Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 96

Full-Text Articles in Law

The Natural And Probable Consequences Doctrine: A Case Study In Failed Law Reform, 15 Berkeley J. Crim. L. 388 (2010), Michael G. Heyman Jan 2010

The Natural And Probable Consequences Doctrine: A Case Study In Failed Law Reform, 15 Berkeley J. Crim. L. 388 (2010), Michael G. Heyman

UIC Law Open Access Faculty Scholarship

No abstract provided.


Colon Santos V. Cooperativa De Seguros Multiples Y El Aparente Conflicto Entre Las Doctrinas De La Solidaridad Y La Inmunidad, 79 Rev. Jur. U.P.R. 1091 (2010), Alberto Bernabe Jan 2010

Colon Santos V. Cooperativa De Seguros Multiples Y El Aparente Conflicto Entre Las Doctrinas De La Solidaridad Y La Inmunidad, 79 Rev. Jur. U.P.R. 1091 (2010), Alberto Bernabe

UIC Law Open Access Faculty Scholarship

No abstract provided.


The Invisible Man: The Conscious Neglect Of Men And Boys In The War On Human Trafficking, 2010 Utah L. Rev. 1143 (2010), Samuel Vincent Jones Jan 2010

The Invisible Man: The Conscious Neglect Of Men And Boys In The War On Human Trafficking, 2010 Utah L. Rev. 1143 (2010), Samuel Vincent Jones

UIC Law Open Access Faculty Scholarship

No abstract provided.


The Ethics Of Letting Civilians Die In Afghanistan: The False Dichotomy Between Hobbesian And Kantian Rescue Paradigms, 59 Depaul L. Rev. 899 (2010), Samuel Vincent Jones Jan 2010

The Ethics Of Letting Civilians Die In Afghanistan: The False Dichotomy Between Hobbesian And Kantian Rescue Paradigms, 59 Depaul L. Rev. 899 (2010), Samuel Vincent Jones

UIC Law Open Access Faculty Scholarship

No abstract provided.


Good But Not Great: Improving Access To Public Records Under The D.C. Freedom Of Information Act, 13 D.C. L. Rev. 359 (2010), Margaret B. Kwoka, Melissa Davenport Jan 2010

Good But Not Great: Improving Access To Public Records Under The D.C. Freedom Of Information Act, 13 D.C. L. Rev. 359 (2010), Margaret B. Kwoka, Melissa Davenport

UIC Law Open Access Faculty Scholarship

No abstract provided.


Excessive Executive Compensation: Prior Federal Attempts To Curb Perceived Abuses, 10 Hous. Bus. & Tax L.J. 196 (2010), Kathryn J. Kennedy Jan 2010

Excessive Executive Compensation: Prior Federal Attempts To Curb Perceived Abuses, 10 Hous. Bus. & Tax L.J. 196 (2010), Kathryn J. Kennedy

UIC Law Open Access Faculty Scholarship

No abstract provided.


Some Lessons Learned From The Aids Pandemic, 19 Annals Health L. 63 (2010), Mark E. Wojcik Jan 2010

Some Lessons Learned From The Aids Pandemic, 19 Annals Health L. 63 (2010), Mark E. Wojcik

UIC Law Open Access Faculty Scholarship

No abstract provided.


Stephanie Feldman-Aleong: A Legacy Of Love And Loyalty, 34 Nova L. Rev. 589 (2010), Anthony Niedwiecki Jan 2010

Stephanie Feldman-Aleong: A Legacy Of Love And Loyalty, 34 Nova L. Rev. 589 (2010), Anthony Niedwiecki

UIC Law Open Access Faculty Scholarship

No abstract provided.


The State Secrets Privilege In The Post-9/11 Era, 30 Pace L. Rev. 778 (2010), Steven D. Schwinn Jan 2010

The State Secrets Privilege In The Post-9/11 Era, 30 Pace L. Rev. 778 (2010), Steven D. Schwinn

UIC Law Open Access Faculty Scholarship

No abstract provided.


Is Our Students Learning - Using Assessments To Measure And Improve Law School Learning And Performance, 15 Barry L. Rev. 73 (2010), Rogelio A. Lasso Jan 2010

Is Our Students Learning - Using Assessments To Measure And Improve Law School Learning And Performance, 15 Barry L. Rev. 73 (2010), Rogelio A. Lasso

UIC Law Open Access Faculty Scholarship

No abstract provided.


Illinois Courts And The Law Of Miranda Waivers: A Policy Worth Preserving, 30 N. Ill. U. L. Rev. 429 (2010), Timothy P. O'Neill Jan 2010

Illinois Courts And The Law Of Miranda Waivers: A Policy Worth Preserving, 30 N. Ill. U. L. Rev. 429 (2010), Timothy P. O'Neill

UIC Law Open Access Faculty Scholarship

No abstract provided.


Mirror Neurons, The New Neuroscience, And The Law: Some Preliminary Observations, 39 Sw. L. Rev. 499 (2010), Timothy P. O'Neill Jan 2010

Mirror Neurons, The New Neuroscience, And The Law: Some Preliminary Observations, 39 Sw. L. Rev. 499 (2010), Timothy P. O'Neill

UIC Law Open Access Faculty Scholarship

No abstract provided.


How Much Anguish Is Enough - Baby Switching And Negligent Infliction Of Emotional Distress, 13 Depaul J. Health Care L. 255 (2010), Marc Ginsberg Jan 2010

How Much Anguish Is Enough - Baby Switching And Negligent Infliction Of Emotional Distress, 13 Depaul J. Health Care L. 255 (2010), Marc Ginsberg

UIC Law Open Access Faculty Scholarship

No abstract provided.


Informed Consent: No Longer Just What The Doctor Ordered - The Contributions Of Medical Associations And Courts To A More Patient Friendly Doctrine, 15 Mich. St. U. J. Med. & L. 17 (2010), Marc Ginsberg Jan 2010

Informed Consent: No Longer Just What The Doctor Ordered - The Contributions Of Medical Associations And Courts To A More Patient Friendly Doctrine, 15 Mich. St. U. J. Med. & L. 17 (2010), Marc Ginsberg

UIC Law Open Access Faculty Scholarship

No abstract provided.


Laws Of Race/Laws Of Representation: The Construction Of Race And Law In Contemporary American Film, 11 Tex. Rev. Ent. & Sports L. 219 (2010), Cynthia D. Bond Jan 2010

Laws Of Race/Laws Of Representation: The Construction Of Race And Law In Contemporary American Film, 11 Tex. Rev. Ent. & Sports L. 219 (2010), Cynthia D. Bond

UIC Law Open Access Faculty Scholarship

Popular film has a lot to teach us about social narratives of law. Both law and film are story-telling, narrative systems. Accordingly, films about law are "overdetermined" in terms of narrative: they are stories about stories. Race is also a narrative system in which visual representation is key. The significance of the visual apprehension of race is deeply relevant to the legal construction of race as well. For example, in early citizenship cases and racial "passing" cases which persisted through the latter part of the 2 0th century. Since society constructs racial categories in large part by visual identification and …


Is The Failure To Respond Appropriately To A Natural Disaster A Crime Against Humanity - The Responsibility To Protect And Individual Criminal Responsibility In The Aftermath Of Cyclone Nargis, 38 Denv. J. Int'l L. & Pol'y 227 (2010), Stuart K. Ford Jan 2010

Is The Failure To Respond Appropriately To A Natural Disaster A Crime Against Humanity - The Responsibility To Protect And Individual Criminal Responsibility In The Aftermath Of Cyclone Nargis, 38 Denv. J. Int'l L. & Pol'y 227 (2010), Stuart K. Ford

UIC Law Open Access Faculty Scholarship

On May 2 and 3, 2008, Cyclone Nargis struck Myanmar, devastating large portions of the Irrawaddy Delta and creating the potential for a massive humanitarian crisis. Yet, the Myanmar government rejected aid from some countries, limited the amount of aid entering the country to a fraction of what was needed, and strictly controlled how that aid was distributed The United Nations and many governments criticized Myanmar's response to the Cyclone as inadequate and inhumane, and senior politicians from a number of countries discussed whether the situation justified invoking the "responsibility to protect" doctrine This article explores several questions, including: (1) …


Government Identity Speech And Religion: Establishment Clause Limits After Summum, 19 Wm. & Mary Bill Rts. J. 1 (2010), Mary Jean Dolan Jan 2010

Government Identity Speech And Religion: Establishment Clause Limits After Summum, 19 Wm. & Mary Bill Rts. J. 1 (2010), Mary Jean Dolan

UIC Law Open Access Faculty Scholarship

This Article offers in-depth analysis of the opinions in Pleasant Grove v. Summum. Summum is a significant case because it expands "government speech" to cover broad, thematic government identity messages in the form of donated monuments, including the much-litigated Fraternal Order of Eagles-donated Ten Commandments. The Article explores the fine distinctions between the new "government speech doctrine"- a defense in Free Speech Clause cases that allows government to express its own viewpoint and to reject alternative views-and "government speech" analyzed under the Establishment Clause, which prohibits government from expressing a viewpoint on religion, and from favoring some religions over others. …


The Time Has Come For The United States To Ratify The Convention On The Elimination Of All Forms Of Discrimination Against Women, 9 Wash. U. Global Stud. L. Rev. 195 (2010), Michael G. Heyman Jan 2010

The Time Has Come For The United States To Ratify The Convention On The Elimination Of All Forms Of Discrimination Against Women, 9 Wash. U. Global Stud. L. Rev. 195 (2010), Michael G. Heyman

UIC Law Open Access Faculty Scholarship

No abstract provided.


Music Markets And Mythologies, 9 J. Marshall Rev. Intell. Prop. L. 831 (2010), Henry H. Perritt, Jr. Jan 2010

Music Markets And Mythologies, 9 J. Marshall Rev. Intell. Prop. L. 831 (2010), Henry H. Perritt, Jr.

UIC Review of Intellectual Property Law

New technologies have started a revolution in the music marketplace. As new business models emerge, major firms in the popular music industry have mounted a campaign on the premise that the world of popular music faces a grave threat from illicit filing sharing. This article makes the case against that campaign. It discusses how new technologies are currently reshaping the marketplace to allow a wider range of new artists, as well as more direct access between musicians and their fans. It also predicts how future demand for popular music will increase due to portability, and ultimately recommends directions for marketplace …


The 8% Solution - Or How Good Are The Calculation Economics By The Federal Circuit In Lucent V. Microsoft?, 9 J. Marshall Rev. Intell. Prop. L. 797 (2010), W. Lesser Jan 2010

The 8% Solution - Or How Good Are The Calculation Economics By The Federal Circuit In Lucent V. Microsoft?, 9 J. Marshall Rev. Intell. Prop. L. 797 (2010), W. Lesser

UIC Review of Intellectual Property Law

Lucent v. Microsoft brought to the fore again the complexity of infringement damage estimates. Differences in approaches were laid open in this case with the trial court jury settling $358 million in damages against Microsoft and the appeals court striking down the value as lacking substantial evidence. Damages were established on the “reasonable royalty” basis for a product which was neither licensed nor sold. This article contends that the appeals court took too narrow a view of economics in its analysis of the software sector. Specifically, the court seems to have applied a “perfect competition” model to a sector which …


No More Rockin' In The Free World: Removing The Radio Broadcast Exemption, 9 J. Marshall Rev. Intell. Prop. L. 935 (2010), Brandon H. Nemec Jan 2010

