WARRANTLESS SEARCH AND SEIZURE OF E-MAIL AND METHODS OF PANOPTICAL PROPHYLAXIS
A. The Fourth Amendment and the Protection of Privacy in Electronic Communications U.S. citizens are in a constant battle for their rights to privacy, fighting the government’s increasingly pervasive...
View ArticleAN ANALYSIS OF THE VIDEO GAME REGULATION HARMONIZATION EFFORT IN THE EUROPEAN...
Video games have become a prominent pastime for both children and adults in the United States (U.S.) and across the European Union (EU). [1] Today, individuals are spending more time and money on...
View ArticleTHE EDGE OF ETHICS IN IPARADIGMS
Abstract–In an attempt to stem a perceived rise in student plagiarism, educational institutions are increasingly turning to anti-plagiarism technologies. The use of these technological means to police...
View ArticleCAN AN INTERNET REFERENCE BE A “PRINTED PUBLICATION”?
Much of the information to the public is provided by the Internet today. The Internet has also become increasingly popular among researchers who now turn to it for articles, journals, and online...
View ArticleTHE UNLITIGATED CASE: A STUDY OF THE LEGALITY OF GUITAR TABLATURES
Abstract–Guitar tablature Web sites have been the subject of recent cease-and-desist letters, forcing most to shut down. Litigation has been side-stepped with the arrival of new creative means to...
View Article“INDECENT” DECEPTION: THE ROLE OF COMMUNICATIONS DECENCY ACT § 230 IN...
“[T]he Internet represents a brave new world of free speech … [it] is fundamentally different from traditional forms of mass communication in at least three important respects. First, the Internet is...
View ArticleAVOID THE RAINY DAY: SURVEY OF U.S. CLOUD COMPUTING CASELAW
Cloud computing, a computer networking model that gives users on-demand access to shared software applications and data storage, [1] is becoming increasingly popular among businesses and individuals....
View ArticleFile Sharing: A Tool for Innovation, or a Criminal Instrument?
The dawn of peer-to-peer networks and the subsequent rise of file sharing over the Internet have proved to be a considerable threat to the revenues of the Recording Industry Association of America...
View ArticleDEFENSELESS IN THE ZOMBIE INFESTED INTERNET: WHY AUDIO-VISUAL WORKS DEMAND...
Before Flash ruled the media-streaming world, and when iTunes simply did not exist, there was Monkey Island II: LeChuck’s Revenge (“Monkey Island”). Aside from its highly addictive gameplay, Monkey...
View ArticleKEEP AN I ON THE SKY: E-DISCOVERY RISKS FORECASTED FOR APPLE’S ICLOUD
On February 22, and March 5, 1873, Barrett and Walton delivered to plaintiff … one hundred and forty tierces of lard, to be shipped …. On the night of March 14, while the lard was stored in defendant’s...
View ArticleIs the Electronic Communications Privacy Act Constitutional: Fourth Amendment...
By: Matthew Lumpkin History and Introduction: Interpretation of the Fourth Amendment, which protects against unreasonable searches and seizures,[1] was relatively straightforward with regard to...
View ArticleNet Neutrality Rules: Title II and its Implications
By: Alexa Esposito Introduction: On February 26th, the Federal Communications Commission (“FCC”) voted to regulate broadband Internet service as a public utility, proposing a series of “strong,...
View ArticleThe Trans-Pacific Partnership on Internet Service Providers: Notice,...
Abstract: With the recent release of the Trans Pacific Partnership (TPP) intellectual property chapters, jurists and pundits have quickly begun to comb through the language and pick apart the...
View ArticleObama’s Broadband Plan
Abstract: This January, President Barack Obama announced a federal government initiative to expand broadband infrastructure. Given the widespread use of technology in today’s society, the President...
View ArticleThe Growing Concern Regarding US Corporate Trade Secrets
Abstract: Globalization has produced many benefits for United States corporations, but a significant detraction has been the emergence of trade secret theft. As technology advances, trade secret theft...
View ArticleYouTube’s ContentID Copyright Infringement Flagging System
Abstract: The idiosyncrasy of the Internet often invites colorful analogies in its description: high seas and piracy, Wild West and lawless frontier. This is not undeserved; despite great strides over...
View ArticleSelfies in Court: Snapchat as Admissible Evidence
Abstract: Social media is now a widely accepted and important medium of evidence in court. Yet Snapchat, a new and popular image messaging app among the youngest generation of smartphone users...
View ArticleFTC SOCIAL MEDIA ENDORSEMENT GUIDELINES: THE EFFECTS ON SOCIAL MEDIA USERS...
Abstract: In the midst of heydays of social media, a social media user will inevitably face a product or service endorsement post in his/her social media feed or thread page. However, in the...
View ArticleBLOCKCHAIN AND COPYRIGHT: VAIN HOPE FOR PHOTOGRAPHERS?
Abstract: Blockchain technology has near unlimited application potential, and its influence could extend all the way to the copyright industry. For photographers, blockchain technology might serve as a...
View ArticleGET OUT OF MY HEAD: AN EXAMINATION OF POTENTIAL BRAIN-COMPUTER INTERFACE DATA...
Abstract: Brain-computer interfaces (“BCI”), which interpret brain impulses and translate them into real world outputs, currently exist in a variety of forms. With the continued development of BCIs and...
View Article
More Pages to Explore .....