Quantcast
Channel: Computing – Intellectual Property and Technology Forum
Browsing all 30 articles
Browse latest View live

WARRANTLESS SEARCH AND SEIZURE OF E-MAIL AND METHODS OF PANOPTICAL PROPHYLAXIS

A. The Fourth Amendment and the Protection of Privacy in Electronic Communications   U.S. citizens are in a constant battle for their rights to privacy, fighting the government’s increasingly pervasive...

View Article



AN ANALYSIS OF THE VIDEO GAME REGULATION HARMONIZATION EFFORT IN THE EUROPEAN...

Video games have become a prominent pastime for both children and adults in the United States (U.S.) and across the European Union (EU). [1] Today, individuals are spending more time and money on...

View Article

THE EDGE OF ETHICS IN IPARADIGMS

Abstract–In an attempt to stem a perceived rise in student plagiarism, educational institutions are increasingly turning to anti-plagiarism technologies. The use of these technological means to police...

View Article

CAN AN INTERNET REFERENCE BE A “PRINTED PUBLICATION”?

Much of the information to the public is provided by the Internet today. The Internet has also become increasingly popular among researchers who now turn to it for articles, journals, and online...

View Article

THE UNLITIGATED CASE: A STUDY OF THE LEGALITY OF GUITAR TABLATURES

Abstract–Guitar tablature Web sites have been the subject of recent cease-and-desist letters, forcing most to shut down. Litigation has been side-stepped with the arrival of new creative means to...

View Article


“INDECENT” DECEPTION: THE ROLE OF COMMUNICATIONS DECENCY ACT § 230 IN...

“[T]he Internet represents a brave new world of free speech … [it] is fundamentally different from traditional forms of mass communication in at least three important respects. First, the Internet is...

View Article

AVOID THE RAINY DAY: SURVEY OF U.S. CLOUD COMPUTING CASELAW

Cloud computing, a computer networking model that gives users on-demand access to shared software applications and data storage, [1] is becoming increasingly popular among businesses and individuals....

View Article

File Sharing: A Tool for Innovation, or a Criminal Instrument?

The dawn of peer-to-peer networks and the subsequent rise of file sharing over the Internet have proved to be a considerable threat to the revenues of the Recording Industry Association of America...

View Article


DEFENSELESS IN THE ZOMBIE INFESTED INTERNET: WHY AUDIO-VISUAL WORKS DEMAND...

Before Flash ruled the media-streaming world, and when iTunes simply did not exist, there was Monkey Island II: LeChuck’s Revenge (“Monkey Island”). Aside from its highly addictive gameplay, Monkey...

View Article


KEEP AN I ON THE SKY: E-DISCOVERY RISKS FORECASTED FOR APPLE’S ICLOUD

On February 22, and March 5, 1873, Barrett and Walton delivered to plaintiff … one hundred and forty tierces of lard, to be shipped …. On the night of March 14, while the lard was stored in defendant’s...

View Article

Is the Electronic Communications Privacy Act Constitutional: Fourth Amendment...

By: Matthew Lumpkin   History and Introduction: Interpretation of the Fourth Amendment, which protects against unreasonable searches and seizures,[1] was relatively straightforward with regard to...

View Article

Net Neutrality Rules: Title II and its Implications

By: Alexa Esposito    Introduction: On February 26th, the Federal Communications Commission (“FCC”) voted to regulate broadband Internet service as a public utility, proposing a series of “strong,...

View Article

The Trans-Pacific Partnership on Internet Service Providers: Notice,...

Abstract: With the recent release of the Trans Pacific Partnership (TPP) intellectual property chapters, jurists and pundits have quickly begun to comb through the language and pick apart the...

View Article


Obama’s Broadband Plan

Abstract: This January, President Barack Obama announced a federal government initiative to expand broadband infrastructure. Given the widespread use of technology in today’s society, the President...

View Article

The Growing Concern Regarding US Corporate Trade Secrets

Abstract: Globalization has produced many benefits for United States corporations, but a significant detraction has been the emergence of trade secret theft. As technology advances, trade secret theft...

View Article


YouTube’s ContentID Copyright Infringement Flagging System

Abstract: The idiosyncrasy of the Internet often invites colorful analogies in its description: high seas and piracy, Wild West and lawless frontier. This is not undeserved; despite great strides over...

View Article

Selfies in Court: Snapchat as Admissible Evidence

Abstract: Social media is now a widely accepted and important medium of evidence in court. Yet Snapchat, a new and popular image messaging app among the youngest generation of smartphone users...

View Article


FTC SOCIAL MEDIA ENDORSEMENT GUIDELINES: THE EFFECTS ON SOCIAL MEDIA USERS...

Abstract: In the midst of heydays of social media, a social media user will inevitably face a product or service endorsement post in his/her social media feed or thread page. However, in the...

View Article

BLOCKCHAIN AND COPYRIGHT: VAIN HOPE FOR PHOTOGRAPHERS?

Abstract: Blockchain technology has near unlimited application potential, and its influence could extend all the way to the copyright industry. For photographers, blockchain technology might serve as a...

View Article

GET OUT OF MY HEAD: AN EXAMINATION OF POTENTIAL BRAIN-COMPUTER INTERFACE DATA...

Abstract: Brain-computer interfaces (“BCI”), which interpret brain impulses and translate them into real world outputs, currently exist in a variety of forms. With the continued development of BCIs and...

View Article
Browsing all 30 articles
Browse latest View live




Latest Images