105 research outputs found

    Privacy as a Public Good

    Get PDF
    Privacy is commonly studied as a private good: my personal data is mine to protect and control, and yours is yours. This conception of privacy misses an important component of the policy problem. An individual who is careless with data exposes not only extensive information about herself, but about others as well. The negative externalities imposed on nonconsenting outsiders by such carelessness can be productively studied in terms of welfare economics. If all relevant individuals maximize private benefit, and expect all other relevant individuals to do the same, neoclassical economic theory predicts that society will achieve a suboptimal level of privacy. This prediction holds even if all individuals cherish privacy with the same intensity. As the theoretical literature would have it, the struggle for privacy is destined to become a tragedy. But according to the experimental public-goods literature, there is hope. Like in real life, people in experiments cooperate in groups at rates well above those predicted by neoclassical theory. Groups can be aided in their struggle to produce public goods by institutions, such as communication, framing, or sanction. With these institutions, communities can manage public goods without heavy-handed government intervention. Legal scholarship has not fully engaged this problem in these terms. In this Article, we explain why privacy has aspects of a public good, and we draw lessons from both the theoretical and the empirical literature on public goods to inform the policy discourse on privacy

    Cracks in the Foundation: The New Internet Legislation\u27s Hidden Threat to Privacy and Commerce

    Get PDF
    Scholarship to date has focused on the legal significance of the novelty of the Internet. This scholarship does not describe or predict actual Internet legislation. Instead of asking whether the Internet is so new as to merit new law, legislators and academics should re-evaluate the role of government in orchestrating collective action and change the relative weight of enforcement, deterrence, and incentives in Internet regulations. A perfect example of the need for this new approach is the recent CANSPAM Act of 2003, which was intended to protect personal privacy and legitimate businesses. However, the law threatens both of these interests, because it does not recognize either the limits of enforceability, or the enhanced possibilities for incentives offered by the decentralized architecture of the Internet

    To Err Is Human: The Judicial Conundrum of Curing Apprendi Error

    Get PDF

    Digital Property Cycles

    Full text link
    The present downturn in non-fungible token (“NFT”) markets is no cause for immediate alarm. There have been multiple cycles in both the legal and media focus on digital intangible property, and these cycles will recur. The cycles are easily explainable: demand for intangible property is constant, even increasing. The legal regimes governing ownership of these assets are unstable and poorly suited to satisfying the preferences of buyers and sellers. The combination of demand and poor legal regulation gives rise to the climate of fraud that has come to characterize NFTs, but it has nothing to do with the value of the technology, the legitimacy of the demand to own intangible property, or even the value of the assets themselves. Rather, fraud and exploitation are entirely avoidable and predictable outcomes of a situation in which buyers and sellers value assets highly but enjoy little to no protection of their interest in their investment. The solution is not more public service announcements indicating that all NFTs are fraudulent; this is neither true nor to the point. Rather, the only solution is to vindicate investor and purchaser rights in intangible property, so that the legitimate demand for intangible property is channeled into the regular economy instead of gray markets

    Virtual Property

    Get PDF
    This article explores three new concepts in property law. First, the article defines an emerging property form - virtual property - that is not intellectual property, but that more efficiently governs rivalrous, persistent, and interconnected online resources. Second, the article demonstrates that the threat to high-value uses of internet resources is not the traditional tragedy of the commons that results in overuse. Rather, the naturally layered nature of the internet leads to overlapping rights of exclusion that cause underuse of internet resources: a tragedy of the anticommons. And finally, the article shows that the common law of property can act to limit the costs of this internet anticommons

    The Search Interest in Contract

    Get PDF
    Parties often do not negotiate for contract terms. Instead, parties search for the products, terms, and contractual counterparties they desire. The traditional negotiation-centered view of contract leads courts to try to determine the meaning of the parties where no meaning was negotiated and to waste time determining the benefits of bargains that were never struck. Further, while courts have ample tools to validate specifically negotiated contract terms, they lack the tools to respond to searched-for terms. Although the law and literature have long recognized that there is a disconnect between the legal fictions of negotiation and the reality of contracting practice, no theory has emerged to replace fictional negotiation.Therefore, this Article develops a new search-oriented theory of contract and shows that search theory can explain contracting behavior where the fictions of negotiation fail. This Article then applies search theory to the common law of contract, the Uniform Commercial Code, and the growing world of Internet searches and electronic contracting

    Bitproperty

    Full text link
    Property is the law of lists and ledgers. County land records, stock certificate entries, mortgage registries, UCC filings on personal property, United States Copyright and Patent registries of interests in intellectual property, bank accounts, domain name systems, and consumers’ Kindle eBook collections in the cloud — all are merely entries in a list, determining who owns what.Each such list has suffered under a traditional limitation. To prevent falsification or duplication, a single entity must maintain the list, and users must trust (and pay) that entity. As a result, transactions must proceed at significant expense and delay. Yet zero or near-zero expense is the fuel of internet scalability. Until technologies get cheap and fast enough, they cannot benefit from the full power of the internet. Property transactions have not yet truly seen an internet revolution because they are constrained by the cost of creating centralized trusted authorities.This article retheorizes the contours of digital property if that central constraint were removed. There is every reason to believe it can be. A spate of interest in cryptocurrencies has driven the development of a series of technologies for creating public, cryptographically secure ledgers of property interests that do not rely on trust in a specific entity to curate the list. Previously, the digital objects that users could buy and sell online were not rivalrous in the same way as offline physical objects, unless some centralized entity such as a social network, digital currency issuer, or game company served the function of trusted list curator. Trustless public ledgers change this dynamic. Counterparties can hand one another digital, rivalrous objects in the same way that they used to hand each other gold bars or dollar bills. No intermediary or curator is needed.Trustless public ledgers can help to reshape property law online. They offer the kind of near-zero transaction costs that have provoked radical disruptive innovation across the internet. With near-zero transaction costs, online property transactions can finally benefit from the huge scaling effects of internet technologies.In addition, the advent of this disruptive technology provides an opportunity to more deeply theorize property interests in information environments. Property online is anemic. Consumers control few online resources and own even less. This is in no small part due to antiquated notions of property as the law of physical, tangible resources. With the advent of new technology that can create digital, scarce, and rival intangible assets, these basic assumptions should be reexamined, discarded, and replaced with a theory of property as an information communication and storage system. That is the project of this piece

    Avatar Experimentation: Human Subjects Research in Virtual Worlds

    Full text link
    Researchers love virtual worlds. They are drawn to virtual worlds because of the opportunity to study real populations and real behavior in shared simulated environments. The growing number of virtual worlds and population growth within virtual worlds has led to a sizeable increase in the number of human subjects experiments taking place in such worlds. Virtual world users care deeply about their avatars, their virtual property, their privacy, their relationships, their community, and their accounts. People within virtual worlds act much as they would in the physical world because the experience of the virtual world is “real” to them. The very characteristics that make virtual worlds attractive to researchers complicate ethical and lawful research design. The same principles govern research in virtual worlds and the physical world. However, the change in context can cause researchers to lose sight of the fact that virtual world research subjects may suffer very real harm to property, reputation, or community as the result of flawed experimental design. Virtual world research methodologies that fail to consider the validity of users’ experiences risk harm to research subjects. This Article argues that researchers who put subjects’ interests in danger run the risk of violating basic human subjects research principles. Although hundreds of articles and studies examine virtual worlds, none have addressed the interplay between the law and best practices of human subjects research in those worlds. This Article fills that gap. Virtual worlds are valuable research environments precisely because the relationships and responses of users are measurably real. This Article concludes that human subjects researchers must protect the very real interests of virtual worlds inhabitants in their property, community, privacy, and reputations

    To Err is Human: The Judicial Conundrum of Curing Apprendi Error

    Full text link
    Not available
    • …
    corecore