Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Fordham Law School (74)
- Schulich School of Law, Dalhousie University (58)
- UC Law SF (49)
- UIC School of Law (49)
- University of Georgia School of Law (24)
-
- Santa Clara Law (20)
- The Catholic University of America, Columbus School of Law (19)
- University of Richmond (19)
- Case Western Reserve University School of Law (17)
- Northwestern Pritzker School of Law (16)
- Chicago-Kent College of Law (15)
- Vanderbilt University Law School (15)
- University of Michigan Law School (14)
- Southern Methodist University (13)
- American University Washington College of Law (12)
- University of Washington School of Law (12)
- Villanova University Charles Widger School of Law (11)
- Duke Law (10)
- Seattle University School of Law (10)
- Washington and Lee University School of Law (10)
- Brooklyn Law School (9)
- University at Buffalo School of Law (9)
- University of South Florida (9)
- Marquette University Law School (8)
- The University of Akron (8)
- Universitas Indonesia (8)
- Texas A&M University School of Law (7)
- West Virginia University (6)
- Maurer School of Law: Indiana University (5)
- Pace University (5)
- Keyword
-
- Internet (45)
- Intellectual property (41)
- Copyright (38)
- Technology (23)
- Trademark (21)
-
- Privacy (19)
- Intellectual Property (16)
- Cybersecurity (15)
- Copyright infringement (13)
- Copyright law (13)
- Law (12)
- Patent (11)
- DMCA (10)
- Digital Millennium Copyright Act (10)
- First Amendment (10)
- Journal (10)
- Legal (10)
- NJTIP (10)
- Northwestern Journal of Technology and Intellectual Property (10)
- Cyberspace (9)
- Northwestern University (9)
- Software (9)
- China (8)
- Domain names (8)
- Inc. (8)
- Information (8)
- Infringement (8)
- Lanham Act (8)
- Trade secrets (8)
- Fair use (7)
- Publication Year
- Publication
-
- Fordham Intellectual Property, Media and Entertainment Law Journal (68)
- Canadian Journal of Law and Technology (58)
- UC Law SF Communications and Entertainment Journal (49)
- UIC Review of Intellectual Property Law (37)
- Journal of Intellectual Property Law (23)
-
- Santa Clara High Technology Law Journal (20)
- Catholic University Journal of Law and Technology (18)
- Richmond Journal of Law & Technology (18)
- Journal of Law, Technology, & the Internet (17)
- Northwestern Journal of Technology and Intellectual Property (15)
- Chicago-Kent Journal of Intellectual Property (13)
- SMU Science and Technology Law Review (13)
- Duke Law & Technology Review (10)
- Vanderbilt Journal of Entertainment & Technology Law (10)
- Washington Journal of Law, Technology & Arts (10)
- Jeffrey S. Moorad Sports Law Journal (9)
- Military Cyber Affairs (9)
- Buffalo Intellectual Property Law Journal (8)
- Seattle University Law Review (8)
- Intellectual Property Brief (7)
- Michigan Telecommunications & Technology Law Review (7)
- UIC John Marshall Journal of Information Technology & Privacy Law (7)
- Akron Law Review (6)
- Marquette Intellectual Property Law Review (6)
- Texas A&M Journal of Property Law (6)
- West Virginia Law Review (6)
- Brooklyn Journal of International Law (5)
- The University of Cincinnati Intellectual Property and Computer Law Journal (5)
- UIC Law Review (5)
- Washington and Lee Law Review (5)
Articles 1 - 30 of 604
Full-Text Articles in Entire DC Network
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
DePaul Business & Commercial Law Journal
No abstract provided.
