Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (29)
- Intellectual Property Law (15)
- Computer Law (11)
- Law and Society (8)
- Criminal Law (6)
-
- Communications Law (5)
- Administrative Law (4)
- Legislation (4)
- Privacy Law (4)
- Science and Technology Law (4)
- Antitrust and Trade Regulation (3)
- Civil Procedure (3)
- First Amendment (3)
- Gaming Law (3)
- International Law (3)
- Social and Behavioral Sciences (3)
- Constitutional Law (2)
- Economics (2)
- Entertainment, Arts, and Sports Law (2)
- Jurisdiction (2)
- Law and Economics (2)
- Science and Technology Studies (2)
- Anthropology (1)
- Civil Rights and Discrimination (1)
- Commercial Law (1)
- Communication (1)
- Contracts (1)
- Criminal Procedure (1)
- Education (1)
- Institution
-
- New York Law School (11)
- Northwestern Pritzker School of Law (5)
- Maurer School of Law: Indiana University (3)
- Selected Works (3)
- University of Michigan Law School (3)
-
- University of Richmond (3)
- American University Washington College of Law (2)
- Boston University School of Law (2)
- Villanova University Charles Widger School of Law (2)
- Case Western Reserve University School of Law (1)
- Columbia Law School (1)
- George Washington University Law School (1)
- Marquette University Law School (1)
- Notre Dame Law School (1)
- Pace University (1)
- Roger Williams University (1)
- Saint Louis University School of Law (1)
- SelectedWorks (1)
- University of Baltimore Law (1)
- University of Colorado Law School (1)
- University of Denver (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of San Diego (1)
- University of South Carolina (1)
- University of Washington School of Law (1)
- Publication
-
- NYLS Law Review (11)
- Northwestern Journal of Technology and Intellectual Property (5)
- Faculty Scholarship (3)
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
-
- Federal Communications Law Journal (2)
- Michigan Telecommunications & Technology Law Review (2)
- University of Richmond Law Review (2)
- All Faculty Scholarship (1)
- Ann Bartow (1)
- Articles by Maurer Faculty (1)
- Book Chapters (1)
- Case Western Reserve Law Review (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- GW Law Faculty Publications & Other Works (1)
- Gillian K Hadfield (1)
- Human Rights & Human Welfare (1)
- Jeffrey S. Moorad Sports Law Journal (1)
- Journal Articles (1)
- Juliet M Moringiello (1)
- Law Faculty Publications (1)
- Law Faculty Scholarship (1)
- Marquette Intellectual Property Law Review (1)
- Publications (1)
- Saint Louis University Public Law Review (1)
- San Diego International Law Journal (1)
- Scholarly Works (1)
- School of Law Conferences, Lectures & Events (1)
- South Carolina Law Review (1)
- Susan Freiwald (1)
- Publication Type
- File Type
Articles 1 - 30 of 52
Full-Text Articles in Law
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Governing By Negotiation: The Internet Naming System, Tamar Frankel
Faculty Scholarship
This Article is about the governance of the Internet naming system. The subject is fascinating, not simply because the naming system is an important system affecting the Internet, although it is; and not because the Internet is important, although it is. The subject is fascinating because it offers a rare opportunity to examine and learn from the evolution of an incoherent governance structure. The naming system is special in that it is the product of a new technology; it reflects the changes and pressures brought by the new technology, and involves the interests of government and private entities, domestic and …
The Hegemony Of The Copyright Treatise, Ann Bartow
The Hegemony Of The Copyright Treatise, Ann Bartow
Ann Bartow
This Article asserts that major conceptions about the appropriate structure, texture, and span of copyright protections and privileges have been fashioned by copyright treatises, particularly the various editions of Nimmer on Copyright. Copyright treatises function in concert with the machinations of Congress, the courts, and custom, but their role is not often scrutinized.
Because copyright treatises typically do a far better job than Congress or the courts of explicating copyright law in straightforward and accessible language, such treatises can not only communicate the copyright law, but also influence its development and direction. Policy makers no doubt understand that content owners …
Grasping Intangibles: Domain Names And Creditors’ Rights, Juliet Moringiello
Grasping Intangibles: Domain Names And Creditors’ Rights, Juliet Moringiello
Juliet M Moringiello
No abstract provided.
Delivering Legality On The Internet: Developing Principles For The Private Provision Of Commercial Law, Gillian K. Hadfield
Delivering Legality On The Internet: Developing Principles For The Private Provision Of Commercial Law, Gillian K. Hadfield
Gillian K Hadfield
No abstract provided.
