Michael Froomkin: Difference between revisions
Nowheregirl (talk | contribs) No edit summary |
Nowheregirl (talk | contribs) No edit summary |
||
Line 12: | Line 12: | ||
Prof. Froomkin is married to University of Miami Law Professor Caroline Bradley. They have two children. | Prof. Froomkin is married to University of Miami Law Professor Caroline Bradley. They have two children. | ||
==Publications== | |||
According to his page at The University of Miami School of Law, the publications by Michael Froomkin are listed below | |||
Forthcoming publications and works in progress | |||
* The Latest Generation of Personal Health Records (PHRs): Ethical, Legal and Social Issues, __ J Am Medl Informatics Assoc. __ (2009) (with Reid Cushman, Anita Cava, Patricia Abril, & Kenneth W. Goodman) (submitted for peer review) | |||
* Building the Bottom Up from the Top Down, 5 I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY – (forthcoming 2009) | |||
* Identity Cards and Identity Romanticism (book chapter) (forthcoming in LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY AND IDENTITY IN A NETWORKED SOCIETY (Ian Kerr, ed., 2009)) | |||
* Anonymity and the Law in the USA (book chapter) (forthcoming in LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY AND IDENTITY IN A NETWORKED SOCIETY (Ian Kerr, ed., 2009)) | |||
* Oops! (Pity You Can't Sue Us): Public Data Breaches in US Law (working title) Winners and Losers: the Internet Changes Everything -or Nothing? The Virtual Law School–A Skeptical View | |||
Publications | |||
* The Uneasy Case for National ID Cards as a Means to Enhance Privacy (book chapter) in SECURING PRIVACY IN THE INTERNET AGE (A. Chander, L. Gelman, M.J. Radin, eds Stanford U.P. 2008. | |||
* The New Health Information Architecture: Coping with the Privacy Implications of the Personal Health Records Revolution, UM ELSI Group for Project HealthDesign (2008), [[http://www.projecthealthdesign.org/media/file/social-life-info-15.pdf (available online)]] | |||
* Forced Sharing of Patient-Controlled Health Records, UM ELSI Group for Project HealthDesign (2007), [[http://www.projecthealthdesign.org/media/file/ Forced-sharing.pdf (available online)]] | |||
* ELSI Guide to Licensing Project HealthDesign Work Product in the Public Interest, for Project HealthDesign (2007), [[http://www.projecthealthdesign.org/media/file/ ELSI-OpenSource-Guide.pdf (available online)]] | |||
* On the Future of Internet Governance (transcript of panel discussion), 101 AMERICAN SOCIETY OF INTERNATIONAL LAW, PROCEEDINGS OF THE ANNUAL MEETING (2007), [[http://ssrn.com/abstract=992805 (abstract available online)]] | |||
* Creating a Viral Federal Privacy Standard, 8 B.C. L. Rev. 55 (2007). The Plural of Anecdote is "Blog", 84 WASH. U. L. REV. 1149 (2006). A Dispatch From the Crypto Wars (Review of MATT CURTIN, BRUTE FORCE: CRACKING THE | |||
* DATA ENCRYPTION STANDARD (2005)), 2 I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY 345 (2006), [[http://www.is-journal.org/V02I02/2ISJLP345-Froomkin.pdf. (available online)]] | |||
* International and National Regulation of the Internet (book chapter in THE ROUND TABLE EXPERT GROUP ON TELECOMMUNICATIONS LAWS: CONFERENCE PAPERS (E.J. DOMMERING & N.A.N.M. VAN EIJK (EDS.) (2005)). | |||
* Virtual Worlds, Real Rules (with Caroline Bradley), 49 N.Y.L.S.L. Rev. 103 (2004) | |||
* When We Say America™ We Mean It, 41 HOUSTON. L. REV. 839 (2004). | |||
*Technologies for Democracy (book chapter in THE PROSPECTS FOR ELECTRONIC DEMOCRACY (Peter Shane, ed. 2004)) | |||
* Commentary: Time to Hug a Bureaucrat, 35 LOY. U. CHI. L.J. 139 (2003). [[http://www.law.miami.edu/~froomkin/articles/Loyola-final.pdf (available online)]] | |||
* ICANN & Anti-Trust, 2003 ILLINOIS L. REV. 1 (co-authored with Mark Lemley). [[ http://www.law.miami.edu/~froomkin/articles/icann-antitrust.pdf (available online)]] | |||
* ICANN 2.0: Meet the New Boss, 36 LOY. L.A. L. REV. 1087 (2003). [[http://llr.lls.edu/volumes/v36-issue3/froomkin.pdf(available online)]] | |||
