Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1639

Full-Text Articles in Law

From The Editor In Chief, Antulio J. Echevarria Ii May 2024

From The Editor In Chief, Antulio J. Echevarria Ii

The US Army War College Quarterly: Parameters

Welcome to the Summer 2024 issue of Parameters. We open this issue with a special “In Memoriam” by General Charles A. Flynn, Commander US Army Pacific, honoring the life and legacies of our director and consummate colleague, Carol V. Evans. We dedicate this issue to her. General Flynn’s memoriam is followed by an In Focus commentary on China’s Belt and Road Initiative. We then feature three forums covering the Russia-Ukraine War, the Middle East, and Professional Development. This issue also contains special essays on the role of professional writing, the US Army War College’s Civil-Military Relations Center, …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Downstreaming, Rachel Landy Apr 2024

Downstreaming, Rachel Landy

Articles

Spotify and its competitors all offer the same product at the same price. Why? Scholars have argued that relationships can be designed in a way that naturally promotes innovation. By “braiding” certain formal contracting practices with informal enforcement norms, parties develop a frame-work that supports trust and positive, long-term collaboration. This Article takes on this consensus and shows that not all braiding is good. Using the multibillion-dollar subscription music streaming business as an illustration, it demonstrates just how industry forces can, and do, overcome braiding’s positive slant. In that industry, the major record labels (Universal, Warner, and Sony) weaponize braiding …


The Use Of Virtual Technology In Federal Criminal Detention Proceedings During Covid-19, The Honorable Karen Wells Roby Apr 2024

The Use Of Virtual Technology In Federal Criminal Detention Proceedings During Covid-19, The Honorable Karen Wells Roby

Georgia Criminal Law Review

The COVID Pandemic presented unparalleled challenges to court operations and the administration of pretrial criminal proceedings. The combination of health concerns and constitutional considerations collided in a way requiring unprecedented creativity in court operations. While scholars have given guidance on how the state courts were functioning during the pandemic, researchers have not conducted an empirical analysis on how federal courts conducted pretrial detention hearings during COVID-19.

This analysis reports the results of both qualitative and empirical findings pretrial detention hearings in federal courts during COVID-19. I examined the state of operations of the district court in several the Fourth, Fifth, …


The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba Apr 2024

The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba

Northwestern University Law Review

Whistleblowers and leakers wield significant influence in technology law and policy. On topics ranging from cybersecurity to free speech, tech whistleblowers spur congressional hearings, motivate the introduction of legislation, and animate critical press coverage of tech firms. But while scholars and policymakers have long called for transparency and accountability in the tech sector, they have overlooked the significance of individual disclosures by industry insiders—workers, employees, and volunteers—who leak information that firms would prefer to keep private.

This Article offers an account of the rise and influence of tech whistleblowing. Radical information asymmetries pervade tech law and policy. Firms exercise near-complete …


The Future Of The International Financial System: The Emerging Cbdc Network And Its Impact On Regulation, Heng Wang, Simin Gao Apr 2024

The Future Of The International Financial System: The Emerging Cbdc Network And Its Impact On Regulation, Heng Wang, Simin Gao

Research Collection Yong Pung How School Of Law

Central bank digital currency (CBDC) is a digital form of fiat currency. CBDC has the potential to be a game challenger in the international financial system, bringing increased complexities arising from technology and regulatory considerations, as well as generating greater currency competition. As more states begin exploring CBDC, the interactions between actors may lead to the emergence of a new CBDC network. What shape would the emerging CBDC network take? What would its network effects be? What would be the impact of the CBDC network on the international financial system, or the global financial network? This article explores these questions …


The Consumer Bundle, Shelly Kreiczer-Levy Mar 2024

The Consumer Bundle, Shelly Kreiczer-Levy

Washington Law Review

Can property law have a consumer protection purpose? One of the most important consumer law concerns today is the limited control consumers have over the digital assets and software-embedded products they purchase. Current proposals for reform focus on classifying the transaction as either license or sale and rely mostly on contract law and consumer protection regulation with a few calls for restoring ownership rights. This Article argues that property law can protect consumers by establishing a minimum bundle of rights for consumers: the “consumer’s bundle.” Working with property theory and an analysis of property values, this Article explains the importance …


Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin Mar 2024

Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin

Washington Law Review

Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.

Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …


New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd Jan 2024

New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd

Fellow, Adjunct, Lecturer, and Research Scholar Works

This Article explores how fintech has disrupted the traditional rent-to-own (RTO) industry, giving rise to new, virtual RTO agreements (VirTOs). These VirTOs have enabled the RTO industry to expand into the service industry and to markets for products not traditionally associated with rentals, such as vehicle repairs, pet ownership, and medical devices. This Article analyzes this development.

RTO agreements purport to rent products to a consumer until the conclusion of a set number of renewable rental payments, at which point ownership transfers. The fundamental characteristic of these agreements – and why they are not regulated as loans – are that …


Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real Jan 2024

Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real

Washington Law Review Online

In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …


Contract-Wrapped Property, Danielle D'Onfro Jan 2024

Contract-Wrapped Property, Danielle D'Onfro

Scholarship@WashULaw

For nearly two centuries, the law has allowed servitudes that “run with” real property while consistently refusing to permit servitudes attached to personal property. That is, owners of land can establish new, specific requirements for the property that bind all future owners—but owners of chattels cannot. In recent decades, however, firms have increasingly begun relying on contract provisions that purport to bind future owners of chattels. These developments began in the context of software licensing, but they have started to migrate to chattels not encumbered by software. Courts encountering these provisions have mostly missed their significance, focusing instead on questions …


How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein Jan 2024

How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein

Emerging Writers

This paper explores the danger of emerging artificial intelligence technology perpetuating racial injustice in law enforcement and how police can ensure the protection of citizens amid this information age. We dissect a real-world case in which AI predictive policing technology resulted in alarming racial discrimination against American minority citizens. We discuss the possible explanations for this result and explore the limitations of artificial intelligence technology. Furthermore, we brainstorm methods for ensuring American citizens' just and constitutional protection as new technology is developed and tested. We propose implementing transparency laws that make the details about any policing technology and surveillance available …


Open Source Perfume, Amanda Levendowski Jan 2024

Open Source Perfume, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

ABRIDGED ABSTRACT: Perfume is a powerful art and technology, but its secrets are closely held by a privileged few - by some counts, there are more astronauts than there are perfumers. As critics have noted increasingly since 2020, those select few perfumers often share similar backgrounds. As interviews with American, British, and French perfumemakers reveal, intellectual property (IP) also plays a gatekeeping role in perfumery. Drawing on work by perfumer and educator Saskia Wilson-Brown, this Article suggests that perfumery is overdue for a transformation. One is emerging: open source perfume. For those seeking ways to share scents and signal commitment …


Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan Jan 2024

Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan

Faculty Scholarship

Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.

Privacy nicks come from the …


The Public’S Companies, Andrew K. Jennings Dec 2023

The Public’S Companies, Andrew K. Jennings

Fordham Journal of Corporate & Financial Law

This Essay uses a series of survey studies to consider how public understandings of public and private companies map into urgent debates over the role of the corporation in American society. Does a social-media company, for example, owe it to its users to follow the free-speech principles embodied in the First Amendment? May corporate managers pursue environmental, social, and governance (“ESG”) policies that could reduce short-term or long-term profits? How should companies respond to political pushback against their approaches to free expression or ESG?

