Skip to main contentdfsdf

Hermes Draper's List: Digital Law Research Topic

  • Statement # 1

    Digital Law has a strong influence in our society.

  • Oct 13, 13

    Connection to the article: McGill Law Journal ~ Revue de droit de McGill
    ----EYES ON THE HORIZON----

    Content (12-15)
    Credibility (14-15)
    Critical Thinking (10-15)
    Copyright (15-15)
    Citation (15-15)
    Continuity (14-15)
    Censorship (13-15)
    Connectivity (15-15)
    Comparability (14-15)
    Context (13-15)

      • The Internet is a dynamic medium, forever changing, but paradoxically,
        it never forgets—as unfortunate victims of identity theft discover when
        they try to repair their credit. Once posted, information cannot be recalled,
        since copies can be proliferated beyond any ability to find all of
        them, making it impossible both to ever correct bad information and to
        have confidence that citation to materials will be stable.

      • This “lack of authoritativeness
        and durability effectively cripples the Internet’s ability to tell courts anything
        of real substance about the reality it purports to depict.”5

    3 more annotations...

  • Oct 13, 13

    Connection to the article: HIGH-TECH FORENSICS

    Content (8-15)
    Credibility (13-15)
    Critical Thinking (12-15)
    Copyright (15-15)
    Citation (15-15)
    Continuity (6-15)
    Censorship (14-15)
    Connectivity (12-15)
    Comparability (13-15)
    Context (11-15)

      • The average officer receives little or no instruction in computer forensics during training at the Police Academy. Local digital forensics labs tend to be staffed by detectives who have been assigned to a high- tech crime unit with limited specialized preparation.

      • Clearly, if electronic evidence is to be used in developing criminal cases, there is a need for law enforcement to explore differ- ent paradigms for processing it.

    5 more annotations...

  • Oct 14, 13

    Connection to the article: Harassment through the Digital Medium
    A Cross-Jurisdictional Comparative Analysis on the Law on Cyberstalking

    Content (15-15)
    Credibility (14-15)
    Critical Thinking (15-15)
    Copyright (15-15)
    Citation (15-15)
    Continuity (15-15)
    Censorship (14-15)
    Connectivity (14-15)
    Comparability (13-15)
    Context (13-15)

      • The cyber world is an extension of the real world. It is another dimension where we can work, study and play. But people also tend to lose their inhibitions on the Internet, often while keeping their anonymity. Because of the perceived and real freedoms in the digital environment, people are emboldened to act in ways that they may not normally do in the real world. One recent phenomenon that is steadily becoming a problem in every country with a high level of electronic connectivity is the act of cyberstalking.

      • Hence, cyberspace affords lesser impediments to aggressive behaviour. The borderless nature of electronic communications medium, concomitant jurisdictional concerns and the unique challenges posed to computer forensics such as the collection of evidence and investigations also arise as relevant issues in this context. Cyberstalking has become a concern that has translated into law in larger and more technologically- matured jurisdictions such as the United States, the United Kingdom, Canada, Australia, Japan and even in a small country like Singapore.

    5 more annotations...

  • Statement # 2

    Digital Law has a strong influence on an individuals actions will using digital media.

  • Oct 14, 13

    Connection to the article: DIGITAL MULTI-MEDIA AND THE LIMITS OF PRIVACY LAW

    Content (15-15)
    Credibility (15-15)
    Critical Thinking (15-15)
    Copyright (15-15)
    Citation (13-15)
    Continuity (10-15)
    Censorship (12-15)
    Connectivity (13-15)
    Comparability (11-15)
    Context (13-15)

      • While digital video and multi-media technologies are becoming increasing- ly prevalent, existing privacy laws tend to focus on text-based personal records. Individuals have little recourse when concerned about infringe- ments of their privacy interests in audio, video, and multi-media files. Often people are simply unaware that video or audio records have been made. Even if they are aware ofthe existence ofthe records, they may be unaware of potential legal remedies or unable to afford legal recourse.

