{"id":480,"date":"2016-10-24T03:17:20","date_gmt":"2016-10-24T07:17:20","guid":{"rendered":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/?page_id=480"},"modified":"2024-09-27T20:23:22","modified_gmt":"2024-09-27T20:23:22","slug":"volume-8","status":"publish","type":"page","link":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/volumes\/volume-8\/","title":{"rendered":"Volume 8"},"content":{"rendered":"<p style=\"text-align:center\"><strong>Symposium&nbsp;Issue 2009<\/strong><\/p>\n<p><em><strong>&#8220;Kiddie Crime&#8221;? The Utility of Criminal Law in Controlling Cyberbullying<\/strong><\/em>&nbsp;by Susan W. Brenner &amp; Megan Rehberg<\/p>\n<p><em><strong>Qualified Immunity and the Trials and Tribulations of Online Student Speech: A Review of Cases and Controversies from 2009<\/strong><\/em>&nbsp;by Clay Calvert<\/p>\n<p><em><strong>Revisiting User Control: The Emergence and Success of a First Amendment Theory for the Internet Age<\/strong><\/em>&nbsp;by John B. Morris &amp; Cynthia M. Wong<\/p>\n<p><em><strong>By Any Means Necessary? The FCC&#8217;s Implementation of Net Neutrality<\/strong><\/em>&nbsp;by Dawn C. Nunziato<\/p>\n<p><em><strong>Sex, Lies and the Internet: Balancing First Amendment Interests, Reputational Harm, and Privacy in the Age of Blogs and Social Networking Sites<\/strong><\/em>&nbsp;by Robert D. Richards<\/p>\n<p style=\"text-align:center\"><strong>Spring Issue 2010<\/strong><\/p>\n<p><em><strong>Father Hill and Fanny Hill: An Activist Group&#8217;s Crusade to Remake Obscenity Law<\/strong><\/em>&nbsp;by Stephen Bates<\/p>\n<p><em><strong>Standards of Conduct for Journalists Under Europe&#8217;s First Amendment<\/strong><\/em>&nbsp;by Regis Bismuth<\/p>\n<p><em><strong>Licensing Facially Religious Government Speech: Summum&#8217;s Impact on the Free Speech and Establishment Clauses<\/strong><\/em>&nbsp;by Scott W. Gaylord<\/p>\n<p><em><strong>Blood Libel: Radical Islam&#8217;s Conscription of the Law of Defamation into a Legal Jihad Against the West &#8211; and How to Stop It<\/strong><\/em>&nbsp;by R. Ashby Pate<\/p>\n<p><em><strong>Obstacles to Credit Rating Agencies&#8217; First Amendment Defense in Light of Abu Dhabi<\/strong><\/em>&nbsp;by <a href=\"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/volume-8-masthead\/\">Parisa Haghshenas<\/a><\/p>\n<p>University of North Carolina School of Law, Class of 2010<\/p>\n<p>Staff Writer (Vol. 8)<\/p>\n<p><em><strong>Iran, Social Media, and U.S. Trade Sanctions: The First Amendment Implications of U.S. Foreign Policy<\/strong><\/em>&nbsp;by <a href=\"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/volume-8-masthead\/\">Nadia L. Luhr<\/a><\/p>\n<p>University of North Carolina School of Law, Class of 2010<\/p>\n<p>Staff Writer (Vol. 8)<\/p>\n<p><em><strong>Insincere Apologies: The Tenth Circuit&#8217;s Treatment of Compelled Speech in Public High Schools<\/strong><\/em>&nbsp;by <a href=\"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/volume-9-masthead\/\">Nora Sullivan<\/a><\/p>\n<p>University of North Carolina School of Law, Class of 2010<\/p>\n<p>Executive Editor (Vol. 9)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Symposium&nbsp;Issue 2009 &#8220;Kiddie Crime&#8221;? The Utility of Criminal Law in Controlling Cyberbullying&nbsp;by Susan W. Brenner &amp; Megan Rehberg Qualified Immunity and the Trials and Tribulations of Online Student Speech: A Review of Cases and Controversies from 2009&nbsp;by Clay Calvert Revisiting User Control: The Emergence and Success of a First Amendment Theory for the Internet Age&nbsp;by <a href=\"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/volumes\/volume-8\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":10,"featured_media":0,"parent":2218,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/wp-json\/wp\/v2\/pages\/480"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/wp-json\/wp\/v2\/comments?post=480"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/wp-json\/wp\/v2\/pages\/480\/revisions"}],"predecessor-version":[{"id":5464,"href":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/wp-json\/wp\/v2\/pages\/480\/revisions\/5464"}],"up":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/wp-json\/wp\/v2\/pages\/2218"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/firstamendmentlawreview\/wp-json\/wp\/v2\/media?parent=480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}