12,366 research outputs found

    Creating a Market Economy in Eastern Europe: The Case of Poland

    Get PDF
    macroeconomics, market economy, Eastern Europe, Poland

    Prospects for Russia's Economic Reforms

    Get PDF
    macroeconomics, Russia, Economic Reforms

    The DRM Dilemma: Re-Aligning Rights Under the Digital Millennium Copyright Act

    Get PDF
    The Digital Millennium Copyright Act (‘DMCA’) prevents unauthorized copying and distribution of digital copyright works by regulating devices that can be used to circumvent Digital Rights Management (‘DRM’) measures that are used to restrict access to those works. A significant problem is that those devices, like many new technologies, have the potential to be used for both socially harmful and socially beneficial purposes. There is no obvious way for Congress to regulate circumvention devices to prevent the social harms, while at the same time facilitating the social benefits they might provide. Recent judicial interpretations of the DMCA have unsurprisingly erred on the side of harm-prevention to the detriment of potentially legitimate uses of circumvention devices. Unlike previous scholarship, this article suggests that the answer to this dilemma is not necessarily to amend the DMCA to bolster legitimate use exceptions to the anti-circumvention provisions. Instead, this article advocates resolving the problem through a new approach that takes socially beneficial uses of circumvention technologies outside the scope of the DMCA altogether. The idea is to create a new administrative complaints mechanism that would support those seeking to make such uses of digitally encrypted copyright works by imposing legal obligations on copyright holders to facilitate those uses. This approach has the added benefit of generating a significant amount of data about emerging social norms relating to the boundaries of the fair use doctrine that could be fed back into legislative and judicial processes as copyright law develops in the future

    Copyright’s Twilight Zone: Digital Copyright Lessons from the Vampire Blogosphere

    Get PDF
    Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright works, or engaging in acts of digital copyright piracy and plagiarism. As online conduct becomes more interactive, copyright laws are less effective in creating clear signals about proscribed conduct. This article examines the application of copyright law to Web 2.0 technologies. It suggests that social norms must take on greater significance because of the community-oriented nature of much of today’s online conduct. Social norms are significant both as a form of social regulation and because they can guide law and policy makers about appropriate new directions for copyright law reform. This article focuses on four case studies involving the popular Twilight book and movie franchise. These case studies illuminate the relationship between copyright norms and laws in the Web 2.0 context. The author draws lessons from the case studies that might inform future developments in copyright law and policy that would better align laws with expectations of Web 2.0 participants. Twilight is chosen as the focal point because of the complex online relationships that have developed in recent years between the various copyright stakeholders: the book author; movie directors; producers and distributors of the books and movies; actors and production crews; and, the fans

    Repairing Online Reputation: A New Multi-Modal Regulatory Approach

    Get PDF
    In today’s interconnected digital society, high profile examples of online abuses abound. Cyberbullies launch attacks on the less powerful, often significantly damaging victims’ reputations. Outside of reputational damage, online harassment, bullying and stalking has led to severe emotional distress, loss of employment, physical assault and even death. Recent scholarship has identified this phenomenon but has done little more than note that current laws are ineffective in combating abusive online behaviors. This article moves the debate forward both by suggesting specific reforms to criminal and tort laws and, more importantly, by situating those reforms within a new multi-modal framework for combating online abuses and protecting victims’ online reputations. This new approach advocates a combination of enhanced public education initiatives, enhanced access to effective reputation defense services, the development of more pro-bono reputation defense services, reporting hotlines, appropriate social norms, and industry self-regulation strategies. The aim of the multi-modal framework is to use the law and other methodologies to facilitate the development of a more civil and accountable global online society

    Copyrighting Twilight : Digital Copyright Lessons from the Vampire Blogosphere

    Get PDF
    In January of 2010 a United States District Court granted an injunction against a Twilight fan magazine for unauthorized use of copyrighted publicity stills . No surprise there. Intellectual property laws deal effectively – some would argue too effectively – with such cases. Nevertheless, recent Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright works, or engaging in acts of digital copyright piracy and plagiarism. As online conduct becomes more interactive, copyright laws are less effective in creating clear signals about proscribed conduct. This article examines the application of copyright law to Web 2.0 technologies. It suggests that social norms must take on greater significance because of the community-oriented nature of much of today’s online conduct. The discussion is organized around four case studies based on the popular Twilight book and movie franchise. These case studies illuminate the relationship between copyright norms and laws in the Web 2.0 context. The author draws lessons from these case studies that might inform future developments in copyright law and policy that would better align laws with expectations of Web 2.0 participants. Twilight is chosen as the focal point because of the complex online relationships that have developed in recent years between the various copyright stakeholders: the book author; movie directors; producers and distributors of the books and movies; actors and production crews; and, the fans

