Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Fourth Amendment (2)
- Surveillance (2)
- Adaptedness (1)
- Attention economy (1)
- Attention spans (1)
-
- Civil rights (1)
- Constitutional protection (1)
- Cyber crime (1)
- Cyberlaw (1)
- Cyberspace (1)
- Cyberspace Law (1)
- E-mail (1)
- Ecosystems (1)
- Electronic mail (1)
- Environments (1)
- Evolution (1)
- FISA (1)
- Foreign Intelligence Surveillance Act (1)
- Foreign affairs (1)
- ISP (1)
- Information systems (1)
- Innovative Technologies (1)
- Intellectual Property (1)
- Intelligence (1)
- Internet Service Provider (1)
- Knowledge ecosystems (1)
- Market (1)
- Organizational science (1)
- Practice and Procedure (1)
- Privacy (1)
Articles 1 - 7 of 7
Full-Text Articles in Law
Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski
Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski
Sascha Vitzthum
Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …
Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski
Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski
David A. Bray
We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …
Cyber Civil Rights (Mp3), Danielle Citron
Trademarking Nanotechnology: Nano-Lies & Federal Trademark Registration, Jason Du Mont
Trademarking Nanotechnology: Nano-Lies & Federal Trademark Registration, Jason Du Mont
Jason John Du Mont
No abstract provided.
Idealized Images Of Science In Law: The Expert Witness In Trial Movies, David Caudill
Idealized Images Of Science In Law: The Expert Witness In Trial Movies, David Caudill
David S Caudill
No abstract provided.
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Fourth Amendment Protection For Stored E-Mail, Susan Freiwald, Patricia L. Bellia
Susan Freiwald
The question of whether and how the Fourth Amendment regulates government access to stored e-mail remains open and pressing. A panel of the Sixth Circuit recently held in Warshak v. United States, 490 F.3d 455 (6th Cir. 2007), that users generally retain a reasonable expectation of privacy in the e-mails they store with their Internet Service Providers (ISPs), which implies that government agents must generally acquire a warrant before they may compel ISPs to disclose their users' stored e-mails. The Sixth Circuit, however, is reconsidering the case en banc. This Article examines the nature of stored e-mail surveillance and argues …
Electronic Surveillance At The Virtual Border, Susan Freiwald
Electronic Surveillance At The Virtual Border, Susan Freiwald
Susan Freiwald
A virtual border divides people into two groups: those subject to the Fourth Amendment’s protections when the U.S. government conducts surveillance of their communications and those who are not. The distinction derives from a separation in powers: inside the virtual border, U.S. citizens and others enjoy the extensive oversight of the judiciary of executive branch surveillance. Judges review such surveillance before, during, and after it transpires. Foreign persons subject to surveillance in foreign countries fall within the executive branch’s’ foreign affairs function. However, the virtual border does not exactly match the physical border of the United States. Some people inside …