Jump to content

Michael Froomkin

From ICANNWiki
Revision as of 13:33, 30 November 2010 by Nowheregirl (talk | contribs)
Country: USA
Email: froomkin@law.miami.edu

A. Michael Froomkin is a Professor at the University of Miami School of Law in Coral Gables, Florida, specializing in Internet Law and Administrative Law. He is a founder and editor of ICANNWatch, and serves on the Editorial Board of Information, Communication & Society and of I/S: A Journal of Law and Policy for the Information Society. [1]

Prof. Froomkin is married to University of Miami Law Professor Caroline Bradley. They have two children.


Publications[edit | edit source]

According to his page at The University of Miami School of Law, the publications by Michael Froomkin are listed below

Forthcoming publications and works in progress

  • The Latest Generation of Personal Health Records (PHRs): Ethical, Legal and Social Issues, __ J Am Medl Informatics Assoc. __ (2009) (with Reid Cushman, Anita Cava, Patricia Abril, & Kenneth W. Goodman) (submitted for peer review)
  • Building the Bottom Up from the Top Down, 5 I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY – (forthcoming 2009)
  • Identity Cards and Identity Romanticism (book chapter) (forthcoming in LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY AND IDENTITY IN A NETWORKED SOCIETY (Ian Kerr, ed., 2009))
  • Anonymity and the Law in the USA (book chapter) (forthcoming in LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY AND IDENTITY IN A NETWORKED SOCIETY (Ian Kerr, ed., 2009))
  • Oops! (Pity You Can't Sue Us): Public Data Breaches in US Law (working title) Winners and Losers: the Internet Changes Everything -or Nothing? The Virtual Law School–A Skeptical View

Publications

  • The Uneasy Case for National ID Cards as a Means to Enhance Privacy (book chapter) in SECURING PRIVACY IN THE INTERNET AGE (A. Chander, L. Gelman, M.J. Radin, eds Stanford U.P. 2008.
  • The New Health Information Architecture: Coping with the Privacy Implications of the Personal Health Records Revolution, UM ELSI Group for Project HealthDesign (2008), [(available online)]
  • On the Future of Internet Governance (transcript of panel discussion), 101 AMERICAN SOCIETY OF INTERNATIONAL LAW, PROCEEDINGS OF THE ANNUAL MEETING (2007), [(abstract available online)]
  • Creating a Viral Federal Privacy Standard, 8 B.C. L. Rev. 55 (2007). The Plural of Anecdote is "Blog", 84 WASH. U. L. REV. 1149 (2006). A Dispatch From the Crypto Wars (Review of MATT CURTIN, BRUTE FORCE: CRACKING THE
  • DATA ENCRYPTION STANDARD (2005)), 2 I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY 345 (2006), [(available online)]
  • International and National Regulation of the Internet (book chapter in THE ROUND TABLE EXPERT GROUP ON TELECOMMUNICATIONS LAWS: CONFERENCE PAPERS (E.J. DOMMERING & N.A.N.M. VAN EIJK (EDS.) (2005)).
  • Virtual Worlds, Real Rules (with Caroline Bradley), 49 N.Y.L.S.L. Rev. 103 (2004)
  • When We Say America™ We Mean It, 41 HOUSTON. L. REV. 839 (2004).
  • Technologies for Democracy (book chapter in THE PROSPECTS FOR ELECTRONIC DEMOCRACY (Peter Shane, ed. 2004))
  • Commentary: Time to Hug a Bureaucrat, 35 LOY. U. CHI. L.J. 139 (2003). [(available online)]
  • ICANN 2.0: Meet the New Boss, 36 LOY. L.A. L. REV. 1087 (2003). [online)]
  • Habermas@discourse.net: Toward a Critical Theory of Cyberspace, 116 HARV. L. REV. 749 (2003) [(available online)]
  • Anonymity in the Balance (book chapter in DIGITAL ANONYMITY: TENSIONS AND DIMENSIONS (C. Nicoll, J.E.J. Prins & M.J.M. van Dellen eds. 2003). [.pdf)]
  • Internet's International Regulation: Emergence and Enforcement, in Évolution des systèmes juridique, bijuridism et commerce international (Louis Perret & Alain-François Bisson, eds.) (Montreal, 2003)
  • Internet Governance: The ICANN Experiment (Or, Three Paradoxes in Search of a Paradigm), in LA LIBERTAD DE INFORMACIÓN: GOBIERNO Y ARQUITECTURA DE INTERNET 12 (ed. Loreto Corredoira y Alfonso) (Madrid, 2001).
  • The Collision of Trademarks, Domain Names, and Due Process in Cyberspace, 44 COMM. ACM 91 (FEB. 2001)
  • Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution, 50 DUKE L.J. 17 (2000).[(available online)]
  • Speculative Microeconomics for Tomorrow’s Economy (with James Bradford De Long) (book chapter) INTERNET PUBLISHING AND BEYOND: THE ECONOMICS OF DIGITAL INFORMATION AND INTELLECTUAL PROPERTY 6 (Brian Kahin &Hal Varian, eds., 2000). [articles/spec.htm (available online)]
  • Semi-Private International Rulemaking: Lessons Learned from the WIPO Domain Name Process, book chapter in CHRISTOPHER T. MARSDEN (ED), REGULATING THE GLOBAL INFORMATION SOCIETY 211 (Routledge 2000)[(view .pdf)]
  • Beating Microsoft at its Own Game (with J. Bradford DeLong), HARV. BUS. REV. 159 (Jan-Feb. 2000) (Review of CHARLES FERGUSON, HIGH STAKES, NO PRISONERS (1999)). The Constitution and Encryption Regulation: Do We Need a “New Privacy”?, 3 N.Y.U. J. LEGIS & PUB. POL. 25 (1999-2000). Of Governments and Governance, 14 BERKELEY LAW & TECHNOLOGY JOURNAL 617 (1999) [[ http://www.law.miami.edu/~froomkin/articles/governance.htm (available online)]] Legal Issues in Anonymity and Pseudonymity, AAAS SYMPOSIUM VOLUME, 15 THE INFORMATION SOCIETY 113 (1999).
  • A Commentary on WIPO's The Management of Internet Names And Addresses: Intellectual Property Issues. [(available online )]
  • 2B as Legal Software for Electronic Contracting --Operating System or Trojan Horse?, 13 BERKELEY L. & TECHNOLOGY JOURNAL 1023 (1999).[(available online)]
  • Comment, The Empire Strikes Back, 73 Chi-Kent L. Rev. 1101 (1998)
  • Firme digitali e Autorità di Certificazione: La garanzie di validità degli atti elettronici, 23 INGENIUM (Italy) 12 (March, 1998) (tr. Giovanni Nasi)
  • Recent Developments in US Computer Law, AMICUS CURIAE 27 (Jan., 1998).[(available online)]
  • The Internet as a Source of Regulatory Arbitrage (book chapter) in BORDERS IN CYBERSPACE (Brian Kahin and Charles Nesson, eds.) (MIT Press, 1997)[(available online)]
  • Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases, 15 U. PITT. J. L. & COM. 395 (1996) (Conference for the Second Century of the University of Pittsburgh School of Law Symposium volume).[[ http://www.law.miami.edu/~froomkin/articles/ocean.htm (available online)]]
  • The Essential Role of Trusted Third Parties in Electronic Commerce, 75 ORE. L. REV. 49 (1996) (The Law and Entrepreneurship Program: Innovation and the Information Environment, Symposium Volume).[[ http://www.law.miami.edu/~froomkin/articles/trusted.htm (available online )]] Reprinted in READINGS IN ELECTRONIC COMMERCE 119 (Ravi Kalakota & Andrew B. Whinston, eds. 1997).

The Metaphor is the Key: Cryptography, the Clipper Chip and the Constitution, 143 U. Penn. L. Rev. 709 (1995)).[(available online)]

  • The Constitutionality of Mandatory Key Escrow--A First Look in BUILDING IN BIG BROTHER: THE CRYPTOGRAPHIC POLICY DEBATE 413 (Lance Hoffman, ed. 1995).
  • The Imperial Presidency's New Vestments, 88 NW. L. REV. 1346 (1994).
  • Still Naked After All These Words, 88 NW. L. REV. 1420 (1994).
  • Politiké Finance V ÈSFR (with Steve Gordon), 12 PRÁVNÍK 1079 (1990).
  • Climbing the Most Dangerous Branch: Legisprudence and the New Legal Process, 66
  • TEX. L. REV. 1071 (1988) (book review). Note, In Defense of Administrative Agency Autonomy, 96 YALE L.J. 787 (1987).

References[edit | edit source]