Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Technology (5)
- Law and technology (4)
- National security (4)
- Privacy (4)
- Clean technology (3)
-
- Climate change (3)
- GHG (3)
- Social media (3)
- AI (2)
- DNA science (2)
- DOE (2)
- Data privacy (2)
- Department of Energy (2)
- Electronic cash (2)
- Electronic payments (2)
- Energy technology (2)
- Genetic science (2)
- Global warming (2)
- Greenhouse gas emissions (2)
- Human Genome Project (2)
- Inc. (2)
- Information technology (2)
- Intellectual property (2)
- National security law (2)
- Patent (2)
- Renewable energy sources (2)
- Renewable portfolio standards (2)
- Science (2)
- Security (2)
- AIDS (1)
- Publication Year
Articles 1 - 30 of 73
Full-Text Articles in Law
How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid
How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid
American University Journal of Gender, Social Policy & the Law
In July 2021, Ziggi Tyler posted a video on TikTok, a popular video sharing platform, where he expressed his frustration with being a Black content creator on TikTok. The video showed Ziggi typing phrases such as “Black Lives Matter” or “Black success” into his Marketplace creator bio, which the app would immediately flag as inappropriate content. However, when Ziggi replaced those words with “white supremacy” or “white success,” no inappropriateness warning appeared. Although a TikTok spokesperson responded to the video clarifying that the app had mistakenly flagged phrases without considering word order, Ziggi refused to let an algorithm absolve TikTok …
Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu
American University National Security Law Brief
The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.
Letter Form The Editor, Wayne Rash, Iii
Letter Form The Editor, Wayne Rash, Iii
American University National Security Law Brief
In our last issue of The National Security Law Brief, Vol. 13, No. 1, we highlighted the dynamism that makes National Security Law such an exciting field. In this issue, No. 2, we continue with the dynamism theme. National security law is a field in constant change that often leaves us questioning how these changes will shape the law.
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
American University National Security Law Brief
Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
American University National Security Law Brief
Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …
Next Verse, Same As The First: Inadequacies In The Government's Legal Approach Toward Biotechnology, Kimberly Righter
Next Verse, Same As The First: Inadequacies In The Government's Legal Approach Toward Biotechnology, Kimberly Righter
Sustainable Development Law & Policy
No abstract provided.
The Patentability Of Gene Editing Technologies Such As Crispr & The Harmonization Of Laws Relating To Germline Editing, Jessica Wachowicz
The Patentability Of Gene Editing Technologies Such As Crispr & The Harmonization Of Laws Relating To Germline Editing, Jessica Wachowicz
Intellectual Property Brief
No abstract provided.
A Nonobvious Approach To Functional Claiming In Software Patents, Jennifer Chiang
A Nonobvious Approach To Functional Claiming In Software Patents, Jennifer Chiang
Intellectual Property Brief
No abstract provided.
A Break From Reality: Modernizing Authentication Standards For Digital Video Evidence In The Era Of Deepfakes, John P. Lamonaga
A Break From Reality: Modernizing Authentication Standards For Digital Video Evidence In The Era Of Deepfakes, John P. Lamonaga
American University Law Review
The legal standard for authenticating photographic and video evidence in court has remained largely static throughout the evolution of media technology in the twentieth century. The advent of “deepfakes,” or fake videos created using artificial intelligence programming, renders outdated many of the assumptions that the Federal Rules of Evidence are built upon.
Rule 901(b)(1) provides a means to authenticate evidence through the testimony of a “witness with knowledge.” Courts commonly admit photographic and video evidence by using the “fair and accurate portrayal” standard to meet this Rule’s intent. This standard sets an extremely low bar—the witness need only testify that …
Intergenerational Control: Why Genetic Modification Of Embryos Via Crispr-Cas9 Is Not A Fundamental Parental Right, Fernando Montoya
Intergenerational Control: Why Genetic Modification Of Embryos Via Crispr-Cas9 Is Not A Fundamental Parental Right, Fernando Montoya
American University Law Review
No abstract provided.
Products Liability In The Digital Age: Liability Of Commercial Sellers Of Cad Files For Injuries Committed With A 3d-Printed Gun, Mika Sharpe
American University Law Review
No abstract provided.
Artificially Intelligent And Free To Monopolize: A New Threat To Competitive Markets Around The World, Kaylynn Noethlich
Artificially Intelligent And Free To Monopolize: A New Threat To Competitive Markets Around The World, Kaylynn Noethlich
American University International Law Review
No abstract provided.
Hey Alexa: Was It The Butter, In The Foyer, With The Candlestick? Understanding Amazon's Echo And Whether The Government Can Retrieve Its Data, Seth Weintraub
Hey Alexa: Was It The Butter, In The Foyer, With The Candlestick? Understanding Amazon's Echo And Whether The Government Can Retrieve Its Data, Seth Weintraub
American University Business Law Review
No abstract provided.
Robots, New Technology, And Industry 4.0 In Changing Workplaces. Impacts On Labor And Employment Laws, Ronald C. Brown
Robots, New Technology, And Industry 4.0 In Changing Workplaces. Impacts On Labor And Employment Laws, Ronald C. Brown
American University Business Law Review
No abstract provided.
"The Way I Felt": Creating A Model Statute To Address Sexual Offenses Which Utilize Virtual Reality, Ryan Esparza
"The Way I Felt": Creating A Model Statute To Address Sexual Offenses Which Utilize Virtual Reality, Ryan Esparza
Criminal Law Practitioner
No abstract provided.
Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar
Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar
American University Law Review
The internet is a marvel of human accomplishment and a feat of technological engineering, which allows nearly instantaneous communication across the globe-an act once considered the stuff of science fiction. It has been lauded for its environmental benefits, such as reducing paper production and waste, but, as with any great accomplishment, there are unintended consequences. The increased proliferation of electronic devices to access the internet and the exponential advancement of those devices results in large amounts of electronic waste-a problem in its own right. Compounding the issue, for all of those internet-enabled devices to work, they must rely on the …
Fundamentally Unfair: Databases, Deportation, And The Crimmigrant Gang Member, Katherine Conway
Fundamentally Unfair: Databases, Deportation, And The Crimmigrant Gang Member, Katherine Conway
American University Law Review
Provocative language painting immigrants as dangerous criminals and promises of increased immigration enforcement were cornerstones of Donald j Trump's presidential candidacy. As president, he has maintained this rhetoric and made good on many of his promises by broadening the definition of "criminal conduct" for immigration enforcement purposes, touting a renewed focus on immigrant gangs and cartels, and conducting several nation-wide anti-gang sweeps that placed an estimated 1095 "known" gang members in Immigration and Customs Enforcement (ICE) custody. But the Trump Administration did not create the specter of the criminal immigrant, or "crimmigrant," gang member, nor did it create the detection …
Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy
Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy
American University Law Review
Smartphones have swiftly replaced most-if not all-conventional methods of sending, receiving, and storing personal information. Letters, address books, calendars, and trips to the bank have been rendered obsolete by tools such as text messaging, digital contacts, iCal, and mobile banking apps. Although these digital alternatives are convenient, they are not immune from attack. Therefore, to remain competitive, technology companies must maintain safe and secure platforms on which users may freely store and share their personal information.
Apple Inc., for example, strives to protect its users' intimate information, consequently earning a reputation for prioritizing security. Like a king protecting his castle, …
Body Worn Cameras With Facial Recognition Technology: When It Constitutes A Search, Kelly Blount
Body Worn Cameras With Facial Recognition Technology: When It Constitutes A Search, Kelly Blount
Criminal Law Practitioner
No abstract provided.
The Implications Of Creating An Iphone Backdoor, Gregory Coutros
The Implications Of Creating An Iphone Backdoor, Gregory Coutros
American University National Security Law Brief
No abstract provided.
The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard
The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard
American University National Security Law Brief
No abstract provided.
The Law Of Armed Conflict, Unconventional Warfare, And Cyber Attacks, Thomas P. Jordan
The Law Of Armed Conflict, Unconventional Warfare, And Cyber Attacks, Thomas P. Jordan
American University National Security Law Brief
No abstract provided.
Applying The Law Of Neutrality While Transitioning The Seas Of Cyberspace, Danielle Higson
Applying The Law Of Neutrality While Transitioning The Seas Of Cyberspace, Danielle Higson
American University National Security Law Brief
No abstract provided.
A Spoof Of Justice: Double Jeopardy Implications For Convictions Of Both Spoofing And Commodities Fraud For The Same Transaction, Abram Olychyk
A Spoof Of Justice: Double Jeopardy Implications For Convictions Of Both Spoofing And Commodities Fraud For The Same Transaction, Abram Olychyk
American University Law Review
No abstract provided.
"Going Green" The Wrong Way: How Governments Are Unconstitutionally Delegating Their Legislative Powers In Pursuit Of Environmental Sustainability, Brandon L. Boxler
"Going Green" The Wrong Way: How Governments Are Unconstitutionally Delegating Their Legislative Powers In Pursuit Of Environmental Sustainability, Brandon L. Boxler
Legislation and Policy Brief
Through either executive or legislative power, state and local governments are rapidly effecting policies that encourage environmental sustainability. Many of these policies have logically targeted buildings and infrastructure, both of which have a significant adverse impact on the environment. In the United States, 38 percent of the nation’s carbon dioxide emissions and 67 percent of its electricity usage come from buildings. New laws and policies are attempting to decrease these figures by requiring construction projects to “go green” and implement sustainable building practices. These legal initiatives have the potential to create substantial environmental benefits by reducing energy consumption, greenhouse gas …
Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman
Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman
Legislation and Policy Brief
In the modern digitized and networked world, personal identifying information has quickly become a commodity that can be traded, sold, or given away like any other. The uses and potential abuses of personal identifying information, however, distinguish this commodity from any other. Personal identifying information can be copied infinitely, is often not protected nearly as well as physical commodities, and, most importantly, can have particular importance to the person identified by that information. The producer of a bushel of apples presumably cares very little about where his apples end up, as long as he is paid for them to begin …
Caster Semenya And The Myth Of A Level Playing Field, Erin E. Buzuvis
Caster Semenya And The Myth Of A Level Playing Field, Erin E. Buzuvis
The Modern American
No abstract provided.
Readily Deployable Approaches To Geoengineering: Cool Materials And Aggressive Reforestation, Max G. Bronstein
Readily Deployable Approaches To Geoengineering: Cool Materials And Aggressive Reforestation, Max G. Bronstein
Sustainable Development Law & Policy
No abstract provided.
Law, Science, And The Continental Shelf: The Russian Federation And The Promise Of Arctic Cooperation, Betsy Baker
Law, Science, And The Continental Shelf: The Russian Federation And The Promise Of Arctic Cooperation, Betsy Baker
American University International Law Review
No abstract provided.
Intellectual Property Rights To Enhance International Clean Tech Transfers, Anastasia Lewandoski
Intellectual Property Rights To Enhance International Clean Tech Transfers, Anastasia Lewandoski
Sustainable Development Law & Policy
No abstract provided.