The studies’ results are consistent with understandings that both public and private companies have greater public …


Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle Dec 2023

Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle

Washington and Lee Law Review Online

In an era dominated by efficiency-driven technology, algorithms have seamlessly integrated into every facet of daily life, wielding significant influence over decisions that impact individuals and society at large. Algorithms are deliberately portrayed as impartial and automated in order to maintain their legitimacy. However, this illusion crumbles under scrutiny, revealing the inherent biases and discriminatory tendencies embedded in ostensibly unbiased algorithms. This Note delves into the pervasive issues of discriminatory algorithms, focusing on three key areas of life opportunities: housing, employment, and voting rights. This Note systematically addresses the multifaceted issues arising from discriminatory algorithms, showcasing real-world instances of algorithmic …


Shouldering The Burden Of Renewable Energy: Lithium Mining In Chile’S Indigenous Communities, Asha Wedemier-Allan Dec 2023

Shouldering The Burden Of Renewable Energy: Lithium Mining In Chile’S Indigenous Communities, Asha Wedemier-Allan

University of Miami Inter-American Law Review

Technology has improved society, from bridging digital divides to increasing efficiency. To power technology, energy sources were traditionally derived from diminishing and exhaustible resources like fossil fuels. The renewable energy revolution emerged to balance the global demand for technology with its impact on natural resources. Lithium is a critical, non-renewable mineral that clean technology relies on. Essentially, lithium makes renewable energy possible. As the pillar for a fossil fuel-free yet technology-driven society, it is imperative to examine the sustainability and impacts of lithium mining.

This Note discusses the legal and socio-political frameworks shaping foreign direct investments in Chile’s lithium mining …


Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen Dec 2023

Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen

Articles

In the brewing tech war between the United States and China, the quest for tech supremacy is in full force. Through enacting a series of laws and policies, China aims to reach its goal of tech supremacy. If China succeeds, U.S. corporations will face a daunting task in competing against Chinese products and services in core industries and in sectors where artificial intelligence and technological breakthroughs reign. This Article is the first to identify and analyze China’s 2022 Law on Science and Technology Progress, Personal Information Protection Law, Made in China 2025, National Intellectual Property Strategies, and digital currency e-CNY; …


A Public Technology Option, Hannah Bloch-Wehba Dec 2023

A Public Technology Option, Hannah Bloch-Wehba

Faculty Scholarship

Private technology increasingly underpins public governance. But the state’s growing reliance on private firms to provide a variety of complex technological products and services for public purposes brings significant costs for transparency: new forms of governance are becoming less visible and less amenable to democratic control. Transparency obligations initially designed for public agencies are a poor fit for private vendors that adhere to a very different set of expectations.

Aligning the use of technology in public governance with democratic values calls for rethinking, and in some cases abandoning, the legal structures and doctrinal commitments that insulate private vendors from meaningful …


Defragging Feminist Cyberlaw, Amanda Levendowski Nov 2023

Defragging Feminist Cyberlaw, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.

In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …


Deplatforming, Ganesh Sitaraman Nov 2023

Deplatforming, Ganesh Sitaraman

Vanderbilt Law School Faculty Publications

Deplatforming in the technology sector is hotly debated, and at times may even seem unprecedented. In recent years, scholars, commentators, jurists, and lawmakers have focused on the possibility of treating social-media platforms as common carriers or public utilities, implying that the imposition of a duty to serve the public would restrict them from deplatforming individuals and content.

But, in American law, the duty to serve all comers was never absolute. In fact, the question of whether and how to deplatform-—to exclude content, individuals, or businesses from critical services—- has been commonly and regularly debated throughout American history. In the common …


Leveraging Technology To Promote Access To Justice, Amy Emerson Oct 2023

Leveraging Technology To Promote Access To Justice, Amy Emerson

Faculty Publications

No abstract provided.


The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman Oct 2023

The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman

University of Miami Law Review

The evolution of Artificial Intelligence (“A.I.”) from a speculative concept depicted in science fiction to its integration into various aspects of everyday life has brought about complex challenges for contemporary legislators. The proliferation of A.I. technology has led to a growing recognition of the need for regulation, as it poses both promises and threats to society. On the one hand, A.I. has the potential to enhance efficiency in various fields, such as medicine and automation of routine tasks. On the other hand, if left unregulated, A.I. has the potential to undermine democratic principles and infringe upon fundamental rights. Thus, legislators …


For Freedom Or Full Of It? State Attempts To Silence Social Media, Grace Slicklen Oct 2023

For Freedom Or Full Of It? State Attempts To Silence Social Media, Grace Slicklen

University of Miami Law Review

Freedom of speech is, unsurprisingly, foundational to the “land of the free.” However, the “land of the free” has undergone some changes since the First Amendment’s ratification. Unprecedented technological evolution has ushered in a digital forum in which the volume, speed, and reach of words transcend the Framers’ visions of the First Amendment’s aims. Social media platforms have become central spaces for public discourse, where opportunities to create—and repress—speech are endless. From enabling individuals to freely express their views, to allowing state actors to limit open exchanges, it is about time that the Supreme Court tackles this complex issue of …


Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray Oct 2023

Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray

Akron Law Review

This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …


Security In The Digital Age, Michael Gentithes Oct 2023

Security In The Digital Age, Michael Gentithes

Akron Law Review

Rapidly evolving technology allows governments and businesses to elevate our collective well-being in ways we could not have imagined just decades ago. Data is now a resource that governments and businesses alike can mine to address the world’s needs with greater efficiency, accuracy, and flexibility. But evolving technology and advanced data analytics also come with risk. New digital capabilities also create new means for nefarious actors to infiltrate the complex technological systems at the heart of nearly all of our daily activities. Just as new digital tools emerge to offer unique goods and services, new tools allow wrongdoers to invade …


Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan Oct 2023

Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan

Articles

This Note will advocate for the view that when presented with the issue, state and federal courts should establish that keyword search warrants are unconstitutional because they violate the Fourth Amendment. Keyword search warrants cannot meet the Fourth Amendment’s requirements of probable cause and particularity because the subjects of the search cannot be identified until after the search is completed. These warrants are unnecessary and have the potential of implicating millions of internet users who have no connection to a crime. This Note will contend that individuals have a reasonable expectation of privacy in their search history data, and that …


Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson Oct 2023

Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson

Dickinson Law Review (2017-Present)

In this Essay, we analyze the arguments in favor of, and against, viewing the use of copyrighted works in training sets for AI as fair use. We call this form of fair use “fair training.” We identify both strong and spurious arguments on both sides of this debate. In addition, we attempt to take a broader perspective, weighing the societal costs (e.g., replacement of certain forms of human employment) and benefits (e.g., the possibility of novel AI-based approaches to global issues such as environmental disruption) of allowing AI to make easy use of copyrighted works as training sets to facilitate …


Exit Engineering, Rachel Landy Oct 2023

Exit Engineering, Rachel Landy

Articles

How do business lawyers create value? For nearly forty years, scholars have conceptualized the business lawyer as a “transaction cost engineer” who helps contracting parties efficiently break negotiation stalemates to create more valuable deals. This theory provides meaningful insights about sophisticated corporate law practice, where outside lawyers parachute in to make one-off deals happen. However, it fails to explain the behavior of startup lawyers, who develop long-term relationships with their clients and counsel them on seemingly routine matters, well before a major transaction materializes. These lawyers are not just transaction cost engineers, they are exit engineers.This Article offers a novel …


To Democratize Algorithms, Ngozi Okidegbe Sep 2023

To Democratize Algorithms, Ngozi Okidegbe

Faculty Scholarship

Jurisdictions increasingly employ algorithms in public sector decisionmaking. Facing public outcry about the use of such technologies, jurisdictions have begun to increase democratic participation in the processes by which algorithms are procured, constructed, implemented, used, and overseen. But what problem is the current approach to democratization meant to solve? Policymakers have tended to view the problem as the absence of public deliberation: agencies and courts often use algorithms without public knowledge or input. To redress this problem, jurisdictions have turned to deliberative approaches designed to foster transparency and public debate.

This Article contends that the current approach to democratization is …