9.4.1 Social Networking
Ray Abilmouna, Social Networking Sites: What an Entangled Web We Weave, 39 W. St. U. L. Rev. 99 (Spring 2012).
Carmen Aguado, Facebook or Face Bank?, 32 LOY. L.A. Ent. L. Rev. 187 (2012).
Matthew Altenberg, Note and Comment, Playing the Mysterious Game of Online Love: Examining an Emerging Trend of Limiting [section] 230 Immunity of the Communications Decency Act and the Effects on E-Dating Websites, 32 PACE L. Rev. 922 (Summer 2012).
James B. Astrachan, Social Media Marketing: Testimonials and Endorsements: The New Transparency and Attorneys' Ethics, 6 Md. B.J. 12 (Nov./Dec. 2012).
Eric D. Bentley, He Tweeted What? A First Amendment Analysis of the Use of Social Media by College Athletes and Recommended Best Practices for Athletic Departments, 38 J.C. & U.L. 451 (2012).
Anita Bernstein, Real Remedies for Virtual Injuries, 90 N.C. L. Rev. 1457 (June 2012).
Julie Brill, Privacy & Consumer Protection in Social Media, 90 N.C. L. REV. 1295 (June 2012).
John T. Ceglia, Comment, The Disappearing Schoolhouse Gate: Applying Tinker in the Internet Age, 39 PEPP. L. rev. 393 (2012).
Anupam Chander, Facebookistan, 90 N.C. L. Rev. 1807 (June 2012).
Stephanie Chau, A "Pinteresting" Question: Is Pinterest Here to Stay? A Study on How IP Can Help Pinterest Lead a Revolution, 19 RICH. J.L. & TECH 3 (Nov. 2012).
Adam Cohen, Social Media and eDiscovery: Emerging Issues, 32 PACE L. Rev. 289 (Spring 2012).
Phyllis Coleman, EHarmony and Homosexuals: A Match Not Made in Heaven, 30 QUINNIPIAC L. REV. 727 (2012).
Maria Danaher, NLRB Turns Attention to Elements of Acceptable Social Media Policy, Law. J., Sept. 2012, at 11.
Lothar Determann, Social Media Privacy: A Dozen Myths and Facts, 2012 STAN. TECH. L. REV. 7 (2012).
Nathan J. Ebnet, Note, It Can Do More Than Protect Your Credit Score: Regulating Social Media PreEmployment Screening with the Fair Credit Reporting Act, 97 Minn. L. Rev. 306 (Nov. 2012).
Geelan Fahimy, Comment, Liable for Your Lies: Misrepresentation Law as a Mechanism for Regulating Behavior on Social Networking Sites, 39 PEPP. L. Rev. 367 (Feb. 2012).
Martin F. Frascogna & Adrienn Karancsi, Social Media, Law, and the Practical Application Within the Entertainment Industry, 31 MISS. C. L. Rev. 299 (2012).
Elizabeth Townsend Gard & Bri Whetstone, Copyright and Social Media: A Preliminary Case Study of Pinterest, 31 Miss. C. L. Rev. 249 (2012).
Jeremy Gelms, High-Tech Harassment: Employer Liability under Title VII For Employee Social Media Misconduct, 87 WASH. L. Rev. 249 (Mar. 2012).
Deborah R. Gerhardt, Social Media Amplify Consumer Investment in Trademarks, 90 N.C. L. REV. 1491 (June 2012).
Lesli Harris, The New Old Spice: Business Identities, Trademarks, And Social Media, 31 MISS. C. L. REV. 309(2012).
Thomas Lee Hazen, Crowdfunding or Fraudfunding? Social Networks and the Securities Laws--Why the Specially Tailored Exemption Must Be Conditioned On
Meaningful Disclosure, 90 N.C. L. REV. 1735 (June 2012).
Stephen E. Henderson, Expectations of Privacy in Social Media, 31 Miss. C. L. REV. 227 (2012).
Kyle-Beth Hilfer, Minimizing Legal Risks for Clients Using Social Media to Advertise and Market Their Brands, 38 Westchester B. J., Winter/Spring 2012, at 35.
Maureen Horcher, Online Dating Regulation, 29 J. Marshall J. Computer & Info. L. 2 (2012).