      • t focuses on an analysis ofthe European Union Data Protection Directive. The Directive is one ofthe most comprehensive digital age legal reforms to address information privacy. Yet even the Directive suffers from shortcomings when applied to audio, video, and multi-media records. The author argues that global law reform is needed to bring privacy law into the age of digital video and multi-media.

    11 more annotations...

  • Oct 14, 13

    Connection to the article: Copyright and You
    "Warez" the Copyright Violation? Digital Copyright Infringement:
    Legal Loopholes and Decentralization

    Content (10-15)
    Credibility (11-15)
    Critical Thinking (13-15)
    Copyright (15-15)
    Citation (15-15)
    Continuity (13-15)
    Censorship (15-15)
    Connectivity (14-15)
    Comparability (13-15)
    Context (10-15)

      • Enforcement of digital copy- right violations are continually thwart- ed by the large population of users who participate in online file sharing and the rapid technological innova- tion that usually keeps the file-shar- ing community one-step ahead of the law (Wright, 2006). 

      • The word warez [pronounced as a single syllable as if the plural of “ware”
        as in software] is a generic term used to refer to copyrighted materials that are shared illegally over the Internet (Goldman, 2004). Taking the form of an executable file (.exe or .app) or other digitally encoded form (e.g., .mp3, .jpg, or .mpg file), warez generally consist of commercially available computer soft- ware, audio and video, video games, still pictures, as well as just about any- thing else that can be packaged and delivered over the Internet (e.g., books, pornography).

    10 more annotations...

  • Oct 15, 13

    Connection to the article: What's Wrong with U.S.?: Why the
    United States Should Have a Public
    Performance Right for Sound
    Recordings

    Content (13-15)
    Credibility (12-15)
    Critical Thinking (11-15)
    Copyright (14-15)
    Citation (14-15)
    Continuity (12-15)
    Censorship (14-15)
    Connectivity (15-15)
    Comparability (14-15)
    Context (11-15)

      • Radio and television stations currently pay the
        performing rights societies a royalty for playing the sound recordings, but they do not pay a performance royalty to the artists who perform the music and record companies that promote and release the sound recordings. Proposed legislation will add a performance royalty for artists and record companies to the current royalty scheme while not reducing the current royalty paid to the songwriters. 

      • Prior to 1972,i2 there was no federal statutory copyright protection for sound recordings.'^ The original reason for the lack of protection stemmed from the requirement that copyrightable material be visually perceptible.i

    5 more annotations...

  • Statement # 3

    Digital Law can sometimes have the ability to violate a citizen's rights such as the violation of privacy.

  • Oct 15, 13

    Connection to the article: WATCHING OURSELVES
    Video surveillance, urban space and
    self-responsibilization

    Content (13-15)
    Credibility (14-15)
    Critical Thinking (14-15)
    Copyright (15-15)
    Citation (15-15)
    Continuity (14-15)
    Censorship (14-15)
    Connectivity (13-15)
    Comparability (12-15)
    Context (15-15)

      • The war on terror declared by the US government shortly after the terrorist attacks of September 11, 2001 includes a series of initiatives ranging from direct military action in Afghanistan to anti-terrorism legislation and federal programs aimed at strengthening homeland security. Among the latter, the PATRIOT Act seeks to deter and capture terrorists in the United States and around the world by enhancing law enforcement investigative tools,1 whereas Total Information Awareness and various other federal programs harness information and surveillance technologies to combat terrorism.

      • After September 11, a wide array of entities turned to video surveillance technology (among other security initiatives) to thwart terrorist attacks in airports, public streets and squares, and landmark locations. In tandem with demands for stricter security measures, law enforcement officials, transporta- tion agencies, city councils, and public/private partnerships installed new surveillance systems or expanded existing ones by increasing the number of cameras, integrating them with face recognition software, or putting them in new locations.

    7 more annotations...

  • Oct 15, 13

    Connection to the article: CONSTITUTIONALSM - REFORM ON DATA PROTECTION
    LAW AND HUMAN RIGHTS

    Content (15-15)
    Credibility (14-15)
    Critical Thinking (14-15)
    Copyright (15-15)
    Citation (14-15)
    Continuity (13-15)
    Censorship (15-15)
    Connectivity (14-15)
    Comparability (12-15)
    Context (14-15)

      • The privacy1 is one of the fundamental human rights established in to many constitutive acts, in UN Declaration of Human Rights2, the International3 Convention on Civil and Political Rights and in the Albanian Constitution.

      • According to the Albanian Constitution these international legal acts adopted by law stands above the domestic laws at the hierarchy of legal acts. 

    9 more annotations...

  • Oct 15, 13

    Connection to the article: Privacy rights in the classroom: peer
    grading Supreme Court judgment 2002

    Content (11-15)
    Credibility (12-15)
    Critical Thinking (12-15)
    Copyright (13-15)
    Citation (14-15)
    Continuity (13-15)
    Censorship (13-15)
    Connectivity (14-15)
    Comparability (13-15)
    Context (14-15)

      • The United States Supreme Court ruled unanimously in the case of Owasso Independent School District v. Falvo that the practice of students grading each other’s work and then calling out the marks does not violate the Family Education Rights and Privacy Act (FERPA) 1974. 

      • In a keenly awaited decision the U.S. Supreme Court ruled unanimously in the case of Owasso Independent School Dist. v. Falvo, 20021 that peer grading and pupils calling out other pupils grades/marks do not violate federal privacy laws. The case generated a great deal of concern and discussion throughout the United States since the Tenth Circuit Court of Appeals in Falvo v. Owasso Independent School District, 20002 ruled that the common practice of allowing primary school pupils to grade fellow pupils’ work and call out their marks to the teacher violated the Family Education Rights and Privacy Act 1974 (or FERPA) 20. U.S.C. Section 1232.

    3 more annotations...

  • Statement #4

    Digital Law is slowly winning it's war on software piracy.

  • Oct 15, 13

    Connection to the article: Internet Software Piracy in China:
    A User Analysis of Resistance to Global
    Software Copyright Enforcement

    Content (14-15)
    Credibility (14-15)
    Critical Thinking (14-15)
    Copyright (15-15)
    Citation (14-15)
    Continuity (13-15)
    Censorship (13-15)
    Connectivity (11-15)
    Comparability (12-15)
    Context (15-15)

      • China’s entry into the global networked society has raised considerable debate over what is derived from the development and expansion of information and communication technologies (ICTs). One of the hotly debated issues is Internet copyright piracy, which is critical to the credibility and stability of China’s membership to the global networked society. This paper examines Chinese users’ online discussion about Internet software piracy as local resistance to global copyright enforcement exercised through globalization processes.

      • Meanwhile, these resistance positions are integrated under the notion of Chinese nationalism to constitute a complete set of counter-discourses to global software copyright enforcement.

    8 more annotations...

  • Oct 15, 13

    Connection to the article: Ripped from the Headlines: What
    can the Popular Press Teach
    us about Software Piracy?

    Content (11-15)
    Credibility (13-15)
    Critical Thinking (12-15)
    Copyright (13-15)
    Citation (12-15)
    Continuity (11-15)
    Censorship (13-15)
    Connectivity (11-15)
    Comparability (10-15)
    Context (14-15)

      • Software piracy is an instance of unautho- rized duplication of information goods where laws and norms are not agreed-upon. 

      • An expanded version of Sykes and Matza’s (American Sociological Review 22, 664–670, 1957); Zamoon and Curley (Working paper, Kuwait University, Kuwait, 2007) neutralization framework is applied to analyze the content of the articles. We found that rationales condoning piracy showed a more balanced use of neutralization ap- proaches, and less moral intensity toward the behavior. In contrast, rationales condemning piracy mostly promoted the injury aspect of software piracy, and suggested higher moral intensity. 

    7 more annotations...

  • Oct 15, 13

    Connection to the article: Digital Piracy: A Competitive Analysis

    Content (15-15)
    Credibility (15-15)
    Critical Thinking (15-15)
    Copyright (15-15)
    Citation (14-15)
    Continuity (12-15)
    Censorship (14-15)
    Connectivity (11-15)
    Comparability (13-15)
    Context (15-15)

      • In recent years, the issue of copyright protection for intellectual properties such as computer software, music CDs, and videos has become increasingly important. It is often claimed that illegal copying of intellectual property costs companies billions of dollars in lost revenues and reduces firms' incentives to innovate. Some researchers have shown that copying can be beneficial to firms when there are strong network effects and copy- ing expands the market.

      • This is because weaker copyright protection enables firms to reduce price competition by allowing price-sensitive consumers to copy. Thus, weaker copyright protection can serve as a coordination device to reduce price compe- tition. We also examine how equilibrium copyright enforcement is affected by network externalities. In contrast to previous research, we show that strong network effects can sometimes lead to a firm choosing higher lev- els of copyright protection.

    7 more annotations...

  • Statement # 5

    Digital Law and what the future hold for a United State Citizen.

  • Oct 15, 13

    Connection to the article: DIGITAL MEDIA INNOVATION AND THE APPLE IPAD:
    THREE PERSPECTIVES ON THE FUTURE
    OF COMPUTER TABLETS AND NEWS DELIVERY

    Content (13-15)
    Credibility (14-15)
    Critical Thinking (13-15)
    Copyright (14-15)
    Citation (12-15)
    Continuity (13-15)
    Censorship (14-15)
    Connectivity (14-15)
    Comparability (13-15)
    Context (15-15)

      • Today, the combination of news information on the Internet coupled with the ease and access of posting news information and blog commentary has fundamentally challenged the economic business model for newspaper and magazine production on a worldwide basis. This paper will look at the state of the newspaper industry and will consider the role of the Internet (and digital media) as both a major cause of the problems now faced by today's newspaper industry as well as its potential solution.

      • In his book, Megatrends, author John Naisbitt (1982) said that the problem with the 19th century train industry was a failure to ask the question; what business are you really in? Naisbitt contends that many industrialists at the time incorrectly saw themselves in the train business rather than the future of transportation. 

    11 more annotations...

  • Oct 15, 13

    Connection to the article: The Scholarly Communication of the Future: From
    Book Information to Problem Solving

    Content (14-15)
    Credibility (15-15)
    Critical Thinking (14-15)
    Copyright (15-15)
    Citation (12-15)
    Continuity (13-15)
    Censorship (13-15)
    Connectivity (14-15)
    Comparability (12-15)
    Context (15-15)

      • As long as scientists discuss scientific problems and communicate with each other, scholarly communication is an essential part of scientific activities. In the very ancient time the scholarly communication was only an oral tradition, a face to face communication. Later on, the written form of communication has taken place. Since the invention of movable printing types by Gutenberg the scholarly communication was preferable in written and printed form.

      • In the future the tra- ditional printed book information for scientific communication will be replaced by problem solving portals with all electronic and digital tools.

    10 more annotations...

  • Oct 15, 13

    Connection to the article: Extended Self in a Digital World

    Content (13-15)
    Credibility (14-15)
    Critical Thinking (15-15)
    Copyright (14-15)
    Citation (14-15)
    Continuity (15-15)
    Censorship (14-15)
    Connectivity (12-15)
    Comparability (11-15)
    Context (10-15)

      • Twenty-five years ago, when Belk (1988) presented the concept of the extended self, there were already personal computers. But there were no web pages, online games, search engines, virtual worlds, social media, Internet, e-mail, smart phones, MP-3 players, or digital cameras. Today, with these and other digital technologies, the possibilities for self-ex- tension have never been so extensive. 

      • This conceptualization begins with a brief review of the original formulation of the extended self. Five changes emerging from our current digital age are then presented: (1) Dematerialization, (2) Reembodiment, (3) Sharing, (4) Co-construction of Self, and (5) Distributed Memory. These changes are assessed in terms of implications for our understanding of the self, the nature of possessions, and our relationships with things in a digital world.

    9 more annotations...

1 - 20 of 20
20 items/page
List Comments (0)