Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Boston University School of Law (51)
- American University Washington College of Law (41)
- University of Georgia School of Law (32)
- University of Michigan Law School (32)
- Roger Williams University (30)
-
- University of Colorado Law School (30)
- University of Miami Law School (22)
- University of Pennsylvania Carey Law School (21)
- Yeshiva University, Cardozo School of Law (16)
- New York Law School (15)
- Singapore Management University (15)
- University of Massachusetts School of Law (12)
- William & Mary Law School (12)
- Texas A&M University School of Law (10)
- University of Baltimore Law (10)
- University of Pittsburgh School of Law (10)
- University of Richmond (10)
- Cleveland State University (9)
- Duke Law (9)
- Georgetown University Law Center (9)
- St. Mary's University (9)
- University of Kentucky (9)
- University of Tennessee College of Law (9)
- George Washington University Law School (7)
- Southern Methodist University (7)
- Maurer School of Law: Indiana University (6)
- Schulich School of Law, Dalhousie University (6)
- University of Maryland Francis King Carey School of Law (6)
- University of Wollongong (6)
- Vanderbilt University Law School (6)
- Publication Year
- Publication
-
- Faculty Scholarship (97)
- Articles (57)
- All Faculty Scholarship (38)
- Faculty Publications (31)
- Articles in Law Reviews & Other Academic Journals (27)
-
- Faculty Articles (24)
- Scholarly Works (22)
- Presentations (16)
- Publications (15)
- Research Collection Yong Pung How School Of Law (15)
- Articles & Chapters (13)
- Life of the Law School (1993- ) (13)
- Law Library Newsletters/Blog (11)
- Law Faculty Scholarly Articles (9)
- Law Faculty Scholarship (9)
- Georgetown Law Faculty Publications and Other Works (8)
- Law Faculty Publications (8)
- Articles, Chapters and Online Publications (7)
- Book Chapters (7)
- Faculty Journal Articles and Book Chapters (7)
- GW Law Faculty Publications & Other Works (7)
- Law Faculty Articles and Essays (7)
- Popular Media (7)
- Articles by Maurer Faculty (6)
- Articles, Book Chapters, & Popular Press (6)
- Other Publications (6)
- Scholarly Articles (6)
- Vanderbilt Law School Faculty Publications (6)
- Amicus Briefs (5)
- Elisabeth Haub School of Law Faculty Publications (5)
Articles 1 - 30 of 601
Full-Text Articles in Entire DC Network
Downstreaming, Rachel Landy
Downstreaming, Rachel Landy
Faculty Articles
Spotify and its competitors all offer the same product at the same price. Why? Scholars have argued that relationships can be designed in a way that naturally promotes innovation. By “braiding” certain formal contracting practices with informal enforcement norms, parties develop a frame-work that supports trust and positive, long-term collaboration. This Article takes on this consensus and shows that not all braiding is good. Using the multibillion-dollar subscription music streaming business as an illustration, it demonstrates just how industry forces can, and do, overcome braiding’s positive slant. In that industry, the major record labels (Universal, Warner, and Sony) weaponize braiding …
The Future Of The International Financial System: The Emerging Cbdc Network And Its Impact On Regulation, Heng Wang, Simin Gao
The Future Of The International Financial System: The Emerging Cbdc Network And Its Impact On Regulation, Heng Wang, Simin Gao
Research Collection Yong Pung How School Of Law
Central bank digital currency (CBDC) is a digital form of fiat currency. CBDC has the potential to be a game challenger in the international financial system, bringing increased complexities arising from technology and regulatory considerations, as well as generating greater currency competition. As more states begin exploring CBDC, the interactions between actors may lead to the emergence of a new CBDC network. What shape would the emerging CBDC network take? What would its network effects be? What would be the impact of the CBDC network on the international financial system, or the global financial network? This article explores these questions …
Open Source Perfume, Amanda Levendowski
Open Source Perfume, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
ABRIDGED ABSTRACT: Perfume is a powerful art and technology, but its secrets are closely held by a privileged few - by some counts, there are more astronauts than there are perfumers. As critics have noted increasingly since 2020, those select few perfumers often share similar backgrounds. As interviews with American, British, and French perfumemakers reveal, intellectual property (IP) also plays a gatekeeping role in perfumery. Drawing on work by perfumer and educator Saskia Wilson-Brown, this Article suggests that perfumery is overdue for a transformation. One is emerging: open source perfume. For those seeking ways to share scents and signal commitment …
New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd
New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd
Fellow, Adjunct, Lecturer, and Research Scholar Works
This Article explores how fintech has disrupted the traditional rent-to-own (RTO) industry, giving rise to new, virtual RTO agreements (VirTOs). These VirTOs have enabled the RTO industry to expand into the service industry and to markets for products not traditionally associated with rentals, such as vehicle repairs, pet ownership, and medical devices. This Article analyzes this development.
RTO agreements purport to rent products to a consumer until the conclusion of a set number of renewable rental payments, at which point ownership transfers. The fundamental characteristic of these agreements – and why they are not regulated as loans – are that …
Contract-Wrapped Property, Danielle D'Onfro
Contract-Wrapped Property, Danielle D'Onfro
Scholarship@WashULaw
For nearly two centuries, the law has allowed servitudes that “run with” real property while consistently refusing to permit servitudes attached to personal property. That is, owners of land can establish new, specific requirements for the property that bind all future owners—but owners of chattels cannot. In recent decades, however, firms have increasingly begun relying on contract provisions that purport to bind future owners of chattels. These developments began in the context of software licensing, but they have started to migrate to chattels not encumbered by software. Courts encountering these provisions have mostly missed their significance, focusing instead on questions …
Write Before You Watch: Policies For Police Body-Worn Cameras That Advance Accountability And Accuracy, Hillary B. Farber
Write Before You Watch: Policies For Police Body-Worn Cameras That Advance Accountability And Accuracy, Hillary B. Farber
Faculty Publications
In the wake of high-profile killings and abuse by police officers over the past few years, the public has come to expect that officers will be equipped with body-worn cameras (BWCs). These cameras capture and preserve encounters between police and civilians, and the footage they record often becomes critical evidence in criminal, civil, or administrative proceedings. Reformers believe BWCs can improve police accountability, build public trust in police, and potentially reform police behavior.
Considering the reliance on BWCs, a key question has emerged: should officers be allowed to review BWC footage before preparing a report or giving a statement, or …
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Faculty Scholarship
Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.
Privacy nicks come from the …
Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen
Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen
Articles
In the brewing tech war between the United States and China, the quest for tech supremacy is in full force. Through enacting a series of laws and policies, China aims to reach its goal of tech supremacy. If China succeeds, U.S. corporations will face a daunting task in competing against Chinese products and services in core industries and in sectors where artificial intelligence and technological breakthroughs reign. This Article is the first to identify and analyze China’s 2022 Law on Science and Technology Progress, Personal Information Protection Law, Made in China 2025, National Intellectual Property Strategies, and digital currency e-CNY; …
A Public Technology Option, Hannah Bloch-Wehba
A Public Technology Option, Hannah Bloch-Wehba
Faculty Scholarship
Private technology increasingly underpins public governance. But the state’s growing reliance on private firms to provide a variety of complex technological products and services for public purposes brings significant costs for transparency: new forms of governance are becoming less visible and less amenable to democratic control. Transparency obligations initially designed for public agencies are a poor fit for private vendors that adhere to a very different set of expectations.
Aligning the use of technology in public governance with democratic values calls for rethinking, and in some cases abandoning, the legal structures and doctrinal commitments that insulate private vendors from meaningful …
Defragging Feminist Cyberlaw, Amanda Levendowski
Defragging Feminist Cyberlaw, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.
