Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (16)
- Internet Law (12)
- Privacy Law (10)
- Intellectual Property Law (9)
- Legal Education (9)
-
- Military, War, and Peace (7)
- Legal Profession (6)
- Social and Behavioral Sciences (6)
- Computer Law (5)
- International Law (5)
- Law and Society (5)
- Legal Writing and Research (5)
- National Security Law (5)
- Legal Ethics and Professional Responsibility (4)
- Antitrust and Trade Regulation (3)
- Business Organizations Law (3)
- Commercial Law (3)
- Constitutional Law (3)
- European Law (3)
- Fourth Amendment (3)
- Legislation (3)
- Other Law (3)
- State and Local Government Law (3)
- Supreme Court of the United States (3)
- Accounting Law (2)
- Air and Space Law (2)
- Arts and Humanities (2)
- Banking and Finance Law (2)
- Communications Law (2)
- Institution
-
- Selected Works (11)
- University of Michigan Law School (5)
- Boston University School of Law (3)
- University of Richmond (3)
- American University Washington College of Law (2)
-
- Cleveland State University (2)
- Loyola Marymount University and Loyola Law School (2)
- Roger Williams University (2)
- Seattle University School of Law (2)
- SelectedWorks (2)
- Southern Methodist University (2)
- St. Mary's University (2)
- The Catholic University of America, Columbus School of Law (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- University of Pennsylvania Carey Law School (2)
- Vanderbilt University Law School (2)
- Association of American Law Schools (1)
- Belmont University (1)
- Brigham Young University Law School (1)
- Case Western Reserve University School of Law (1)
- Embry-Riddle Aeronautical University (1)
- Fordham Law School (1)
- Nova Southeastern University (1)
- Ohio Northern University (1)
- Pace University (1)
- Pepperdine University (1)
- Rowan University (1)
- Saint Louis University School of Law (1)
- Texas A&M University School of Law (1)
- The University of Akron (1)
- Publication
-
- Faculty Scholarship (6)
- Articles (4)
- University of Richmond Law Review (3)
- All Faculty Scholarship (2)
- Catholic University Law Review (2)
-
- Faculty Journal Articles and Book Chapters (2)
- Loyola of Los Angeles Law Review (2)
- Michigan Telecommunications & Technology Law Review (2)
- Seattle University Law Review (2)
- Akron Law Review (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Belmont Law Review (1)
- Cardozo Life (1)
- Catherine J. Lanctot (1)
- Contributions to Books (1)
- Cynthia R. Farina (1)
- Darla W. Jackson (1)
- Faculty Articles (1)
- Faculty Publications (1)
- Faculty of Law, Humanities and the Arts - Papers (Archive) (1)
- Fordham Law Review (1)
- Franklin G. Snyder (1)
- Georgia Journal of International & Comparative Law (1)
- Giancarlo Francesco Frosio (1)
- International Law Studies (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Experiential Learning (1)
- Journal of Legal Education (1)
- Law Faculty Articles and Essays (1)
- Law Faculty Contributions to Books (1)
- Publication Type
Articles 1 - 30 of 71
Full-Text Articles in Law
Disruptive Technology And Securities Regulation, Chris Brummer
Disruptive Technology And Securities Regulation, Chris Brummer
Fordham Law Review
Nowhere has disruptive technology had a more profound impact than in financial services—and yet nowhere do academics and policymakers lack a coherent theory of the phenomenon more, much less a coherent set of regulatory prescriptions. Part of the challenge lies in the varied channels through which innovation upends market practices. Problems also lurk in the popular assumption that securities regulation operates against the backdrop of stable market gatekeepers like exchanges, broker-dealers, and clearing systems—a fact scenario increasingly out of sync in twenty-first-century capital markets.
This Article explains how technological innovation “disrupts” not only capital markets but also the exercise of …
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Privacy Almighty? The Cjeu's Judgment In Google Spain Sl V. Aepd, David J. Stute
Michigan Journal of International Law
The Internet has matured into an unprecedented repository of data, retrievable through myriad unique “links,” or Uniform Resource Locators. Yet, this wealth of information only became broadly accessible through the invention and continual development of algorithm-based search engines. Keyword searches empowered search-engine users to find—and sometimes stumble upon—information with great ease. Indeed, search-engine indices arguably have become the most comprehensive catalogues of information the world has ever seen. This wealth of accessible information poses challenges to traditional notions of privacy: aspects of our private and public lives, which previously would have rarely left the vicinities of our immediate social or …
Newsroom: Logan On Drone Law, Roger Williams University School Of Law
Newsroom: Logan On Drone Law, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Taxation, William L.S. Rowe, Emily J.S. Winbigler
Taxation, William L.S. Rowe, Emily J.S. Winbigler
University of Richmond Law Review
This article reviews significant recent developments in the lawsaffecting Virginia state and local taxation. Each section coverslegislative activity, judicial decisions, and selected opinions fromthe Virginia Department of Taxation (the "Department") and the Virginia Attorney General over the past year.
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
Cybersecurity And Law Enforcement: The Cutting Edge : Symposium, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
2015 Cardozo Life (Fall), Benjamin N. Cardozo School Of Law
2015 Cardozo Life (Fall), Benjamin N. Cardozo School Of Law
Cardozo Life
Table of Contents:
Top News & Events, page 3
Clinics News, page 8
Faculty Briefs, page 10
New Dean, New Era, page 14
Creative Enterprise, page 18
Tech Talks, page 26
Helping Clients: Clinics in Action, page 30
Student Briefs, page 34
Movers & Shakers, page 36
Alumni News & Class Notes, page 37
Advancement News, page 44
In Memoriam, page 47
End Note, page 48
Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek
Symposium: Regulatory Capture And Technological Entrepreneurship: Protecting Consumer Interests?, Robert Anderson, John G. Shearer, Christopher Koopman, Makan Delrahim, Erik Syverson, Babbette Boliek
The Journal of Business, Entrepreneurship & the Law
No abstract provided.
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Giancarlo Francesco Frosio
In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …
Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman
Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman
Lawrence J. Trautman Sr.
Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …
Clean Energy Federalism, Felix Mormann
Clean Energy Federalism, Felix Mormann
Faculty Scholarship
Legal scholarship tends to approach the law and policy of clean energy from an environmental law perspective. As hydraulic fracturing, renewable energy integration, nuclear reactor (re)licensing, transport biofuel mandates, and other energy issues have pushed to the forefront of the environmental law debate, clean energy law has begun to emancipate itself. The emerging literature on clean energy federalism is a symptom of this emancipation. This Article adds to that literature by offering two case studies, a novel model for policy integration, and theoretical insights to elucidate the relationship between environmental federalism and clean energy federalism.
Renewable portfolio standards and feed-in …
Emerging Technologies And Loac Signaling, Eric Talbot Jensen
Emerging Technologies And Loac Signaling, Eric Talbot Jensen
International Law Studies
As States seek to weaponize new technologies such as robotics, cyber tools and nanotechnology, the current law of armed conflict (LOAC) that guides the employment of existing weapons will signal rules and principles that should guide national decisions on what new technologies to weaponize and how to do so in a way that ensures compliance with battlefield regulation. LOAC has served this "signaling" function historically with respect to innovative weapon systems such as balloons, submarines, airplanes, and nuclear weapons, and will continue to do so as nations look forward to potentially weaponizing emerging technologies.
Bankruptcy Treatment Of Intellectual Property Assets: An Economic Analysis, Peter S. Menell
Bankruptcy Treatment Of Intellectual Property Assets: An Economic Analysis, Peter S. Menell
Peter Menell
No abstract provided.
Institutionalizing Legal Innovation: The (Re)Emergence Of The Law Lab, Martha F. Davis
Institutionalizing Legal Innovation: The (Re)Emergence Of The Law Lab, Martha F. Davis
Journal of Legal Education
No abstract provided.
Late Night Thoughts On Blogging While Reading Duncan Kennedy's Legal Education And The Reproduction Of Hierarchy In An Arkansas Motel Room, Franklin G. Snyder
Late Night Thoughts On Blogging While Reading Duncan Kennedy's Legal Education And The Reproduction Of Hierarchy In An Arkansas Motel Room, Franklin G. Snyder
Franklin G. Snyder
It has been more than twenty years since Duncan Kennedy published his seminal 'Legal Education and the Reproduction of Hierarchy'. In it he called for a radical assault on the hierarchies embedded in American law schools. But that assault failed. Over the past two decades, the hierarchies of legal education have, if anything, become even more fixed, insular, and status-driven, even while the elites of the practicing bar have changed dramatically and become more open to outsiders. It is vastly easier for the graduate of a fourth-tier law school to become a partner at an elite law firm than it …
Real Metamorphosis Or More Of The Same: Navigating The Practice Of Law In The Wake Of Ethics 20/20 - Globalization, New Technologies, And What It Means To Be A Lawyer In These Uncertain Times, Jack P. Sahl
Akron Law Review
On April 4 and 5, 2013, The University of Akron School of Law’s Miller-Becker Center for Professional Responsibility (“MBC”) hosted the symposium, Navigating the Practice of Law in the Wake of Ethics 20/20 – Globalization, New Technologies, and What It Means to Be a Lawyer in These Uncertain Times (Ethics 20/20 – Uncertain Times). The symposium examined the myriad of changes and problems confronting the bar, legal education, and the courts. Although law schools, courts, and the organized bar have provided a steady supply of programs addressing the recent changes confronting the profession and legal education, Ethics 20/20 – Uncertain …
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Cynthia R. Farina
This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …
Aereo, In-Line Linking, And A New Approach To Copyright Infringement For Emerging Technologies, Shannon Mcgovern
Aereo, In-Line Linking, And A New Approach To Copyright Infringement For Emerging Technologies, Shannon Mcgovern
Catholic University Law Review
In an ever-changing technological landscape, strictly adhering to the language and definitions of the Copyright Act in cases involving emerging technologies may contravene the purpose and intent of copyright law. However, the Supreme Court’s 2014 opinion in American Broadcasting Cos. v. Aereo Inc. puts forth a commercial interest rationale that suggests copyright infringers may no longer be able to avoid liability based on perceived technological loopholes that have typically absolved online infringers of infringement liability. This Note argues that Aereo’s commercial interest rationale paves the way for a new approach to technologically complex copyright cases, particularly where in-line linking …
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Loopholes For Circumventing The Constitution: Unrestrained Bulk Surveillance On Americans By Collecting Network Traffic Abroad, Axel Arnbak, Sharon Goldberg
Michigan Telecommunications & Technology Law Review
This Article reveals interdependent legal and technical loopholes that the US intelligence community could use to circumvent constitutional and statutory safeguards for Americans. These loopholes involve the collection of Internet traffic on foreign territory, and leave Americans as unprotected as foreigners by current United States (US) surveillance laws. This Article will also describe how modern Internet protocols can be manipulated to deliberately divert American’s traffic abroad, where traffic can then be collected under a more permissive legal regime (Executive Order 12333) that is overseen solely by the executive branch of the US government. Although the media has reported on some …
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Voluntary Disclosure Of Information As A Proposed Standard For The Fourth Amendment's Third-Party Doctrine, Margaret E. Twomey
Michigan Telecommunications & Technology Law Review
The third-party doctrine is a long-standing tenant of Fourth Amendment law that allows law enforcement officers to utilize information that was released to a third party without the probable cause required for a traditional search warrant. This has allowed law enforcement agents to use confidential informants, undercover agents, and access bank records of suspected criminals. However, in a digital age where exponentially more information is shared with Internet Service Providers, e-mail hosts, and social media “friends,” the traditional thirdparty doctrine ideas allow law enforcement officers access to a cache of personal information and data with a standard below probable cause. …
Bowman V. Monsanto Co.: A Bellwether For The Emerging Issue Of Patentable Self-Replicating Technologies And Inadvertent Infringement, Christopher M. Holman
Bowman V. Monsanto Co.: A Bellwether For The Emerging Issue Of Patentable Self-Replicating Technologies And Inadvertent Infringement, Christopher M. Holman
Missouri Law Review
The inherent tendency of patented seeds to self-replicate has led to fears that farmers might face liability for inadvertent patent infringement. To address the perceived problem, some have proposed severely limiting the availability of effective patent protection for self-replicating technologies. Typical examples include denying patent rights to “second generation” selfreplicating products, and even broadly declaring such technologies ineligible for patent protection. The fact is, lawsuits against inadvertently infringing farmers remain of largely hypothetical concern. However, changes in the market could soon render such lawsuits a reality. In addressing the resulting policy concerns, Congress and the courts have at their disposal …
Anarchy, Status Updates, And Utopia, James Grimmelmann
Anarchy, Status Updates, And Utopia, James Grimmelmann
Pace Law Review
Social software has a power problem. Actually, it has two. The first is technical. Unlike the rule of law, the rule of software is simple and brutal: whoever controls the software makes the rules. And if power corrupts, then automatic power corrupts automatically. Facebook can drop you down the memory hole; PayPal can garnish your pay. These sovereigns of software have absolute and dictatorial control over their domains.
Is it possible to create online spaces without technical power? It is not, because of social software’s second power problem. Behind technical power, there is also social power. Whenever people come together …
The Relationship Between Foundations And Principles In Ip Law, Robert P. Merges
The Relationship Between Foundations And Principles In Ip Law, Robert P. Merges
Robert P Merges
The article presents information on basic principles concerning foundations of the field of intellectual property (IP) law. It provides information on the basic principles of IP law which include efficiency, proportionality and dignity. It stresses on the granting of IP rights to make a workable foundation. It rejects utilitarianism for lack of precise data and presents an analysis of the three levels of IP law with the help of new technologies.
Legal Education In Disruption: The Headwinds And Tailwinds Of Technology, Jon M. Garon
Legal Education In Disruption: The Headwinds And Tailwinds Of Technology, Jon M. Garon
Faculty Scholarship
By harnessing improvements on communications and computational systems, law firms are producing a revolution in the practice of law. Self-help legal manuals have transformed into sophisticated interactive software; predictive coding can empower clients to receive sophisticated legal advice from a machine; socially mediated portals select among potential lawyers and assess the quality of the advice given; and virtual law firms threaten to distintermediate the grand edifices of twentieth century Big Law. These changes may profoundly restructure the legal practice, undermining the business model for many solo and small firm practices.
This paper focuses on the implications of these profound disruptive …
Acknowledgements, D. Paul Holdsworth
Acknowledgements, D. Paul Holdsworth
University of Richmond Law Review
No abstract provided.
There's No Place Like Work: How Modern Technology Is Changing The Judiciary's Approach To Work-At-Home Arrangements As An Ada Accommodation, Benjamin D. Johnson
There's No Place Like Work: How Modern Technology Is Changing The Judiciary's Approach To Work-At-Home Arrangements As An Ada Accommodation, Benjamin D. Johnson
University of Richmond Law Review
No abstract provided.
Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone
Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone
Michele R. Pistone
1. For many years, the question of how to use technology to teach the law has been a minor concern of the legal academy. That era of general indifference to developments in learning technologies is now coming to an end. There are many reasons for the change. Law schools are facing such a host of difficulties— declining enrollments, declining job prospects for graduates, reduced public funding, and understandable concerns about cost and debt—that sometimes it seems the only debate is over whether the situation is best described as a “tsunami” or “a perfect storm.” Against this backdrop, technology offers the …
Expired Patents, Saurabh Vishnubhakat
Expired Patents, Saurabh Vishnubhakat
Catholic University Law Review
This article presents a comprehensive empirical description of the public domain of technologies that have recently passed out of patent protection. From a new dataset of over 300,000 patents that expired during 2008–2012, the study examines technological, geographical, and procedural traits of newly public inventions as a basis for exploring the social value associated with their competitive use. Moreover, comparing these inventions to inventions newly patented during the same period enables more specific discussion of how the balance of innovation in the United States continues to change.
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
Silent Similarity, Jessica D. Litman
Silent Similarity, Jessica D. Litman
Articles
From 1909 to 1930, U.S. courts grappled with claims by authors of prose works claiming that works in a new art form—silent movies—had infringed their copyrights. These cases laid the groundwork for much of modern copyright law, from their broad expansion of the reproduction right, to their puzzled grappling with the question how to compare works in dissimilar media, to their confusion over what sort of evidence should be relevant to show copyrightability, copying and infringement. Some of those cases—in particular, Nichols v. Universal Pictures—are canonical today. They are not, however, well-understood. In particular, the problem at the heart of …
Autonomous Weapons And Accountability: Seeking Solutions In The Law Of War, Kelly Cass
Autonomous Weapons And Accountability: Seeking Solutions In The Law Of War, Kelly Cass
Loyola of Los Angeles Law Review
Autonomous weapons are increasingly used by militaries around the world. Unlike conventional unmanned weapons such as drones, autonomous weapons involve a machine deciding whether to deploy lethal force. Yet, because a machine cannot have the requisite mental state to commit a war crime, the legal scrutiny falls onto the decision to deploy an autonomous weapon. This Article focuses on the dual questions arising from that decision: how to regulate autonomous weapon use and who should be held criminally liable for an autonomous weapon’s actions. Regarding the first issue, this Article concludes that regulations expressly limiting autonomous weapon use to non-human …