Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

About-Face: How Facebook’S Restrictions On User Posts Could Violate Antitrust Law, Efrem Berk Apr 2023

About-Face: How Facebook’S Restrictions On User Posts Could Violate Antitrust Law, Efrem Berk

Northwestern Journal of Technology and Intellectual Property

This Note examines whether Facebook’s restrictions on its users’ posts are subject to Sherman Act § 2. This Note looks at the economic activity generated by social media activity and argues that posts are commerce. While this piece finds that current antitrust jurisprudence likely favors Facebook, an alternative approach sought by some antitrust scholars could influence judges to preclude the platform’s restrictions.


The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar Apr 2023

The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar

Northwestern Journal of Technology and Intellectual Property

Biased black-box algorithms have drawn increasing levels of scrutiny from the public. This is especially true for those black-box algorithms with the potential to negatively affect protected or vulnerable populations.1 One type of these black-box algorithms, a neural network, is both opaque and capable of high accuracy. However, neural networks do not provide insights into the relative importance, underlying relationships, structures of the predictors or covariates with the modelled outcomes.2 There are methods to combat a neural network’s lack of transparency: globally or locally interpretable post-hoc explanatory models.3 However, the threat of such measures usually does not bar an actor …


Compulsory Licensing: A Potential Solution To The Antitrust Dilemma Of Technology Standards Setting, Shen Peng Apr 2023

Compulsory Licensing: A Potential Solution To The Antitrust Dilemma Of Technology Standards Setting, Shen Peng

Northwestern Journal of Technology and Intellectual Property

The Constitution grants patent owners exclusive rights over their inventions to “promote the Progress of Science.”1 This clause was drafted based on the belief that monetary incentives granted to the first inventor, such as the proceeds from selling and licensing the invention, will foster new ideas and accelerate innovation to the benefit of the public welfare. However, when the first inventor is the sole benefactor of the rewards from the innovation, subsequent innovation may be stifled.

For instance, the first person to invent the idea of a mobile phone but lacking the right to use the underlying technologies essential to …


The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor Nov 2022

The First Amendment And Online Access To Information About Abortion: The Constitutional And Technological Problems With Censorship, John Villasenor

Northwestern Journal of Technology and Intellectual Property

To what extent could an abortion-restrictive state impede access to online information about abortion? After Dobbs, this question is no longer theoretical. This essay engages with this issue from both a legal and technological perspective, analyzing First Amendment jurisprudence as well as the technological implications of state-level online censorship. It concludes that the weight of Supreme Court precedent indicates that state attempts to censor information regarding out-of-state abortion services would violate the First Amendment. That said, the essay also recognizes that as Dobbs itself upended precedent, it is unclear what Supreme Court would do when ruling on questions regarding …


International Cryptography Regulation And The Global Information Economy, Nathan Saper Sep 2013

International Cryptography Regulation And The Global Information Economy, Nathan Saper

Northwestern Journal of Technology and Intellectual Property

With the meteoric rise of the Internet and e-commerce in the 1990s came great attention to the problems and opportunities associated with cryptography. Throughout that decade, the United States and many foreign countries debated and experimented with various forms of cryptography regulation, and attempts were made at international harmonization. Since then, however, policy-making activity around cryptography has slowed, if not halted altogether, leaving individuals and companies to face a bewildering array of regulations—or, in many cases, to face regulations that are extraordinarily unclear and haphazardly applied.

This Note seeks to introduce the reader to the issue of international cryptography regulation …


The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang Sep 2013

The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang

Northwestern Journal of Technology and Intellectual Property

With the growing availability of Internet access across the globe, social media has transformed the traditional relationship between government authority and its citizens by providing the people with an innovative and powerful means to harmonize their efforts in expressing their political and social concerns. The importance of safeguarding Internet availability is more critical than ever before as access to the Internet is now the means by which the world communicates, stays informed, and engages in daily tasks. In the face of potential social unrest fueled by social media, the United States must take a preventative approach, one that matches our …


Do-Not-Track As Default, Joshua A.T. Fairfield Sep 2013

Do-Not-Track As Default, Joshua A.T. Fairfield

Northwestern Journal of Technology and Intellectual Property

Do-Not-Track is a developing online legal and technological standard that permits consumers to express their desire not to be tracked by online advertisers. Do-Not-Track has the ability to change the relationship between consumers and advertisers in the information market. Everything will depend on implementation. The most effective way to allow users to achieve their privacy preferences is to implement Do-Not-Track as a default feature.

The World Wide Web Consortium’s (W3C) standard setting body for Do-Not-Track has, however, endorsed a corrosive standard in its Tracking Preferences Expression (TPE) draft. This standard requires consumers to set their privacy preference by hand. This …