Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Michigan Law School (8)
- American University Washington College of Law (4)
- Seattle University School of Law (4)
- Selected Works (4)
- Cleveland State University (3)
-
- Maurer School of Law: Indiana University (3)
- University of Pittsburgh School of Law (3)
- BLR (2)
- University of Colorado Law School (2)
- University of Pennsylvania Carey Law School (2)
- University of Washington School of Law (2)
- Vanderbilt University Law School (2)
- Chicago-Kent College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- SJ Quinney College of Law, University of Utah (1)
- Schulich School of Law, Dalhousie University (1)
- SelectedWorks (1)
- Singapore Management University (1)
- Southern Methodist University (1)
- St. Mary's University (1)
- University of Cincinnati College of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of New Hampshire (1)
- Washington and Lee University School of Law (1)
- Publication Year
- Publication
-
- Articles (6)
- Articles in Law Reviews & Other Academic Journals (4)
- Seattle University Law Review (4)
- Cleveland State Law Review (3)
- Michigan Law Review (3)
-
- All Faculty Scholarship (2)
- ExpressO (2)
- Federal Communications Law Journal (2)
- Michigan Journal of International Law (2)
- Publications (2)
- A. Michael Froomkin (1)
- Articles by Maurer Faculty (1)
- Canadian Journal of Law and Technology (1)
- Chicago-Kent Law Review (1)
- Faculty Articles and Other Publications (1)
- Faculty Scholarship (1)
- Jared A. Harshbarger (1)
- Konstantinos Stylianou (1)
- Law Faculty Scholarship (1)
- Loyola of Los Angeles Law Review (1)
- Michigan Telecommunications & Technology Law Review (1)
- Professor Katina Michael (1)
- Research Collection Yong Pung How School Of Law (1)
- SMU Science and Technology Law Review (1)
- Tejas N. Narechania (1)
- The Scholar: St. Mary's Law Review on Race and Social Justice (1)
- Utah Law Review (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- Vanderbilt Journal of Transnational Law (1)
- Washington Journal of Law, Technology & Arts (1)
- Publication Type
Articles 31 - 51 of 51
Full-Text Articles in Law
The Efficacy Of Cybersecurity Regulation, David Thaw
The Efficacy Of Cybersecurity Regulation, David Thaw
Articles
Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do – and should – deliberately encode regulatory capture into the rulemaking process. This relatively uncommon approach to administrative law, which I describe as Management-Based Regulatory Delegation, involves the combination of two legislative approaches to engaging private entities' expertise. This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted by the state legislatures. My analysis suggests that a blend of these …
Enlightened Regulatory Capture, David Thaw
Enlightened Regulatory Capture, David Thaw
Articles
Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo
All Faculty Scholarship
Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …
Costing A Pretty Penny: Online Penny Auctions Revive The Pestilence Of Unregulated Lotteries, David R. Konkel
Costing A Pretty Penny: Online Penny Auctions Revive The Pestilence Of Unregulated Lotteries, David R. Konkel
Seattle University Law Review
Penny auctions, an online phenomenon imported from Europe, operate by the hundreds in the United States without meaningful oversight from consumer protection agencies. In a penny auction, consumers compete for items one penny at a time. To date, no significant inquiry, either academic or practical, into the legitimacy of the penny auction has occurred. Although marketed as auctions, online penny auctions may actually qualify as lotteries. Unlike the multifarious and confusing definitions of gambling, the long-accepted definition of a lottery consists of three elements: prize, consideration, and chance. If a penny auction satisfies this definition then, under well-established case law …
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.
Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.
Jared A. Harshbarger
Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.
An Innovation-Centric Approach Of Telecommunications Infrastructure Regulation, Konstantinos Stylianou
An Innovation-Centric Approach Of Telecommunications Infrastructure Regulation, Konstantinos Stylianou
Konstantinos Stylianou
This paper considers the mechanics and role of innovation in telecommunications networks, and explains how regulation can be designed to maximize innovation. To better focus on the relationship between innovation and regulation an effort is made to distinguish innovation from competition, although the two concepts are closely related, and several reasons are presented on why the fast changing, networked and technical nature of telecommunications offers a very favorable environment for innovation to thrive, as well as why innovation benefits from a large number of actors. Moreover, the paper further explains that even small players are useful in the innovation process …
A Portrait Of The Internet As A Young Man, Ann Bartow
A Portrait Of The Internet As A Young Man, Ann Bartow
Law Faculty Scholarship
In brief, the core theory of Jonathan Zittrain’s1 2008 book The Future of the Internet - and How to Stop It is this: good laws, norms, and code are needed to regulate the Internet, to prevent bad laws, norms, and code from compromising its creative capabilities and fettering its fecund flexibility. A far snarkier if less alliterative summary would be “We have to regulate the Internet to preserve its open, unregulated nature.” Zittrain posits that either a substantive series of unfortunate Internet events or one catastrophic one will motivate governments to try to regulate cyberspace in a way that promotes …
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
Opening Bottlenecks: On Behalf Of Mandated Network Neutrality, Bill D. Herman
Federal Communications Law Journal
This Article calls for mandated "network neutrality," which would require broadband service providers to treat all nondestructive data equitably. The Author argues that neutral networks are preferable because they better foster online innovation and provide a more equitable distribution of the power to communicate. Without mandated network neutrality, providers in highly concentrated regional broadband markets will likely begin charging content providers for the right to send data to end users at the fastest speeds available. The Author demonstrates that regional broadband competition and forthcoming transmission technologies are unlikely to prevent broadband discrimination, ad hoc regulation under current statutory authority is …
