Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Intellectual Property Law

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 604

Full-Text Articles in Entire DC Network

Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton Jun 2024

Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton

DePaul Business & Commercial Law Journal

No abstract provided.


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou Apr 2024

Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou

Washington Journal of Law, Technology & Arts

This article discusses contemporary problems related to Artificial Intelligence (AI), law and the visual arts. It suggests that the fallacies of copyright law are already visible in legal conundrums raised by AI in the creative sector. These include, for instance, the lack of uniformity in relation to creations’ copyrightability, the massive scale of copyright infringement affecting visual artists and the creative industry, and the difficulties in implementing media regulation and cyber-regulation. The deeply cherished ‘human authorship’ criterion that was sustained recently by a US Federal Appeals Court in Thaler, in particular, is a short-term solution to the legal challenges …


Fairness And Fair Use In Generative Ai, Matthew Sag Apr 2024

Fairness And Fair Use In Generative Ai, Matthew Sag

Fordham Law Review

Although we are still a long way from the science fiction version of “artificial general intelligence” that thinks, feels, and refuses to “open the pod bay doors,” recent advances in machine learning and artificial intelligence (AI) have captured the public’s imagination and lawmakers’ interest. We now have large language models (LLMs) that can pass the bar exam, carry on (what passes for) a conversation about almost any topic, create new music, and create new visual art. These artifacts are often indistinguishable from their human-authored counterparts and yet can be produced at a speed and scale surpassing human ability.

“Generative AI” …


Prosumer Behavior Of The Army Fandom Of Bts In Indonesia As A Form Of New Consumerist Society, Larassatti Dharma Nanda, Joesana Tjahjani Jan 2024

Prosumer Behavior Of The Army Fandom Of Bts In Indonesia As A Form Of New Consumerist Society, Larassatti Dharma Nanda, Joesana Tjahjani

International Review of Humanities Studies

One of the most influential K-pop groups in the world is Bangtan Sonyeondan, abbreviated as BTS. BTS' success can also be determined by their extensive community of fans who create a fandom culture worldwide, including in Indonesia. This paper investigates the BTS fandom consumerism behavior, which is called ARMY, and its relation to Indonesia's participatory fan culture. This research focuses on how BTS's managing company creates a fandom image and how Indonesian fans react. This article is qualitative research using a literature review as the method. Analysis of this paper uses the consumerist society theory by Jean Baudrillard (1986) to …


The Ideas Of Journalistic Ethics Based On Pancasila For Multicultural Society, Sugeng Sugeng, Fristian Hadinata Jan 2024

The Ideas Of Journalistic Ethics Based On Pancasila For Multicultural Society, Sugeng Sugeng, Fristian Hadinata

International Review of Humanities Studies

This paper aims to show that journalistic code of ethics based on Pancasila is strongly related to multiculturalism morality as both emphasize inclusive ideas, respect for diversity, and the awareness of unity in diversity. The writers use descriptive qualitative library research in the field of philosophy to show meaning and objectively reveal philosophical essence. This method includes collecting and analyzing criticism of relevant literature related to multiculturalism, philosophy, journalistic ethics, and cyber media reporting. The result shows that the development of the internet technology has changed the way society live, and it has affected their preferences towards the elements of …


Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky Jan 2024

Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky

University of Miami Business Law Review

For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …


Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella Jan 2024

Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella

Washington Journal of Law, Technology & Arts

If digital platforms are found liable on hybrid antitrust-data protection violations, by how much should individual users be compensated? While traditional antitrust literature offers some estimation techniques, these methods were developed mostly around the idea that anti-competitive conduct manifests in supra-competitive prices, lost profits, or lost customers, all of which are easily quantifiable using commercially available evidence.

In digital markets, where antitrust violations are often intertwined with data protection issues, several complications arise. First, unlike transactions covered by traditional treble damage estimation techniques, “data-for-services” dealings are not evidenced by receipts. Second, personal data valuation is highly contextual and prone to …


Forming A More Perfect Union With Blockchains And Nfts: Why The United States Should Embrace An E-Government, Alexandria Labaro Jan 2024

Forming A More Perfect Union With Blockchains And Nfts: Why The United States Should Embrace An E-Government, Alexandria Labaro

Fordham Intellectual Property, Media and Entertainment Law Journal

This Note analyzes blockchain and non-fungible token (“NFT”) technology in the government, emphasizing the benefits of technological integration for improved data security and streamlined bureaucratic processes. It follows the growing popularity of “e-government” practices across the globe and considers factors associated with integrating blockchain and NFT technology in U.S. governmental procedures.


Foreign Intelligence Surveillance Act Section 702: The Good, The Bad, And A Proposal To Make It Less Ugly, Kevin Burns Jan 2024

Foreign Intelligence Surveillance Act Section 702: The Good, The Bad, And A Proposal To Make It Less Ugly, Kevin Burns

Fordham Intellectual Property, Media and Entertainment Law Journal

Section 702 of the Foreign Intelligence Surveillance Act (“FISA”) has been controversial since its inception. Created to allow intelligence collection against targeted foreign persons, electronic surveillance under Section 702 casts a wide net, often capturing communications sent to or by United States persons. Opponents point to the invasion of privacy such collection presents, and to the well-documented abuse and biased use of Section 702 data against U.S. citizens. This Note argues that despite this, Section 702 is a vital tool in the fight against terrorism and drug trafficking and the case against Section 702 is weaker than it appears. This …


Looking For Liability For Harmful Social Media Content And Cyberbullying After Gonzalez V. Google, Llc, Elizabeth M. Jaffe Jan 2024

Looking For Liability For Harmful Social Media Content And Cyberbullying After Gonzalez V. Google, Llc, Elizabeth M. Jaffe

Marquette Intellectual Property & Innovation Law Review

None


Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi Jan 2024

Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi

Cybaris®

No abstract provided.


Cross-Border Data Regulatory Frameworks: Opportunities, Challenges, And A Future- Forward Agenda, Andrew D. Mitchell, Neha Mishra Jan 2024

Cross-Border Data Regulatory Frameworks: Opportunities, Challenges, And A Future- Forward Agenda, Andrew D. Mitchell, Neha Mishra

Fordham Intellectual Property, Media and Entertainment Law Journal

This Article evaluates the existing regulatory framework for cross-border data flows across Bahrain, Djibouti, Jordan, Kuwait, Morocco, Nigeria, Oman, Pakistan, Rwanda, and Saudi Arabia. A common factor among these countries is that they are members of the Digital Cooperation Organization (“DCO”). It considers how these countries have devised laws, regulations, and policies on cross-border data flows to enable digital trade, and how these instruments promote the growth of a robust digital economy, both domestically and internationally. The Article then offers policy recommendations for DCO members to consider in developing relevant laws and regulations on data flows.

These …


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray Oct 2023

Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray

Akron Law Review

This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …


Place Your Bets: The Legal Integration Of Sports Betting With Cryptocurrency, Andrew Topps Sep 2023

Place Your Bets: The Legal Integration Of Sports Betting With Cryptocurrency, Andrew Topps

UNH Sports Law Review

No abstract provided.


Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan Aug 2023

Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan

Brooklyn Journal of International Law

Deepfake technology is becoming increasingly sophisticated, and with it, the potential to pose a significant threat to the digital community, democratic institutions, and private individuals. With the creation of highly convincing but entirely fabricated audio, video, and images, there is a pressing need for the international community to address the vulnerabilities posed by deepfake technology in the current legal landscape through unambiguous legislation. This Note explores the ethical, legal, and social implications of deepfakes, including issues of privacy, identity theft, and political manipulation. It also reviews existing international legal frameworks, i.e., the Convention on Cybercrime (“Budapest Convention”) and proposes a …


Kejahatan Siber Terhadap Individu: Jenis, Analisis, Dan Perkembangannya, Russel Butarbutar Aug 2023

Kejahatan Siber Terhadap Individu: Jenis, Analisis, Dan Perkembangannya, Russel Butarbutar

Technology and Economics Law Journal

No abstract provided.


Vested Patents And Equal Justice, Adam Macleod Aug 2023

Vested Patents And Equal Justice, Adam Macleod

Catholic University Law Review

In a time of renewed interest in equal justice, the vested patent right may be timely again. Vested patent rights helped marginalized Americans to secure equal justice earlier in American history. And they helped to make sense of the law. Vested patent rights can perform those tasks again today.

The concept of vested rights render patent law coherent. And it explains patent law’s interactions with other areas of law, such as property, administrative, and constitutional law. The vested rights doctrine also can serve the requirements of equal justice, as it has several times in American history. Vested rights secure justice …


The Need For Cyber Resilience Of Space Assets: Law And Policy Considerations Of Ensuring Cybersecurity In Outer Space, Daniella Febbraro Jul 2023

The Need For Cyber Resilience Of Space Assets: Law And Policy Considerations Of Ensuring Cybersecurity In Outer Space, Daniella Febbraro

