Articles

Censoring Hate Speech In Cyberspace: A New Debate in a New America

Volume 3, Issue 1 (Jun 2012)

Following the tragic events which occurred in the United States on September 11, 2001, the threat of violence due to hate-based ideas and values has become a pressing reality. Americans have been forced to question whether hate-filled online rhetoric is simply the harmless exercise of free speech or is a preventable catalyst of illegal conduct.

Download Full Text PDF

Edgar Burch, Comment, Censoring Hate Speech In Cyberspace: A New Debate in a New America, 3 N.C. J.L. & Tech. 175 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/11_3NCJLTech1752001-2002.pdf.

Can Facial Recognition Technology Be Used To Fight the New War Against Terrorism?: Examining the Constitutionality of Facial Recognition Surveillance Systems

Volume 3, Issue 1 (Jun 2012)

Because Americans live in one of the most technologically advanced societies, our lives have already been monitored and our freedoms constrained by highly intrusive means. Employers can legally monitor their employees’ e-mails, and automobile drivers can be issued traffic tickets with the use of video cameras attached to stoplights. This comment will focus on one

Download Full Text PDF

Kanya A. Bennett, Comment, Can Facial Recognition Technology Be Used To Fight the New War Against Terrorism?: Examining the Constitutionality of Facial Recognition Surveillance Systems, 3 N.C. J.L. & Tech. 151 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/10_3NCJLTech1512001-2002.pdf.

America’s Anti-hijacking Campaign — Will It Conform to Our Constitution?

Volume 3, Issue 1 (Jun 2012)

On September 11, 2001, tragedy struck the United States after nineteen hijackers slipped past security in three American airports and, wielding only knives and box cutters, successfully gained control of four United States commercial airliners. The terrorists crashed two planes into the World Trade Center, collapsing the Twin Towers and killing more than 3000 people,

Download Full Text PDF

Addie S. Ries, Comment, America’s Anti-hijacking Campaign -- Will It Conform to Our Constitution?, 3 N.C. J.L. & Tech. 123 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/09_3NCJLTech1232001-2002.pdf.

Deciphering Means-Plus-Function Claim Limitation Infringement under § 112, Paragraph 6: Finding Certainty in the Uncertain Case Law

Volume 3, Issue 1 (Jun 2012)

The development of a technology-centered economy has increased the importance of patent rights. In order for these patent rights to have value, patentees must be able to ascertain the metes and bounds of their patent claims. In recent years the Federal Circuit has muddled means-plus-function claim limitation infringement analysis governed by 35 U.S.C. § 112,

Download Full Text PDF

Chad S.C. Stover, Comment, Deciphering Means-Plus-Function Claim Limitation Infringement under § 112, Paragraph 6: Finding Certainty in the Uncertain Case Law, 3 N.C. J.L. & Tech. 101 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/08_3NCJLTech1012001-2002.pdf.

Leveling the Accessibility Playing Field: Section 508 of the Rehabilitation Act

Volume 3, Issue 1 (Jun 2012)

Innovative technology is an essential asset in the information age. Most people have the ability to obtain information about almost any topic at the click of a mouse thanks to recent developments in Internet and home computer technology. But many people face obstacles in obtaining the same information due to mental and physical disabilities. Although

Download Full Text PDF

Latresa McLawhorn, Recent Development, Leveling the Accessibility Playing Field: Section 508 of the Rehabilitation Act, 3 N.C. J.L. & Tech. 63 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/07_3NCJLTech632001-2002.pdf.

Comparative Advertising on the Internet: Defining the Boundaries of Trademark Fair Use for Internet Metatags and Trigger Ads

Volume 3, Issue 1 (Jun 2012)

With well over a billion websites in existence, finding the desired material on the Internet can be a challenge. Many individuals, businesses, and organizations are faced with the similar challenge of ensuring that their websites can be found by interested parties. Because websites are often the primary economic livelihood for individuals and businesses, the ease

Download Full Text PDF

Benjamin F. Sidbury, Comparative Advertising on the Internet: Defining the Boundaries of Trademark Fair Use for Internet Metatags and Trigger Ads, 3 N.C. J.L. & Tech. 35 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/06_3NCJLTech352001-2002.pdf.

Are There Any Tax Havens in Electronic Commerce?

Volume 3, Issue 1 (Jun 2012)

E-commerce sales do not require a fixed place of business in foreign countries since consumers can order goods by accessing the seller’s website over the Internet. As such, e-commerce permits a foreign company to engage in extensive transactions with U.S. customers without entering the United States. Although such a company is clearly engaged in a

Download Full Text PDF

Michelle L. Prettie, Are There Any Tax Havens in Electronic Commerce?, 3 N.C. J.L. & Tech. 1 (2001), available at http://ncjolt.org/wp-content/uploads/2016/09/05_3NCJLTech12001-2002.pdf.

Cyber-Elections and the Minority Voter’s Response

Volume 4, Issue 2 (Jun 2012)

At first thought, Internet voting seems like an inexpensive, convenient and accurate platform for the election process. Given the current inadequacies in access to the Internet, however, remote Internet voting could potentially disenfranchise minorities. Internet voting makes voting more convenient for predominantly white voters and creates a bias that hinders minorities’ full participation in the

Download Full Text PDF

Allison Anne Stacker, Article, Cyber-Elections and the Minority Voter’s Response, 4 N.C. J.L. & Tech. 475 (2003), available at http://ncjolt.org/wp-content/uploads/2016/09/19_4NCJLTech4752002-2003.pdf.

Considering a Market in Human Organs

Volume 4, Issue 2 (Jun 2012)

In 1963, Nobel Prize winning geneticist Joshua Lederberg predicted that medical advances would impose “intolerable economic pressures on transplant sources.” His prophetic statement has become more undeniably true as current altruistic methods for organ donation have failed to meet organ demand for more than thirty years. As a result of these failed organ procurement methods,

Download Full Text PDF

S. Gregory Boyd, Jr., Article, Considering a Market in Human Organs, 4 N.C. J.L. & Tech. 417 (2003), available at http://ncjolt.org/wp-content/uploads/2016/09/18_4NCJLTech4172002-2003.pdf.

Debating the Proposed Peer-to-Peer Piracy Prevention Act: Should Copyright Owners be Permitted to Disrupt Illegal File Trading Over Peer-to-Peer Networks?

Volume 4, Issue 2 (Jun 2012)

On July 25, 2002, Representative Howard Berman (DCalif.) introduced a bill that would protect copyright owners from legal action stemming from “blocking, diverting or otherwise impairing the unauthorized distribution, display, performance, or reproduction of his or her copyrighted work on a publicly accessible peer-to-peer (“P2P”) file trading network.”2 The bill, known as H.R. 5211, has

Download Full Text PDF

James S. Humphrey, Article, Debating the Proposed Peer-to-Peer Piracy Prevention Act: Should Copyright Owners be Permitted to Disrupt Illegal File Trading Over Peer-to-Peer Networks?, 4 N.C. J.L. & Tech. 375 (2003), available at http://ncjolt.org/wp-content/uploads/2016/09/17_4NCJLTech3752002-2003.pdf.

The North Carolina Journal of Law & Technology has adopted the Open Access Program, a part of the Scholar’s Copyright Project created by Science Commons. Authors designate the conditions under which their articles are licensed. By downloading articles, you agree to comply with the license terms specified. Please contact NC JOLT at eic.ncjolt@gmail.com with permissions inquiries.