    “We, the Paparazzi”: Developing a Privacy Paradigm for Digital Video

    Get PDF
    In January 2009, the Camera Phone Predator Alert bill was introduced into Congress. It raised serious concerns about privacy rights in the face of digital video technology. In so doing, it brought to light a worrying gap in current privacy regulation – the lack of rules relating to digital video privacy. To date, digital privacy regulation has focused on text records that contain personal data. Little attention has been paid to privacy in video files that may portray individuals in inappropriate contexts, or in an unflattering or embarrassing light. As digital video technology, including inexpensive cellphone cameras, is now becoming widespread in the hands of the public, the regulatory focus must shift. Once a small percentage of online content, digital video is now appearing at an exponential rate. This is largely due to the growth of online social networking platforms such as YouTube and Facebook. Sharing video online has become a global phenomenon, while the lack of effective privacy protection for these images has become a global problem. Digital video poses four distinct problems for privacy, arising from: de-contextualization, dissemination, aggregation, and permanency of video information. While video shares some of these attributes with text, its unique qualities necessitate a separate study of video privacy regulation. This article identifies a rationale for, and critiques suggested approaches to, digital video privacy. It argues that legal regulation, without more, is unlikely to provide necessary solutions. Instead, it advocates a new multi-modal approach consisting of a matrix of legal rules, social norms, system architecture, market forces, public education, and non-profit institutions

    Ph.D. Lite : A New Approach to Teaching Scholarly Legal Writing

    Get PDF
    Most American law schools require the satisfaction of an upper level writing requirement, usually in the form of a seminar paper, or “Note”, for graduation. The problem for many students is that the J.D. is not generally geared towards learning scholarly writing. In recent years, the author has experimented with reformulating a seminar class as a “writing workshop” in order to focus on the scholarly writing process. In so doing, she has drawn from experiences supervising legal research degrees in other countries where research-based LL.M. degrees and Ph.D. degrees in law are the norm. This essay details her approach – effectively a condensed version of the training for a Ph.D. in lawthat might be called “Ph.D Lite”. The aim is to better train students in the scholarly writing endeavor. The approach seems to elicit better results in terms of student research and writing, as well as student engagement

    Who Owns Hillary.com ? Political Speech and the First Amendment in Cyberspace

    Get PDF
    In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? This Article examines the large gaps and inconsistencies in current domain name law and policy as to domain name use in the political context. Current domain name policy focuses on protecting trademark uses of domain names against bad faith commercial cybersquatters. It does not deal with protecting important uses of domain names as part of the political process. This Article identifies the current problems with Internet domain name policy in the political context and makes recommendations for developing clearer guidelines for uses of political domain names. In so doing, it creates a new categorization system for different problems confronting the political process in cyberspace, including: (a) socially and economically wasteftil political cybersquatting ; (b) political cyberfraud, which might involve conduct such as registering a politician\u27s name as a domain name to promulgate a misleading message about the politician; and (c) competition between politicians\u27 names and competing trademark interests

    Smile, You\u27re on Cellphone Camera! : Regulating Online Video Privacy in the MySpace Generation

    Get PDF
    In the latest Batman movie, Bruce Wayne’s corporate right hand man, Lucius Fox, copes stoically with the death and destruction dogging his boss. Interestingly, the last straw for him is Bruce’s request that he use digital video surveillance created through the city’s cellphone network to spy on the people of Gotham City in order to locate the Joker. Does this tell us something about the increasing social importance of privacy, particularly in an age where digital video technology is ubiquitous and largely unregulated? While much digital privacy law and commentary has focused on text files containing personal data, little attention has been paid to privacy interests in video files that may portray individuals in an unflattering or embarrassing light. As digital video technology is now becoming widespread in the hands of the public, this focus needs to shift. Once a small percentage of online content, digital video images are now appearing online at an exponential rate. This is largely due to the growth of online video sharing services such as YouTube, MySpace, Flickr, and Facebook. The sharing of images online is now a global phenomenon – as is the lack of explicit legal protection for privacy rights in these images. This article examines the extent to which we do, or should, have privacy rights in digital video content. It then considers the most effective approach for regulating online video privacy. It suggests that pure legal regulation, without more, is unlikely to be up to the task. Instead, a combination of regulatory modalities will be required to effectively protect privacy interests in digital video files. These modalities will likely include the four regulatory modalities previously identified by Professor Lawrence Lessig: legal rules, social norms, system architecture, and market forces. Additionally, new regulatory modalities may need to be developed. These might include public education and non-profit institutions recognized in a regulatory role
    • 

    corecore