No More Rockin' In The Free World: Removing The Radio Broadcast Exemption, 9 J. Marshall Rev. Intell. Prop. L. 935 (2010), Brandon H. Nemec

UIC Review of Intellectual Property Law

In an era of boundless technological advancement, the music industry faces its most turbulent economic landscape to date. The sustainability of the industry relies on the emergence of an innovative strategy to adapt music’s business model and continue to incentivize the creation and performance of brilliant music. A modernized industry model necessitates a reorganization of the copyright protections ultimately designed to motivate exceptional musicians. The following comment proposes a shift in one of music’s traditional revenue streams, and examines the controversial public performance exemption provided to broadcast radio. While debate has circulated around the public performance exemption for decades, the …


Deadly Delay / Postponed Pills, 10 J. Marshall Rev. Intell. Prop. L. 254 (2010), Christopher R. Walker Jan 2010

Deadly Delay / Postponed Pills, 10 J. Marshall Rev. Intell. Prop. L. 254 (2010), Christopher R. Walker

UIC Review of Intellectual Property Law

Since 1984, generic pharmaceuticals have continued to grow, and are an important element in our national struggle to increase affordable health care options in the United States. The Hatch-Waxman Act has played a pivotal role in helping to create a regulatory environment that fosters the development of generic pharmaceuticals, thereby increasing access to lower-cost alternatives to more expensive drugs. An important part of balancing the interests of the generic manufacturers against those of the primary pharmaceutical makers is the thirty-month stay provision of the Hatch-Waxman Act. This comment begins by taking a look at the history of the Hatch-Waxman Act …


Constitutional Argument As Jeremiad, 45 Val. U. L. Rev. 33 (2010), Timothy P. O'Neill Jan 2010

Constitutional Argument As Jeremiad, 45 Val. U. L. Rev. 33 (2010), Timothy P. O'Neill

UIC Law Open Access Faculty Scholarship

No abstract provided.


Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney Jan 2010

Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney

UIC Law Open Access Faculty Scholarship

The next wave of concern regarding Google involves web analytics. Web analytics is the measurement, collection, analysis, and reporting of Internet data for the purposes of understanding and optimizing web usage. The concerns of web analytics use touches on issues of online user privacy, government use of personal information, and information on website user activity. While Google Analytics is not the sole web analytics product on the market, it is widely used by corporate, non-profit, and government organizations. The product has been reported to have a 59% market share among web analytics vendors in a 2008 study.

Web analytics technology …


Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles Jan 2010

Cyberwar Policy, 27 J. Marshall J. Computer & Info. L. 303 (2010), Matthew Borton, Samuel Liles, Sydney Liles

UIC John Marshall Journal of Information Technology & Privacy Law

Cyberwarfare is a very real threat to the security of the nation. Yet there is confusion and disagreement as to which government body is most appropriate to assume the cyberwar mission. The Strategy to Secure Cyberspace treats the threat primarily as a criminal issue, and assigns responsibility to the Department of Homeland Security. The National Defense Strategy implies that cyberwarfare is a military issue. Both documents may be correct, depending on the case. The cyberspace terrain transcends boundaries, quickly blurring the line between civil or criminal action and an act of war, leaving the government with the issue of assigning …


Law School & The Web Of Group Affiliation: Socializing, Socialization, And Social Network Site Use Among Law Students, 27 J. Marshall J. Computer & Info. L. 325 (2010), Eric M. Fink Jan 2010

Law School & The Web Of Group Affiliation: Socializing, Socialization, And Social Network Site Use Among Law Students, 27 J. Marshall J. Computer & Info. L. 325 (2010), Eric M. Fink

UIC John Marshall Journal of Information Technology & Privacy Law

Online social network sites (“SNS”) have emerged as a significant socio-technical phenomenon in the past several years. Scholars from various disciplines have examined these sites to develop a better understanding of their social significance and implications from a variety of perspectives. Within the burgeoning field of SNS studies, one strand of work focuses on the place of SNSs in students’ educational experiences and the potential pedagogical applications of SNSs. However, the SNS phenomenon generally, and its educational/pedagogical significance in particular, have received scant attention from legal scholars. This article examines the place of SNSs within the contemporary law school experience, …


Cyber Fatwās And Classical Islamic Jurisprudence, 27 J. Marshall J. Computer & Info. L. 577 (2010), Derek John Illar Jan 2010

Cyber Fatwās And Classical Islamic Jurisprudence, 27 J. Marshall J. Computer & Info. L. 577 (2010), Derek John Illar

UIC John Marshall Journal of Information Technology & Privacy Law

The first section of this paper will explain what fatwâs are, why they are important, and what is the relationship between fatwâs and the Islamic judiciary. This section will also address who can issue such opinions and how scholars reach their conclusions. In the second part of this paper, I will explore the recent emergence of cyber fatwâs. This section specifically will focus on how Muslims have used this medium and how fatwâs have manifested themselves therein. The third portion of this paper will identity the problems that cyber fatwâs create and why they fail to comport with particular tenets …


How Safe Is This Shore? - Data Protection And Bpos In India, 27 J. Marshall J. Computer & Info. L. 539 (2010), Kritika Bharadwaj Jan 2010

How Safe Is This Shore? - Data Protection And Bpos In India, 27 J. Marshall J. Computer & Info. L. 539 (2010), Kritika Bharadwaj

UIC John Marshall Journal of Information Technology & Privacy Law

India has one of the fastest growing demographics of personal computer and Internet usage, following the U.S. and the U.K. In the light of this progress, there is no doubt that India has benefited from the worldwide process of outsourcing. On the same note, the service offered by India has rendered her indispensible to countries around the world, including the U.S. and the U.K. However, where convenience, speed, and accessibility are taken for granted in this digital era, this paradigm shift has consequently resulted in changes in its management and control, safeguard measures, and a surge of unprecedented threats and …


An Evolutionary Study Of Cloud Computing Services Privacy Terms, 27 J. Marshall J. Computer & Info. L. 593 (2010), Konstantinos K. Stylianou Jan 2010

An Evolutionary Study Of Cloud Computing Services Privacy Terms, 27 J. Marshall J. Computer & Info. L. 593 (2010), Konstantinos K. Stylianou

UIC John Marshall Journal of Information Technology & Privacy Law

This paper examines the evolution of a number of cloud computing services’ terms of use with the aim to discern whether they offer less or more (or equal) privacy safeguards. To better highlight the changes cloud computing has brought about, I focus on those privacy terms that relate to the special modus operandi of cloud services. This paper proceeds in three parts. Part I identifies the special ways by which cloud computing challenges privacy. Part II discusses a series of privacy terms commonly found in the sampled cloud computing services and follows their evolution by comparing previous versions where available. …


Firearm Transaction Disclosure In The Digital Age: Should The Government Know What Is In Your Home?, 27 J. Marshall J. Computer & Info. L. 497 (2010), Elaine Vullmahn Jan 2010

Firearm Transaction Disclosure In The Digital Age: Should The Government Know What Is In Your Home?, 27 J. Marshall J. Computer & Info. L. 497 (2010), Elaine Vullmahn

UIC John Marshall Journal of Information Technology & Privacy Law

This comment examines the primary arguments for continuing to prohibit the federal government from establishing a federal firearm registry. The Background section of this comment surveys the development of laws restricting firearm sales and requiring federal firearm licensed dealers to maintain pertinent records. This section also describes how, if enacted, the Blair Holt’s Firearm Licensing and Registration Act of 2009, known as H.R. 45, would, through the creation of federal firearm registry, expose electronic records of private citizens’ firearm purchases and ownership to possible government abuse. The Analysis section examines why H.R. 45 is not the correct means for achieving …