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Washington Journal of Law, Technology & Arts
This article discusses contemporary problems related to Artificial Intelligence (AI), law and the visual arts. It suggests that the fallacies of copyright law are already visible in legal conundrums raised by AI in the creative sector. These include, for instance, the lack of uniformity in relation to creations’ copyrightability, the massive scale of copyright infringement affecting visual artists and the creative industry, and the difficulties in implementing media regulation and cyber-regulation. The deeply cherished ‘human authorship’ criterion that was sustained recently by a US Federal Appeals Court in Thaler, in particular, is a short-term solution to the legal challenges …
Fairness And Fair Use In Generative Ai, Matthew Sag
Fairness And Fair Use In Generative Ai, Matthew Sag
Fordham Law Review
Although we are still a long way from the science fiction version of “artificial general intelligence” that thinks, feels, and refuses to “open the pod bay doors,” recent advances in machine learning and artificial intelligence (AI) have captured the public’s imagination and lawmakers’ interest. We now have large language models (LLMs) that can pass the bar exam, carry on (what passes for) a conversation about almost any topic, create new music, and create new visual art. These artifacts are often indistinguishable from their human-authored counterparts and yet can be produced at a speed and scale surpassing human ability.
“Generative AI” …
Prosumer Behavior Of The Army Fandom Of Bts In Indonesia As A Form Of New Consumerist Society, Larassatti Dharma Nanda, Joesana Tjahjani
Prosumer Behavior Of The Army Fandom Of Bts In Indonesia As A Form Of New Consumerist Society, Larassatti Dharma Nanda, Joesana Tjahjani
International Review of Humanities Studies
One of the most influential K-pop groups in the world is Bangtan Sonyeondan, abbreviated as BTS. BTS' success can also be determined by their extensive community of fans who create a fandom culture worldwide, including in Indonesia. This paper investigates the BTS fandom consumerism behavior, which is called ARMY, and its relation to Indonesia's participatory fan culture. This research focuses on how BTS's managing company creates a fandom image and how Indonesian fans react. This article is qualitative research using a literature review as the method. Analysis of this paper uses the consumerist society theory by Jean Baudrillard (1986) to …
The Ideas Of Journalistic Ethics Based On Pancasila For Multicultural Society, Sugeng Sugeng, Fristian Hadinata
The Ideas Of Journalistic Ethics Based On Pancasila For Multicultural Society, Sugeng Sugeng, Fristian Hadinata
International Review of Humanities Studies
This paper aims to show that journalistic code of ethics based on Pancasila is strongly related to multiculturalism morality as both emphasize inclusive ideas, respect for diversity, and the awareness of unity in diversity. The writers use descriptive qualitative library research in the field of philosophy to show meaning and objectively reveal philosophical essence. This method includes collecting and analyzing criticism of relevant literature related to multiculturalism, philosophy, journalistic ethics, and cyber media reporting. The result shows that the development of the internet technology has changed the way society live, and it has affected their preferences towards the elements of …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Washington Journal of Law, Technology & Arts
If digital platforms are found liable on hybrid antitrust-data protection violations, by how much should individual users be compensated? While traditional antitrust literature offers some estimation techniques, these methods were developed mostly around the idea that anti-competitive conduct manifests in supra-competitive prices, lost profits, or lost customers, all of which are easily quantifiable using commercially available evidence.
In digital markets, where antitrust violations are often intertwined with data protection issues, several complications arise. First, unlike transactions covered by traditional treble damage estimation techniques, “data-for-services” dealings are not evidenced by receipts. Second, personal data valuation is highly contextual and prone to …
Forming A More Perfect Union With Blockchains And Nfts: Why The United States Should Embrace An E-Government, Alexandria Labaro
Forming A More Perfect Union With Blockchains And Nfts: Why The United States Should Embrace An E-Government, Alexandria Labaro
Fordham Intellectual Property, Media and Entertainment Law Journal
This Note analyzes blockchain and non-fungible token (“NFT”) technology in the government, emphasizing the benefits of technological integration for improved data security and streamlined bureaucratic processes. It follows the growing popularity of “e-government” practices across the globe and considers factors associated with integrating blockchain and NFT technology in U.S. governmental procedures.
