![]() |
Nicholas Johnson
Teaching Cyberspace Law Seminar, Spring 2000 |
Participants' Research Papers
(Note: Of the class participants, 11 have been approved for writing
credits. The following table indicates their current status, paper titles,
and will -- once the papers are completed and posted to this site -- provide
a link to the full text of each. -- N.J.)
Name | Status | Tentative Titles | Credits |
Chris Gansen | [independent research] topic approved Apr. 4; | 1 | |
Robert Holub | topic approved; research conference Feb. 22; rough draft (in lieu outline) submitted Mar. 6/conference, approved Mar. 10; first final Mar. 30, conference Apr. 4, Web posted Apr. 4; presentation Apr. 5 | Celebrity
in Cyberspace: Expanding the Right of Publicity with the Anti-Cybersquatting
Protection Act
|
1 |
Henry Kass | topic approved; research conference/outline submitted/ conference, approved Mar. 7; preliminary first final Mar. 30, conference Apr. 4; Web posted Apr. 20 | Problems in Copyright Law: Can Congress’ Latest Addition to the Digital Millennium Copyright Act Circumvent the First Amendment? | 1 |
Charles Kierscht | topic approved; research conference Feb. 18; first final Mar. 30, conference Apr. 6; Web posted Apr. 4; presentation Apr. 5 | Accommodating the Geographical Doctrines of Concurrent Trademark Holders' Rights on the Boundary-less Internet | 1 |
Tom Ksobiech | topic approved; research conference Feb. 18; outline submitted Mar. 6/conference, approved Mar. 10; paper Apr. 17; presentation Apr. 19 | I Know It When I Double-Click on It: A Look at How the Internet Will Cause Change to Community Standard Analysis in Obscenity Cases | 2 |
Kerrie Larson | topic approved; research conference Feb. 18; outline submitted Mar. 6/conference, approved Mar. 9; first final Mar. 30, conference Apr. 5; presentation Apr. 12 | The Domain Name Maze: What is it and Why Should we be Worried? | 2 |
Nicole Meer | topic approved; research conference Feb. 17; outline submitted Mar. 6/conference, approved Mar. 9; first final Mar. 30, conference Apr. 7; presentation Apr. 12 | Putting the Byte Into Crime: The Who, What, When, Where and Why of MP3 Liability | 2 |
Dan Pinegar | [independent research; final March 18, 2001]
|
Abusing Electronic Communication and the First Amendment: Combating Electronic Harassment, Threats and Cyberstalking Pinegar Website version | |
Brett Schilling | topic approved; research conference Feb. 18; outline submitted Mar. 6/ conference, approved Mar. 6; first final Mar. 31, conference Apr. 5; final final Apr. 14; presentation Apr. 19 | A
Prescription for Disaster: The Online Prescription and Distribution of
Pharmaceuticals
|
1 |
Marty Sutcliffe | topic approved; research conference Feb. 23; outline submitted Mar. 6/conference, approved Mar. 8; first final Mar. 30, conference Apr. 5; presentation Apr. 19 | Defamation on the Internet: Searching for Community, Identity and Statutory Solutions | 2 |
Lionel Weaver | topic approved; research conference Feb. 15; outline submitted/conference, approved Mar. 3; first final Mar. 29, conference Apr. 3; posted Apr. 10; no presentation | Internet Filters, Public Libraries, and the First Amendment | 1 |
Note: For courses with seminar papers the student work is published through this site, and is intended for lawyers, academics, journalists -- indeed anyone who might find it of use (subject to the usual copyright restrictions).
By "usual copyright restrictions" we mean that (a) all rights are reserved by the author, with, usually, (b) permission granted for individual use (viewing, linking, downloading, and printing limited to one copy). Any commercial, or other use, requires permission from the author.
If you have any suggestions, questions, or comments please e-mail them to me: njohnson@inav.net
-- Nicholas Johnson