Nikolei M. Kaplanov, Note, Nerdy Money: Bitcoin, the Private Digital Currency, and the Case Against its Regulation, 25 LOY. Consumer L. Rev. 111 (2012).
Kirsten M. Koepsel, Social Networks and the Uneasy Relationship with Copyright Law, Md. B.J., Nov./Dec. 2012, at 20.
Shelly Kramer, Twelve Little-Known LinkedIn Tricks, MICH. B.J., Aug. 2012, at 56.
Lou Kroeck, Cyberbullying in Pennsylvania: Student's Free Speech Rights Online, Law. J., Feb. 2012, at 5.
Uyen P. Le, Online and Linked In: "Public Morals" in the Human Rights and Trade Networks, 38 N.C.J. Int'l L. & Com. Reg. 107 (Fall, 2012).
Jyh-An Lee, First Amendment Essay: Regulating Blogging and Microblogging in China, 91 OR. L. Rev. 609 (2012).
Lili Levi, Social Media and the Press, 90 N.C. L. Rev. 1531 (June 2012).
David S. Levine, The Social Layer of Freedom of Information Law, 90 N.C. L. Rev. 1687 (June 2012).
Ariana R. Levinson, Toward a Cohesive Interpretation of the Electronic Communications Privacy Act for the Electronic Monitoring of Employees, 114 W. VA. L. REV. 461 (Winter 2012).
Ian Macduff, Using Blogs in Teaching Negotiation: A Technical and Intercultural Postscript, 28 Negotiations J. 201 (Apr. 2012).
Jason Mazzone, Facebook's Afterlife, 90 N.C. L. Rev. 1643 (June 2012).
Deborah Jones Merritt, Social Media, The Sixth Amendment, And Restyling: Recent Developments In The Federal Law of Evidence, 28 Touro L. Rev. 27, (2012).
Naomi Mezey & Cornelia T.L. Pillard, Against the New Maternalism, 18 Mich. J. Gender & L. 229 (2012).
Tristan Morales, Social Media Campaigns as an Emerging Alternative to Litigation, 38 Rutgers Computer & Tech. L.J. 35 (2012).
Alexander Naito, Comment, A Fourth Amendment Status Update: Applying Constitutional Privacy Protection to Employees' Social Media Use, 14 U. Pa. J. Const. L. 849 (Feb. 2012).
Lauren K. Neal, The Virtual Water Cooler and the NLRB: Concerted Activity in the Age of Facebook, 69 Wash. & Lee L. Rev. 1715 (Summer 2012).
Mary-Rose Papandrea, Social Media, Public School Teachers, and the First Amendment, 90 N.C. L. Rev. 1597 (June 2012).
Connie Davis Powell, Privacy For Social Networking, 34 U. Ark. Little Rock L. Rev. 689 (Summer 2012).
Ira P. Robbins, Writings on the Wall: The Need for an Authorship-Centric Approach to the Authentication of Social-Networking Evidence, 13 Minn. J.L. Sci. & Tech. 1 (Winter 2012).
Robert J. Rojas, Note, The NLRB's Difficult Journey down the Information Super Highway: A New Framework for Protecting Social Networking Activities under the NLRA, 51 Washburn L.J. 663 (Summer 2012).
Michael H. Rubin, The Social Media Thicket for Mississippi Lawyers: Surviving and Thriving in an Ethical Tangled Web, 31 Miss. C. L. Rev. 281 (2012).
Monique Sadarangani, Book Note, The Reputation Society: How Online Opinions are Reshaping the Offline World, 11 J. High Tech. L. 1 (2011-2012) (reviewing Hassan Masum & Mark Tovey).
Kristina Sherry, Comment, What Happens to Our Facebook Accounts When We Die?: Probate Versus Policy and the Fate of Social-Media Assets Postmortem, 40 Pepp. L. Rev. 185 (2012).
Miland F. Simpler, III, The Unjust "Web" We Weave: The Evolution of Social Media and its Psychological Impact on Juror Impartiality and Fair Trials, 36 Law & Psychol. Rev. 275 (2012).
Lauren B. Solberg, Regulating Human Subjects Research in the Information Age: Data Mining on Social Networking Sites, 39 N. Ky. L. Rev. 327 (2012).
