Michael Froomkin

Revision as of 13:32, 30 November 2010 by Nowheregirl (talk | contribs)
Country: USA
Email: froomkin@law.miami.edu

A. Michael Froomkin is a Professor at the University of Miami School of Law in Coral Gables, Florida, specializing in Internet Law and Administrative Law. He is a founder and editor of ICANNWatch, and serves on the Editorial Board of Information, Communication & Society and of I/S: A Journal of Law and Policy for the Information Society. [1]

Prof. Froomkin is married to University of Miami Law Professor Caroline Bradley. They have two children.


Publications edit

According to his page at The University of Miami School of Law, the publications by Michael Froomkin are listed below

Forthcoming publications and works in progress edit

  • The Latest Generation of Personal Health Records (PHRs): Ethical, Legal and Social Issues, __ J Am Medl Informatics Assoc. __ (2009) (with Reid Cushman, Anita Cava, Patricia Abril, & Kenneth W. Goodman) (submitted for peer review)
  • Building the Bottom Up from the Top Down, 5 I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY – (forthcoming 2009)
  • Identity Cards and Identity Romanticism (book chapter) (forthcoming in LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY AND IDENTITY IN A NETWORKED SOCIETY (Ian Kerr, ed., 2009))
  • Anonymity and the Law in the USA (book chapter) (forthcoming in LESSONS FROM THE IDENTITY TRAIL: ANONYMITY, PRIVACY AND IDENTITY IN A NETWORKED SOCIETY (Ian Kerr, ed., 2009))
  • Oops! (Pity You Can't Sue Us): Public Data Breaches in US Law (working title) Winners and Losers: the Internet Changes Everything -or Nothing? The Virtual Law School–A Skeptical View

Publications edit

  • The Uneasy Case for National ID Cards as a Means to Enhance Privacy (book chapter) in SECURING PRIVACY IN THE INTERNET AGE (A. Chander, L. Gelman, M.J. Radin, eds Stanford U.P. 2008.
  • The New Health Information Architecture: Coping with the Privacy Implications of the Personal Health Records Revolution, UM ELSI Group for Project HealthDesign (2008), [(available online)]
  • On the Future of Internet Governance (transcript of panel discussion), 101 AMERICAN SOCIETY OF INTERNATIONAL LAW, PROCEEDINGS OF THE ANNUAL MEETING (2007), [(abstract available online)]
  • Creating a Viral Federal Privacy Standard, 8 B.C. L. Rev. 55 (2007). The Plural of Anecdote is "Blog", 84 WASH. U. L. REV. 1149 (2006). A Dispatch From the Crypto Wars (Review of MATT CURTIN, BRUTE FORCE: CRACKING THE
  • DATA ENCRYPTION STANDARD (2005)), 2 I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY 345 (2006), [(available online)]
  • International and National Regulation of the Internet (book chapter in THE ROUND TABLE EXPERT GROUP ON TELECOMMUNICATIONS LAWS: CONFERENCE PAPERS (E.J. DOMMERING & N.A.N.M. VAN EIJK (EDS.) (2005)).
  • Virtual Worlds, Real Rules (with Caroline Bradley), 49 N.Y.L.S.L. Rev. 103 (2004)
  • When We Say America™ We Mean It, 41 HOUSTON. L. REV. 839 (2004).
  • Technologies for Democracy (book chapter in THE PROSPECTS FOR ELECTRONIC DEMOCRACY (Peter Shane, ed. 2004))
  • Commentary: Time to Hug a Bureaucrat, 35 LOY. U. CHI. L.J. 139 (2003). [(available online)]
  • ICANN 2.0: Meet the New Boss, 36 LOY. L.A. L. REV. 1087 (2003). [online)]
  • Habermas@discourse.net: Toward a Critical Theory of Cyberspace, 116 HARV. L. REV. 749 (2003) [(available online)]
  • Anonymity in the Balance (book chapter in DIGITAL ANONYMITY: TENSIONS AND DIMENSIONS (C. Nicoll, J.E.J. Prins & M.J.M. van Dellen eds. 2003). [.pdf)]
  • Internet's International Regulation: Emergence and Enforcement, in Évolution des systèmes juridique, bijuridism et commerce international (Louis Perret & Alain-François Bisson, eds.) (Montreal, 2003)
  • Internet Governance: The ICANN Experiment (Or, Three Paradoxes in Search of a Paradigm), in LA LIBERTAD DE INFORMACIÓN: GOBIERNO Y ARQUITECTURA DE INTERNET 12 (ed. Loreto Corredoira y Alfonso) (Madrid, 2001).
  • The Collision of Trademarks, Domain Names, and Due Process in Cyberspace, 44 COMM. ACM 91 (FEB. 2001)
  • Wrong Turn in Cyberspace: Using ICANN to Route Around the APA and the Constitution, 50 DUKE L.J. 17 (2000).[(available online)]
  • Speculative Microeconomics for Tomorrow’s Economy (with James Bradford De Long) (book chapter) INTERNET PUBLISHING AND BEYOND: THE ECONOMICS OF DIGITAL INFORMATION AND INTELLECTUAL PROPERTY 6 (Brian Kahin &Hal Varian, eds., 2000). [articles/spec.htm (available online)]
  • Semi-Private International Rulemaking: Lessons Learned from the WIPO Domain Name Process, book chapter in CHRISTOPHER T. MARSDEN (ED), REGULATING THE GLOBAL INFORMATION SOCIETY 211 (Routledge 2000)[(view .pdf)]
  • Beating Microsoft at its Own Game (with J. Bradford DeLong), HARV. BUS. REV. 159 (Jan-Feb. 2000) (Review of CHARLES FERGUSON, HIGH STAKES, NO PRISONERS (1999)). The Constitution and Encryption Regulation: Do We Need a “New Privacy”?, 3 N.Y.U. J. LEGIS & PUB. POL. 25 (1999-2000). Of Governments and Governance, 14 BERKELEY LAW & TECHNOLOGY JOURNAL 617 (1999) [[ http://www.law.miami.edu/~froomkin/articles/governance.htm (available online)]] Legal Issues in Anonymity and Pseudonymity, AAAS SYMPOSIUM VOLUME, 15 THE INFORMATION SOCIETY 113 (1999).
  • A Commentary on WIPO's The Management of Internet Names And Addresses: Intellectual Property Issues. [(available online )]
  • 2B as Legal Software for Electronic Contracting --Operating System or Trojan Horse?, 13 BERKELEY L. & TECHNOLOGY JOURNAL 1023 (1999).[(available online)]
  • Comment, The Empire Strikes Back, 73 Chi-Kent L. Rev. 1101 (1998)
  • Firme digitali e Autorità di Certificazione: La garanzie di validità degli atti elettronici, 23 INGENIUM (Italy) 12 (March, 1998) (tr. Giovanni Nasi)
  • Recent Developments in US Computer Law, AMICUS CURIAE 27 (Jan., 1998).[(available online)]
  • The Internet as a Source of Regulatory Arbitrage (book chapter) in BORDERS IN CYBERSPACE (Brian Kahin and Charles Nesson, eds.) (MIT Press, 1997)[(available online)]
  • Flood Control on the Information Ocean: Living With Anonymity, Digital Cash, and Distributed Databases, 15 U. PITT. J. L. & COM. 395 (1996) (Conference for the Second Century of the University of Pittsburgh School of Law Symposium volume).[[ http://www.law.miami.edu/~froomkin/articles/ocean.htm (available online)]]
  • The Essential Role of Trusted Third Parties in Electronic Commerce, 75 ORE. L. REV. 49 (1996) (The Law and Entrepreneurship Program: Innovation and the Information Environment, Symposium Volume).[[ http://www.law.miami.edu/~froomkin/articles/trusted.htm (available online )]] Reprinted in READINGS IN ELECTRONIC COMMERCE 119 (Ravi Kalakota & Andrew B. Whinston, eds. 1997).

The Metaphor is the Key: Cryptography, the Clipper Chip and the Constitution, 143 U. Penn. L. Rev. 709 (1995)).[(available online)]

  • The Constitutionality of Mandatory Key Escrow--A First Look in BUILDING IN BIG BROTHER: THE CRYPTOGRAPHIC POLICY DEBATE 413 (Lance Hoffman, ed. 1995).
  • The Imperial Presidency's New Vestments, 88 NW. L. REV. 1346 (1994).
  • Still Naked After All These Words, 88 NW. L. REV. 1420 (1994).
  • Politiké Finance V ÈSFR (with Steve Gordon), 12 PRÁVNÍK 1079 (1990).
  • Climbing the Most Dangerous Branch: Legisprudence and the New Legal Process, 66
  • TEX. L. REV. 1071 (1988) (book review). Note, In Defense of Administrative Agency Autonomy, 96 YALE L.J. 787 (1987).

References edit