In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …
Deplatforming, Ganesh Sitaraman
Deplatforming, Ganesh Sitaraman
Vanderbilt Law School Faculty Publications
Deplatforming in the technology sector is hotly debated, and at times may even seem unprecedented. In recent years, scholars, commentators, jurists, and lawmakers have focused on the possibility of treating social-media platforms as common carriers or public utilities, implying that the imposition of a duty to serve the public would restrict them from deplatforming individuals and content.
But, in American law, the duty to serve all comers was never absolute. In fact, the question of whether and how to deplatform-—to exclude content, individuals, or businesses from critical services—- has been commonly and regularly debated throughout American history. In the common …
Leveraging Technology To Promote Access To Justice, Amy Emerson
Leveraging Technology To Promote Access To Justice, Amy Emerson
Faculty Publications
No abstract provided.
Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan
Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan
Student Articles
This Note will advocate for the view that when presented with the issue, state and federal courts should establish that keyword search warrants are unconstitutional because they violate the Fourth Amendment. Keyword search warrants cannot meet the Fourth Amendment’s requirements of probable cause and particularity because the subjects of the search cannot be identified until after the search is completed. These warrants are unnecessary and have the potential of implicating millions of internet users who have no connection to a crime. This Note will contend that individuals have a reasonable expectation of privacy in their search history data, and that …
Exit Engineering, Rachel Landy
Exit Engineering, Rachel Landy
Faculty Articles
How do business lawyers create value? For nearly forty years, scholars have conceptualized the business lawyer as a “transaction cost engineer” who helps contracting parties efficiently break negotiation stalemates to create more valuable deals. This theory provides meaningful insights about sophisticated corporate law practice, where outside lawyers parachute in to make one-off deals happen. However, it fails to explain the behavior of startup lawyers, who develop long-term relationships with their clients and counsel them on seemingly routine matters, well before a major transaction materializes. These lawyers are not just transaction cost engineers, they are exit engineers.This Article offers a novel …
Two Visions Of Digital Sovereignty, Sujit Raman
Two Visions Of Digital Sovereignty, Sujit Raman
Joint PIJIP/TLS Research Paper Series
No abstract provided.
How To Understand China's Approach To Central Bank Digital Currency?, Heng Wang
How To Understand China's Approach To Central Bank Digital Currency?, Heng Wang
Research Collection Yong Pung How School Of Law
China's central bank digital currency (CBDC), digital yuan or e-CNY, is likely to profoundly affect the international financial system. China's CBDC is fast evolving. Understanding the influencing factors of China's CBDC will likely be crucial to explore its future direction. Major influencing factors include (i) China's perception and conception of regulation and technology, (ii) complementarity between China's preferences and CBDC development, (iii) domestic and international legitimacy, and (iv) institutional development. This paper argues that these influencing factors contribute to China's likely approach of selectively reshaping the international financial system. Given the potential wide-ranging implications of the introduction of CBDC globally, …
To Democratize Algorithms, Ngozi Okidegbe
To Democratize Algorithms, Ngozi Okidegbe
Faculty Scholarship
Jurisdictions increasingly employ algorithms in public sector decisionmaking. Facing public outcry about the use of such technologies, jurisdictions have begun to increase democratic participation in the processes by which algorithms are procured, constructed, implemented, used, and overseen. But what problem is the current approach to democratization meant to solve? Policymakers have tended to view the problem as the absence of public deliberation: agencies and courts often use algorithms without public knowledge or input. To redress this problem, jurisdictions have turned to deliberative approaches designed to foster transparency and public debate.
This Article contends that the current approach to democratization is …
Law School News: Rwu Alumni Named To Pbn's 2023 40 Under Forty List 7/5/2023, Stacey Pacheco
Law School News: Rwu Alumni Named To Pbn's 2023 40 Under Forty List 7/5/2023, Stacey Pacheco
Life of the Law School (1993- )
No abstract provided.
