Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney May 2019

When Law Frees Us To Speak, Danielle K. Citron, Jonathon Penney

Faculty Scholarship

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …


When Law Frees Us To Speak, Danielle Citron, Jonathon Penney Jan 2019

When Law Frees Us To Speak, Danielle Citron, Jonathon Penney

Articles, Book Chapters, & Popular Press

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …


Copyright’S Other Functions, Margaret Chon Jun 2016

Copyright’S Other Functions, Margaret Chon

Chicago-Kent Journal of Intellectual Property

This response to a keynote speech by Judge Margaret McKeown explores some dimensions of copyright in addition to its dominant function as a set of market-facilitating exclusive rights. The recent possible trend towards protecting privacy and other non-commercial concerns via copyright law is not necessarily inconsistent with its historical usages, does not necessarily threaten freedom of expression and may further important privacy policies. The balance of these competing policies is shifting, especially in an environment of proliferating digital content where cyber civil rights may need further development in response to cyberbullying. It examines the specific case of non-consensual pornography as …


Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Keats Citron Dec 2009

Law's Expressive Value In Combating Cyber Gender Harassment, Danielle Keats Citron

Michigan Law Review

The online harassment of women exemplifies twenty-first century behavior that profoundly harms women yet too often remains overlooked and even trivialized. This harassment includes rape threats, doctored photographs portraying women being strangled, postings of women's home addresses alongside suggestions that they are interested in anonymous sex, and technological attacks that shut down blogs and websites. It impedes women's full participation in online life, often driving them offline, and undermines their autonomy, identity, dignity, and well-being. But the public and law enforcement routinely marginalize women's experiences, deeming the harassment harmless teasing that women should expect, and tolerate, given the internet's Wild …


Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron Mar 2009

Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron

Danielle Keats Citron

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …


Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron Nov 2008

Cyber Civil Rights (November 2008; Mp3), Danielle Keats Citron

Faculty Scholarship

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …