Open Access. Powered by Scholars. Published by Universities.®
Business Law, Public Responsibility, and Ethics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (5)
- Boise State University (4)
- The Catholic University of America, Columbus School of Law (4)
- Selected Works (2)
- St. Mary's University (2)
-
- University of Maryland Francis King Carey School of Law (2)
- University of New Hampshire (2)
- City University of New York (CUNY) (1)
- Claremont Colleges (1)
- James Madison University (1)
- Northwestern Pritzker School of Law (1)
- Sacred Heart University (1)
- Salve Regina University (1)
- Stony Brook University (1)
- University of Arkansas, Fayetteville (1)
- University of San Diego (1)
- Keyword
-
- Privacy (8)
- Ethics (3)
- Social media (3)
- Advertising (2)
- Corporate Law (2)
-
- Corporations (2)
- Data privacy (2)
- Facebook (2)
- Law and Technology (2)
- Legislation (2)
- Privacy Law (2)
- Technology (2)
- AI ethics (1)
- Access (1)
- Alexa (1)
- Artificial intelligence (1)
- Asset (1)
- Asset freezing (1)
- Asset recovery (1)
- Asset tracing (1)
- Augmented space (1)
- Big Data (1)
- Blockchain (1)
- Bored Apes (1)
- CCPA (1)
- COPPA (1)
- CTR (1)
- Cash (1)
- Child Welfare Law (1)
- Civil liberties (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (5)
- Catholic University Journal of Law and Technology (4)
- Management Faculty Publications and Presentations (4)
- Journal of Business & Technology Law (2)
- CMC Senior Theses (1)
-
- Communication (1)
- Dissertations (1)
- Donald J. Kochan (1)
- Faculty and Staff - Articles & Papers (1)
- James Madison Undergraduate Research Journal (JMURJ) (1)
- Marketing Undergraduate Honors Theses (1)
- Northwestern Journal of Law & Social Policy (1)
- Open Educational Resources (1)
- RISK: Health, Safety & Environment (1990-2002) (1)
- School of Computer Science & Engineering Faculty Publications (1)
- St. Mary's Law Journal (1)
- Susan Park (1)
- Technology & Society Faculty Publications (1)
- The Scholar: St. Mary's Law Review on Race and Social Justice (1)
- Publication Type
Articles 1 - 30 of 30
Full-Text Articles in Business Law, Public Responsibility, and Ethics
Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman
Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman
Catholic University Journal of Law and Technology
The Model Rules of Professional Conduct seek to police the conduct of attorneys. Each jurisdiction adopts its own rules of professional conduct to apply to the attorneys licensed within it. Notably, the model rules prohibit any sexual relationship between the attorney and client unless that relationship precedes the attorney-client relationship. Traditionally, defining a "sexual relationship" was simple, particularly if the attorney and client engaged in sexual intercourse. The introduction of dating apps, however, has blurred the line.
This article outlines the inherent risks of attorneys using dating apps at a time when most newly-licensed attorneys make up the majority of …
New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya
New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya
Catholic University Journal of Law and Technology
A decade ago, ‘NFTs’ were rarely heard of or known to anyone, unless they worked in or kept up with the tech world. However, they are not new - they have been around for almost two decades. Their popularity has grown over the past few years. ‘NFT’ stands for ‘non-fungible token’. An NFT is a digital file with a unique identity that is verified on a blockchain and is therefore not interchangeable - i.e., a kind of crypto asset, like an authentication certificate for digital artifacts. In theory, NFTs can represent almost any real or intangible property. These days, it …
Learning From Mistakes: A Guide To Expanding The Oversight Board, Kevin Frazier
Learning From Mistakes: A Guide To Expanding The Oversight Board, Kevin Frazier
Catholic University Journal of Law and Technology
More than 4.4 billion people use social media. A few platforms attract a significant number of those users—for example, 2.9 billion people use Facebook, 2.3 billion use YouTube, and 1.2 billion use WeChat. How these major platforms govern themselves with respect to content moderation has an impact on billions of users and may lead to policy changes across other platforms that affect billions more. That is why it is so important to analyze Meta’s Oversight Board—an independent body created for the purpose of “promot[ing] free expression by making principled, independent decisions regarding content on Facebook and Instagram by issuing recommendations …
Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa
Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa
The Scholar: St. Mary's Law Review on Race and Social Justice
Small businesses and small minority owned businesses are vital to our nation’s economy; therefore legislation, regulation, and policy has been created in order to assist them in overcoming their economic stability issues and ensure they continue to serve the communities that rely on them. However, there is not a focus on regulating nor assisting small businesses to ensure their cybersecurity standards are up to par despite them increasingly becoming a victim of cyberattacks that yield high consequences. The external oversight and assistance is necessary for small businesses due to their lack of knowledge in implementing effective cybersecurity policies, the fiscal …
The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao
Catholic University Journal of Law and Technology
The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.
