Forty-third selected bibliography on computers, technology and the law (January 2011 through December 2011).

Position9. Legal Issues of the Internet to 10. Law and Technology 10.4.1 Electronic Records, p. 371-395 - Bibliography
  1. LEGAL ISSUES OF THE INTERNET

    9.0 General

    Peter Adamo, Comment, Craigslist, the CDA, and Inconsistent International Standards Regarding Liability for Third-Party Postings on the Internet, 2 PACE INT'L L. REV. ONLINE COMPANION 1 (2011).

    Jason D. Arnold, Licensing Concerns for Virtual Worlds, 14 J. INTERNET L. 3 (2011).

    Steven C. Bennett, Regulating Online Behavioral Advertising, 44 J. MARSHALL L. REV. 899 (2011).

    John Billings, Conspectus: Selected Docket and Legislative Summaries, 2011: Stop Online Piracy Act, H.R. 3261, 112th Cong., 20 COMMLAW CONSPECTUS 295 (2011).

    Book Note, 10 J. HIGH TECH. L. 1 (2010-2011) (reviewing EVGENY MOROZOV, THE NET DELUSION (2011).

    Michael Burke, Cracks in the Armor? The Future of the Communications Decency Act and Potential Challenges to the Protections of Section 230 to Gossip Web Sites, 17 B.U.J. SCI. & TECH. L. 232 (2011).

    Sahara Bvrne & Theodore Lee, Toward Predicting Youth Resistance to Internet Risk Prevention Strategies, 55 J. BROAD. & ELEC. MEDIA 90 (2011).

    Federica Casarosa, Protection of Minors Online: Available Regulatory Approaches, 14 J. INTERNET L. 25 (2011).

    Nicholas Clark, Article, Jurisprudence for a Digital Age: Free Software and the Need for a New Media Legal Authority, 14 UDC-DCSL L. REV. 193 (2011).

    Susan Corbett, Creative Common Licenses, the Copyright Regime and the Online Community: Is there a Fatal Disconnect?, 74 MOD. L. REV. 503 (2011).

    David Corneil, Comment, Harboring Wikileaks: Comparing Swedish and American Press Freedom in the Internet Age, 41 CAL. W. INT'L L.J. 477, (2011).

    Keith Daley, Year in Review, Network Automation, Inc. v. Advanced Systems Concepts, Inc., 638 F.3d 1137 (9th Cir. 2011), 38 W. ST. U. L. REV. 238 (2011).

    Jeffrey R. Doty, Choose Your Words Wisely: Affirmative Representations as a Limit on [section] 230 Immunity, 6 WASH. J.L. TECH. & ARTS 259 (2011).

    Katharina de la Durantave, Finding a Home for Orphans: Google Book Search and Orphan Works Law in the United States and Europe. 21 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 229 (2011).

    Benjamin Edelman, Bias in Search of Results?: Diagnosis and Response, 7 INDIAN J. L. & TECH. 16 (2011).

    Lyombe Eko, et al., Google This: The Great Firewall of China, the It Wheel of India, Google Inc., and Internet Regulation, 15 J. INTERNET L. 3 (2011).

    Jeremy Epstein, Privacy, Democracy, and Elections: Internet Voting, Security, and Privacy, 19 WM. & MARY BILL RITS. J. 885 (2011).

    Jonathan Ezor, Busting Blocks: Revisiting 47 U.S.C. [section] 230 To Address the Lack of Effective Legal Recourse for Wrongful Inclusion in Spam Filters, 17 RICH. J.L. & TECH. 7(2011).

    Virginia A. Fitt, Crowdsourcing the News: News Organization Liability for iReporters, 37 WM. MITCHELL L. REV. 1839 (2011).

    Jonathan D. Frieden et al., Putting the Genie Back in the Bottle: Leveraging Private Enforcement to Improve Internet Privacy, 37 WM. MITCHELL L. REV. 1671 (2011).

    Eric Goldman, Revisiting Search Engine Bars, 38 WM. MITCHELL L. REV. 96 (2011).

    Sasha Grandison, Article, The Child Online Privacy Protection Act. The Relationship Between Constitutional Rights and the Protection of Children, 14 UDC-DCSL L. REV. 209 (2011).

    Lital Helman & Gideon Parchomovsky, Article, The Best Available Technology Standard, 111 COLUM. L. REV. 1194 (2011).

    Hayley M. Koteen, Note, Ending the Disconnect for the Deaf Community: How Amendments to the Federal Regulations Can Realign the ADA With Its Purpose, 29 CARDOZO ARTS & ENT. L. J. 425 (2011).

    Robert G. Larson & Paul A. Godfread, Bringing John Doe to Court. Procedural Issues in Unmasking Anonymous Internet Defendants, 38 WM. MITCHELL L. REV. 328 (2011).

    Doug Lichtman, Google Book Search in the Gridlock Economy, 53 ARIZ. L. REV. 131 (2011).

    Jared S. Livingston, Comment, Invasion Contracts: The Privacy Implications of Terms of Use Agreements in the Online Social Media Setting, 21 ALB. L.J. SCI. & TECH. 591 (2011).

    Charles F. Marshall & Eric M. David, Prior Restraint 2.0: A Framework for Applying Section 230 to Online Journalism, 1 WAKE FOREST J.L. & POL'Y 75 (2011).

    Julia Marter. Comment. When and Where Does an Internet Posting Constitute Publication? Interpreting Moberg v. 33T LLC, 21 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 495 (2011).

    John O. McGinnis, Symposium, Technology in a Democratic Age: Laws for Learning in an Age of Acceleration, 53 WM. & MARY L. REV. 305 (2011).

    Sascha D. Meinratht et al., Article, Digital Feudalism: Enclosures and Erasures from Digital Rights Management to the Digital Divide, 19 COMMLAW CONSPECTUS 423 (2011).

    Paul J. Morrow, Cyberlaw: The Unconscionability/Unenforceability of Contracts (Shrink-Wrap, Clickwrap, and Browse-Wrap) on the Internet: A Multijurisdictional Analysis Showing the Need for Oversight, 11 PGH. J. TECH. L. & POL'Y 1 (2011).

    Nichole Rustin-Paschal, Privacy, Democracy, and Elections: Online Behavioral Advertising and Deceptive Campaign Tactics: Policy Issues, 19 WM. & MARY BILL OF RITS. J. 907 (2011)

    Lynn C. Percival, IV, Public Policy Favoritism in the Online World." Contract Voidability Meets the Communications Decency Act, 17 TEX. WESLEYAN L. REV. 165 (2011).

    Matthew L. Perdoni, Article, Revising the Analysis of Personal Jurisdiction to Accommodate Internet-Based Personal Contacts, 14 UDC-DCSL L. REV. 159 (2011).

    Kimberlianne Podlas, The "Legal Epidemiology" of the Teen Sexting Epidemic: How the Media Influenced a Legislative Outbreak, 12 PGH. J. TECH. L. & POL'Y 1 (2011).

    Marian K. Riedy et al., Managing Business Smartphone Data, 14 J. INTERNET L. 3 (2011).

    Joseph T. Ripberger, Capturing Curiosity: Using Internet Search Trends to Measure Public Attentiveness, 39 POL. ST. J. 239 (2011).

    Eric G. Roscoe, Article, Taxing Virtual Worlds: Can the IRS PWN You?, 12 PGH. J. TECH. L. & POL'Y 1 (2011).

    Paul M. Schwartz, Regulating Governmental Data Mining in the United States and Germany: Constitutional Courts, the States, and New Technology, 53 WM. & MARY L. REV. 351 (2011).

    Tracy A. Steindel, Note, A Path Toward User Control of Online Profiling, 17 MICH. TELECOMM. TECH. L. REV. 459 (2011).

    Gavin Sutter, Rethinking Online Intermediary Liability: In Search of the Baby Bear Approach, 7 INDIAN J. L. & TECH. 33 (2011).

