Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Law

Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li May 2013

Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li

Jeffrey Li

Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …


Right To Information Identity, Elad Oreg Jan 2012

Right To Information Identity, Elad Oreg

Elad Oreg

Inspired by the famous Warren&Brandeis conceptualization of the "right to privacy", this article tries to answer a different modern conceptual lacuna and present the argument for the need to conceptualize and recognize a new, independent legal principle of a "right to information-identity". This is the right of an individual to the functionality of the information platforms that enable others to identify and know him and to remember who and what he is. What was happening regarding privacy in the late 19th century happens now with identity. Changes in technology and social standards make the very notion of identity increasingly fluid, …


De Rechtsstaat In Cyberspace?, Mireille Hildebrandt Dec 2011

De Rechtsstaat In Cyberspace?, Mireille Hildebrandt

Mireille Hildebrandt

Cyberspace is inmiddels overal. Wat tien jaar geleden misschien nog een aparte niet-fysieke wereld leek waar niemand wist dat je een hond was, gaat steeds meer lijken op een verzameling onderling verbonden dorpspleinen. Met dien verstande dat alles wat iedereen doet permanent wordt opgenomen, opgeslagen en doorzocht op betekenisvolle patronen. Steeds meer personen, organisaties maar ook dingen raken verbonden via het internet. De Internationale Telecommunicatie Unie sprak in 2005 van het ‘internet van de dingen’, om aan te geven dat binnen afzienbare tijd alles overal (‘everyware’) via draadloze identificatiesystemen traceerbaar is. Intussen raakt iedereen via de smartphone ‘always on(line)’. Deze …


Repairing Online Reputation: A New Multi-Modal Regulatory Approach, Jacqueline Lipton Jul 2010

Repairing Online Reputation: A New Multi-Modal Regulatory Approach, Jacqueline Lipton

Jacqueline D Lipton

In today’s interconnected digital society, high profile examples of online abuses abound. Cyberbullies launch attacks on the less powerful, often significantly damaging victims’ reputations. Outside of reputational damage, online harassment, bullying and stalking has led to severe emotional distress, loss of employment, physical assault and even death. Recent scholarship has identified this phenomenon but has done little more than note that current laws are ineffective in combating abusive online behaviors. This article moves the debate forward both by suggesting specific reforms to criminal and tort laws and, more importantly, by situating those reforms within a new multi-modal framework for combating …


Cyberspace Is Outside The Schoolhouse Gate: Offensive Online Student Speech Receives First Amendment Protection, Joseph Tomain Mar 2010

Cyberspace Is Outside The Schoolhouse Gate: Offensive Online Student Speech Receives First Amendment Protection, Joseph Tomain

Joseph A Tomain

Doctrinal and normative analysis show that schools do not possess jurisdiction over offensive online student speech, at least when it does not cause a substantial disruption of the school environment. This article is a timely analysis on the limits of school jurisdiction over offensive online student speech.

On February 4, 2010, two different Third Circuit panels issued opinions reaching opposite conclusions on whether schools may punish students based on online speech created by students when they are off-campus; one of these cases may be heard en banc. Another case addressing this same issue is currently pending before the Second Circuit. …


Poisoned Flowers In Cyberspace: Resolving Focal Point Abuses And Tradmark-Related Conflicts In Space By Rewriting Code, Thomas C. Folsom Jan 2010

Poisoned Flowers In Cyberspace: Resolving Focal Point Abuses And Tradmark-Related Conflicts In Space By Rewriting Code, Thomas C. Folsom

Thomas C. Folsom

In cyberspace, dynamically coded focal points don’t just provide salient references. They can actually deliver a person’s augmented presence to a location. Placing reliable focal points as navigational markers in coded space is useful and indexing them is even better because these activities support the public good by providing a virtual map to cyberspace, thereby promoting access, navigation, information-activity and trust among augmented presences. In an objective cyberspace which relies upon a virtual map featuring dynamically coded focal points functioning as markers, addresses, magnets, roadblocks or detours, I propose that conduct which (a) alters the virtual map, (b) plants deceptive …


Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington May 2009

Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington

Matthew Hoisington

Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via cyberspace strains traditional definitions of the use of force. In order to clearly delineate the rights of the parties involved, including the right to self-defense, the international community must come to some consensus on the meaning of cyberwarfare within the existing jus ad bellum paradigm. After examining the shortcomings inherent in classifying cyberattacks according to classical notions of kinetic warfare, …


Website Proprietorship And Cyber Harassment, Nancy Kim Jan 2009

Website Proprietorship And Cyber Harassment, Nancy Kim

Nancy Kim

While harassment and bullying have always existed, when such behavior is conducted online, the consequences can be uniquely devastating. The anonymity of harassers, the ease of widespread digital dissemination, and the inability to contain and/or eliminate online information aggravate the nature of harassment on the Internet. Furthermore, Section 230 of the Communications Decency Act provides website sponsors with immunity for content posted by others and no incentive to remove offending content. Given the unique nature of cyber harassment, ex post punitive measures are inadequate to redress grievances. In this Article, I propose the imposition of proprietorship liability upon website sponsors …