6th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2004, Department Of Attorney General, State Of Rhode Island
6th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2004, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
What Does Pruneyard Have To Do With California Internet Trade Secret Law?, Adam J. Sheridan
What Does Pruneyard Have To Do With California Internet Trade Secret Law?, Adam J. Sheridan
Marquette Intellectual Property Law Review
This comment discusses the facts of the Bunner case and the decisions of the Sixth District and the Supreme Court. The Bunner case involves Andrew Bunner and his act of putting a link on his Web page allowing visitors to access a Digitial Video Disc (DVD) descrambler program, which allowed a computer user to decrypt DVDs. The DVD Copy Control Association sought an injunction against Bunner under the California Uniform Trade Secrets Act (UTSA). The author analyzes the historical protection given free speech and trade secrets under California law. Looking at the Bunner case in light of Pruneyard, the author …
Family Court Files: A Treasure Trove For Identity Thieves, Melissa F. Brown
Family Court Files: A Treasure Trove For Identity Thieves, Melissa F. Brown
South Carolina Law Review
No abstract provided.
Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy
Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy
San Diego International Law Journal
The debate over whether cyberspace can or should be regulated is essentially dead. This is the conclusion being taught in law schools today. The battle between Judge Frank Easterbrook and Professor Lawrence Lessig over "laws" and "horses", infamous among cyberspace legal scholars, became irrelevant when geographically-based governments began regulating Internet related activities. However, debate over how the Internet should be regulated continues. One way of framing this debate is in terms of deciding how to regulate behavior in cyberspace. Professor Lessig postulated four kinds of constraints regulate behavior: (1) social norms, (2) markets, (3) law, and (4) architecture. This comment …
A Horizontal Leap Forward: Formulating A New Communications Public Policy Framework Based On The Network Layers Model, Richard S. Whitt
A Horizontal Leap Forward: Formulating A New Communications Public Policy Framework Based On The Network Layers Model, Richard S. Whitt
Federal Communications Law Journal
Over the course of the last several decades, legal and structural fictions have evolved and have been integrated into the reality of communications theory and regulation. In this Article, the Author argues that the development of a "layers approach" to communications regulation of IP networks would lead to greater efficiencies while addressing public policy issues. By reconceptualizing communications regulation along horizontal layers, Mr. Whitt posits that the logical walls surrounding the key components of IP networks should be removed to promote increased functionality of communications oversight and management. In this way, the outmoded vertical separation associated with the legal legacy …
Try, Try Again: Will Congress Ever Get It Right? A Summary Of Internet Pornography Laws Protecting Children And Possible Solutions, Susan Hanley Kosse
Try, Try Again: Will Congress Ever Get It Right? A Summary Of Internet Pornography Laws Protecting Children And Possible Solutions, Susan Hanley Kosse
University of Richmond Law Review
No abstract provided.
Staying Afloat In The Internet Stream: How To Keep Web Radio From Drowning In Digital Copyright Royalties, Emily D. Harwood
Staying Afloat In The Internet Stream: How To Keep Web Radio From Drowning In Digital Copyright Royalties, Emily D. Harwood
Federal Communications Law Journal
In the 1990's, the development of "streaming" technology allowed webcasters to begin broadcasting music on the Internet. The public took advantage of a plethora of free media players, and the number of web-based radio stations soared. However, a crippling dispute over broadcast rates left the viability of this technology in doubt. This Note criticizes current policies that curtail radio streaming by providing harsh financial restrictions on webcasters. In looking to the future, this Note argues that Congress should extend licensing exemptions to cover those Internet stations most like their AM/FM counterparts who do not have to pay additional fees.
From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans
From The Cluetrain To The Panopticon: Isp Activity Characterization And Control Of Internet Communications, Eric Evans
Michigan Telecommunications & Technology Law Review
If ISPs are exposed to liability for forwarding others' messages--messages originating with other ISPs or with the ISP's own users--the norm of universal mutual message forwarding that underlies the present operation of the Internet will be threatened. This Note will argue that society presently confronts a choice between a common carrier Internet characterized by universal mutual message forwarding and a monitored and controlled Internet. Part I will describe the underlying rules that govern ISPs' liability for their users' actions. Part II will argue that the present statutory regime governing ISPs' liability for users' copyright infringement includes elements that provide ISPs …
Application Of The Public-Trust Doctrine And Principles Of Natural Resource Management To Electromagnetic Spectrum, Patrick S. Ryan
Application Of The Public-Trust Doctrine And Principles Of Natural Resource Management To Electromagnetic Spectrum, Patrick S. Ryan
Michigan Telecommunications & Technology Law Review
The Electromagnetic spectrum is among our most valuable natural resources. Yet while the past few decades have seen a rich body of environmental law develop for other natural resources, this movement has largely passed over the electromagnetic spectrum. This Article argues that to remedy that situation, the public-trust doctrine, which is now a cornerstone of modern environmental law, should be extended to the electromagnetic spectrum. This extension would not be a leap: the public-trust doctrine has already been used to guarantee the public access to various bodies of water (not just navigable water), and to protect recreational lakes and beaches, …
Communicating Entitlements: Property And The Internet, William Hubbard
Communicating Entitlements: Property And The Internet, William Hubbard
All Faculty Scholarship
No abstract provided.
Inciting Terrorism On The Internet: An Application Of Brandenburg To Terrorist Websites, Thomas E. Crocco
Inciting Terrorism On The Internet: An Application Of Brandenburg To Terrorist Websites, Thomas E. Crocco
Saint Louis University Public Law Review
No abstract provided.
Whose Music Is It Anyway? How We Came To View Musical Expression As A Form Of Property, Michael W. Carroll
Whose Music Is It Anyway? How We Came To View Musical Expression As A Form Of Property, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
Many participants in the music industry consider unauthorized transmissions of music files over the Internet to be theft of their property. Many Internet users who exchange music files reject this characterization. Prompted by the dispute over unauthorized music distribution, this Article explores how those who create and distribute music first came to look upon music as their property and when in Western history the law first supported this view. By analyzing the economic and legal structures governing music making in Western Europe from the classical period in Greece through the Renaissance, the Article shows that the law first granted some …
Legal Aesthetics Of The Family And The Nation: Agoraxchange And Notes Toward Re-Imaging The Future, Jacqueline Stevens
Legal Aesthetics Of The Family And The Nation: Agoraxchange And Notes Toward Re-Imaging The Future, Jacqueline Stevens
NYLS Law Review
No abstract provided.
Fire, Metaphor, And Constitutional Myth-Making, Robert Tsai
Fire, Metaphor, And Constitutional Myth-Making, Robert Tsai
Articles in Law Reviews & Other Academic Journals
From the standpoint of traditional legal thought, metaphor is at best a dash of poetry adorning lawyerly analysis, and at worst an unjustifiable distraction from what is actually at stake in a legal contest. By contrast, in the eyes of those who view law as a close relative of ordinary language, metaphor is a basic building block of human understanding. This article accepts that metaphor helps us to comprehend a court's decision. At the same time, it argues that metaphor plays a special role in the realm of constitutional discourse. Metaphor in constitutional law not only reinforces doctrinal categories, but …
Virtual Worlds, Real Rules, Caroline Bradley, Michael Froomkin
Virtual Worlds, Real Rules, Caroline Bradley, Michael Froomkin
NYLS Law Review
No abstract provided.
Who’S In Charge Of Who I Am?: Identity And Law Online, Susan P. Crawford
Who’S In Charge Of Who I Am?: Identity And Law Online, Susan P. Crawford
NYLS Law Review
No abstract provided.
The Right To Play, Edward Castronova
Virtual Crimes, Gregory Lastowka, Dan Hunter
United States V. Jarrett, Andres A. Munoz
Friendsters, Tricksters, And Playculture, Mary Flanagan
Friendsters, Tricksters, And Playculture, Mary Flanagan
NYLS Law Review
No abstract provided.
Who Killed Miss Norway?, Tracy Spaight
Sound And Fury Signifying Nothing?: Jurgen Bϋssow’S Battle Against Hate-Speech On The Internet, Eric T. Eberwine
Sound And Fury Signifying Nothing?: Jurgen Bϋssow’S Battle Against Hate-Speech On The Internet, Eric T. Eberwine
NYLS Law Review
No abstract provided.
Information Privacy In Virtual Worlds: Identifying Unique Concerns Beyond The Online And Offline Worlds, Tal Z. Zarksy
Information Privacy In Virtual Worlds: Identifying Unique Concerns Beyond The Online And Offline Worlds, Tal Z. Zarksy
NYLS Law Review
No abstract provided.
Virtual Worlds As Comparative Law, James Grimmelmann
Virtual Worlds As Comparative Law, James Grimmelmann
NYLS Law Review
No abstract provided.
Beyond Zippo's Sliding Scale - The Third Circuit Clarifies Internet-Based Personal Jurisdiction Analysis, David M. Fritch
Beyond Zippo's Sliding Scale - The Third Circuit Clarifies Internet-Based Personal Jurisdiction Analysis, David M. Fritch
Villanova Law Review
No abstract provided.
Taxing The New Intellectual Property Right, Xuan-Thao Nguyen, Jeffrey A. Maine
Taxing The New Intellectual Property Right, Xuan-Thao Nguyen, Jeffrey A. Maine
Articles
Current, albeit arbitrary, rules exist governing the tax treatment of traditional forms of intellectual property, such as patents, trade secrets, copyrights, trademarks, and trade names. While tax principles exist for these traditional intellectual property and intangible rights, specific tax rules do not exist for new intellectual property rights, such as domain names, that are emerging with the arrival of global electronic commerce transactions on the Internet. This article explores the proper tax treatment of domain name registration and acquisition costs, addressing these parallel questions? Are domain names merely variations of traditional forms of intellectual property and other intangible rights to …