* Habermas@discourse.net: Toward a Critical Theory of Cyberspace, 116 HARV. L. REV. 749 (2003) [[http://www.law.miami.edu/~froomkin/discourse/ils.pdf (available online)]] | |||
* Anonymity in the Balance (book chapter in DIGITAL ANONYMITY: TENSIONS AND DIMENSIONS (C. Nicoll, J.E.J. Prins & M.J.M. van Dellen eds. 2003). [[http://wwwl.law.miami.edu/~froomkin/articles/balance.pdf(view .pdf)]] | |||
* Internet's International Regulation: Emergence and Enforcement, in Évolution des systèmes juridique, bijuridism et commerce international (Louis Perret & Alain-François Bisson, eds.) (Montreal, 2003) | |||
* Form and Substance in Cyberspace, 6 J. SMALL & EMERGING BUS. L. 93 (2002).[[ http://www.law.miami.edu/~froomkin/articles/formandsubstance.pdf(available online)]] | |||
* ICANN’s UDRP: Its Causes and (Partial) Cures, 67 BROOKLYN L. REV. 605 (2002)[[ http://www.law.miami.edu/~froomkin/articles/udrp.pdf (available online)]] | |||
* Internet Governance: The ICANN Experiment (Or, Three Paradoxes in Search of a Paradigm), in LA LIBERTAD DE INFORMACIÓN: GOBIERNO Y ARQUITECTURA DE INTERNET 12 (ed. Loreto Corredoira y Alfonso) (Madrid, 2001). | |||
* The Collision of Trademarks, Domain Names, and Due Process in Cyberspace, 44 COMM. ACM 91 (FEB. 2001) | |||
* Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution, 50 DUKE L.J. 17 (2000).[[http://www.law.miami.edu/~froomkin/articles/icann.pdf (available online)]] | |||
* The Death of Privacy? 52 STAN. L. REV. 1461 (2000)[[http://www.law.miami.edu/~froomkin/articles/privacy-deathof.pdf (available online)]] | |||
* Speculative Microeconomics for Tomorrow’s Economy (with James Bradford De Long) (book chapter) INTERNET PUBLISHING AND BEYOND: THE ECONOMICS OF DIGITAL INFORMATION AND INTELLECTUAL PROPERTY 6 (Brian Kahin &Hal Varian, eds., 2000). [[http://www.law.miami.edu/~froomkin/ articles/spec.htm (available online)]] | |||
* Semi-Private International Rulemaking: Lessons Learned from the WIPO Domain Name Process, book chapter in CHRISTOPHER T. MARSDEN (ED), REGULATING THE GLOBAL INFORMATION SOCIETY 211 (Routledge 2000)[[http://www.law.miami.edu/~froomkin/articles/tprc99.pdf (view .pdf)]] | |||
* Beating Microsoft at its Own Game (with J. Bradford DeLong), HARV. BUS. REV. 159 (Jan-Feb. 2000) (Review of CHARLES FERGUSON, HIGH STAKES, NO PRISONERS (1999)). The Constitution and Encryption Regulation: Do We Need a “New Privacy”?, 3 N.Y.U. J. LEGIS & PUB. POL. 25 (1999-2000). Of Governments and Governance, 14 BERKELEY LAW & TECHNOLOGY JOURNAL 617 (1999) [[ http://www.law.miami.edu/~froomkin/articles/governance.htm (available online)]] Legal Issues in Anonymity and Pseudonymity, AAAS SYMPOSIUM VOLUME, 15 THE INFORMATION SOCIETY 113 (1999). | |||
* A Commentary on WIPO's The Management of Internet Names And Addresses: Intellectual Property Issues. [[http://personal.law.miami.edu/~amf/commentary.htm (available online )]] | |||
* 2B as Legal Software for Electronic Contracting --Operating System or Trojan Horse?, 13 BERKELEY L. & TECHNOLOGY JOURNAL 1023 (1999).[[http://www.law.miami.edu/~froomkin/articles/2b.htm (available online)]] | |||
* A Critique of WIPO's RFC3, http://www.law.miami.edu/~amf (1999) | |||
* Comment, The Empire Strikes Back, 73 Chi-Kent L. Rev. 1101 (1998) | |||
* Firme digitali e Autorità di Certificazione: La garanzie di validità degli atti elettronici, 23 INGENIUM (Italy) 12 (March, 1998) (tr. Giovanni Nasi) | |||
* Recent Developments in US Computer Law, AMICUS CURIAE 27 (Jan., 1998).[[http://www.law.miami.edu/~froomkin/articles/RENO.htm (available online)]] | |||
* Digital Signatures Today in FINANCIAL CRYPTOGRAPHY 287 (Rafael Hirschfeld ed., 1997) (Springer Lecture Notes in Computer Science vol. 1318).[[http://www.law.miami.edu/~froomkin/articles/digsig1.pdf (available online)]] | |||
* The Internet as a Source of Regulatory Arbitrage (book chapter) in BORDERS IN CYBERSPACE (Brian Kahin and Charles Nesson, eds.) (MIT Press, 1997)[[http://www.law.miami.edu/~froomkin/articles/arbitr.htm (available online)]] | |||
* It Came From Planet Clipper, 1996 U. CHI. L. FORUM 15 (The Law of Cyberspace symposium volume).[[http://www.law.miami.edu/~froomkin/articles/planet_clipper.htm (available online)]] | |||
* Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases, 15 U. PITT. J. L. & COM. 395 (1996) (Conference for the Second Century of the University of Pittsburgh School of Law Symposium volume).[[http://www.law.miami.edu/~froomkin/articles/ocean.htm (available online)]] | |||
* The Essential Role of Trusted Third Parties in Electronic Commerce, 75 ORE. L. REV. 49 (1996) (The Law and Entrepreneurship Program: Innovation and the Information Environment, Symposium Volume).[[http://www.law.miami.edu/~froomkin/articles/trusted.htm (available online )]] Reprinted in READINGS IN ELECTRONIC COMMERCE 119 (Ravi Kalakota & Andrew B. Whinston, eds. 1997). | |||
* Reinventing the Government Corporation 1995 ILL. L. REV. 543[[http://www.law.miami.edu/~froomkin/articles/reinvent.htm (available online)]] | |||
* Anonymity and Its Enmities, 1 JOURNAL OF ONLINE LAW art. 4 (1995)[[ http://www.wm.edu/law/publications/jol/froomkin.html(available online)]] | |||
The Metaphor is the Key: Cryptography, the Clipper Chip and the Constitution, 143 U. Penn. L. Rev. 709 (1995)).[[http://www.law.miami.edu/~froomkin/articles/clipper.htm (available online)]] | |||
* The Constitutionality of Mandatory Key Escrow--A First Look in BUILDING IN BIG BROTHER: THE CRYPTOGRAPHIC POLICY DEBATE 413 (Lance Hoffman, ed. 1995). | |||
* The Imperial Presidency's New Vestments, 88 NW. L. REV. 1346 (1994). | |||
* Still Naked After All These Words, 88 NW. L. REV. 1420 (1994). | |||
* Politiké Finance V ÈSFR (with Steve Gordon), 12 PRÁVNÍK 1079 (1990). | |||
* Climbing the Most Dangerous Branch: Legisprudence and the New Legal Process, 66 | |||
* TEX. L. REV. 1071 (1988) (book review). Note, In Defense of Administrative Agency Autonomy, 96 YALE L.J. 787 (1987). | |||
==References== | ==References== |
Revision as of 13:39, 30 November 2010
Country: | USA |
Email: | froomkin@law.miami.edu |
A. Michael Froomkin is a Professor at the University of Miami School of Law in Coral Gables, Florida, specializing in Internet Law and Administrative Law. He is a founder and editor of ICANNWatch, and serves on the Editorial Board of Information, Communication & Society and of I/S: A Journal of Law and Policy for the Information Society. [1]
Prof. Froomkin is married to University of Miami Law Professor Caroline Bradley. They have two children.
Publications[edit | edit source]
According to his page at The University of Miami School of Law, the publications by Michael Froomkin are listed below
Forthcoming publications and works in progress
- The Latest Generation of Personal Health Records (PHRs): Ethical, Legal and Social Issues, __ J Am Medl Informatics Assoc. __ (2009) (with Reid Cushman, Anita Cava, Patricia Abril, & Kenneth W. Goodman) (submitted for peer review)
- Building the Bottom Up from the Top Down, 5 I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY – (forthcoming 2009)
- Identity Cards and Identity Romanticism (book chapter) (forthcoming in LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY AND IDENTITY IN A NETWORKED SOCIETY (Ian Kerr, ed., 2009))
- Anonymity and the Law in the USA (book chapter) (forthcoming in LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY AND IDENTITY IN A NETWORKED SOCIETY (Ian Kerr, ed., 2009))
- Oops! (Pity You Can't Sue Us): Public Data Breaches in US Law (working title) Winners and Losers: the Internet Changes Everything -or Nothing? The Virtual Law School–A Skeptical View
Publications
- The Uneasy Case for National ID Cards as a Means to Enhance Privacy (book chapter) in SECURING PRIVACY IN THE INTERNET AGE (A. Chander, L. Gelman, M.J. Radin, eds Stanford U.P. 2008.
- The New Health Information Architecture: Coping with the Privacy Implications of the Personal Health Records Revolution, UM ELSI Group for Project HealthDesign (2008), [(available online)]
- Forced Sharing of Patient-Controlled Health Records, UM ELSI Group for Project HealthDesign (2007), [Forced-sharing.pdf (available online)]
- ELSI Guide to Licensing Project HealthDesign Work Product in the Public Interest, for Project HealthDesign (2007), [ELSI-OpenSource-Guide.pdf (available online)]
- On the Future of Internet Governance (transcript of panel discussion), 101 AMERICAN SOCIETY OF INTERNATIONAL LAW, PROCEEDINGS OF THE ANNUAL MEETING (2007), [(abstract available online)]
- Creating a Viral Federal Privacy Standard, 8 B.C. L. Rev. 55 (2007). The Plural of Anecdote is "Blog", 84 WASH. U. L. REV. 1149 (2006). A Dispatch From the Crypto Wars (Review of MATT CURTIN, BRUTE FORCE: CRACKING THE
- DATA ENCRYPTION STANDARD (2005)), 2 I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY 345 (2006), [(available online)]
- International and National Regulation of the Internet (book chapter in THE ROUND TABLE EXPERT GROUP ON TELECOMMUNICATIONS LAWS: CONFERENCE PAPERS (E.J. DOMMERING & N.A.N.M. VAN EIJK (EDS.) (2005)).
- Virtual Worlds, Real Rules (with Caroline Bradley), 49 N.Y.L.S.L. Rev. 103 (2004)
- When We Say America™ We Mean It, 41 HOUSTON. L. REV. 839 (2004).
- Technologies for Democracy (book chapter in THE PROSPECTS FOR ELECTRONIC DEMOCRACY (Peter Shane, ed. 2004))
- Commentary: Time to Hug a Bureaucrat, 35 LOY. U. CHI. L.J. 139 (2003). [(available online)]
- ICANN & Anti-Trust, 2003 ILLINOIS L. REV. 1 (co-authored with Mark Lemley). [[ http://www.law.miami.edu/~froomkin/articles/icann-antitrust.pdf (available online)]]
- ICANN 2.0: Meet the New Boss, 36 LOY. L.A. L. REV. 1087 (2003). [online)]
- Habermas@discourse.net: Toward a Critical Theory of Cyberspace, 116 HARV. L. REV. 749 (2003) [(available online)]
- Anonymity in the Balance (book chapter in DIGITAL ANONYMITY: TENSIONS AND DIMENSIONS (C. Nicoll, J.E.J. Prins & M.J.M. van Dellen eds. 2003). [.pdf)]
- Internet's International Regulation: Emergence and Enforcement, in Évolution des systèmes juridique, bijuridism et commerce international (Louis Perret & Alain-François Bisson, eds.) (Montreal, 2003)
- Form and Substance in Cyberspace, 6 J. SMALL & EMERGING BUS. L. 93 (2002).[[ http://www.law.miami.edu/~froomkin/articles/formandsubstance.pdf(available online)]]
- ICANN’s UDRP: Its Causes and (Partial) Cures, 67 BROOKLYN L. REV. 605 (2002)[[ http://www.law.miami.edu/~froomkin/articles/udrp.pdf (available online)]]
- Internet Governance: The ICANN Experiment (Or, Three Paradoxes in Search of a Paradigm), in LA LIBERTAD DE INFORMACIÓN: GOBIERNO Y ARQUITECTURA DE INTERNET 12 (ed. Loreto Corredoira y Alfonso) (Madrid, 2001).
- The Collision of Trademarks, Domain Names, and Due Process in Cyberspace, 44 COMM. ACM 91 (FEB. 2001)
- Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution, 50 DUKE L.J. 17 (2000).[(available online)]
- The Death of Privacy? 52 STAN. L. REV. 1461 (2000)[(available online)]
- Speculative Microeconomics for Tomorrow’s Economy (with James Bradford De Long) (book chapter) INTERNET PUBLISHING AND BEYOND: THE ECONOMICS OF DIGITAL INFORMATION AND INTELLECTUAL PROPERTY 6 (Brian Kahin &Hal Varian, eds., 2000). [articles/spec.htm (available online)]
- Semi-Private International Rulemaking: Lessons Learned from the WIPO Domain Name Process, book chapter in CHRISTOPHER T. MARSDEN (ED), REGULATING THE GLOBAL INFORMATION SOCIETY 211 (Routledge 2000)[(view .pdf)]
- Beating Microsoft at its Own Game (with J. Bradford DeLong), HARV. BUS. REV. 159 (Jan-Feb. 2000) (Review of CHARLES FERGUSON, HIGH STAKES, NO PRISONERS (1999)). The Constitution and Encryption Regulation: Do We Need a “New Privacy”?, 3 N.Y.U. J. LEGIS & PUB. POL. 25 (1999-2000). Of Governments and Governance, 14 BERKELEY LAW & TECHNOLOGY JOURNAL 617 (1999) [[ http://www.law.miami.edu/~froomkin/articles/governance.htm (available online)]] Legal Issues in Anonymity and Pseudonymity, AAAS SYMPOSIUM VOLUME, 15 THE INFORMATION SOCIETY 113 (1999).
- A Commentary on WIPO's The Management of Internet Names And Addresses: Intellectual Property Issues. [(available online )]
- 2B as Legal Software for Electronic Contracting --Operating System or Trojan Horse?, 13 BERKELEY L. & TECHNOLOGY JOURNAL 1023 (1999).[(available online)]
- A Critique of WIPO's RFC3, http://www.law.miami.edu/~amf (1999)
- Comment, The Empire Strikes Back, 73 Chi-Kent L. Rev. 1101 (1998)
- Firme digitali e Autorità di Certificazione: La garanzie di validità degli atti elettronici, 23 INGENIUM (Italy) 12 (March, 1998) (tr. Giovanni Nasi)
- Recent Developments in US Computer Law, AMICUS CURIAE 27 (Jan., 1998).[(available online)]
- Digital Signatures Today in FINANCIAL CRYPTOGRAPHY 287 (Rafael Hirschfeld ed., 1997) (Springer Lecture Notes in Computer Science vol. 1318).[(available online)]
- The Internet as a Source of Regulatory Arbitrage (book chapter) in BORDERS IN CYBERSPACE (Brian Kahin and Charles Nesson, eds.) (MIT Press, 1997)[(available online)]
- It Came From Planet Clipper, 1996 U. CHI. L. FORUM 15 (The Law of Cyberspace symposium volume).[(available online)]
- Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases, 15 U. PITT. J. L. & COM. 395 (1996) (Conference for the Second Century of the University of Pittsburgh School of Law Symposium volume).[(available online)]
- The Essential Role of Trusted Third Parties in Electronic Commerce, 75 ORE. L. REV. 49 (1996) (The Law and Entrepreneurship Program: Innovation and the Information Environment, Symposium Volume).[(available online )] Reprinted in READINGS IN ELECTRONIC COMMERCE 119 (Ravi Kalakota & Andrew B. Whinston, eds. 1997).
- Reinventing the Government Corporation 1995 ILL. L. REV. 543[(available online)]
- Anonymity and Its Enmities, 1 JOURNAL OF ONLINE LAW art. 4 (1995)[[ http://www.wm.edu/law/publications/jol/froomkin.html(available online)]]
The Metaphor is the Key: Cryptography, the Clipper Chip and the Constitution, 143 U. Penn. L. Rev. 709 (1995)).[(available online)]
- The Constitutionality of Mandatory Key Escrow--A First Look in BUILDING IN BIG BROTHER: THE CRYPTOGRAPHIC POLICY DEBATE 413 (Lance Hoffman, ed. 1995).
- The Imperial Presidency's New Vestments, 88 NW. L. REV. 1346 (1994).
- Still Naked After All These Words, 88 NW. L. REV. 1420 (1994).
- Politiké Finance V ÈSFR (with Steve Gordon), 12 PRÁVNÍK 1079 (1990).
- Climbing the Most Dangerous Branch: Legisprudence and the New Legal Process, 66
- TEX. L. REV. 1071 (1988) (book review). Note, In Defense of Administrative Agency Autonomy, 96 YALE L.J. 787 (1987).