    Michael W. Taylor, Note, A Blogger, Google, and a "Skank": Analysis of Whether Google has a Fiduciary Obligation to Its Bloggers, 113 W. VA. L. REV. 1001 (2011).

    Matthew Tokson. Automation and the Fourth Amendment, 96 IOWA L. REV. 581 (2011).

    Katherine Tsai, How to Create International Law: The Case of Internet Freedom in China, 21 DUKE J. COMP. & INT'L L. 401 (2011).

    Russell L. Weaver, Brandenburg and Incitement in a Digital Era, 80 MISS. L.J. 1263 (2011).

    Kevin Werbach, The Network Utility, 60 DUKE L.J. 1761 (2011).

    9.1 ISP and Internet Access

    9.1.0 General

    Michael P. Anderson, Ensuring Equal Access to the Internet for the Elderly: The Need to Amend Title III of the ADA, 19 ELDER L.J. 159 (2011).

    Dieter Dorr & Steffen Janich, The Criminal Responsibility of Internet Service Providers in Germany, 80 MISS. L.J. 1247 (2011).

    Jonathon W. Penney, Internet Access Rights: A Brief History and Intellectual Origins, 38 WM. MITCHELL L. REV. 10 (2011).

    Andrew J. Sabino, Note, How Joe Schmoe's Name Could Transform the Internet: A Proposal to Preserve ISP Immunity Under the Communications Decency Act, 45 NEW ENG. L. REV. 913 (2011).

    Molly Sachson, The Big Bad Internet: Reassessing Service Provider Immunity Under [section] 230 to Protect the Private Individual From Understanding Internet Communication, 25 J. CIV. RTS. & ECON. DEV. 353 (2011).

    Nicolas Suzor & Brian Fitzgerald, The Legitimacy of Graduated Response Schemes in Copyright Law, 34 U.N.S.W.L.J. 1 (2011).

    Steven Swanson, Google Sets Sail: Ocean-Based Server Farms and International Law, 43 CONN. L. REV. 709 (2011).

    Ke Steven Wan, Internet Service Providers' Vicarious Liability Versus Regulation of Copyright Infringement in China, 2011 U. ILL. J.L. TECH. & POL'Y 375 (2011).

    Jonathan Weinberg, Governments, Privatization, and "Privatization": ICANN and the GAC, 18 MICH. TELECOMM. TECH. L. REV. 189 (2011).

    9.1.1 Net Neutrality

    Larry Downes, Article, Unscrambling the FCC's Net Neutrality Order: Preserving the Open Internet--But Which One?, 20 COMMLAW CONSPECTUS 83 (2011).

    Daniel A. Lyons, Virtual Takings: The Coming Fifth Amendment Challenge to Net Neutrality Regulation, 86 NOTRE DAME L. REV. 65 (2011).

    Eric Null, Note, The Difficulty with Regulating Network Neutrality, 29 CARDOZO ARTS & ENT. L. J. 459 (2011).

    Caroline S. Scala, Comment, The FCC's Role in Regulating Network Neutrality:

    Protection of Online Innovation & Business, 15 CHAP. L. REV. 419 (2011).

    James B. Speta, Supervising Managed Services, 60 DUKE L.J. 1715 (2011).

    Jennifer Wong, Net Neutralitv: Preparing for the Future, 31 J. NAT'L ASS'N L. JUD. 669 (2011).

    Christopher S. Yoo, Technologies of Control and the Future of the First Amendment, 53 WM. & MARY L. REV. 747 (2011).

    9.2 Domain Names

    Gregg M. Barabakoff, Comment, No Shoes, No Service? Why Cybersquatting has Outgrown the International Shoe Framework for Personal Jurisdiction, and the Need for Legislative Reform, 6 SEVENTH CIR. REV. 374 (2011).

    Brian W. Borchert, Note, Imminent Domain Name: The Technological Land-Grab and ICANN'S Lifting of Domain Name Restrictions, 45 VAL. U.L. REV. 505 (2011).

    Whitney C...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT