Beebe ‐ Trademark Law: an Open‐Source Casebook Part II 1 II. Trademark Infringement

Total Page:16

File Type:pdf, Size:1020Kb

Beebe ‐ Trademark Law: an Open‐Source Casebook Part II 1 II. Trademark Infringement Beebe ‐ Trademark Law: An Open‐Source Casebook II. Trademark Infringement ............................................................................................................. 3 A. The Actionable Use Requirement ..................................................................................... 4 1. Defendant’s “Use in Commerce” ............................................................................. 5 Rescuecom Corp. v. Google Inc. .......................................................................... 7 2. Defendant’s Use “in Connection with the Sale…of any Goods or Services” ......................................................................................................................... 19 Bosley Medical Institute, Inc. v. Kremer ...................................................... 20 B. Confusion‐Based Infringement ...................................................................................... 28 1. The History of the Confusion‐Based Cause of Action for Trademark Infringement ................................................................................................................ 29 a. The Early‐Twentieth Century Approach to the Likelihood of Consumer Confusion ....................................................................................... 29 Borden Ice Cream Co. v. Borden’s Condensed Milk Co. ........................ 29 b. The Development of the Modern Multifactor Test ............................. 34 Polaroid Corp. v. Polarad Electronics Corp. .............................................. 36 2. Contemporary Applications of the Multifactor Test for the Likelihood of Confusion .................................................................................................................. 40 Virgin Enterprises Ltd. v. Nawab ................................................................... 43 3. Survey Evidence and the Likelihood of Confusion ....................................... 59 Smith v. Wal‐Mart Stores, Inc. ......................................................................... 62 4. “Sponsorship or Affiliation” Confusion ............................................................. 85 5. Initial Interest Confusion ........................................................................................ 92 Network Automation, Inc. v. Advanced Systems Concepts, Inc. ....... 93 6. Post‐Sale Confusion ................................................................................................ 113 Ferrari S.P.A. v. Roberts .................................................................................... 114 7. Reverse Confusion .................................................................................................. 129 A & H Sportswear, Inc. v. Victoria’s Secret Stores, Inc. ....................... 130 8. Reverse Passing Off ................................................................................................ 146 Dastar Corp. v. Twentieth Century Fox Film Corp. ............................... 148 9. Lanham Act § 2(d) Confusion ............................................................................. 163 C. Trademark Dilution ......................................................................................................... 166 1. Dilution by Blurring ............................................................................................... 172 Nike, Inc. v. Nikepal Intern., Inc. ................................................................... 172 Starbucks Corp. v. Wolfe's Borough Coffee, Inc. .................................... 187 Chanel v. Makarczyk .......................................................................................... 203 2. Dilution by Tarnishment ...................................................................................... 214 V Secret Catalogue, Inc. v. Moseley .............................................................. 214 D. Cybersquatting ................................................................................................................... 230 Part II 1 This work is licensed under the Creative Commons Attribution‐NonCommercial‐ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by‐nc‐sa/4.0/. V1.0/2014‐07‐03. Beebe ‐ Trademark Law: An Open‐Source Casebook 1. The Section 43(d) Prohibition Against Cybersquatting .......................... 230 Sporty’s Farm L.LC. v. Sportsman’s Market, Inc. ................................... 230 Lamparello v. Falwell ........................................................................................ 243 2. The Uniform Dispute Resolution Policy and the Uniform Rapid Suspension System ................................................................................................. 257 a. The Uniform Dispute Resolution Policy ............................................... 257 Eastman Sporto Group LLC v. Jim and Kenny ........................................ 265 b. The Uniform Rapid Suspension System ............................................... 277 Facebook Inc. v. Radoslav ............................................................................... 279 E. Secondary Liability ........................................................................................................... 283 Tiffany (NJ) Inc. v. eBay Inc. ............................................................................ 283 Gucci America, Inc. v. Frontline Processing Corp. ................................. 301 Part II 2 This work is licensed under the Creative Commons Attribution‐NonCommercial‐ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by‐nc‐sa/4.0/. V1.0/2014‐07‐03. Beebe ‐ Trademark Law: An Open‐Source Casebook II. Trademark Infringement In this Part, we consider the infringement of trademark rights under certain sections of the Lanham Act: § 32, 15 U.S.C. § 1114 (likelihood of confusion with respect to registered marks) § 43(a), 15 U.S.C. § 1125(a) (likelihood of confusion with respect to registered or unregistered marks) § 43(c), 15 U.S.C. § 1125(c) (likelihood of dilution with respect to registered or unregistered marks) § 43(d), 15 U.S.C. § 1125(d) (“cybersquatting” of registered or unregistered marks) Note that the test for likelihood of confusion under § 32 is now essentially the same as the test for likelihood of confusion under § 43(a), and courts often cite to case law under one section interchangeably with case law under the other. When owners of registered marks plead likelihood of confusion, they typically do so under both § 32 and § 43(a) in the event that some defect is discovered in their registration. Such plaintiffs may also plead under both sections in order to avail themselves of the slightly broader language of § 43(a), though, again, courts typically treat § 32 and § 43(a) as essentially interchangeable. Courts have set forth the elements of a trademark infringement claim in a variety of ways. For example, with respect to a claim based on a likelihood of confusion under either or both of § 32 and § 43(a), courts have stated: “[T]o succeed in a Lanham Act suit for trademark infringement, a plaintiff has two obstacles to overcome: the plaintiff must prove that its mark is entitled to protection and, even more important, that the defendant's use of its own mark will likely cause confusion with plaintiff's mark.” Gruner + Jahr USA Publ'g v. Meredith Corp., 991 F.2d 1072, 1074 (2d Cir.1993). “To prevail on a claim of trademark infringement under the Lanham Act, 15 U.S.C. § 1114, a party must prove: (1) that it has a protectible ownership interest in the mark; and (2) that the defendant’s use of the mark is likely to cause consumer confusion.” Network Automation, Inc. v. Advanced Systems Concepts, Inc., 638 F.3d 1137, 1144 (9th Cir. 2011) (citations omitted). “To establish trademark infringement under the Lanham Act, a plaintiff must prove: (1) that it owns a valid mark; (2) that the defendant used the mark ‘in commerce’ and without plaintiff’s authorization; (3) that the defendant used the mark (or an imitation of it) ‘in connection with the sale, Part II 3 This work is licensed under the Creative Commons Attribution‐NonCommercial‐ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by‐nc‐sa/4.0/. V1.0/2014‐07‐03. Beebe ‐ Trademark Law: An Open‐Source Casebook offering for sale, distribution, or advertising’ of goods or services; and (4) that the defendant’s use of the mark is likely to confuse consumers.” Rosetta Stone v Google Rosetta Stone Ltd. v. Google, Inc., 676 F.3d 144, 152 (4th Cir. 2012) (citations omitted). “Both infringement and false designation of origin have five elements. To prevail under either cause of action, the trademark holder must prove: (1) that it possesses a mark; (2) that the [opposing party] used the mark; (3) that the [opposing party's] use of the mark occurred ‘in commerce’; (4) that the [opposing party] used the mark ‘in connection with the sale, offering for sale, distribution, or advertising’ of goods or services; and (5) that the [opposing party] used the mark in a manner likely to confuse consumers.” Lamparello v. Falwell, 420 F.3d 309, 313 (4th Cir. 2005) (citations omitted). Though the enumerations vary in their level of detail, these statements of the elements of a likelihood of confusion claim are all essentially the same. The plaintiff must prove that (1) it possesses exclusive rights in a mark and
Recommended publications
  • Child Pornography in the “Send Nudes” Era 239
    University of Baltimore Law Review Volume 49 Issue 2 Article 6 2020 Reevaluating Maryland’s Child Pornography Laws in the “Send Nudes” Era Shannon Hayden Follow this and additional works at: https://scholarworks.law.ubalt.edu/ublr Part of the Law Commons Recommended Citation Hayden, Shannon (2020) "Reevaluating Maryland’s Child Pornography Laws in the “Send Nudes” Era," University of Baltimore Law Review: Vol. 49 : Iss. 2 , Article 6. Available at: https://scholarworks.law.ubalt.edu/ublr/vol49/iss2/6 This Article is brought to you for free and open access by ScholarWorks@University of Baltimore School of Law. It has been accepted for inclusion in University of Baltimore Law Review by an authorized editor of ScholarWorks@University of Baltimore School of Law. For more information, please contact [email protected]. REEVALUATING MARYLAND’S CHILD PORNOGRAPHY LAWS IN THE “SEND NUDES” ERA Shannon Hayden* I. INTRODUCTION In 2018, A24 Films released the film Eighth Grade.1 Critics and audiences alike immediately praised the film for its “painfully real” depiction of what it is like to grow up in the age of social media.2 The film follows protagonist Kayla, a bit of a “quiet outcast,”3 as she navigates her way through the last week of middle school, trying desperately to fit in.4 Kayla’s middle school experience is similar to that of many adolescents; she is socially awkward at school and riddled with anxiety, but at home she comes alive, where she self- produces videos for her YouTube channel.5 Like many of her real life counterparts, Kayla has a crush on the resident cool kid Aiden, a classmate of hers.6 In one memorable scene, Kayla’s middle school is having an active shooter drill.7 During the drill, Kayla hears from * J.D.
    [Show full text]
  • Appendix A: Non-Executive Directors of Channel 4 1981–92
    Appendix A: Non-Executive Directors of Channel 4 1981–92 The Rt. Hon. Edmund Dell (Chairman 1981–87) Sir Richard Attenborough (Deputy Chairman 1981–86) (Director 1987) (Chairman 1988–91) George Russell (Deputy Chairman 1 Jan 1987–88) Sir Brian Bailey (1 July 1985–89) (Deputy Chairman 1990) Sir Michael Bishop CBE (Deputy Chairman 1991) (Chairman 1992–) David Plowright (Deputy Chairman 1992–) Lord Blake (1 Sept 1983–87) William Brown (1981–85) Carmen Callil (1 July 1985–90) Jennifer d’Abo (1 April 1986–87) Richard Dunn (1 Jan 1989–90) Greg Dyke (11 April 1988–90) Paul Fox (1 July 1985–87) James Gatward (1 July 1984–89) John Gau (1 July 1984–88) Roger Graef (1981–85) Bert Hardy (1992–) Dr Glyn Tegai Hughes (1983–86) Eleri Wynne Jones (22 Jan 1987–90) Anne Lapping (1 Jan 1989–) Mary McAleese (1992–) David McCall (1981–85) John McGrath (1990–) The Hon. Mrs Sara Morrison (1983–85) Sir David Nicholas CBE (1992–) Anthony Pragnell (1 July 1983–88) Usha Prashar (1991–) Peter Rogers (1982–91) Michael Scott (1 July 1984–87) Anthony Smith (1981–84) Anne Sofer (1981–84) Brian Tesler (1981–85) Professor David Vines (1 Jan 1987–91) Joy Whitby (1981–84) 435 Appendix B: Channel 4 Major Programme Awards 1983–92 British Academy of Film and Television Arts (BAFTA) 1983: The Snowman – Best Children’s Programme – Drama 1984: Another Audience With Dame Edna – Best Light Entertainment 1987: Channel 4 News – Best News or Outside Broadcast Coverage 1987: The Lowest of the Low – Special Award for Foreign Documentary 1987: Network 7 – Special Award for Originality
    [Show full text]
  • Virtual Prostitution: New Technologies and the World's Oldest Profession David Cardiff
    Hastings Communications and Entertainment Law Journal Volume 18 | Number 4 Article 6 1-1-1996 Virtual Prostitution: New Technologies and the World's Oldest Profession David Cardiff Follow this and additional works at: https://repository.uchastings.edu/ hastings_comm_ent_law_journal Part of the Communications Law Commons, Entertainment, Arts, and Sports Law Commons, and the Intellectual Property Law Commons Recommended Citation David Cardiff, Virtual Prostitution: New Technologies and the World's Oldest Profession, 18 Hastings Comm. & Ent. L.J. 869 (1996). Available at: https://repository.uchastings.edu/hastings_comm_ent_law_journal/vol18/iss4/6 This Note is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Communications and Entertainment Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. Virtual Prostitution: New Technologies and the World's Oldest Profession by DAVID CARDIFF* Table of Contents I. Outline of the New Technologies .......................................... 874 II. A Brief History of the Laws Relating to Pornography ....... 877 A . Pornography in G eneral ................................................... 877 B . D ial-a-Porn C ases .............................................................. 882 C. Pornography as Prostitution Cases .................................. 887 III. Arguments For and Against Aggressive Porn R egulation ...............................................................................
    [Show full text]
  • 442 Final FOURTH COMMUNICATION from the COMMISSION TO
    COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 17.07.2000 COM(2000) 442 final FOURTH COMMUNICATION FROM THE COMMISSION TO THE COUNCIL AND THE EUROPEAN PARLIAMENT on the application of Articles 4 and 5 of Directive 89/552/EEC "Television without Frontiers" for the period 1997-8 CONTENTS Introduction 3 I. Commission's opinion on the application of Articles 4 and 5 for the period 1997-1998 4 1. Application by EU Member States 4 1.1. Broadcasting of a majority proportion of European works. 4 1.2. Works by independent producers 9 2. Application by the Member States of the European Free Trade Area participating in the European Economic Area 11 II. Summary of reports from Member States 12 III. Summary of reports from the Member States of the European Free Trade Area that are part of the European Economic Area 61 IV. ANNEXES 65 Annex 1 : Document "Suggested new guidelines for monitoring application of Articles 4 and 5 of the "Television without frontiers" Directive 66 Annex 2 : List of European television channels, by country, not achieving the target for the proportion of European works and independent productions 71 Annex 3: Parameters used to calculate the weighted averages of broadcasts of European works by the channels of the European Union with a major audience. 77 2 INTRODUCTION This is the fourth Commission monitoring report on the application of Articles 4 and 5 of Directive 89/552/EEC1 as amended by Directive 97/36/EC2, for the years 1997 and 1998. It was drawn up on the basis of the reports sent in by the Member States concerning the application of Articles 4 and 5 over the reference period.
    [Show full text]
  • Building a Prevention Framework to Address Teen “Sexting” Behaviors
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Building a Prevention Framework to Address Teen “Sexting” Behaviors Author(s): Andrew J. Harris, PhD ; Judith Davidson ; Elizabeth Letourneau ; Carl Paternite ; Karin Tusinski Miofsky Document No.: 244001 Date Received: 10/30/2013 Award Number: 2010-MC-CX-0001 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant report available electronically. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Building a Prevention Framework to Address Teen “Sexting” Behaviors Funded by U.S. Department of Justice, Office of Justice Programs, Office of Juvenile Justice and Delinquency Prevention (OJJDP GRANT # 2010-MC-CX-0001) BUILDING A PREVENTION FRAMEWORK TO ADDRESS TEEN “SEXTING” BEHAVIORS Principal Investigator Andrew J. Harris, PhD University of Massachusetts Lowell Co-Investigators Judith Davidson, PhD University of Massachusetts Lowell Elizabeth Letourneau, PhD Johns Hopkins University Carl Paternite. PhD Miami University, Ohio Karin Tusinski Miofsky, PhD University of Hartford This project was supported by Grant No. 2010-MC-CX-0001, awarded by the Office of Juvenile Justice and Delinquency Prevention, Office of Justice Programs, U.S. Department of Justice. Points of view or opinions in this document
    [Show full text]
  • Computer Winter 99
    Winter 1999 Volume 17, No. 1 In the News... Editor Christopher J. Falkowski By Christopher J. Falkowski, Counsel, CSC Health Care, Inc. [email protected] and Jeremy D. Bisdorf, http://www.michbar.org/sections/computer/ Associate, Raymond & Prokop, P.C. “As it happened, the lightning struck early. The public got a taste of interactivity on the Internet’s World Wide Web and said, ‘We’re not waiting for a better solution! Let’s go’.” — Bill Gates (cofounder and chairman of Microsoft Corporation) Web Entanglements: A Copyrights Analysis of Linking on the World Wide Web By Mario J. Fiorucci Part I: Introduction This excerpt by author Stephen Wilson encapsulates the power of the Web. It is linking that makes the WWW web- In June 1998, Matrix Information and Directory Ser- like, with documents seamlessly referencing and cross-refer- vices reported that there were 102 million people access- encing each other. The result is that browsing the WWW dif- ing the Internet in the world. They estimate this number fers fundamentally from traditional means of research, in that will increase to 707 million by the year 2001.1 There is no it is inherently non-linear. Users can jump from one document doubt this astonishing growth is due in large part to the to another, following a unique course on an indirect pathway 4 World Wide Web (‘WWW’ or ‘Web’). The dramatic through cyberspace. However, WWW linking raises some in- growth the Web has experienced in recent years has teresting legal questions. Does the provision of a link impli- transformed the Internet from
    [Show full text]
  • Cable Authority Annual Reports and Accounts 1988-89
    © Cable Authority 1989 British Cable :KeyFads 31 March 31 March 31 March 1989 1988 1987 Number of franchises awarded 32 23 22 Number of franchises operating 10 10 8 Homes to be passed by franchises awarded 4.601.000 2,365,000 2,297 .000 Homes so far passed 470,203 307,453 168,436 Homes connected to franchises 65.874 44.565 21,873 Average franchise penetration rate 14.0% 14.5% 13.0% Average subscription paid per month £17.08 £17.86 £18.50 Licences for upgrade/SMATV systems 144 119 73 Homes passed by all UK cable 1,478.583 1,372,856 1,189.655 Homes connected to all UK cable 283,816 256.527 193.173 Average penetration rate 19.2% 18.7% 16.2% Proportion of viewing of cable channels 36% 39% 30% The Rt Hon Douglas Hurd CBE M P Secretary of State for the Hom e Department Hom e Office 50 Queen Anne's Gate LONDO N SW1H 9AT 10 July 1989 Dear Secretary of State I have pleasure in sending to you, inaccordance w ith section 21 of the Cable and Broadcasting Act 1984, the Annual Report of the Cable Authority, together w ith the statement of accounts, covering the period from April 1988 to March 1989 . Yours sincerely ~ - /' Richard Burton • M r Richard Burton Chairman of the Authority Members oftheAuthority Chairman MR RICHARD H BURTON Deputy Chairman PROFESSOR JAMES RING CBE MRS ANNE BALLARD M RPHILlP DARW IN MR PAUL JOHNSON M RS ELIZA BETH MACDONALD-BROWN M R PETER S PAINE CBE DFC 2 Chairman's Foreword W hen I said in my foreword to last year's report that the prospects for cable w ere better than ever before.
    [Show full text]
  • 219-Page Antitrust Complaint
    INTRODUCTION This action arises under federal antitrust laws in the context of the worldwide motion picture industry (the “movie industry” or the “WMPI”). Defendant LIONSGATE ENTERTAINMENT CORP. (“LIONSGATE”),1 a corporate entity of foreign origin which currently trades on the New York Stock Exchange, has become a dominant market force in the movie industry during the last five years on the strength of a fresh WMPI business model known as the “tentpole franchise.” Beginning in 2001 with the theatrical debut of the highly successful movie series Harry Potter, the tentpole franchise has proven to be the most lucrative way of doing business for largescale (i.e., billion-dollar-plus annual revenue) movie studios. This business model contemplates a series of motion pictures as one “brand” or single property under which all economic and speech activity can be consolidated, owned, controlled and monetized by the studio. But as this case demonstrates, the newfangled model – which actually has roots in 19th century popular entertainment - has the potential to threaten the existence of the already limited “Fair Use Zones” populated by independent filmmakers, parodists and other “counter-cultural” artists who create separate or derivative works that may be related to, inspired by or comment upon the pop culture events that dominate the national Cineplex and, by extension: the attitudes, perspectives and behaviors of the populace. Defendants’ anticompetitive conduct sets the benchmark example for why James Madison and Thomas Jefferson were apprehensive in the months leading up to the Philadelphia Convention about granting authors even limited copyright monopolies over their works: the 1 Defendant SUMMIT ENTERTAINMENT, LLC (“SUMMIT”) is a fully-integrated and wholly-owned division or department of LIONSGATE.
    [Show full text]
  • Video Games and Gender-Based Violence
    Available online at www.sciencedirect.com ScienceDirect Procedia - Social and Behavioral Sciences 132 ( 2014 ) 58 – 64 6th International Conference on Intercultural Education “Education and Health: From a transcultural perspective” Video games and gender-based violence Enrique Javier Díez Gutiérreza * aUniversidad de León. Facultad de Educación 146, León 24071, España Abstract Gender-based violence is violence perpetrated against women, which is primarily or exclusively motivated by their sex, and includes both intimate partner abuse and physical or sexual assault by strangers. The aim of the present research was to investigate whether gender-based violence is depicted in the world of video games and whether video games contribute to the socialisation of young people in this regard. The methodology employed went beyond the administration of questionnaires to ascertain the perceptions of those who use video games or an analysis of the associated advertising, the habitual research strategies in this field. Rather, an analysis was conducted of the videogames themselves, examining their contents, dynamics and development, and the possibilities that they offer, etc., based on a "videographic analysis" of the variables explored. The results show that video games, which contain explicit incitements to violence, are widely available on the Internet, from the "anime", with various subgenres such as eroge and hentai, to the famous GTA, one of the best-selling video games worldwide, which contains a clear incitement to violence in the sense defined by the Comprehensive Law against Gender-Based Violence. The conclusion drawn from this research leads us to ask whether, as Amnesty International claims, we are in breach of the Convention on the Elimination of All Forms of Discrimination against Women, which requires States to take steps to remove such discrimination in all its manifestations.
    [Show full text]
  • Pornotopia-Beatriz-Preciado.Pdf
    Beatriz Preciado Pornotopía Arquitectura y sexualidad en «Playboy» durante la guerra fría H EDITORIAL ANAGRAMA BARCELONA Diseño de la colección: Julio Vivas y Estudio A Ilustración: Al Brulé Primera edición: mayo 2010 Primera edición mexicana: mayo 2010 ©Beatriz Preciado, 2010 © EDITORIAL ANAGRAMA, S. A., 2010 Pedro de la Creu, 58 08034 Barcelona ISBN: 978-607-7720-66-9 La presente edición ha sido realizada por convenio con Colofón S A. de C.V. Impreso en México. Acabados de Impresión y Encuadernación Fusión S. A. de C. V. Trigo 121, col. Granjas Esmeralda, 09810, Iztapalapa, México, D. F. El día 15 de abril de 2010, el jurado compuesto por Salvador Clotas, Román Gubern, Xavier Rubert de Ven­ tos, Fernando Savater, Vicente Verdú y el editor Jorge Herralde, concedió, por unanimidad, el XXXVIII Premio Anagrama de Ensayo a €®0$, de Eloy Fernández Porta. Resultó finalista Pornotopía, de Beatriz Preciado. ADVERTENCIA Este texto es pura ficción. Algunos de los capítulos proyectan los nombres de figuras pú­ blicas «reales» en unos personajes inventados y en unas situaciones inventadas. Cuando en esta obra se utilizan los nombres de empresas, de medios de comunicación o de políticos, con ellos sólo se quiere denotar personajes, imáge­ nes, la materia de los sueños colectivos; no de­ notan ni pretenden dar una información priva­ da de personas existentes, en carne y hueso, ni vivas, ni muertas, o nada que se le parezca. DAVID FOSTER WALLACE, La niña del pelo raro, 1989 Este proyecto surgió de una noche de insomnio. Veía la televisión, mientras intentaba dormir sin éxito en mi apartamento de Brooklyn, cuando, de repente, escuché a Hugh Hefner, el director de Playboy, la más influyente re­ vista para adultos del mundo, vestido con pijama, batín y zapatillas de estar en casa, hablando sobre la importancia de la arquitectura en el imperio que él mismo había crea­ do en 1953: palabras como «domesticidad», «liberación es­ pacial» o «ático de soltero» tenían una resonancia especial en el discurso de Hefner.
    [Show full text]
  • Teenagers' Practices of Online Sexualization and Sexting in Bulgaria
    Teenagers’ practices of online sexualization and sexting in Bulgaria Thesis submitted in partial fulfillment of the requirements for the degree of Master of Arts in Media Studies: New Media and Digital Culture at the Graduate School of Humanities at the ​ ​ University of Amsterdam Word count: 22 836 0 Table of Contents Table of Contents 1 Abstract 4 Acknowledgments 5 Theoretical Framework 7 An online self 7 Children online 7 Sexualization 9 Technology and Intimacy 10 Terms of Service 11 Sexual Education 13 The state of the affair in Bulgaria 14 Cultural differences 16 Law 16 Research question 16 Hypotheses 17 Methodology 18 Empirical Research 18 Dealing with the concepts 20 Finding and recruiting participants 21 Questionnaire formation 23 Analyzing the data 23 General Remarks 23 Findings and discussion 25 Platform Usage and Digital Privacy 25 Internet Usage 25 Platform Usage 26 Creating an account before the age of 13 28 General Data Protection Regulation 30 Education 30 Sexual education 30 Media Literacy Education 32 Awareness of the risks online 34 Attitudes towards digital privacy 36 1 Civil Education in Bulgaria and the teaching staff issue 37 Current initiatives and the Third Sector 40 Promoting abstinence 40 Taboo 41 Generation X 42 Online sexualization 43 The importance of social media for self-actualization 43 Girly stuff 44 The impact of social media on teenagers’ intimate relationships 45 Teenager’s sexual exploration 46 Pornography 47 Vanity metrics 48 Is social media sexualizing? 50 The warriors and the groups 51 Gender difference
    [Show full text]
  • Teenagers, Sexting, and the Law Victor C
    Teenagers, Sexting, and the Law Victor C. Strasburger, MD,a Harry Zimmerman, JD, Jeff R. Temple, PhD,b Sheri Madigan, PhD, R Psychc,d The phenomenon of teen sexting emerged as a result of the proliferation of abstract digital technology. More than 40 studies have established that teen sexting occurs relatively frequently and is a rising trend, commensurate with the ubiquity of smartphone ownership in teens. Studies have shown that sexting is associated with incidences of increased sexual behavior. US state laws on sexting vary widely, from decriminalization to misdemeanor charges or prosecution for child pornography with harsh sentences. Teen behavior and digital invention have outpaced the development of new laws, and this has the potential to have dire legal ramifications for teens. Separating consensual sexting from nonconsensual sexting and actual child pornography is a critical next step for law enforcement agencies and policy makers to catch up to technology. In this article, we argue that consensual teen-to-teen sexting does not warrant law enforcement involvement but rather is a health and education issue that is better addressed at home, in schools, and in aDepartment of Pediatrics, School of Medicine, University of New Mexico, Albuquerque, New Mexico; bUniversity of Texas primary care. Medical Branch, Galveston, Texas; cUniversity of Calgary, Calgary, Canada; and dAlberta Children’s Hospital Research Institute, Calgary, Canada Dr Strasburger and Mr Zimmerman conceptualized With the advent of smartphones, the interest in the phenomena associated the study, drafted the initial manuscript, and past decade has witnessed a new with new technology (eg, sexting, reviewed and revised the manuscript; Drs Temple manifestation of adolescent sexual cyberbullying, Internet addiction, and and Madigan helped to conceptualize the study and behavior known as sexting.
    [Show full text]