This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …
Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo
Dissertations
In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.
To address …
Developing A Measure Of Social, Ethical, And Legal Content For Intelligent Cognitive Assistants, Clovia Hamilton, William Swart, Gerald M. Stokes
Developing A Measure Of Social, Ethical, And Legal Content For Intelligent Cognitive Assistants, Clovia Hamilton, William Swart, Gerald M. Stokes
Technology & Society Faculty Publications
We address the issue of consumer privacy against the backdrop of the national priority of maintaining global leadership in artificial intelligence, the ongoing research in Artificial Cognitive Assistants, and the explosive growth in the development and application of Voice Activated Personal Assistants (VAPAs) such as Alexa and Siri, spurred on by the needs and opportunities arising out of the COVID-19 global pandemic. We first review the growth and associated legal issues of the of VAPAs in private homes, banks, healthcare, and education. We then summarize the policy guidelines for the development of VAPAs. Then, we classify these into five major …
Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta
Privacy-As-Property: A New Fundamental Approach To The Right To Privacy And The Impact This Will Have On The Law And Corporations, Sevion Dacosta
CMC Senior Theses
The most popular conception of the right to privacy stems from Warren and Brandeis’s description of privacy as “the right to be left alone.” This theory ultimately points to a more fundamental approach to the right to privacy rooted in property rights. This fundamental approach - which I call privacy-as-property - is what I establish in this paper. I argue that the Lockean concept of property that “every man has a property in his own person” provides the foundation for the right to privacy. Privacy-as-property begins with the fundamental right to control oneself. Because of this intrinsic right, your property …
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
James Madison Undergraduate Research Journal (JMURJ)
A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up a …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
What Consumers Don’T Know They’Re Giving Away (Data And Privacy Concerns), Bayleigh Reeves
What Consumers Don’T Know They’Re Giving Away (Data And Privacy Concerns), Bayleigh Reeves
Marketing Undergraduate Honors Theses
The modern world leverages technology and information captured by it in ways the inventors of these technologies likely never imagined. Phones and other devices are gathering information about consumers in the background when they do not even realize it. Pew Research Center found that about 77% of Americans own a smartphone and 88% use the internet. This mass access to technology and information tracking raises many privacy concerns. Basic demographic information is being tracked as well as more in-depth information like shopping tendencies, financial information, and information about known associates. While most of this data is being used for marketing …
Screened Out Of Housing: The Impact Of Misleading Tenant Screening Reports And The Potential For Criminal Expungement As A Model For Effectively Sealing Evictions, Katelyn Polk
Northwestern Journal of Law & Social Policy
Having an eviction record “blacklists” tenants from finding future housing. Even renters with mere eviction filings—not eviction orders—on their records face the harsh collateral consequences of eviction. This Note argues that eviction records should be sealed at filing and only released into the public record if a landlord prevails in court. Juvenile record expungement mechanisms in Illinois serve as a model for one way to protect people with eviction records. Recent updates to the Illinois juvenile expungement process provided for the automatic expungement of certain records and strengthened the confidentiality protections of juvenile records. Illinois protects juvenile records because it …
Domestic Asset Tracing And Recovery Of Hidden Assets And The Spoils Of Financial Crime, Nathan Wadlinger, Carl Pacini, Nicole Stowell, William Hopwood, Debra Sinclair
Domestic Asset Tracing And Recovery Of Hidden Assets And The Spoils Of Financial Crime, Nathan Wadlinger, Carl Pacini, Nicole Stowell, William Hopwood, Debra Sinclair
St. Mary's Law Journal
Abstract forthcoming
Playing With Real Property Inside Augmented Reality: Pokemon Go, Trespass, And Law's Limitations, Donald J. Kochan
Playing With Real Property Inside Augmented Reality: Pokemon Go, Trespass, And Law's Limitations, Donald J. Kochan
Donald J. Kochan
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril
Digital Self-Ownership: A Publicity-Rights Framework For Determining Employee Social Media Rights, Susan Park, Patricia Sánchez Abril
Management Faculty Publications and Presentations
Imagine an upandcoming company hires you as one of its first employees. Passionate about your employer, you put in long hours doing everything from marketing to accounting to event planning. You are also proud of your employer's product, so you begin to publicize it to your friends through your social network accounts. (In fact, the company's founder is also one of your Facebook friends.) You tell your friends about the product launch, invite them to marketing events, and eventually blog about your industry, amassing a significant social media following while creating buzz about your employer. But one day, during layoffs …
Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park
Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park
Susan Park
Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas
Faculty and Staff - Articles & Papers
This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …
The Child Independence Is Born: James Otis And Writs Of Assistance, James M. Farrell
The Child Independence Is Born: James Otis And Writs Of Assistance, James M. Farrell
Communication
This chapter is a reexamination of the Writs of Assistance speech by James Otis. In particular, it is a reconsideration of the evidence upon which rests the historical reputation of Otis’s address. Are the claims by historians who credit Otis with sparking the Revolutionary movement in colonial America warranted or not? That reassessment begins with a detailed review of the nature and function of writs of assistance within the political, legal, and economic environment of colonial Massachusetts. It then turns to an analysis of the legal dispute over writs of assistance in the 1761 trial. From there we will reconstruct …
Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby
Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby
Journal of Business & Technology Law
No abstract provided.
Maryland's Social Networking Law: No "Friend" To Employers And Employees, Alexander Borman
Maryland's Social Networking Law: No "Friend" To Employers And Employees, Alexander Borman
Journal of Business & Technology Law
No abstract provided.
Employee Internet Privacy: A Proposed Act That Balances Legitimate Employer Rights And Employee Privacy, Susan Park
Employee Internet Privacy: A Proposed Act That Balances Legitimate Employer Rights And Employee Privacy, Susan Park
Management Faculty Publications and Presentations
When Justin Basset interviewed for a job in New York City in 2012, he expected to respond to questions one is typically asked in a job interview. However, his interview took a modern technological twist when the interviewer opened her computer and attempted to look at Mr. Basset’s Facebook profile on her computer. Unable to see the details of his profile because he had taken advantage of Facebook’s privacy options to limit public viewing, she asked for his login information to access his account. He declined and withdrew his application.1 In 2010, Robert Collins, a Maryland Department of Public …
Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park
Legal And Ethical Implications Of Corporate Social Networks, Gundars Kaupins, Susan Park
Management Faculty Publications and Presentations
Corporate social networking sites provide employees and employers with considerable opportunity to share information and become friends. Unfortunately, American laws do not directly address social networking site usage. The National Labor Relations Act, civil rights laws, and various common law doctrines such as employment at-will and defamation provide the pattern for future social networking laws. Ethical considerations such as productivity, security, goodwill, privacy, accuracy, and discipline fairness also affect future laws. Corporate policies on corporate social networking should balance the employer‘s and employee‘s interests. Existing laws and ethical issues associated with social networking should impact social networking policies related to …
Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park
Legal And Ethical Issues Associated With Employee Use Of Social Networks, Gundars Kaupins, Susan Park
Management Faculty Publications and Presentations
Social networking sites such as Facebook and Twitter can help employees enhance a company’s marketing, recruiting, security, and safety. However, employee’s use of social networking sites and employers’ access of those sites can result in illegal and unethical behavior, such as discrimination and privacy invasions. Companies must gauge whether and how to rely upon employees’ use of personal social networking sites and how much freedom employees should have in using networks inside and outside of the companies. This research summarizes the latest legal and ethical issues regarding employee use of social networks and provides recommended corporate policies.
Welfare, Dialectic, And Mediation In Corporate Law, William W. Bratton
Welfare, Dialectic, And Mediation In Corporate Law, William W. Bratton
All Faculty Scholarship
No abstract provided.
Some Ethical Reflections On Cyberstalking, Frances Grodzinsky, Herman T. Tavani
Some Ethical Reflections On Cyberstalking, Frances Grodzinsky, Herman T. Tavani
School of Computer Science & Engineering Faculty Publications
The present study examines a range of moral issues associated with recent cyberstalking cases. Particular attention is centered on the Amy Boyer/ Liam Youens case of cyberstalking, which raises a host of considerations that we believe have a significant impact for ethical behavior on the Internet. Among the questions we consider are those having to do with personal privacy and the use of certain kinds of Internet search facilities to stalk individuals in cyberspace. Also considered are questions having to do with legal liability and (possible) moral responsibility that Internet Service Providers (ISPs) have for stalking crimes that occur in …
Minor Distractions: Children, Privacy And E-Commerce, Anita L. Allen
Minor Distractions: Children, Privacy And E-Commerce, Anita L. Allen
All Faculty Scholarship
No abstract provided.
Social Issues Of Genome Innovation And Intellectual Property, Elaine Alma Draper
Social Issues Of Genome Innovation And Intellectual Property, Elaine Alma Draper
RISK: Health, Safety & Environment (1990-2002)
Dr. Draper's focus is the use of personal information derived from genome research. She identifies several potential problems, including access to and control of genetic information, employment discrimination and social stratification. She also recommends possible solutions.
A Contractual Approach To Data Privacy, Stephanos Bibas
A Contractual Approach To Data Privacy, Stephanos Bibas
All Faculty Scholarship
No abstract provided.
Rethinking The Rules Against Corporate Privacy Rights: Some Conceptual Quandries For The Common Law, Anita L. Allen
Rethinking The Rules Against Corporate Privacy Rights: Some Conceptual Quandries For The Common Law, Anita L. Allen
All Faculty Scholarship
No abstract provided.