From Nuclear War To Net War: Analogizing Cyber Attacks In International Law, Scott James Shackelford Jul 2008

From Nuclear War To Net War: Analogizing Cyber Attacks In International Law, Scott James Shackelford

Scott Shackelford

On April 27, 2007, Estonia was attacked by a computer network causing widespread damage. It is currently unclear what legal rights a state has as a victim of a cyber attack. Even if Estonia could conclusively prove that it was Russia, for example, behind the March 2007 attack, could it respond with force or its own cyber attack? There is a paucity of literature dealing with these questions, as well as the ethical, humanitarian, and human rights implications of information warfare (“IW”) on national and international security. Treatments of IW outside the orthodox international humanitarian law (“IHL”) framework are nearly …


Space Pirates, Hitchhikers, Guides And The Public Interest: Transformational Trademark Law In Cyberspace, Thomas C. Folsom Apr 2008

Space Pirates, Hitchhikers, Guides And The Public Interest: Transformational Trademark Law In Cyberspace, Thomas C. Folsom

Thomas C. Folsom

Modern trademark law has come of age. Like copyright and patent, it not only has a metaphysic of its own, but it also has the capacity to take goods and services out of the commons. The tendency of modern trademark law to dimi-nish, waste or spoil the commons is nowhere more apparent than in cyber-space. My prior analytic, descriptive and doctrinal articles asserted the leading cases either overprotect or under–protect marks in space, and both extremes are wrong. The cases reach the wrong results at the critical margin because they neither define cyberspace nor distinguish the mark–type conflicts typical-ly occurring …


Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline Lipton Feb 2008

Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline Lipton

Jacqueline D Lipton

When the Oscar™-winning actress Julia Roberts fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual’s persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …


Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton Mar 2007

Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton

Jacqueline D Lipton

In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns ‘hillaryclinton.com’, the more generic ‘hillary.com’ is registered to a software firm, Hillary Software, Inc. What about ‘hillary2008.com’? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …


Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton Mar 2007

Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline Lipton

Jacqueline D Lipton

In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns ‘hillaryclinton.com’, the more generic ‘hillary.com’ is registered to a software firm, Hillary Software, Inc. What about ‘hillary2008.com’? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …


The Hegemony Of The Copyright Treatise, Ann Bartow Sep 2004

The Hegemony Of The Copyright Treatise, Ann Bartow

Ann Bartow

This Article asserts that major conceptions about the appropriate structure, texture, and span of copyright protections and privileges have been fashioned by copyright treatises, particularly the various editions of Nimmer on Copyright. Copyright treatises function in concert with the machinations of Congress, the courts, and custom, but their role is not often scrutinized.

Because copyright treatises typically do a far better job than Congress or the courts of explicating copyright law in straightforward and accessible language, such treatises can not only communicate the copyright law, but also influence its development and direction. Policy makers no doubt understand that content owners …


Complexity And Copyright In Contradiction, Michael J. Madison Jan 2000

Complexity And Copyright In Contradiction, Michael J. Madison

Michael J. Madison

The title of the article is a deliberate play on architect Robert Venturi?s classic of post-modern architectural theory, Complexity and Contradiction in Architecture. The article analyzes metaphorical ?architectures? of copyright and cyberspace using architectural and land use theories developed for the physical world. It applies this analysis to copyright law through the lens of the First Amendment. I argue that the ?simplicity? of digital engineering is undermining desirable ?complexity? in legal and physical structures that regulate expressive works.


Canadian Copyright Law In Cyberspace: An Examination Of The Copyright Act In The Context Of The Internet , Jeremy F. De Beer Jan 2000

Canadian Copyright Law In Cyberspace: An Examination Of The Copyright Act In The Context Of The Internet , Jeremy F. De Beer

Jeremy de Beer

This paper considers the application of Canada's Copyright Act to various online activities. I advocate for an evolutionary rather than revolutionary approach to digitial copyright reform.


Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson Jan 1998

Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson

Ira Steven Nathenson

This Article addresses 'spamdexing,' namely, the practice of stuffing invisible keywords into webpages in order to try to get more favorable listings with search engines. For instance, some website owners will stuff the trademarks of competitors into a webpage’s code, particularly by using 'meta tags,' indexing keywords that can be hidden in a webpage’s source code. Although meta tags are not typically viewed by users, the code can be read by search engines, with the result that webpages may be improperly boosted in search engine rankings. Such practices can confuse the public and have also spurred trademark lawsuits. But the …