Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 27 of 27

Full-Text Articles in Law

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee Jan 2016

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee

Larissa Lee

Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another, using a peer-to-peer …


Targeted Killing: A Legal And Political History, Markus Gunneflo Dec 2015

Targeted Killing: A Legal And Political History, Markus Gunneflo

Markus Gunneflo

Looking beyond the current debate’s preoccupation with the situations of insecurity of the second intifada and 9/11, this book reveals how targeted killing is intimately embedded in both Israeli and US statecraft and in the problematic relation of sovereign authority and lawful violence underpinning the modern state system. The book details the legal and political issues raised in targeted killing as it has emerged in practice including questions of domestic constitutional authority, the norms on the use of force in international law, the law of targeting and human rights. The distinctiveness of Israeli and US targeted killing is accounted for …


Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges Dec 2015

Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges

Patrick T. Ryan

This essay looks at the the different roles that institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the layered model of the Internet. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications to show why it is important for different institutions within the governance system to focus on their areas of expertise (e.g., the ITU, ICANN, and IGF). Several areas of conflict are reviewed, such as the desire to promote more broadband infrastructure (a topic that is in the …


Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel Dec 2015

Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel

Nehal A. Patel

AbstractOver thirty years have passed since the Bhopal chemical disaster began,and in that time scholars of corporate social responsibility (CSR) havediscussed and debated several frameworks for improving corporate responseto social and environmental problems. However, CSR discourse rarelydelves into the fundamental architecture of legal thought that oftenbuttresses corporate dominance in the global economy. Moreover, CSRdiscourse does little to challenge the ontological and epistemologicalassumptions that form the foundation for modern economics and the role ofcorporations in the world.I explore methods of transforming CSR by employing the thought ofMohandas Gandhi. I pay particular attention to Gandhi’s critique ofindustrialization and principle of swadeshi (self-sufficiency) …


Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest Aug 2015

Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest

Sean Pager

INFRINGEMENT AS UNFAIR COMPETITION: A BLUEPRINT FOR GLOBAL GOVERNANCE?

Sean A. Pager Michigan State University College of Law

Eric Priest University of Oregon School of Law

ABSTRACT

This Article examines a new approach to address persistent regulatory failures in global supply chains. In a series of recent cases, unfair competition actions have been brought in U.S. court against foreign manufacturers who infringe software overseas under the theory that the cost savings from infringement confers an unfair advantage in U.S. markets. While this theory has been advanced in the intellectual property context, the same approach could work to target abuses in …


Finding The Adequate Legal Framework For The Deployment Of Ocean Renewable Energy Through Area-Based Management, Xiao Recio-Blanco Aug 2015

Finding The Adequate Legal Framework For The Deployment Of Ocean Renewable Energy Through Area-Based Management, Xiao Recio-Blanco

Xiao Recio-Blanco

The world runs on electricity, but its global distribution is uneven and incomplete. The lack of access to electricity denies some people the most basic benefits, from healthcare and sanitation to security and economic development.

To increase access to electricity, most developing nations have relied on traditional sources of energy, namely fossil fuels, and the extension of a central electrical grid. Scholars and specialized International Organizations suggest that the implementation of renewable energy technologies through small-to-mid scale grid projects could be a reliable alternative. However, renewable energy technologies must overcome three formidable hurdles: low reliability, uneven availability, and the high …


Using Occam’S Razor To Solve International Attorney-Client Privilege Choice Of Law Issues: An Old Solution To A New Problem, Nathan M. Crystal, Francesca Giannoni-Crystal Jul 2015

Using Occam’S Razor To Solve International Attorney-Client Privilege Choice Of Law Issues: An Old Solution To A New Problem, Nathan M. Crystal, Francesca Giannoni-Crystal

Nathan M. Crystal

The practice of law is increasingly becoming “delocalized.” Globalization and the use of technology are two important factors in this fundamental change in practice. Delocalization is affecting almost all areas of practice, including issues involving attorney-client privilege (ACP). To some extent the choice-of-law rules governing ACP are also – like other fields of the law - being “delocalized,” but in our view only partially. This paper discusses six approaches to choice of law issues governing ACP that are being used by the courts. Aside from the traditional lex loci approach (which simply applies the law of the forum to the …


Cybercrime: A Saudi And American Perspective, Hussam M. Alkanbashi May 2015

Cybercrime: A Saudi And American Perspective, Hussam M. Alkanbashi

Hussam M. Alkanbashi

Cybercrime is one of the greatest threats facing the International community. Defined as criminal activity perpetrated using computers and the internet, cybercrime has developed into a trillion dollar a year industry, affecting millions of people around the world, as well as countless businesses and the governments of every nation. With nearly 431 million victims projected in 2015, cyber related crime is one of if not the most frequent, costly and pervasive crimes worldwide. This article examines and assesses the effectiveness of Saudi and American Cyber Laws in deterring the growing global threats posed by cybercrime. The article studies cyber identity …


Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort Jan 2015

Sustainable Cybersecurity: Applying Lessons From The Green Movement To Managing Cyber Attacks, Scott J. Shackelford, Tim Fort

Scott Shackelford

According to Frank Montoya, the U.S. National Counterintelligence Chief, “We’re an information-based society now. Information is everything. That makes . . . company executives, the front line – not the support mechanism, the front line – in [determining] what comes.”[1] Chief Montoya’s remarks underscore the central role played by the private sector in ongoing efforts aimed at enhancing cybersecurity, much like the increasingly vital role firms are playing in fostering sustainability. For example, according to Accenture surveys, the number of managers who consider sustainability to be critical to the future success of their organizations jumped from fifty to more …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


Is Social Media A Human Right? Exploring The Scope Of Internet Rights, Brian Christopher Jones Nov 2014

Is Social Media A Human Right? Exploring The Scope Of Internet Rights, Brian Christopher Jones

Brian Christopher Jones

This article explores the basis for social media being recognised as a human right, how such services have come to be seen as both democracy-enabing and rights-infringing, and further examines social media's contentious relationship with authoritarian regimes.


Balancing The Scales: Adhuc Sub Judice Li Est Or Trial By Media, Casey J. Cooper Jul 2014

Balancing The Scales: Adhuc Sub Judice Li Est Or Trial By Media, Casey J. Cooper

Casey J Cooper

The right to freedom of expression and free press is recognized under almost all major human rights instruments and domestic legal systems—common and civil—in the world. However, what do you do when a fundamental right conflicts with another equally fundamental right, like the right to a fair trial? In the United States, the freedom of speech, encompassing the freedom of the press, goes nearly unfettered: the case is not the same for other common law countries. In light of cultural and historic facts, institutional factors, modern realities, and case-law, this Article contends that current American jurisprudence does not take into …


An Other History Of Knowledge And Decision In Precautionary Approaches To Sustainability, Saptarishi Bandopadhyay Jul 2014

An Other History Of Knowledge And Decision In Precautionary Approaches To Sustainability, Saptarishi Bandopadhyay

Saptarishi Bandopadhyay

In this paper, I offer an alternative reading of precaution with the hope of recovering the capacity of this ethic to facilitate legal and political decisions. Despite being a popular instrument of international environmental governance, decision-makers continue to understand this principle as reflecting an immemorial and natural instinct for preserving the environment in cases of scientific uncertainty. Such a reading, however, ignores the history and moral basis underlying this principle and thereby renders it obvious, and automatically adaptable to the politics of Sustainable Development. By offering a thicker history of precautionary governance at exemplary moments of ecological crisis I trace …


Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding Apr 2014

Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding

Dillon A Redding

This note argues that the preservation of Antarctica for peaceful research and internationally cooperative activity as envisioned originally by the Antarctic Treaty in 1961 has gone unrealized amid growing international interest in the strategic advantages offered by Antarctica, including the possibility of large swathes of mineral deposits and optimal locations for satellite stations. Part 1 describes the motivations behind the Antarctic Treaty System (ATS) and outlines the relevant provisions of the Antarctic Treaty. Part 2 examines the military advantages to a state presence in Antarctica and the ways in which the ATS allows for such a presence to be carried …


Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos Apr 2014

Cuba And China: A Comparative Study Of Digital Oppression, Katharine M. Villalobos

Katharine M. Villalobos

The Digital Age has introduced a new form of expression that totalitarian states are struggling to silence. With social sharing websites like Twitter and Youtube, political dissidents living under oppressive governments can expose governmental abuse to web-users worldwide in a matter of seconds. However, while digital media has proved more difficult to control than traditional, non-electronic media, dictatorships like Cuba and China are resolved to prevent its inhabitants from freely using and expressing themselves on the Internet—even if that means violating their obligations as signatories of the International Covenant on Civil and Political Rights (ICCPR).

Both Cuba and China are …


Copyright And Inequality, Lea Shaver Feb 2014

Copyright And Inequality, Lea Shaver

Lea Shaver

The prevailing theory of copyright law imagines a marketplace efficiently serving up new works to an undifferentiated world of consumers. Yet the reality is that all consumers are not equal. The majority of the world’s people experience copyright law not as a boon to consumer choice, but as a barrier to acquiring knowledge and taking part in cultural life. The resulting patterns of privilege and disadvantage, moreover, reinforce and perpetuate preexisting social divides. Class and culture combine to explain who wins, and who loses, from copyright protection. Along the dimension of class, the insight is that just because new works …


Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer Jan 2014

Surveillance, Speech Suppression And Degradation Of The Rule Of Law In The “Post-Democracy Electronic State”, David Barnhizer

David Barnhizer

None of us can claim the quality of original insight achieved by Alexis de Tocqueville in his early 19th Century classic Democracy in America in his observation that the “soft” repression of democracy was unlike that in any other political form. It is impossible to deny that we in the US, the United Kingdom and Western Europe are experiencing just such a “gentle” drift of the kind that Tocqueville describes, losing our democratic integrity amid an increasingly “pretend” democracy. He explained: “[T]he supreme power [of government] then extends its arm over the whole community. It covers the surface of society …


Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor Oct 2013

Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor

Jonathan I. Ezor

Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …


Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li May 2013

Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li

Jeffrey Li

Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …


Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr. Apr 2013

Social Media And Our Misconceptions Of The Realities, Richard Sanvenero Jr.

Richard Sanvenero Jr.

This article will review the current laws of the expectations of privacy under the two-pronged Katz test, and more specifically other cases that the courts have tried to interpret the test as applicable to social media such as Facebook, Instagram, Twitter, and e-mail. Since there seems to be “no light at the end of the tunnel” with any uniform decision within the courts on the Fourth Amendment protections against search and seizure when there is a reasonable expectation of privacy with social media. This reasonable expectation standard is developed by the users themselves who will allow their rights to be …


A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: International Law, Matthew Rimmer Dr Nov 2012

A Submission To The Australian Law Reform Commission On Copyright And The Digital Economy: International Law, Matthew Rimmer Dr

Matthew Rimmer

The Australian Law Reform Commission poses a question in respect of international law in the issues paper on Copyright and the Digital Economy.Question 1. The ALRC is interested in evidence of how Australia’s copyright law is affecting participation in the digital economy. For example, is there evidence about how copyright law: a. affects the ability of creators to earn a living, including through access to new revenue streams and new digital goods and services; b. affects the introduction of new or innovative business models; c. imposes unnecessary costs or inefficiencies on creators or those wanting to access or make use …


A Submission To The New Zealand Government On The Plain Packaging Of Tobacco Products, Matthew Rimmer Oct 2012

A Submission To The New Zealand Government On The Plain Packaging Of Tobacco Products, Matthew Rimmer

Matthew Rimmer

EXECUTIVE SUMMARYThis submission draws upon a number of pieces of research and policy papers on the plain packaging of tobacco products including:1. Becky Freeman, Simon Chapman, and Matthew Rimmer, 'The Case for the Plain Packaging of Tobacco Products' (2008) 103 (4) Addiction 580-590.2. Matthew Rimmer, 'A Submission to the Senate Legal and Constitutional Committee on the Trade Marks Amendment (Tobacco Plain Packaging) Bill (Cth)', September 2011, https://senate.aph.gov.au/submissions/comittees/viewdocument.aspx?id=dabfcd75-9807-493f-bc99-4a7506bf493b3A. Matthew Rimmer, 'Tobacco's Mad Men Threaten Public Health', The Conversation, 23 September 2011, http://theconversation.edu.au/tobaccos-mad-men-threaten-public-health-34503B. Matthew Rimmer, 'Big Tobacco's Box Fetish: Plain Packaging at the High Court', The Conversation, 20 April 2012, https://theconversation.edu.au/big-tobaccos-box-fetish-plain-packaging-at-the-high-court-65183C. Matthew …


A Submission To The Joint Standing Committee On Treaties On The Anti-Counterfeiting Trade Agreement 2011 (#Acta), Matthew Rimmer Mar 2012

A Submission To The Joint Standing Committee On Treaties On The Anti-Counterfeiting Trade Agreement 2011 (#Acta), Matthew Rimmer

Matthew Rimmer

“If Hollywood could order intellectual property laws for Christmas, what would they look like? This is pretty close.” David Fewer“While European and American IP maximalists have pushed for TRIPS-Plus provisions in FTAs and bilateral agreements, they are now pushing for TRIPS-Plus-Plus protections in these various forums.” Susan Sell“ACTA is a threat to the future of a free and open Internet.” Alexander Furnas“Implementing the agreement could open a Pandora's box of potential human rights violations.” Amnesty International.“I will not take part in this masquerade.” Kader Arif, Rapporteur for the Anti-Counterfeiting Trade Agreement 2011 in the European ParliamentExecutive SummaryAs an independent scholar …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


Social Networking: A Conceptual Analysis Of A Data Controller, Rebecca Wong Dec 2009

Social Networking: A Conceptual Analysis Of A Data Controller, Rebecca Wong

Dr Rebecca Wong

This article updates a working party looking at the definition of a "data controller" under the Data Protection Directive 95/46/EC within the context of a social networking environment. In brief, the article considers twhether the phenomenom of social networking (through Facebook (FB), MySpace and Bebo) has produced unintended consequences in the interpretation and application of the Data Protection Directive 95/46/EC to the online environment. The Data Protection Directive 95/46/EC defines a "data controller" broadly to refer to the 'natural or legal person, public authority, agency or any other body which alone or jointly with others determines the purposes and means …


Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington May 2009

Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington

Matthew Hoisington

Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via cyberspace strains traditional definitions of the use of force. In order to clearly delineate the rights of the parties involved, including the right to self-defense, the international community must come to some consensus on the meaning of cyberwarfare within the existing jus ad bellum paradigm. After examining the shortcomings inherent in classifying cyberattacks according to classical notions of kinetic warfare, …