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal
Buried Online: State Laws That Limit E-Commerce In Caskets, Jerry Ellig, Asheesh Agarwal
ExpressO
Consumers seeking to purchase caskets online could benefit from the Supreme Court’s 2005 decision that states cannot discriminate against interstate direct wine shipment. Federal courts have reached conflicting conclusions when asked whether state laws requiring casket sellers to be licensed funeral directors violate the U.S. Constitution’s Due Process Clause. In Powers v. Harris, the 10th Circuit even offered an unprecedented ruling that economic protectionism is a legitimate state interest that can justify otherwise unconstitutional policies. In Granholm v. Heald, however, the Supreme Court declared that discriminatory barriers to interstate wine shipment must be justified by a legitimate state interest, and …
The Legacy Of The Federal Communications Commission’S Computer Inquiries, Robert Cannon
The Legacy Of The Federal Communications Commission’S Computer Inquiries, Robert Cannon
Federal Communications Law Journal
The FCC and the computer industry have learned much in the 35 years since the agency first began to regulate computer networks. Safeguards were imposed on common carriers for the benefit of the networks. This Article examines the so-called Computer Inquiries and how they have repeatedly re-examined and redefined the nature of the regulatory treatment of computer networks over communications networks. The Author reviews Computer I, in which the FCC first attempted to divide the world technologically between computers that ran communications networks ("pure communications") and computers at the end of telephone lines with which people interacted ("pure data processing"). …
Global Trecs: The Regulation Of International Trade In Cyberspace, J. Steele
Global Trecs: The Regulation Of International Trade In Cyberspace, J. Steele
Canadian Journal of Law and Technology
This paper provides an overview of trade-related aspects of electronic commerce, and examines three approaches for regulating international trade in cyber- space. A model which integrates these approaches is then proposed, emphasizing private standards of self-regula- tion within a broader public framework of minimal background standards. A summary of potential areas of conflict between competing regulatory approaches fol- lows, and the paper concludes that both the WTO and the OECD have important roles to play in the develop- ment of international consensus towards a harmonized framework for the regulation of global TRECs.
Climbing The Walls Of Your Electronic Cage, Steven Hetcher
Climbing The Walls Of Your Electronic Cage, Steven Hetcher
Michigan Law Review
Space. The final frontier. Not so, say the doyennes of the firstgeneration Internet community, who view themselves as the new frontiersmen and women staking out a previously unexplored territory - cyberspace. Numerous metaphors in the Internet literature picture cyberspace as a new, previously unexplored domain. Parallels are frequently drawn to the American colonies, the Western frontier, or outer space. In Code: And Other Laws of Cyberspace, Lawrence Lessig says, "Cyberspace is a place. People live there." In this place, we will build a "new society" (p. 4). A sense of this background is helpful in appraising Lessig's claims. He argues …
High-Tech Heroes, Virtual Villians, And Jacked-In Justice: Visions Of Law And Lawyers In Cyberpunk Science Fiction, Walter Effross
High-Tech Heroes, Virtual Villians, And Jacked-In Justice: Visions Of Law And Lawyers In Cyberpunk Science Fiction, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Putting The Cards Before The Purse: Distinctions, Differences, And Dilemmas In The Regulation Of Stored Value Card Systems, Walter Effross
Putting The Cards Before The Purse: Distinctions, Differences, And Dilemmas In The Regulation Of Stored Value Card Systems, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Piracy, Privacy, And Privitization: Fictional And Legal Approaches To The Electronic Future Of Cash, Walter Effross
Piracy, Privacy, And Privitization: Fictional And Legal Approaches To The Electronic Future Of Cash, Walter Effross
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Garbage In: Emerging Media And Regulation Of Unsolicited Commercial Solicitiations, Michael W. Carroll
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski
Integrated Servies Digital Network: Issues And Options For The World's Future Communications Systems, A. M. Rutkowski
Michigan Journal of International Law
There has been virtually no public discussion of the significant public policy issues raised because of the intimidating nature of network engineering which forms the basis for nearly all the current dialogue. This paper discusses current ISDN developments, and sets forth an analytical framework within which these issues may be discussed.
The International Application Of The Second Computer Inquiry, Robert M. Frieden
The International Application Of The Second Computer Inquiry, Robert M. Frieden
Michigan Journal of International Law
This article chronicles the FCC's attempt to confront the confluence of telecommunications and data processing technologies by fashioning a regulatory scheme designed primarily for the United States. The Commission has chosen to apply this scheme, without significant qualification, internationally. Given the different objectives and structure of United States and foreign communications industries, the FCC's system cannot be transplanted abroad without prior consultation and substantial modification. After reviewing the international problems created by the Commission's application abroad of its newly developed scheme, this article concludes with recommendations for resolving these conflicts that currently threaten the well-being of carriers, customers, and international …
The Fcc Computer Inquiry: Interfaces Of Competitive And Regulated Markets, Michigan Law Review
The Fcc Computer Inquiry: Interfaces Of Competitive And Regulated Markets, Michigan Law Review
Michigan Law Review
Since the advent of computer technology, data processing and communication services have become increasingly interdependent. In 1966, the Federal Communications Commission launched the Computer Inquiry to explore the broad range of regulatory and policy problems generated by this technological development.2