Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (28)
- Computer Law (19)
- Science and Technology Law (16)
- Intellectual Property Law (11)
- Communications Law (9)
-
- First Amendment (9)
- Constitutional Law (6)
- Privacy Law (6)
- International Law (5)
- Torts (4)
- Civil Law (3)
- Criminal Procedure (3)
- Health Law and Policy (3)
- Public Law and Legal Theory (3)
- Business Organizations Law (2)
- Civil Rights and Discrimination (2)
- Commercial Law (2)
- Comparative and Foreign Law (2)
- Conflict of Laws (2)
- Consumer Protection Law (2)
- Contracts (2)
- Criminal Law (2)
- European Law (2)
- Jurisdiction (2)
- Law and Race (2)
- Law and Society (2)
- Marketing Law (2)
- Other Law (2)
- Sexuality and the Law (2)
- Institution
-
- Duke Law (12)
- Case Western Reserve University School of Law (3)
- Selected Works (3)
- The Catholic University of America, Columbus School of Law (3)
- American University Washington College of Law (2)
-
- Boston University School of Law (2)
- Maurer School of Law: Indiana University (2)
- Pepperdine University (2)
- Roger Williams University (2)
- Seattle University School of Law (2)
- St. John's University School of Law (2)
- University of Rhode Island (2)
- University of Tennessee College of Law (2)
- William & Mary Law School (2)
- Chicago-Kent College of Law (1)
- Cleveland State University (1)
- Columbia Law School (1)
- Florida International University College of Law (1)
- Florida State University College of Law (1)
- Fordham Law School (1)
- Loyola University Chicago, School of Law (1)
- Pace University (1)
- St. Mary's University (1)
- University of Michigan Law School (1)
- University of Pittsburgh School of Law (1)
- University of South Carolina (1)
- University of Wollongong (1)
- Yeshiva University, Cardozo School of Law (1)
- Publication
-
- Duke Law & Technology Review (12)
- Faculty Scholarship (3)
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Catholic University Journal of Law and Technology (2)
-
- Journal of Law, Technology, & the Internet (2)
- Scholarly Works (2)
- Seattle University Law Review (2)
- All Faculty Scholarship (1)
- Case Western Reserve Journal of International Law (1)
- Catholic University Law Review (1)
- Dignity: A Journal of Analysis of Exploitation and Violence (1)
- FIU Law Review (1)
- Faculty Articles (1)
- Faculty Publications & Other Works (1)
- Faculty of Law, Humanities and the Arts - Papers (Archive) (1)
- Fordham Intellectual Property, Media and Entertainment Law Journal (1)
- IP Theory (1)
- Indiana Law Journal (1)
- Jeffrey Bellin (1)
- Journal of Civil Rights and Economic Development (1)
- Journal of Law and Mobility (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Laura A. Heymann (1)
- Law Faculty Briefs and Court Documents (1)
- Law Library Newsletters/Blog (1)
- Life of the Law School (1993- ) (1)
- Pace Law Review (1)
- Pepperdine Law Review (1)
- Scholarly Publications (1)
- Publication Type
Articles 1 - 30 of 55
Full-Text Articles in Law
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Law School News: Logan To Serve As Adviser On Restatement Third Of Torts 11-07-2019, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford
Contracting For Fourth Amendment Privacy Online, Wayne A. Logan, Jake Linford
Scholarly Publications
No abstract provided.
Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes
Critical Reviews Of Flawed Research On Prostitution, Donna M. Hughes
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
The Internet Of Bodies, Andrea M. Matwyshyn
The Internet Of Bodies, Andrea M. Matwyshyn
William & Mary Law Review
This Article introduces the ongoing progression of the Internet of Things (IoT) into the Internet of Bodies (IoB)—a network of human bodies whose integrity and functionality rely at least in part on the Internet and related technologies, such as artificial intelligence. IoB devices will evidence the same categories of legacy security flaws that have plagued IoT devices. However, unlike most IoT, IoB technologies will directly, physically harm human bodies—a set of harms courts, legislators, and regulators will deem worthy of legal redress. As such, IoB will herald the arrival of (some forms of) corporate software liability and a new legal …
Internet (Re)Search By Judges, Jurors, And Lawyers, H. Albert Liou, Jasper L. Tran
Internet (Re)Search By Judges, Jurors, And Lawyers, H. Albert Liou, Jasper L. Tran
IP Theory
How can Internet research be used properly and reliably in law? This paper analyzes several key and very different issues affecting judges, jurors, and lawyers. With respect to judges, this paper discusses the rules of judicial conduct and how they guide the appropriate use of the Internet for research; the standards for judicial notice; and whether judges can consider a third category of non-adversarially presented, non-judicially noticed factual evidence. With respect to jurors, this paper discusses causes of and deterrents to jurors conducting Internet research during trials; and the recourse available to parties who are adversely impacted by such behavior. …
When "Things" Go Wrong: Redefining Liability For The Internet Of Medical Things, Bethany A. Corbin
When "Things" Go Wrong: Redefining Liability For The Internet Of Medical Things, Bethany A. Corbin
South Carolina Law Review
No abstract provided.