Canadian Journal of Law and Technology

In 2018, NASA’s Jet Propulsion Laboratory was the subject of a data breach where over 500 megabytes of data from a major mission system was stolen by hackers. This attack affected NASA’s Deep Space Network, prompting the United States Johnson Space Center to disconnect the International Space Station from the affected gateway due to fears that mission systems could become compromised. NASA has acknowledged that its vast online presence, which includes thousands of publicly accessible datasets, offers a large potential target for cybercriminals. The 2018 incident was one of many, with NASA experiencing more than 6000 cyberattacks from 2017-2021 alone. …


Parallel Play: The Simultaneous Professional Responsibility Campaigns Against Unethical Ip Practitioners By The United States And China, Mark A. Cohen Jun 2023

Parallel Play: The Simultaneous Professional Responsibility Campaigns Against Unethical Ip Practitioners By The United States And China, Mark A. Cohen

Akron Law Review

“Parallel Play: The Simultaneous Professional Responsibility Campaigns Against IP Practitioners by the United States and China” describes efforts by the United States Patent and Trademark Office and the China National IP Administration to discipline trademark and patent practitioners through contemporaneous campaign-style approach directed to bad faith filings. At the USPTO, many of these bad faith filings have originated from China. In both countries, these bad faith activities have imposed significant burdens on IP agencies, the courts, and legitimate rights holders. The campaign is likely the largest professional responsibility campaign undertaken by an IP agency, and the largest cross-border IP disciplinary …


Under Nifty Light: Trademark Considerations For The New Digital World, Willajeanne F. Mclean Jun 2023

Under Nifty Light: Trademark Considerations For The New Digital World, Willajeanne F. Mclean

Akron Law Review

Three cases involving non-fungible tokens are grabbing the attention of fashionistas, intellectual property mavens, and metaverse cognoscenti alike. All three are cases of first impression, despite involving trademark infringement claims. All are considered to be cases that will determine whether old trademark principles apply to new technology, and each has compelling and competing arguments that may militate against findings of infringement. While most commentators have focused on the questions surrounding alleged infringement, very few have discussed the challenges of applying remedies, such as injunctions, traditionally used in trademark infringement cases.

This article considers trademark law and examines it in a …


Protecting Public Health Amidst Data Theft, Sludge, And Dark Patterns: Overcoming The Constitutional Barriers To Health Information Regulations, Jon M. Garon Jun 2023

Protecting Public Health Amidst Data Theft, Sludge, And Dark Patterns: Overcoming The Constitutional Barriers To Health Information Regulations, Jon M. Garon

Akron Law Review

Public health has grown to over $4.1 trillion in spending in the past year, yet for millions of people, their health care is ineffective and sometimes harmful. New technologies have improved health access and treatment, but they can expose an individual’s personal health information to theft and misuse. There is little or no regulation for the reuse of data once it has been lawfully collected for general purposes. Any observer can create a detailed personal diary of an individual or a population by building from a mosaic of inferential data—such as lawfully obtained zip code information, non-regulated health care application …


What You Don’T Know Will Hurt You: Fighting The Privacy Paradox By Designing For Privacy And Enforcing Protective Technology, Perla Khattar Jun 2023

What You Don’T Know Will Hurt You: Fighting The Privacy Paradox By Designing For Privacy And Enforcing Protective Technology, Perla Khattar

Washington Journal of Law, Technology & Arts

The persistence of the privacy paradox is proof that current industry regulation is insufficient to protect consumer’s privacy. Although consumer choice is essential, we argue that it should not be the main pillar of modern data privacy legislation. This article argues that legislation should aim to protect consumer’s personal data in the first place, while also giving internet users the choice to opt-in to the processing of their information. Ideally, privacy by design principles would be mandated by law, making privacy an essential component of the architecture of every tech-product and service.


Weisner V. Google Llc: An Effort To Provide Clarity Regarding Patent Subject Matter Eligibility, Poirot, Nicole May 2023

Weisner V. Google Llc: An Effort To Provide Clarity Regarding Patent Subject Matter Eligibility, Poirot, Nicole

Santa Clara High Technology Law Journal

The United States Court of Appeals for the Federal Circuit (“Federal Circuit”) recently issued a precedential two-to-one decision regarding patent subject matter eligibility under section 101 of the Patent Act.1 In Weisner v. Google LLC, the Federal Circuit held that U.S. Patent Nos. 10,380,202 and 10,642,910 are directed to abstract ideas of creating digital travel logs which are patent ineligible.2 Additionally, the Court held that U.S. Patent Nos. 10,394,905 and 10,642,911 are directed to both creating and using travel logs to improve computerized search results and are potentially patenteligible.3 The majority’s decision is an attempt to clarify the historically gray …


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …