the history of the United States. The data breach affected approximately 145 million consumers and subsequently a wave of consumer class actions followed. This Note clarifies why class action lawsuits and arbitration are not viable legal remedies for massive data breaches where entities like credit reporting agencies are …


Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake Oct 2018

Delineating Victims From Perpetrators: Prosecuting Self-Produced Child Pornography In Youth Criminal Justice Systems, Bryce Westlake

Faculty Publications

Video recording technology advancements and accessibility has been paralleled by a growth in self-produced child pornography (SPCP). Although social and judicial attention has been given to instances of teenage sexting, Internet-based forms of SPCP, such as webcam/website sex tourism, have almost been ignored. While some of the proposed legislation reform has referenced video-based SPCP, the majority has focused on SPCP distributed through cellular phones; excluding that which is manifested online or through entrepreneurial efforts. The purpose of this article is to introduce non-sexting SPCP, using the case study of Justin Berry (in the United States), and to propose a broad …


What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius Oct 2018

What's The Big Hurry? The Urgency Of Data Breach Notification, Ellen Cornelius

Homeland Security Publications

No abstract provided.


The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips Oct 2018

The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips

Dickinson Law Review (2017-Present)

Despite global condemnation, sex trafficking continues to plague our world. Even in developed countries, the problem persists. Technological advancements, like the Internet, have spurred the development of organized sex trafficking networks and have made “transactions” easier. Although law enforcement agencies have tried to adapt their investigative techniques to combat the problem, developments in technology move at a much quicker rate.

Autonomous vehicles (AVs) will present a new set of challenges for law enforcement agencies in the fight against sex trafficking. In the not-too-distant future, AVs, or “self-driving cars,” will dominate the roadways. An AV will be completely aware of the …


A Fixed Game: The Frustrations Of Ticket Scalping And The Realities Of Its Solutions, Dylan C. Porcello Oct 2018

A Fixed Game: The Frustrations Of Ticket Scalping And The Realities Of Its Solutions, Dylan C. Porcello

Brooklyn Law Review

Due to the rapid growth of the secondary resale market, purchasing tickets at their face-value price is becoming a fleeting expectation. While ticket scalping has existed quite possibly as long as tickets themselves have, innovations in invasive purchasing practices are leading to unprecedented profit margins for ticket scalpers and a greater distance between consumers and the original ticket sale. With ticket scalpers employing advanced ticket purchasing software, referred to as bots, consumers are left with no option but to surrender to steep resale prices, which often have no ceiling. Though ticket scalping regulation has developed, these legislative efforts have been …


Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney Sep 2018

Trafficking Technology: A Look At Different Approaches To Ending Technology-Facilitated Human Trafficking, David Barney

Pepperdine Law Review

In 2018, many believe that slavery is an antiquated concept. But as with anything else, if it has not become extinct, it has evolved with time. Human trafficking is no different. Each year, millions of men, women and children are trafficked in the United States, and internationally, and forced to work against their will. Through the rise of technology and an increasingly globalized world, traffickers have learned to use technology as a tool to help facilitate the trafficking of persons and to sell those victims to others they never could have reached before. But what are we doing about it? …


Territorialization Of The Internet Domain Name System, Marketa Trimble Sep 2018

Territorialization Of The Internet Domain Name System, Marketa Trimble

Pepperdine Law Review

Territorialization of the internet—the linking of the internet to physical geography—is a growing trend. Internet users have become accustomed to the conveniences of localized advertising, have enjoyed location-based services, and have witnessed an increasing use of geolocation and geoblocking tools by service and content providers who—for various reasons— either allow or block access to internet content based on users’ physical locations. This article analyzes whether, and if so how, the trend toward territorialization has affected the internet Domain Name System (DNS). As a hallmark of cyberspace governance that aimed to be detached from the territorially-partitioned governance of the physical world, …


Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo Sep 2018

Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo

San Diego International Law Journal

This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.


Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, David E. Sorkin Sep 2018

Unsolicited Commercial E-Mail And The Telephone Consumer Protection Act Of 1991, David E. Sorkin

David E. Sorkin

No abstract provided.


Mining For Children’S Data In Today’S Digital World, Damin Park Sep 2018

Mining For Children’S Data In Today’S Digital World, Damin Park

Journal of the National Association of Administrative Law Judiciary

No abstract provided.


Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover Sep 2018

Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover

Seattle University Law Review

Transcript of the panel discussion at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law.” The panel is moderated by Seattle University School of Law Professor Gregory Silverman, and discusses the forthcoming book Robotica, by David M. Skover and Ronald K. L. Collins. The panelists are Bruce E. H. Johnson, Helen Norton, and David M. Skover.