Racializing Algorithms, Jessica M. Eaglin
Racializing Algorithms, Jessica M. Eaglin
Articles by Maurer Faculty
There is widespread recognition that algorithms in criminal law’s administration can impose negative racial and social effects. Scholars tend to offer two ways to address this concern through law—tinkering around the tools or abolishing the tools through law and policy. This Article contends that these paradigmatic interventions, though they may center racial disparities, legitimate the way race functions to structure society through the intersection of technology and law. In adopting a theoretical lens centered on racism and the law, it reveals deeply embedded social assumptions about race that propel algorithms as criminal legal reform in response to mass incarceration. It …
Montana Is Trying To Ban Tiktok. What Does The First Amendment Have To Say?, Deborah Pearlstein, John Dellamore
Montana Is Trying To Ban Tiktok. What Does The First Amendment Have To Say?, Deborah Pearlstein, John Dellamore
Faculty Online Publications
Last month, Montana became the first U.S. state to pass a bill banning TikTok from operating within its borders. If Governor Greg Gianforte signs some version of the bill, it will become the first statewide ban in the country to take direct aim at the popular social media app, which various U.S. government officials have warned poses a serious national security threat. But while Montana may be the first to act, significant gaps remain in the public debate surrounding both the nature of the threat that TikTok presents, and the constitutional questions that trying to regulate it might create.
Dystopian Trademark Revelations, Amanda Levendowski
Dystopian Trademark Revelations, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
Uncovering dystopian technologies is challenging. Nondisclosure agreements, procurement policies, trade secrets, and strategic obfuscation collude to shield the development and deployment of these technologies from public scrutiny until it is too late to combat them with law or policy. But occasionally, exposing dystopian technologies is simple. Corporations choose technology trademarks inspired by dystopian philosophies and novels or similar elements of real life—all warnings that their potential uses are dystopian as well. That pronouncement is not necessarily trumpeted on social media or corporate websites, however. It is revealed in a more surprising place: trademark registrations at the U.S. Patent and Trademark …
Antitrust For Dominant Digital Platforms: An Alternative To The Monopoly Power Standard To Restore Competition, Jordan Ramsey
Antitrust For Dominant Digital Platforms: An Alternative To The Monopoly Power Standard To Restore Competition, Jordan Ramsey
Senior Honors Theses
Antitrust law is meant to promote competition by prohibiting anticompetitive business practices such as mergers and acquisitions as well as exclusionary conduct. Judicial interpretation of antitrust law has allowed dominant digital platforms to undertake anticompetitive actions without prosecution. The Sherman Antitrust Act should be amended to remove the monopoly power standard that allows firms to engage in anticompetitive conduct as long as the conduct does not create or uphold monopoly power. The amendment would make anticompetitive conduct illegal regardless of monopoly power, as long as six proof requirements are met. This would result in lessened market concentration, which would benefit …
Startup Biases, Jennifer S. Fan
Startup Biases, Jennifer S. Fan
Articles
This Article provides an original descriptive account of bias in the startup context and explains why litigation is eschewed and what happens when it is used as a mechanism to combat bias in the venture capital ecosystem. Further, this Article identifies two particular phenomena in the startup context that exacerbate gender and racial bias. First, homophily—the idea that like attracts like—abounds and has been part of the DNA of venture capital since its inception. The thick networks that developed as venture capital made its way from the East Coast to the West Coast were limited to an elite group that …
Oh No, Another Chatgpt Post: Incorporating Ai-Powered Chatbots Into Legal Research Exercises And Assignments, Olivia R. Smith Schlinck
Oh No, Another Chatgpt Post: Incorporating Ai-Powered Chatbots Into Legal Research Exercises And Assignments, Olivia R. Smith Schlinck
Library Staff Online Publications
Since it was launched at the end of November 2022, the discourse around ChatGPT and AI search tools has been unrelenting. What impact will AI-powered chatbots have on education? Will students submit ChatGPT-written essays and homework assignments? Will AI make lawyers obsolete? Look, this chatbot just passed the bar exam! Wait a minute—is this thing. . . sentient?
Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Data Localization And Government Access To Data Stored Abroad: Discussion Paper 2, Shanzay Pervaiz, Alex Joel
Joint PIJIP/TLS Research Paper Series
The Centre for Information Policy Leadership (CIPL) and Tech, Law & Security Program (TLS) have been collaborating on a project regarding data localization policies. As data localization is increasingly gaining traction, we seek to understand the different dimensions of the impacts and effectiveness of these policies. As part of this collaboration—CIPL published a paper on the “real life” business, societal, and consumer impacts of data localization policies and TLS published the present paper on whether data localization measures are legally effective in achieving one of their main ostensible purposes, i.e., to prevent foreign government access to data.
Lisp – An Historical Reminiscence, Heather Simmons
Lisp – An Historical Reminiscence, Heather Simmons
Articles, Chapters and Online Publications
Reflections on the history of the Legal Information Services to the Public group of the American Association of Law Libraries.
Match Up: Increasing Disclosure Of Facial Recognition Technology With Criminal Discovery Rules, Paget Barranco
Match Up: Increasing Disclosure Of Facial Recognition Technology With Criminal Discovery Rules, Paget Barranco
Duke Journal of Constitutional Law & Public Policy Sidebar
Facial recognition technology (FRT) is an automated computer tool that compares the image of one face in a target image to one or more images of other faces. Law enforcement at both the federal and state levels increasingly use FRT to identify unknown perpetrators of crimes. FRT has great potential to generate investigative leads and assist in solving crimes, but there are issues with the technology and a lack of transparency about how it is used. Further, law enforcement and prosecutors may not disclose information about the FRT search results that they relied on to identify a suspect, affecting defense …
Hit The Road, Jack: The Auto Industry As The Next Vehicle For Predatory Infringement, Kristen Osenga
Hit The Road, Jack: The Auto Industry As The Next Vehicle For Predatory Infringement, Kristen Osenga
Law Faculty Publications
While patents, patent litigation, and patent pools have been part of the automotive industry since the late-1800s, the prevalence of technology covered by standards and accompanying standard essential patents (SEPs) is much more recent. Today’s smart cars and the widespread incorporation of telecommunication and Internet of Things standards in vehicles raise concerns about how well the automotive industry will be able to adapt to this new SEP-laden future. This article predicts that predatory infringement of SEPs for two related reasons. First, although some industries, such as telecommunications, have long dealt with SEPs, the incorporation of standardized technology is more recent …
Views Of The Irish Judiciary On Technology In Courts: Results Of A Survey, Brian M. Barry Dr, Rónán Kennedy Dr
Views Of The Irish Judiciary On Technology In Courts: Results Of A Survey, Brian M. Barry Dr, Rónán Kennedy Dr
Articles
Technology continues to transform how judges perform their functions, both in Ireland and elsewhere. This article reports the results of a survey of Irish judges on their use of technology in their role, their attitudes towards technology, and their views on how it impacts on the judicial function. The survey, part of a global survey, found that Irish judges habitually used digital technologies, and were broadly satisfied with the technology available in chambers, but less so with what was provided in courtrooms. Although generally happy to embrace change, the majority of respondents were concerned with, and did not prefer, online …
Emerging Technology’S Language Wars: Cryptocurrency, Carla L. Reyes
Emerging Technology’S Language Wars: Cryptocurrency, Carla L. Reyes
Faculty Journal Articles and Book Chapters
Work at the intersection of blockchain technology and law suffers from a distinct linguistic disadvantage. As a highly interdisciplinary area of inquiry, legal researchers, lawmakers, researchers in the technical sciences, and the public all talk past each other, using the same words, but as different terms of art. Evidence of these language wars largely derives from anecdote. To better assess the nature and scope of the problem, this Article uses corpus linguistics to reveal the inherent value conflicts embedded in definitional differences and debates related to developing regulation in one specific area of the blockchain technology ecosystem: cryptocurrency. Using cryptocurrency …