Federal Communications Law Journal

Trade journal covering communications law. Published in cooperation with the Indiana University School of Law, Bloomington.

Articles from Vol. 64, No. 3, May

An End to End-to-End? A Review Essay of Barbara Van Schewick's Internet Architecture and Innovation
Barbara van Schewick's Internet Architecture and Innovation surveys broad areas of computer engineering and economic theory to argue that some types of network neutrality regulation may be necessary to optimize innovation. My central critique of her...
BART Cell Phone Service Shutdown: Time for a Virtual Forum?
I. INTRODUCTION II. BART CELL PHONE SERVICE SHUTDOWN A. Overview B. BART's Response and New Policy C. FCC Review III. BACKGROUND A. The Communications Act of 1934 1. Overview 2. Blocking and Jamming Signals B. The First Amendment ...
Behavioral Advertising: The Cryptic Hunter and Gatherer of the Internet
I. INTRODUCTION II. ONLINE BEHAVIORAL ADVERTISING A. Targeting B. Retargeting C. What is FetchBack? III. HOW USERS ARE TARGETED A. The Type of Information Gathered B. How that Information Is Gathered. IV. THE PROBLEMS WITH BEHAVIORAL TARGETING ...
Editor's Note
Welcome to the third and final Issue of the sixty-fourth Volume of the Federal Communications Law Journal, the nation's premier communications law journal and the official journal of the Federal Communications Bar Association. On behalf of the Volume...
Law and the Open Internet
I. INTRODUCTION II. ECONOMIC ANALYSIS DOES NOT PROVIDE POLICY GUIDANCE A. Is Vertical Foreclosure the Right Lens for Network Openness? B. Is Foreclosure a Reasonable Concern? 1. The Single Monopoly Rent Theorem, Vertical ...
Reforming Retransmission Consent
I. INTRODUCTION II. RETRANSMISSION CONSENT III. THE CURRENT DISPUTE: WHAT EACH PARTY WANTS A. Cable Providers B. Broadcasters C. Consumers IV. POSSIBLE SOLUTIONS A. FCC Proposals 1. Improving Good Faith Standards 2. Revision...
Should Cyber Exploitation Ever Constitute a Demonstration of Hostile Intent That May Violate UN Charter Provisions Prohibiting the Threat or Use of Force?
I. INTRODUCTION II. CYBER ATTACK AND CYBER EXPLOITATION A. Difference Between Cyber Attacks and Cyber Exploitations Generally B. Comparison of Cyber Attacks and Cyber Exploitations III. LOAC AND THE UN CHARTER A. Laws That Apply...
The FCC's Sponsorship Identification Rules: Ineffective Regulation of Embedded Advertising in Today's Media Marketplace
I. INTRODUCTION II. EMBEDDED ADVERTISING: DEFINING THE PHENOMENON III. DEVELOPMENT OF EMBEDDED ADVERTISING: A MAJOR SHIFT IN THE ADVERTISING MAINSTREAM IV. SPONSORSHIP IDENTIFICATION REGULATION AND ITS CURRENT INABILITY TO REGULATE ...
WikiLeaks and the First Amendment
I. INTRODUCTION II. NATIONAL SECURITY AND FREE SPEECH III. THE DILEMMA IV. THE RIGHTS OF PUBLIC EMPLOYEES V. THE RIGHT TO DISSEMINATE INFORMATION VI. CONCLUSION I. INTRODUCTION After the controversy over WikiLeaks erupted, (1) members of Congress...
Author Advanced search

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.