Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Law
The Death Of The Legal Subject, Katrina Geddes
The Death Of The Legal Subject, Katrina Geddes
Vanderbilt Journal of Entertainment & Technology Law
The law is often engaged in prediction. In the calculation of tort damages, for example, a judge will consider what the tort victim’s likely future earnings would have been, but for their particular injury. Similarly, when considering injunctive relief, a judge will assess whether the plaintiff is likely to suffer irreparable harm if a preliminary injunction is not granted. And for the purposes of a child custody evaluation, a judge will consider which parent will provide an environment that is in the best interests of the child.
Relative to other areas of law, criminal law is oversaturated with prediction. Almost …
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Brain-Computer-Interfacing & Respondeat Superior: Algorithmic Decisions, Manipulation, And Accountability In Armed Conflict, Salahudin Ali
Catholic University Journal of Law and Technology
This article examines the impact that brain-computer-interfacing platforms will have on the international law of armed conflict’s respondeat superior legal regime. Major Ali argues that the connection between the human brain and this nascent technology’s underlying technology of artificial intelligence and machine learning will serve as a disruptor to the traditional mental prerequisites required to impart culpability and liability on commanders for actions of their troops. Anticipating that BCI will become increasingly ubiquitous, Major Ali’s article offers frameworks for solution to BCI’s disruptive potential to the internal law of armed conflict.
Transnational Government Hacking, Jennifer C. Daskal
Transnational Government Hacking, Jennifer C. Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Death By Bullying: A Comparative Culpability Proposal, Audrey Rogers
Death By Bullying: A Comparative Culpability Proposal, Audrey Rogers
Pace Law Review
This article explores the possibility and advisability of imposing homicide charges against bullies, a controversial approach because of the serious causation questions it poses. Nonetheless, there is precedent for holding a person criminally culpable for a victim’s suicide. A notorious case involved the head of the Ku Klux Klan who was convicted of murder after the woman he raped killed herself by swallowing poison, “distracted by pain and shame so inflicted upon her.” Some may see her shame as analogous to gay teens who commit suicide after being bullied about their sexual orientation. But perhaps the law should not demand …
Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall
Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall
Benton C. Martin
This short essay acknowledges certain efficiencies in enforcing copyright law against "secondary" infringers like filesharing services through criminal proceedings, but it proposes guidelines for prosecutors to use in limiting prosecutions against this type of infringer.
Big Brother Or Little Brother? Surrendering Seizure Privacy For The Benefits Of Communication Technology, José F. Anderson
Big Brother Or Little Brother? Surrendering Seizure Privacy For The Benefits Of Communication Technology, José F. Anderson
All Faculty Scholarship
Over two centuries have passed since Benjamin Franklin quipped that we should defend privacy over security if people wanted either privacy or security. Although his axiom did not become a rule of law in its original form, its principles found voice in the Fourth and Fifth Amendments of the Constitution's Bill of Rights. To a lesser extent, provisions against the quartering of troops in private homes found in the Third Amendment also support the idea that what a government can require you to do, or who you must have behind the doors of your home, is an area of grave …
Fantasy Crime: The Role Of Criminal Law In Virtual Worlds, Susan W. Brenner
Fantasy Crime: The Role Of Criminal Law In Virtual Worlds, Susan W. Brenner
Vanderbilt Journal of Entertainment & Technology Law
This Article analyzes activity in virtual worlds that would constitute crime if they were committed in the real world. It reviews the evolution of virtual worlds like Second Life and notes research which indicates that more and more of our lives will move into this realm. The Article then analyzes the criminalization of virtual conduct that inflicts "harm" in the real world and virtual conduct that only inflicts "harm" in the virtual world. It explains that the first category qualifies as cybercrime and can be prosecuted under existing law. Finally, it analyzes the necessity and propriety of criminalizing the second …
New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers
New Technology, Old Defenses: Internet Sting Operations And Attempt Liability, Audrey Rogers
University of Richmond Law Review
No abstract provided.
Toward A Criminal Law For Cyberspace: Distributed Security, Susan Brenner
Toward A Criminal Law For Cyberspace: Distributed Security, Susan Brenner
ExpressO
The article analyzes the structure and evolution of the current, traditional model of law enforcement and explains why this model is not an effective means of addressing computer-facilitated criminal activity. It begins by analyzing the operation of rules in collective systems composed of biological or artificial entities; it explains that every such system utilizes basic, constitutive rules to maintain both internal and external order. The article explains that intelligence has a profound effect upon a system’s ability to maintain internal order. Intelligence creates the capacity for deviant behavior, i.e., the refusal to abide by constitutive rules, and this requires the …