Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (41)
- Intellectual Property Law (25)
- Computer Law (23)
- Internet Law (23)
- Jurisprudence (23)
-
- Courts (20)
- Criminal Law (19)
- Human Rights Law (17)
- Privacy Law (17)
- Constitutional Law (16)
- International Law (15)
- Legislation (15)
- Comparative and Foreign Law (12)
- Law and Society (12)
- International Humanitarian Law (11)
- Criminal Procedure (9)
- Entertainment, Arts, and Sports Law (9)
- Legal History (9)
- State and Local Government Law (9)
- Consumer Protection Law (7)
- First Amendment (7)
- Commercial Law (6)
- Health Law and Policy (6)
- Legal Writing and Research (6)
- Military, War, and Peace (6)
- Torts (6)
- Business Organizations Law (5)
- Law and Gender (5)
- Law and Politics (5)
- Keyword
- Publication
- Publication Type
Articles 1 - 30 of 96
Full-Text Articles in Law
The Natural And Probable Consequences Doctrine: A Case Study In Failed Law Reform, 15 Berkeley J. Crim. L. 388 (2010), Michael G. Heyman
The Natural And Probable Consequences Doctrine: A Case Study In Failed Law Reform, 15 Berkeley J. Crim. L. 388 (2010), Michael G. Heyman
UIC Law Open Access Faculty Scholarship
No abstract provided.
Colon Santos V. Cooperativa De Seguros Multiples Y El Aparente Conflicto Entre Las Doctrinas De La Solidaridad Y La Inmunidad, 79 Rev. Jur. U.P.R. 1091 (2010), Alberto Bernabe
UIC Law Open Access Faculty Scholarship
No abstract provided.
The Invisible Man: The Conscious Neglect Of Men And Boys In The War On Human Trafficking, 2010 Utah L. Rev. 1143 (2010), Samuel Vincent Jones
The Invisible Man: The Conscious Neglect Of Men And Boys In The War On Human Trafficking, 2010 Utah L. Rev. 1143 (2010), Samuel Vincent Jones
UIC Law Open Access Faculty Scholarship
No abstract provided.
The Ethics Of Letting Civilians Die In Afghanistan: The False Dichotomy Between Hobbesian And Kantian Rescue Paradigms, 59 Depaul L. Rev. 899 (2010), Samuel Vincent Jones
The Ethics Of Letting Civilians Die In Afghanistan: The False Dichotomy Between Hobbesian And Kantian Rescue Paradigms, 59 Depaul L. Rev. 899 (2010), Samuel Vincent Jones
UIC Law Open Access Faculty Scholarship
No abstract provided.
Good But Not Great: Improving Access To Public Records Under The D.C. Freedom Of Information Act, 13 D.C. L. Rev. 359 (2010), Margaret B. Kwoka, Melissa Davenport
Good But Not Great: Improving Access To Public Records Under The D.C. Freedom Of Information Act, 13 D.C. L. Rev. 359 (2010), Margaret B. Kwoka, Melissa Davenport
UIC Law Open Access Faculty Scholarship
No abstract provided.
Excessive Executive Compensation: Prior Federal Attempts To Curb Perceived Abuses, 10 Hous. Bus. & Tax L.J. 196 (2010), Kathryn J. Kennedy
Excessive Executive Compensation: Prior Federal Attempts To Curb Perceived Abuses, 10 Hous. Bus. & Tax L.J. 196 (2010), Kathryn J. Kennedy
UIC Law Open Access Faculty Scholarship
No abstract provided.
Some Lessons Learned From The Aids Pandemic, 19 Annals Health L. 63 (2010), Mark E. Wojcik
Some Lessons Learned From The Aids Pandemic, 19 Annals Health L. 63 (2010), Mark E. Wojcik
UIC Law Open Access Faculty Scholarship
No abstract provided.
Stephanie Feldman-Aleong: A Legacy Of Love And Loyalty, 34 Nova L. Rev. 589 (2010), Anthony Niedwiecki
Stephanie Feldman-Aleong: A Legacy Of Love And Loyalty, 34 Nova L. Rev. 589 (2010), Anthony Niedwiecki
UIC Law Open Access Faculty Scholarship
No abstract provided.
The State Secrets Privilege In The Post-9/11 Era, 30 Pace L. Rev. 778 (2010), Steven D. Schwinn
The State Secrets Privilege In The Post-9/11 Era, 30 Pace L. Rev. 778 (2010), Steven D. Schwinn
UIC Law Open Access Faculty Scholarship
No abstract provided.