Foreign Intelligence Surveillance Act Section 702: The Good, The Bad, And A Proposal To Make It Less Ugly, Kevin Burns
Foreign Intelligence Surveillance Act Section 702: The Good, The Bad, And A Proposal To Make It Less Ugly, Kevin Burns
Fordham Intellectual Property, Media and Entertainment Law Journal
Section 702 of the Foreign Intelligence Surveillance Act (“FISA”) has been controversial since its inception. Created to allow intelligence collection against targeted foreign persons, electronic surveillance under Section 702 casts a wide net, often capturing communications sent to or by United States persons. Opponents point to the invasion of privacy such collection presents, and to the well-documented abuse and biased use of Section 702 data against U.S. citizens. This Note argues that despite this, Section 702 is a vital tool in the fight against terrorism and drug trafficking and the case against Section 702 is weaker than it appears. This …
Looking For Liability For Harmful Social Media Content And Cyberbullying After Gonzalez V. Google, Llc, Elizabeth M. Jaffe
Looking For Liability For Harmful Social Media Content And Cyberbullying After Gonzalez V. Google, Llc, Elizabeth M. Jaffe
Marquette Intellectual Property & Innovation Law Review
None
Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi
Cybaris®
No abstract provided.
Cross-Border Data Regulatory Frameworks: Opportunities, Challenges, And A Future- Forward Agenda, Andrew D. Mitchell, Neha Mishra
Cross-Border Data Regulatory Frameworks: Opportunities, Challenges, And A Future- Forward Agenda, Andrew D. Mitchell, Neha Mishra
Fordham Intellectual Property, Media and Entertainment Law Journal
This Article evaluates the existing regulatory framework for cross-border data flows across Bahrain, Djibouti, Jordan, Kuwait, Morocco, Nigeria, Oman, Pakistan, Rwanda, and Saudi Arabia. A common factor among these countries is that they are members of the Digital Cooperation Organization (“DCO”). It considers how these countries have devised laws, regulations, and policies on cross-border data flows to enable digital trade, and how these instruments promote the growth of a robust digital economy, both domestically and internationally. The Article then offers policy recommendations for DCO members to consider in developing relevant laws and regulations on data flows.
These …
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Akron Law Review
This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …
Place Your Bets: The Legal Integration Of Sports Betting With Cryptocurrency, Andrew Topps
Place Your Bets: The Legal Integration Of Sports Betting With Cryptocurrency, Andrew Topps
UNH Sports Law Review
No abstract provided.
Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan
Deep Dive Into Deepfakes—Safeguarding Our Digital Identity, Yi Yan
Brooklyn Journal of International Law
Deepfake technology is becoming increasingly sophisticated, and with it, the potential to pose a significant threat to the digital community, democratic institutions, and private individuals. With the creation of highly convincing but entirely fabricated audio, video, and images, there is a pressing need for the international community to address the vulnerabilities posed by deepfake technology in the current legal landscape through unambiguous legislation. This Note explores the ethical, legal, and social implications of deepfakes, including issues of privacy, identity theft, and political manipulation. It also reviews existing international legal frameworks, i.e., the Convention on Cybercrime (“Budapest Convention”) and proposes a …
Kejahatan Siber Terhadap Individu: Jenis, Analisis, Dan Perkembangannya, Russel Butarbutar
Kejahatan Siber Terhadap Individu: Jenis, Analisis, Dan Perkembangannya, Russel Butarbutar
Technology and Economics Law Journal
No abstract provided.
Vested Patents And Equal Justice, Adam Macleod
Vested Patents And Equal Justice, Adam Macleod
Catholic University Law Review
In a time of renewed interest in equal justice, the vested patent right may be timely again. Vested patent rights helped marginalized Americans to secure equal justice earlier in American history. And they helped to make sense of the law. Vested patent rights can perform those tasks again today.
The concept of vested rights render patent law coherent. And it explains patent law’s interactions with other areas of law, such as property, administrative, and constitutional law. The vested rights doctrine also can serve the requirements of equal justice, as it has several times in American history. Vested rights secure justice …
The Need For Cyber Resilience Of Space Assets: Law And Policy Considerations Of Ensuring Cybersecurity In Outer Space, Daniella Febbraro
The Need For Cyber Resilience Of Space Assets: Law And Policy Considerations Of Ensuring Cybersecurity In Outer Space, Daniella Febbraro
Canadian Journal of Law and Technology
In 2018, NASA’s Jet Propulsion Laboratory was the subject of a data breach where over 500 megabytes of data from a major mission system was stolen by hackers. This attack affected NASA’s Deep Space Network, prompting the United States Johnson Space Center to disconnect the International Space Station from the affected gateway due to fears that mission systems could become compromised. NASA has acknowledged that its vast online presence, which includes thousands of publicly accessible datasets, offers a large potential target for cybercriminals. The 2018 incident was one of many, with NASA experiencing more than 6000 cyberattacks from 2017-2021 alone. …
Parallel Play: The Simultaneous Professional Responsibility Campaigns Against Unethical Ip Practitioners By The United States And China, Mark A. Cohen
Parallel Play: The Simultaneous Professional Responsibility Campaigns Against Unethical Ip Practitioners By The United States And China, Mark A. Cohen
Akron Law Review
“Parallel Play: The Simultaneous Professional Responsibility Campaigns Against IP Practitioners by the United States and China” describes efforts by the United States Patent and Trademark Office and the China National IP Administration to discipline trademark and patent practitioners through contemporaneous campaign-style approach directed to bad faith filings. At the USPTO, many of these bad faith filings have originated from China. In both countries, these bad faith activities have imposed significant burdens on IP agencies, the courts, and legitimate rights holders. The campaign is likely the largest professional responsibility campaign undertaken by an IP agency, and the largest cross-border IP disciplinary …
Under Nifty Light: Trademark Considerations For The New Digital World, Willajeanne F. Mclean
Under Nifty Light: Trademark Considerations For The New Digital World, Willajeanne F. Mclean
Akron Law Review
Three cases involving non-fungible tokens are grabbing the attention of fashionistas, intellectual property mavens, and metaverse cognoscenti alike. All three are cases of first impression, despite involving trademark infringement claims. All are considered to be cases that will determine whether old trademark principles apply to new technology, and each has compelling and competing arguments that may militate against findings of infringement. While most commentators have focused on the questions surrounding alleged infringement, very few have discussed the challenges of applying remedies, such as injunctions, traditionally used in trademark infringement cases.
This article considers trademark law and examines it in a …
Protecting Public Health Amidst Data Theft, Sludge, And Dark Patterns: Overcoming The Constitutional Barriers To Health Information Regulations, Jon M. Garon
Akron Law Review
Public health has grown to over $4.1 trillion in spending in the past year, yet for millions of people, their health care is ineffective and sometimes harmful. New technologies have improved health access and treatment, but they can expose an individual’s personal health information to theft and misuse. There is little or no regulation for the reuse of data once it has been lawfully collected for general purposes. Any observer can create a detailed personal diary of an individual or a population by building from a mosaic of inferential data—such as lawfully obtained zip code information, non-regulated health care application …
What You Don’T Know Will Hurt You: Fighting The Privacy Paradox By Designing For Privacy And Enforcing Protective Technology, Perla Khattar
What You Don’T Know Will Hurt You: Fighting The Privacy Paradox By Designing For Privacy And Enforcing Protective Technology, Perla Khattar
Washington Journal of Law, Technology & Arts
The persistence of the privacy paradox is proof that current industry regulation is insufficient to protect consumer’s privacy. Although consumer choice is essential, we argue that it should not be the main pillar of modern data privacy legislation. This article argues that legislation should aim to protect consumer’s personal data in the first place, while also giving internet users the choice to opt-in to the processing of their information. Ideally, privacy by design principles would be mandated by law, making privacy an essential component of the architecture of every tech-product and service.
Weisner V. Google Llc: An Effort To Provide Clarity Regarding Patent Subject Matter Eligibility, Poirot, Nicole
Weisner V. Google Llc: An Effort To Provide Clarity Regarding Patent Subject Matter Eligibility, Poirot, Nicole
Santa Clara High Technology Law Journal
The United States Court of Appeals for the Federal Circuit (“Federal Circuit”) recently issued a precedential two-to-one decision regarding patent subject matter eligibility under section 101 of the Patent Act.1 In Weisner v. Google LLC, the Federal Circuit held that U.S. Patent Nos. 10,380,202 and 10,642,910 are directed to abstract ideas of creating digital travel logs which are patent ineligible.2 Additionally, the Court held that U.S. Patent Nos. 10,394,905 and 10,642,911 are directed to both creating and using travel logs to improve computerized search results and are potentially patenteligible.3 The majority’s decision is an attempt to clarify the historically gray …
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …