Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Federalist Society’S Intellectual Property Practice Group And Its Stanford Law School Present A Debate On Open Source And Intellectual Property Rights, Lawrence Lessig, F. Scott Kieff, G. Marcus Cole
Federalist Society’S Intellectual Property Practice Group And Its Stanford Law School Present A Debate On Open Source And Intellectual Property Rights, Lawrence Lessig, F. Scott Kieff, G. Marcus Cole
University of Massachusetts Law Review
Transcript of the Federalist Society’s Intellectual Property Practice Group and its Stanford Law School Chapter debate on Open Source and Intellectual Property Rights with panelists Professor Lawrence Lessig from Stanford University and Professor F. Scott Kieff from Stanford University and moderated by Professor G. Marcus Cole from Stanford Law School. This debate took place on Wednesday, March 30, 2005 in Palo Alto, California.
Lessons Learned From 9/11: Dna Identification In Mass Fatality Incidents, National Institute Of Justice
Lessons Learned From 9/11: Dna Identification In Mass Fatality Incidents, National Institute Of Justice
University of Massachusetts Law Review
DNA analysis is the gold standard for identification of human remains from mass disasters. Particularly in the absence of traditional anthropological and other physical characteristics, forensic DNA typing allows for identification of any biological sample and the association of body parts, as long as sufficient DNA can be recovered from the samples. This is true even when the victim’s remains are fragmented and the DNA is degraded. While many effective laboratory protocols are available for DNA analysis, the analytical portion is only one part of the identification process.
Intimate Terrorism And Technology: There's An App For That, Justine A. Dunlap
Intimate Terrorism And Technology: There's An App For That, Justine A. Dunlap
University of Massachusetts Law Review
Technology enhances the ability of the domestic violence prepetrator. It also holds the promise of assisting domestic violence survivors in their quest for safety. This is true in practical, daily ways and is becoming increasingly true in the legal treatment of these cases. Perpetrators can use technology to stalk and find their victims; survivors can use it to access necessary information to get away from their batterers. Laws are being amended to take into account cyber-enhanced domestic violence techniques. Domestic or intimate terrorists are among the class of criminals targeted for use of GPS monitoring. This article discusses the way …