Is Our Students Learning - Using Assessments To Measure And Improve Law School Learning And Performance, 15 Barry L. Rev. 73 (2010), Rogelio A. Lasso
Is Our Students Learning - Using Assessments To Measure And Improve Law School Learning And Performance, 15 Barry L. Rev. 73 (2010), Rogelio A. Lasso
UIC Law Open Access Faculty Scholarship
No abstract provided.
Illinois Courts And The Law Of Miranda Waivers: A Policy Worth Preserving, 30 N. Ill. U. L. Rev. 429 (2010), Timothy P. O'Neill
Illinois Courts And The Law Of Miranda Waivers: A Policy Worth Preserving, 30 N. Ill. U. L. Rev. 429 (2010), Timothy P. O'Neill
UIC Law Open Access Faculty Scholarship
No abstract provided.
Mirror Neurons, The New Neuroscience, And The Law: Some Preliminary Observations, 39 Sw. L. Rev. 499 (2010), Timothy P. O'Neill
Mirror Neurons, The New Neuroscience, And The Law: Some Preliminary Observations, 39 Sw. L. Rev. 499 (2010), Timothy P. O'Neill
UIC Law Open Access Faculty Scholarship
No abstract provided.
How Much Anguish Is Enough - Baby Switching And Negligent Infliction Of Emotional Distress, 13 Depaul J. Health Care L. 255 (2010), Marc Ginsberg
How Much Anguish Is Enough - Baby Switching And Negligent Infliction Of Emotional Distress, 13 Depaul J. Health Care L. 255 (2010), Marc Ginsberg
UIC Law Open Access Faculty Scholarship
No abstract provided.
Informed Consent: No Longer Just What The Doctor Ordered - The Contributions Of Medical Associations And Courts To A More Patient Friendly Doctrine, 15 Mich. St. U. J. Med. & L. 17 (2010), Marc Ginsberg
UIC Law Open Access Faculty Scholarship
No abstract provided.
Laws Of Race/Laws Of Representation: The Construction Of Race And Law In Contemporary American Film, 11 Tex. Rev. Ent. & Sports L. 219 (2010), Cynthia D. Bond
Laws Of Race/Laws Of Representation: The Construction Of Race And Law In Contemporary American Film, 11 Tex. Rev. Ent. & Sports L. 219 (2010), Cynthia D. Bond
UIC Law Open Access Faculty Scholarship
Popular film has a lot to teach us about social narratives of law. Both law and film are story-telling, narrative systems. Accordingly, films about law are "overdetermined" in terms of narrative: they are stories about stories. Race is also a narrative system in which visual representation is key. The significance of the visual apprehension of race is deeply relevant to the legal construction of race as well. For example, in early citizenship cases and racial "passing" cases which persisted through the latter part of the 2 0th century. Since society constructs racial categories in large part by visual identification and …
Is The Failure To Respond Appropriately To A Natural Disaster A Crime Against Humanity - The Responsibility To Protect And Individual Criminal Responsibility In The Aftermath Of Cyclone Nargis, 38 Denv. J. Int'l L. & Pol'y 227 (2010), Stuart K. Ford
UIC Law Open Access Faculty Scholarship
On May 2 and 3, 2008, Cyclone Nargis struck Myanmar, devastating large portions of the Irrawaddy Delta and creating the potential for a massive humanitarian crisis. Yet, the Myanmar government rejected aid from some countries, limited the amount of aid entering the country to a fraction of what was needed, and strictly controlled how that aid was distributed The United Nations and many governments criticized Myanmar's response to the Cyclone as inadequate and inhumane, and senior politicians from a number of countries discussed whether the situation justified invoking the "responsibility to protect" doctrine This article explores several questions, including: (1) …
Government Identity Speech And Religion: Establishment Clause Limits After Summum, 19 Wm. & Mary Bill Rts. J. 1 (2010), Mary Jean Dolan
Government Identity Speech And Religion: Establishment Clause Limits After Summum, 19 Wm. & Mary Bill Rts. J. 1 (2010), Mary Jean Dolan
UIC Law Open Access Faculty Scholarship
This Article offers in-depth analysis of the opinions in Pleasant Grove v. Summum. Summum is a significant case because it expands "government speech" to cover broad, thematic government identity messages in the form of donated monuments, including the much-litigated Fraternal Order of Eagles-donated Ten Commandments. The Article explores the fine distinctions between the new "government speech doctrine"- a defense in Free Speech Clause cases that allows government to express its own viewpoint and to reject alternative views-and "government speech" analyzed under the Establishment Clause, which prohibits government from expressing a viewpoint on religion, and from favoring some religions over others. …
The Time Has Come For The United States To Ratify The Convention On The Elimination Of All Forms Of Discrimination Against Women, 9 Wash. U. Global Stud. L. Rev. 195 (2010), Michael G. Heyman
UIC Law Open Access Faculty Scholarship
No abstract provided.
Music Markets And Mythologies, 9 J. Marshall Rev. Intell. Prop. L. 831 (2010), Henry H. Perritt, Jr.
Music Markets And Mythologies, 9 J. Marshall Rev. Intell. Prop. L. 831 (2010), Henry H. Perritt, Jr.
UIC Review of Intellectual Property Law
New technologies have started a revolution in the music marketplace. As new business models emerge, major firms in the popular music industry have mounted a campaign on the premise that the world of popular music faces a grave threat from illicit filing sharing. This article makes the case against that campaign. It discusses how new technologies are currently reshaping the marketplace to allow a wider range of new artists, as well as more direct access between musicians and their fans. It also predicts how future demand for popular music will increase due to portability, and ultimately recommends directions for marketplace …
The 8% Solution - Or How Good Are The Calculation Economics By The Federal Circuit In Lucent V. Microsoft?, 9 J. Marshall Rev. Intell. Prop. L. 797 (2010), W. Lesser
UIC Review of Intellectual Property Law
Lucent v. Microsoft brought to the fore again the complexity of infringement damage estimates. Differences in approaches were laid open in this case with the trial court jury settling $358 million in damages against Microsoft and the appeals court striking down the value as lacking substantial evidence. Damages were established on the “reasonable royalty” basis for a product which was neither licensed nor sold. This article contends that the appeals court took too narrow a view of economics in its analysis of the software sector. Specifically, the court seems to have applied a “perfect competition” model to a sector which …
No More Rockin' In The Free World: Removing The Radio Broadcast Exemption, 9 J. Marshall Rev. Intell. Prop. L. 935 (2010), Brandon H. Nemec
No More Rockin' In The Free World: Removing The Radio Broadcast Exemption, 9 J. Marshall Rev. Intell. Prop. L. 935 (2010), Brandon H. Nemec
UIC Review of Intellectual Property Law
In an era of boundless technological advancement, the music industry faces its most turbulent economic landscape to date. The sustainability of the industry relies on the emergence of an innovative strategy to adapt music’s business model and continue to incentivize the creation and performance of brilliant music. A modernized industry model necessitates a reorganization of the copyright protections ultimately designed to motivate exceptional musicians. The following comment proposes a shift in one of music’s traditional revenue streams, and examines the controversial public performance exemption provided to broadcast radio. While debate has circulated around the public performance exemption for decades, the …
Deadly Delay / Postponed Pills, 10 J. Marshall Rev. Intell. Prop. L. 254 (2010), Christopher R. Walker
Deadly Delay / Postponed Pills, 10 J. Marshall Rev. Intell. Prop. L. 254 (2010), Christopher R. Walker
UIC Review of Intellectual Property Law
Since 1984, generic pharmaceuticals have continued to grow, and are an important element in our national struggle to increase affordable health care options in the United States. The Hatch-Waxman Act has played a pivotal role in helping to create a regulatory environment that fosters the development of generic pharmaceuticals, thereby increasing access to lower-cost alternatives to more expensive drugs. An important part of balancing the interests of the generic manufacturers against those of the primary pharmaceutical makers is the thirty-month stay provision of the Hatch-Waxman Act. This comment begins by taking a look at the history of the Hatch-Waxman Act …
Constitutional Argument As Jeremiad, 45 Val. U. L. Rev. 33 (2010), Timothy P. O'Neill
Constitutional Argument As Jeremiad, 45 Val. U. L. Rev. 33 (2010), Timothy P. O'Neill
UIC Law Open Access Faculty Scholarship
No abstract provided.
Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney
Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney
UIC Law Open Access Faculty Scholarship
The next wave of concern regarding Google involves web analytics. Web analytics is the measurement, collection, analysis, and reporting of Internet data for the purposes of understanding and optimizing web usage. The concerns of web analytics use touches on issues of online user privacy, government use of personal information, and information on website user activity. While Google Analytics is not the sole web analytics product on the market, it is widely used by corporate, non-profit, and government organizations. The product has been reported to have a 59% market share among web analytics vendors in a 2008 study.
Web analytics technology …
Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles
Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles
UIC John Marshall Journal of Information Technology & Privacy Law
Cyberwarfare is a very real threat to the security of the nation. Yet there is confusion and disagreement as to which government body is most appropriate to assume the cyberwar mission. The Strategy to Secure Cyberspace treats the threat primarily as a criminal issue, and assigns responsibility to the Department of Homeland Security. The National Defense Strategy implies that cyberwarfare is a military issue. Both documents may be correct, depending on the case. The cyberspace terrain transcends boundaries, quickly blurring the line between civil or criminal action and an act of war, leaving the government with the issue of assigning …
Law School & The Web Of Group Affiliation: Socializing, Socialization, And Social Network Site Use Among Law Students, 27 J. Marshall J. Computer & Info. L. 325 (2010), Eric M. Fink
UIC John Marshall Journal of Information Technology & Privacy Law
Online social network sites (“SNS”) have emerged as a significant socio-technical phenomenon in the past several years. Scholars from various disciplines have examined these sites to develop a better understanding of their social significance and implications from a variety of perspectives. Within the burgeoning field of SNS studies, one strand of work focuses on the place of SNSs in students’ educational experiences and the potential pedagogical applications of SNSs. However, the SNS phenomenon generally, and its educational/pedagogical significance in particular, have received scant attention from legal scholars. This article examines the place of SNSs within the contemporary law school experience, …
Cyber Fatwās And Classical Islamic Jurisprudence, 27 J. Marshall J. Computer & Info. L. 577 (2010), Derek John Illar
Cyber Fatwās And Classical Islamic Jurisprudence, 27 J. Marshall J. Computer & Info. L. 577 (2010), Derek John Illar
UIC John Marshall Journal of Information Technology & Privacy Law
The first section of this paper will explain what fatwâs are, why they are important, and what is the relationship between fatwâs and the Islamic judiciary. This section will also address who can issue such opinions and how scholars reach their conclusions. In the second part of this paper, I will explore the recent emergence of cyber fatwâs. This section specifically will focus on how Muslims have used this medium and how fatwâs have manifested themselves therein. The third portion of this paper will identity the problems that cyber fatwâs create and why they fail to comport with particular tenets …
How Safe Is This Shore? - Data Protection And Bpos In India, 27 J. Marshall J. Computer & Info. L. 539 (2010), Kritika Bharadwaj
How Safe Is This Shore? - Data Protection And Bpos In India, 27 J. Marshall J. Computer & Info. L. 539 (2010), Kritika Bharadwaj
UIC John Marshall Journal of Information Technology & Privacy Law
India has one of the fastest growing demographics of personal computer and Internet usage, following the U.S. and the U.K. In the light of this progress, there is no doubt that India has benefited from the worldwide process of outsourcing. On the same note, the service offered by India has rendered her indispensible to countries around the world, including the U.S. and the U.K. However, where convenience, speed, and accessibility are taken for granted in this digital era, this paradigm shift has consequently resulted in changes in its management and control, safeguard measures, and a surge of unprecedented threats and …
An Evolutionary Study Of Cloud Computing Services Privacy Terms, 27 J. Marshall J. Computer & Info. L. 593 (2010), Konstantinos K. Stylianou
An Evolutionary Study Of Cloud Computing Services Privacy Terms, 27 J. Marshall J. Computer & Info. L. 593 (2010), Konstantinos K. Stylianou
UIC John Marshall Journal of Information Technology & Privacy Law
This paper examines the evolution of a number of cloud computing services’ terms of use with the aim to discern whether they offer less or more (or equal) privacy safeguards. To better highlight the changes cloud computing has brought about, I focus on those privacy terms that relate to the special modus operandi of cloud services. This paper proceeds in three parts. Part I identifies the special ways by which cloud computing challenges privacy. Part II discusses a series of privacy terms commonly found in the sampled cloud computing services and follows their evolution by comparing previous versions where available. …
Firearm Transaction Disclosure In The Digital Age: Should The Government Know What Is In Your Home?, 27 J. Marshall J. Computer & Info. L. 497 (2010), Elaine Vullmahn
Firearm Transaction Disclosure In The Digital Age: Should The Government Know What Is In Your Home?, 27 J. Marshall J. Computer & Info. L. 497 (2010), Elaine Vullmahn
UIC John Marshall Journal of Information Technology & Privacy Law
This comment examines the primary arguments for continuing to prohibit the federal government from establishing a federal firearm registry. The Background section of this comment surveys the development of laws restricting firearm sales and requiring federal firearm licensed dealers to maintain pertinent records. This section also describes how, if enacted, the Blair Holt’s Firearm Licensing and Registration Act of 2009, known as H.R. 45, would, through the creation of federal firearm registry, expose electronic records of private citizens’ firearm purchases and ownership to possible government abuse. The Analysis section examines why H.R. 45 is not the correct means for achieving …