Congress, The Internet, And The Intractable Pornography Problem: The Child Online Protection Act Of 1998, Timothy Zick
Congress, The Internet, And The Intractable Pornography Problem: The Child Online Protection Act Of 1998, Timothy Zick
Timothy Zick
No abstract provided.
The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann
The Satellite Has No Conscience: §230 In A World Of ‘Alternative Facts’, Laura A. Heymann
Laura A. Heymann
No abstract provided.
Trial By Google: Judicial Notice In The Information Age, Jeffrey Bellin, Andrew Guthrie Ferguson
Trial By Google: Judicial Notice In The Information Age, Jeffrey Bellin, Andrew Guthrie Ferguson
Jeffrey Bellin
This Article presents a theory of judicial notice for the information age. It argues that the ease of accessing factual data on the Internet allows judges and litigants to expand the use of judicial notice in ways that raise significant concerns about admissibility, reliability, and fair process. State and federal courts are already applying the surprisingly pliant judicial notice rules to bring websites ranging from Google Maps to Wikipedia into the courtroom, and these decisions will only increase in frequency in coming years. This rapidly emerging judicial phenomenon is notable for its ad hoc and conclusory nature—attributes that have the …
Barlow's Legacy, Cory Doctorow
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle
The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle
Duke Law & Technology Review
No abstract provided.
Is The Internet Over?! (Again?), James Boyle
Is The Internet Over?! (Again?), James Boyle
Duke Law & Technology Review
No abstract provided.
Inventing The Future: Barlow And Beyond, Cindy Cohn
Inventing The Future: Barlow And Beyond, Cindy Cohn
Duke Law & Technology Review
No abstract provided.
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Duke Law & Technology Review
No abstract provided.
A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson
A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson
Duke Law & Technology Review
No abstract provided.
Revisiting Barlow's Misplaced Optimism, Benjamin Edelman
Revisiting Barlow's Misplaced Optimism, Benjamin Edelman
Duke Law & Technology Review
No abstract provided.
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Internet Utopianism And The Practical Inevitability Of Law, Julie E. Cohen
Duke Law & Technology Review
No abstract provided.
John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain
John Perry Barlow’S Call For Persuasion Over Power, Jonathan L. Zittrain
Duke Law & Technology Review
No abstract provided.
What Didn’T Happen: An Essay In Speculation, Peter Jaszi
What Didn’T Happen: An Essay In Speculation, Peter Jaszi
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow
The Past And Future Of The Internet: A Symposium For John Perry Barlow
Duke Law & Technology Review
No abstract provided.
Brief Amici Curiae Of Electronic Frontier Foundation, 1851 Center For Constitutional Law, And Profs. Jonathan Entin, David F. Forte, Andrew Geronimo, Raymond Ku, Stephen Lazarus, Kevin Francis O’Neill, Margaret Tarkington, Aaron H. Caplan, And Eugene Volokh In Support Of Respondent-Appellant, Joni Bey And Rebecca Rasawehr V. Jeffrey Rasawehr, Supreme Court Of Ohio (Case No. 2019-0295), David Forte, Stephen R. Lazarus, Kevin F. O'Neill, Jonathan L. Entin, Andrew Geronimo, Raymond Ku, Margaret Tarkington, Aaron H. Kaplan, Eugene Volokh
Brief Amici Curiae Of Electronic Frontier Foundation, 1851 Center For Constitutional Law, And Profs. Jonathan Entin, David F. Forte, Andrew Geronimo, Raymond Ku, Stephen Lazarus, Kevin Francis O’Neill, Margaret Tarkington, Aaron H. Caplan, And Eugene Volokh In Support Of Respondent-Appellant, Joni Bey And Rebecca Rasawehr V. Jeffrey Rasawehr, Supreme Court Of Ohio (Case No. 2019-0295), David Forte, Stephen R. Lazarus, Kevin F. O'Neill, Jonathan L. Entin, Andrew Geronimo, Raymond Ku, Margaret Tarkington, Aaron H. Kaplan, Eugene Volokh
Law Faculty Briefs and Court Documents
The brief argues that the Third District Court of Appeals, in violation of the First Amendment, erred in upholding an injunction that barred defendant from any online postings regarding plaintiff, whether or not those postings were to plaintiff or to third parties.
Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell
Web Of Lives: How Regulating The Dark Web Can Combat Online Human Trafficking, Christopher Campbell
Journal of the National Association of Administrative Law Judiciary
This article argues that one of the ways to appropriately fight online human trafficking is through governmental regulation of the Dark Web. Specifically, this article argues that a new Attaching Criminal Dark Web Statute is the best method to combat human trafficking because it can incentivize prosecutors to use current human trafficking statutes to prosecute traffickers. This proposal can deter traffickers from enslaving people. Additionally, this article shows the evolution of online human trafficking laws, investigation, and prosecution (Section II); demonstrates why current and proposed laws do not effectively address the online human trafficking issue (Sections III and IV); introduces …
Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher
Reuse, Remix, And Create With Creative Commons Licenses, Andrée Rathemacher
Technical Services Faculty Presentations
Slides from a presentation, "Reuse, Remix, and Create with Creative Commons Licenses," presented at the Rhode Island Library Association Annual Conference 2019, Get Informed!, on May 23, 2019 in North Smithfield, Rhode Island.
An openly-shared Google Slides version of this presentation is also available at https://bit.ly/2w6maqH.
=====
REUSE, REMIX, AND CREATE WITH CREATIVE COMMONS LICENSES | ROOM 2A
What are Creative Commons (CC) licenses and how do they work? What is the difference between something that is free online and something that is truly “open”? Did you know that it is often a Creative Commons license that puts …
Prior Restraint In The Digital Age, Ariel L. Bendor, Michal Tamir
Prior Restraint In The Digital Age, Ariel L. Bendor, Michal Tamir
William & Mary Bill of Rights Journal
In this Article we argue that the digital revolution requires a reshaping of the Doctrine of Prior Restraint, which prohibits the implementation of any regulations that prevent the publication of speech prior to its distribution. We describe the prohibition on prior restraint of speech, its rationales and its exceptions; present the characteristics of the media in the digital age; suggest that the traditional design of the Doctrine does not fit these characteristics; and describe the reshaping that we propose in order to adapt the Doctrine to the age of the Internet and social networking.
Protecting Personal Data: A Model Data Security And Breach Notifications Statute, Michael Bloom
Protecting Personal Data: A Model Data Security And Breach Notifications Statute, Michael Bloom
St. John's Law Review
(Excerpt)
This Note argues that current law is inadequate to protect consumers in light of the prevalence and severity of data breaches in recent years, and that a unifying federal legislation combining portions of state law and the DSBNA should be enacted. Part I of this Note analyzes the DSBNA for notification requirements when data breaches occur, the requirements for the implementation of security policies, regulatory mechanisms for monitoring compliance with these requirements, and criminal penalties for failing to comply. Part II summarizes the various state laws that exist for notification of data breaches. Part III proposes a model federal …
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount
Seattle University Law Review
Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Seattle University Law Review
The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …
The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano
The Indecency Of The Communications Decency Act § 230: Unjust Immunity For Monstrous Social Media Platforms, Natalie Annette Pagano
Pace Law Review
The line between First Amendment protection and the innovation of social media platforms is hazy at best. Not only do these platforms increasingly encompass the lives of many individuals, but they provide incredible new opportunities to interact from near and far, through sharing photographs, videos, and memories. The Internet provides countless outlets that are available at the tip of users’ fingers: thriving forums to communicate nearly whenever and wherever desired. Users effortlessly interact on these platforms and are consistently exposed to numerous forms of speech, including messages through posts, chat room discussions, videos, polls, and shared statements. From 2010 to …
The Internet Adopts Two-Way Radio, Henry Perritt
The Internet Adopts Two-Way Radio, Henry Perritt
All Faculty Scholarship
The Internet, having displaced conventional correspondence with email, having displaced traditional libraries with online ones, having revolutionized shopping, having uprooted television and movies, now is absorbing police, fire, ambulance, and public utility two-radio systems.Digital radio technologies combine with Internet switching of transmitters, receivers, and networks, so that a police officer can talk to an ambulance driver or a train dispatcher across the state or across the country. Specialized cellphones are becoming indistinguishable from walkie-talkies. Cellular telephone channels replace two-way-radio air links.Integration of “private mobile radio” into the Internet is the result of specific advances in radio and networking technology that …