Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 8 of 8
Full-Text Articles in Law
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Lori B. Andrews
Private Technology (Foreword), Daniel Harris Brean
Private Technology (Foreword), Daniel Harris Brean
Daniel Harris Brean
Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe
Technology And Intellectual Property: New Rules For An Old Game?, Elizabeth A. Rowe
Elizabeth A Rowe
This foreword to the first issue of 2009 for the Journal of Technology Law and Policy discusses the questions presented by the merger of technology and intellectual property and considers how best the two areas should co-exist.
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael
Professor Katina Michael
Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael
Associate Professor Katina Michael
In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
The Fall-Out From Emerging Technologies: On Matters Of Surveillance, Social Networks And Suicide, M.G. Michael, Katina Michael
M. G. Michael
No abstract provided.
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Stephen E Henderson
The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Stephen E Henderson
The Internet, already of major significance throughout much of the globe, is expected to become increasingly pervasive in diverse arenas, from health care, to commerce, to entertainment, and is expected to become increasingly critical to essential infrastructures, including banking, power, and telecommunications. Yet the medium is both inherently and unnecessarily insecure. In particular, today’s Internet can be crippled by distributed denial-of-service attacks launched by relatively unsophisticated and judgment-proof parties. Not every computing system involved in such attacks, however, is necessarily without resources. Application of traditional negligence liability, coupled with other government incentives and support institutions, will encourage better security and …