Timothy D. Sparapani, Putting Consumers at the Heart of the Social Media Revolution: Toward a Personal Property Interest to Protect Privacy, 90 N.C. L. Rev. 1309 (June 2012).
Susan H. Stephan, Datamining for God: Social Media and Social Capital in a Postnational Global Market, 39 N. Ky. L. Rev. 163 (2012).
Peter Swire, Social Networks, Privacy, and Freedom of Association: Data Protection vs. Data Empowerment, 90N.C. L. Rev. 1371 (June 2012).
Nicolas P. Terry, Fear of Facebook: Private Ordering of Social Media Risks Incurred by Healthcare Providers, 90 Neb. L. Rev. 703 (2012).
Spencer Weber Waller, Antitrust and Social Networking, 90 N.C. L. Rev. 1771 (June 2012).
Paul F. Wellborn III, "Undercover Teachers" Beware: How that Fake Profile on Facebook Could Land You in the Pokey, 63 Mercer L. Rev. 697 (Winter 2012).
Jan Whittington & Chris Jay Hoofnagle, Unpacking Privacy's Price, 90 N.C. L. REV. 1327 (June 2012).
Heng Xu, Reframing Privacy 2.0 in Online Social Network, 14 U. Pa. J. Const. L. 1077 (Mar. 2012).
Decisions of Interest, Termination for Web Posts Too Harsh, 18 City L. 60 (May/June 2012).
9.4.2 Virtual Worlds William E. Arnold, Note, Tax Enforcement in Virtual Worlds--Virtually Impossible?, 40 Syracuse J. Int'l. L. & Com. 187 (Fall 2012).
Sal Humphreys & Melissa de Zwart, Griefing, Massacres, Discrimination, and Art: The Limits of Overlapping Rule Sets in Online Games, 2 UC Irvine L. Rev. 507 (2012).
Jordan L. Ludwig, Protections for Virtual Property: A modern Restitutionary Approach, 32 LOY. L.A. Ent. L. Rev. 1 (2012).
Lucille M. Ponte, Leveling Up to Immersive Dispute Resolution (IDR) In 3-D Virtual Worlds: Learning And Employing Key IDR Skills To Resolve In-World Developer-Participant Conflicts, 34 U. Ark. Little Rock L. Rev. 713 (Summer 2012).
9.5 First Amendment Concerns Ryan J. Adams, Note, An Objective Approach to Obscenity in the Digital Age, 86 St. John's L. Rev. 211 (Winter 2012).
Amy Adler, The First Amendment and the Second Commandment, 57 N.Y.L. SCH. L. Rev. 41 (2012/2013).
Marvin Ammori, The Year in First Amendment Architecture, 2012 Stan. Tech. L. Rev. 6 (2012).
Paul J. Cambria, Symposium, ICANN, the ".xxx" Debate, and Antitrust: The Adult Internet Industry's Next Challenge, 23 STAN. L. & POL'Y REV 101 (2012).
Gary K.Y. Chan, Defamation via Hyperlinks--More Than Meets the Eye, 128 Law Q. Rev. 346 (July 2012).
Ryan French, Note, Picking up the Pieces: Finding Unity after the Communication Decency Act Section 230 Jurisprudential Clash, 72 La. L. Rev. 443 (Winter 2012).
Mickey Lee Jett, Note, The Reach of the Schoolhouse Gate: The Fate of Tinker in the Age of Digital Social Media, 61 Cath. U. L. Rev. 895 (Summer 2012).
Brittany L. Kaspar, Beyond the Schoolhouse Gate: Should Schools Have the Authority to Punish Online Student Speech?, 88 CHI.-KENTL. Rev. 187 (2012).
James P. Kelly, Jr., WikiLeaks: A Guide for American Law Librarians, 104 Law Libr. J. 245 (Spring 2012).
E. Morgan Laird, Comment, The Internet and the Fall
of the Miller Obscenity Standard: Reexamining the Problem of Applying Local Community Standards in Light of a Recent Circuit Split, 52 Santa Clara L. Rev. 1503 (2012).
Christopher Lynett, Constitutional Law--Revising the Application of Tinker and Fraser in the Age of the...