Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

SelectedWorks

Technology

Discipline
Publication Year
Publication

Articles 1 - 30 of 43

Full-Text Articles in Law

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman Sep 2015

Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


Practice Lean! Implementing Technology-Driven Lean Six Sigma In A Law Firm, Frank A. Urbanic Nov 2014

Practice Lean! Implementing Technology-Driven Lean Six Sigma In A Law Firm, Frank A. Urbanic

frank a urbanic

No abstract provided.


Litigation Technology For The Modern Practitioner, Jonathan H. Lomurro Esq. Llm, Christopher T. Campbell Esq, Matthew K. Blaine Esq, Stephanie L. Lomurro Esq, Christina V. Harvey Esq Aug 2014

Litigation Technology For The Modern Practitioner, Jonathan H. Lomurro Esq. Llm, Christopher T. Campbell Esq, Matthew K. Blaine Esq, Stephanie L. Lomurro Esq, Christina V. Harvey Esq

Jonathan H. Lomurro Esq. LLM

No abstract provided.


Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander Jun 2014

Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander

Rachel Rose Ostrander

As the science of stem cell research progresses it is difficult to tell what implications it will have on our society and for women. I will begin this discussion by examining how science has viewed women in the past, and use this as a basis to conjecture about how they will be viewed and treated in the future. Prevalent gender bias in scientific writing should be a cause for concern as the science of stem cell research and commodification of the female egg becomes more of a reality.

The process of egg donation has stirred much debate in the feminist …


Aereo's Errors, Ira Steven Nathenson Jan 2014

Aereo's Errors, Ira Steven Nathenson

Ira Steven Nathenson

This article scrutinizes the many troubling errors made by the United States Supreme Court in its decision in American Broadcasting Companies, Inc. v. Aereo, Inc. Aereo’s streaming television service allowed subscribers to watch broadcast television on a computer, tablet, or smartphone without requiring them to be directly connected to cable, satellite, or a local antenna. Aereo’s system was designed to comply with existing copyright law by using thousands of antennas, each of which was designated for only one subscriber at a time. Aereo was sued for copyright infringement by a number of leading television broadcasters. The United States Supreme Court, …


Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner Sep 2013

Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner

Dru Stevenson

Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement – based on perceptions of likely outcomes at trial and anticipated litigation costs. Lawyers practicing in the shadow of trial have, in turn, traditionally formed their perception of the likely outcome at trial based on their knowledge of case precedents, intuition, and previous interactions with the presiding judge and opposing counsel in similar cases. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in …


Sue My Car Not Me: Products Liability And Accidents Involving Autonomous Vehicles, Jeffrey K. Gurney Jan 2013

Sue My Car Not Me: Products Liability And Accidents Involving Autonomous Vehicles, Jeffrey K. Gurney

Jeffrey K Gurney

Autonomous vehicles will revolutionize society within the decade. These cars will cause accidents. Tort liability, however, is not ready for the introduction of autonomous vehicles, and, thus, liability will not be assessed to the party that is responsible for the accident. This Article addresses the liability of autonomous vehicle by examining products liability through the use of four scenarios: the Distracted Driver; the Diminished Capabilities Driver; the Disabled Driver; and the Attentive Driver.Based on those scenarios, this Article argues that the autonomous technology manufacturer should be liable for accidents while the vehicle is in autonomous mode. This Article suggests that …


Watch The World "Burn": Copyright, Micropatent And The Emergence Of 3d Printing, Matthew A. Susson Jan 2013

Watch The World "Burn": Copyright, Micropatent And The Emergence Of 3d Printing, Matthew A. Susson

Matthew A Susson

Where the Industrial Revolution introduced the notion of mass production of goods — and thereby upended previous economic models — 3D printing now “makes it as cheap to create single items as it is to produce thousands,” which “may have as profound an impact on the world as the coming of the factory did.” In short, a new fabrication revolution is coming.

3D printing is, put simply, a technology that allows one to transform a digital file into a physical product — in other words, we can now print actual objects. Technology that allows users to manufacture complex objects at …


The Court Misses The Point Again In United States V. Jones: An Opt-In Model For Privacy Protection In A Post Google-Earth World, Mary G. Leary Mar 2012

The Court Misses The Point Again In United States V. Jones: An Opt-In Model For Privacy Protection In A Post Google-Earth World, Mary G. Leary

Mary G Leary

“Nothing is private anymore.” This is an oft repeated sentiment by many Americans, not to mention the focus of judicial confusion and legislative blustering. In the wake of publicly available technologies such as Google Earth, internet tracking, cell phone triangulation, to name just a few, many people feel unable to prevent the government or anyone from obtaining private information. While this may seem simply a function of a modern world, this reality creates a fundamental problem for Fourth Amendment jurisprudence which has heretofore gone unrecognized. The Fourth Amendment protects citizens from unreasonable searches and seizures. Therefore, in order for the …


Illuminating Innovation, Lea B. Shaver Mar 2012

Illuminating Innovation, Lea B. Shaver

Lea Shaver

The central justification offered for patent protection is the need to incentivize technological innovation. Yet to date there is little empirical evidence that this aim is achieved. This Article argues that historical case studies, exploring the impact of patent law on particular fields of technological innovation, can be especially helpful in providing an empirical foundation for patent scholarship. The Article then proceeds to offer one such case study, focused on one of the most important technological revolutions of the past two centuries: electrification. Although Thomas Edison and “the incandescent lamp” have been extensively studied, so far no one has asked …


Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil Jan 2012

Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil

William Marra

The United States is in the midst of a national debate about the role drone aircraft should play in warfare abroad and law enforcement at home. Armed drones hunt enemies abroad 24 hours a day, seven days a week. Drones have begun to patrol our domestic skies too, on the lookout for suspicious activity. But contemporary drones are merely the “Model T” of robot technology. Today, humans are still very much “in the loop”: humans decide when to launch a drone, where it should fly, and whether it should take action against a suspect. But as drones develop greater autonomy, …


The Economics Of Horizontal Government Cooperation (Working Paper), Matthew R. Dalsanto Ph.D. Apr 2011

The Economics Of Horizontal Government Cooperation (Working Paper), Matthew R. Dalsanto Ph.D.

Matthew R. DalSanto, Ph.D.

This paper analyzes the ability of intrastate and interstate cooperative agreements to either minimize or capitalize on interjurisdictional externalities. These agreements are commonly referred to as compacts or joint powers agreements (intrastate compacts). The compact mechanism allows regional governments to enter into contractual agreements with one another to coordinate policy choices and to engage in cooperative endeavors. Given the inter-jurisdictional nature of the issues that affect horizontally situated governments, this mechanism is a powerful tool to achieve welfare-enhancing outcomes for citizens.

A review of the legal case law surrounding compacts is conducted to analyze the legal properties from an economic …


Information Overload, Multi-Tasking, And The Socially Networked Jury: Why Prosecutors Should Approach The Media Gingerly, Andrew Taslitz Feb 2011

Information Overload, Multi-Tasking, And The Socially Networked Jury: Why Prosecutors Should Approach The Media Gingerly, Andrew Taslitz

Andrew E. Taslitz

Abstract The rise of computer technology, the internet, rapid news dissemination, multi-tasking, and social networking have wrought changes in human psychology that alter how we process news media. More specifically, news coverage of high-profile trials necessarily focuses on emotionally-overwrought, attention-grabbing information disseminated to a public having little ability to process that information critically. The public’s capacity for empathy is likewise reduced, making it harder for trial processes to overcome the unfair prejudice created by the high-profile trial. Market forces magnify these changes. Free speech concerns limit the ability of the law to alter media coverage directly, and the tools available …


The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti Jan 2011

The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti

Corey A Ciocchetti

In the midst of massive government involvement in the financial, real estate and automotive sectors, other important problems linger without sufficient governmental attention. This article focuses on one area where federal intervention has been particularly absent - the realm of individual privacy in the Information Age. The problem is that monitoring in the United States is increasingly powerful and takes many forms. Online, prominent Web sites collect, store and disseminate a great deal of personally identifying information (PII) without clearly and simply informing users. This is the case even though such notice is cheap and can be effective. Offline, technology …


Water, Climate, And Energy Security, Prof. Elizabeth Burleson Jan 2011

Water, Climate, And Energy Security, Prof. Elizabeth Burleson

Prof. Elizabeth Burleson

Civil society participation can facilitate sound energy, climate, and water governance. This article analyzes the dynamics of transnational decision-making. Part II discusses sound energy strategy in light of a shrinking water-resources base due to climate change. Part III considers how public participation in international decision-making can sustain trust in governments and strengthen the legitimacy of legal decisions. Part IV concludes that process and outcome are both integral to addressing water, climate, and energy challenges.


Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew J. King-Ries Aug 2010

Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew J. King-Ries

Andrew J King-Ries

While the legal system has made progress in combating domestic violence in the last 30 years, this progress is threatened by the intersection of two recent developments: teenagers normalizing unhealthy relationship patterns through pervasive use of technology and law enforcement’s inability to adequately respond to cyberstalking. The combination of these trends suggests America is producing a new generation of domestic violence batterers.

Recent studies document extensive use of technology—email, texts, social networking—by teenagers in their intimate relationships. Teenagers’ use of technology in their dating relationships often mimics relationship patterns present in violent adult relationships. Teenagers appear to be normalizing unhealthy …


Barricading The Digital Frontier: Copyright, Technology And The War On Music Piracy, Benjamin Gibert Aug 2010

Barricading The Digital Frontier: Copyright, Technology And The War On Music Piracy, Benjamin Gibert

Benjamin Gibert

The Internet is changing the way vast numbers of people experience culture today. Providing tools to interact with, manipulate and freely redistribute content, technology is dissolving conventional divisions between creators and consumers of cultural artefacts. As new technological and legislative mechanisms are deployed to stop digital piracy, there is a need to reflect on the meaning of copyright, piracy and culture in the context of digital technologies. This paper discusses the relationship between copyright and cultural participation. It refers to the music industry in order to depict the changing patterns of consumption behavior precipitated by the rise of digital networks …


Fighting Homogenization: The Global Infiltration Of Technology And The Struggle To Preserve Cultural Distinctiveness., Saptarishi Bandopadhyay Apr 2010

Fighting Homogenization: The Global Infiltration Of Technology And The Struggle To Preserve Cultural Distinctiveness., Saptarishi Bandopadhyay

Saptarishi Bandopadhyay

While technology and globalization continue to pervade every aspect of the world, the scope for the sustenance of national or regional culture is rapidly disappearing. This paper will seek to use the lessons and experiences obtained through the controversies in the use of Direct Broadcasting Satellites in its more initial years and apply the same to the Internet to assess its effect on the culture of developing States. The eventual thesis proposed here argues that the freedom of information upheld through technology, and the human right to culture need not be seen as perpendicular interests, but that the latter may …


Constructing Commons In The Cultural Environment, Katherine J. Strandburg, Michael J. Madison, Brett M. Frischmann Jan 2010

Constructing Commons In The Cultural Environment, Katherine J. Strandburg, Michael J. Madison, Brett M. Frischmann

Katherine J. Strandburg

This Article sets out a framework for investigating sharing and resource pooling arrangements for information and knowledge-based works. We argue that the approach to commons arrangements in the natural environment pioneered by Elinor Ostrom and collaborators provides a template for examining the construction of commons in the cultural environment. The approach promises to lead to a better understanding of how participants in commons and pooling arrangements structure their interactions in relation to the environments in which they are embedded, in relation to information and knowledge resources that they produce and use, and in relation to one another.

An improved understanding …


Protect The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technological World, Francis S. Monterosso Nov 2009

Protect The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technological World, Francis S. Monterosso

Francis S Monterosso

This Note untangles courts’ problems with the prosecution of child pornography defendants and aims to redirect attention to the social impact associated with these crimes. First, Part I provides an introduction to the Note and discusses the background of the Child Pornography Prevention Act. Secondly, Part II sets forth the evolution of the CPPA and its goals and shortcomings. Next, Part III further explains the development of child pornography prosecutions in the United States through two cases that illustrate the government’s desire to prosecute child pornography defendants.

Moreover, Part IV explains the difficulties courts have encountered in the prosecution of …


Examining The "Csi-Effect" In The Cases Of Circumstantial Evidence And Eyewitness Testimony: Multivariate And Path Analyses, Hon. Donald E. Shelton, Young S. Kim, Gregg Barak Sep 2009

Examining The "Csi-Effect" In The Cases Of Circumstantial Evidence And Eyewitness Testimony: Multivariate And Path Analyses, Hon. Donald E. Shelton, Young S. Kim, Gregg Barak

Hon. Donald E. Shelton

As part of a larger investigation of the changing nature of juror behavior in the context of technology development, this study examined important questions unanswered by previous studies on the “CSI-effect.” In answering such questions, the present study applied multivariate and path analyses for the first time. The results showed that (a) watching CSI dramas had no independent effect on jurors' verdicts, (b) the exposure to CSI dramas did not interact with individual characteristics, (c) different individual characteristics were significantly associated with different types of evidence, and (d) CSI watching had no direct effect on jurors' decisions, and it had …


The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie Jun 2009

The Federal Response To A Tragic Teen Suicide: The Stretching Of A Statute To Punish Cyber-Harassment, The Groundbreaking Trial, Implications For Everyone, And Suggestions For The Future., John M. Ivancie

John M Ivancie Jr.

This paper revolves around the novel use of the federal Computer Fraud and Abuse Act to prosecute a Missouri woman, who, with her high-school-aged daughter, and a teenage employee created a fake MySpace.com account to get information about, and harass the daughter’s teen-aged friend. This harassment eventually led to that young girls suicide. No local law was broken by the trio’s actions, and thus, there was nothing local law-enforcement authorities could do. Federal prosecutors in California did respond and charged the mother under the Computer Fraud and Abuse Act, a Federal anti-hacking statute. The way prosecutors used the statute is …


The Inevitable Disclosure Doctrine: A Common-Sense Application That Considers The Rights Of Trade Secret Holders And Employees, Eduardo M. Gonzalez Mar 2009

The Inevitable Disclosure Doctrine: A Common-Sense Application That Considers The Rights Of Trade Secret Holders And Employees, Eduardo M. Gonzalez

Eduardo M Gonzalez

Under the inevitable disclosure doctrine, a court may enjoin a person accepting employment with a direct competitor of a former employer to protect a trade secret. Most states that have adopted the doctrine do not limit its application. Such broad application of the doctrine can be harsh and unfair if the former employee lacked any intent to disclose a trade secret. Moreover, it encourages frivolous lawsuits by employers and discourages bargained-for non-compete agreements. Some states, notably California, citing these policy concerns, have declined to adopt the doctrine. This extreme approach is equally troublesome because it ignores that the protection of …


Technology And The Crime Society: Rethinking Legal Protection, Bert-Jaap Koops Mar 2009

Technology And The Crime Society: Rethinking Legal Protection, Bert-Jaap Koops

Bert-Jaap Koops

Building on existing insights of the risk society and the surveillance society, this article sketches the contours of the emerging crime society, where every form of human behaviour is perceived in terms of potential criminal risk and controlled by means of criminal law. It articulates the pivotal role of technology in the ever increasing footprint of criminal law, as it often facilitates criminalisation, expanding policing, preventative and architectural approaches, and pervasive surveillance. Criminal law is shifting from a last resort to a primary tool of social control: criminal risk governance. This paradigm shift goes hand in hand with a shift …


When Your Recording Agency Turns Into An Agency Problem: The True Nature Of The Peer-To-Peer Debate, Lital Helman Mar 2009

When Your Recording Agency Turns Into An Agency Problem: The True Nature Of The Peer-To-Peer Debate, Lital Helman

Lital Helman

This article examines the music industry, and particularly its reaction to the file-sharing phenomenon, through the prism of the agent-principal problem. The file-sharing phenomenon shined a spotlight on the divergence of interests between the creators of music and their ultimate representatives in copyright debates, the recording industry. The economic interests of creators are focused on maximizing revenues from their works. Record companies, in contrast, are not content with their share in the revenue pie, rather are interested in maximizing their control over the exploitation of such works, in order to secure the dominant position they currently hold in the market. …


Untapped Inventive Potential In U.S. Communities, Michael Meehan Mar 2009

Untapped Inventive Potential In U.S. Communities, Michael Meehan

Michael Meehan PhD

This paper combines the 2000 U.S. Census data and the National Bureau of Economic Research’s (NBER) Patent Citation Data File in order to analyze how certain community-level population and community factors correlate with overall patenting and relative rates of assigned and unassigned patenting. Among the interesting findings discussed are that, in addition to the fact that overall patenting increased with higher populations of employed people, higher populations of people with either terminal undergraduate or master’s degrees, and higher median income, the overall rates of patenting decreased, and did not merely remain the level, as the other sectors of a communities’ …


Will Benefits Of Communicating Face-To-Face Drive Widespread Adoption Of Telepresence For Use In Commercial Negotiation?, Brian D. Mckenzie Jan 2009

Will Benefits Of Communicating Face-To-Face Drive Widespread Adoption Of Telepresence For Use In Commercial Negotiation?, Brian D. Mckenzie

Brian D. McKenzie

People are famously egocentric, short-sighted, risk-averse, competitive, and insecure. All of these human characteristics are in play during a face-to-face negotiation, where a negotiator’s ability to control his own characteristics while observing those of his opponent can have a significant impact on the outcome of the negotiation. While highly effective, face-to-face negotiation suffers from the expense of drawing geographically disparate parties into close physical proximity. As a result, alternatives for business have been developed, such as telephone, and email, but this paper will demonstrate how each falls short of the “personal experience” of face-to-face negotiation, and how such a deficiency …


International Harmonization Of Regulation Of Nanomedicine, Gary E. Marchant, Douglas J. Sylvester, Kenneth W. Abbott, Tara Lynn Danforth Jan 2009

International Harmonization Of Regulation Of Nanomedicine, Gary E. Marchant, Douglas J. Sylvester, Kenneth W. Abbott, Tara Lynn Danforth

Gary E. Marchant

Nanomedicine holds enormous promise for the improved prevention, detection and treatment of disease. Yet, at the same time, countervailing concerns about the potential safety risks of nanotechnologies generally, and nanomedical products specifically, threaten to derail or at least delay the introduction and commercial viability of many nanomedicine applications. All around the globe, national governments are struggling with balancing these competing benefits and risks of nanotechnology in the medical and other sectors. It is becoming increasingly clear that reasonable, effective and predictable regulatory structures will be critical to the successful implementation of nanotechnology. The question examined in this paper is whether …