Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (467)
- Intellectual Property Law (377)
- Internet Law (212)
- Social and Behavioral Sciences (154)
- Privacy Law (144)
-
- Law and Society (128)
- Computer Law (126)
- Legal Education (118)
- International Law (94)
- Communications Law (92)
- Legal Profession (88)
- Constitutional Law (85)
- Legislation (74)
- Business (65)
- Fourth Amendment (64)
- Administrative Law (63)
- Criminal Law (60)
- Legal Writing and Research (55)
- Physical Sciences and Mathematics (54)
- Law and Economics (51)
- Business Organizations Law (50)
- Public Affairs, Public Policy and Public Administration (50)
- Courts (49)
- Criminal Procedure (49)
- Entertainment, Arts, and Sports Law (47)
- First Amendment (47)
- Health Law and Policy (47)
- Antitrust and Trade Regulation (46)
- Legal Ethics and Professional Responsibility (46)
- Institution
-
- University of Michigan Law School (151)
- Selected Works (127)
- Northwestern Pritzker School of Law (123)
- Boston University School of Law (52)
- Fordham Law School (52)
-
- American University Washington College of Law (50)
- SelectedWorks (50)
- University of Miami Law School (47)
- Maurer School of Law: Indiana University (42)
- University of Georgia School of Law (34)
- Vanderbilt University Law School (33)
- Roger Williams University (31)
- University of Colorado Law School (30)
- University of South Carolina (29)
- Pepperdine University (28)
- University of Richmond (24)
- Duke Law (23)
- Marquette University Law School (23)
- New York Law School (23)
- Touro University Jacob D. Fuchsberg Law Center (23)
- U.S. Naval War College (22)
- University of Pennsylvania Carey Law School (22)
- St. Mary's University (21)
- Yeshiva University, Cardozo School of Law (21)
- The Catholic University of America, Columbus School of Law (19)
- University of Massachusetts School of Law (19)
- Seattle University School of Law (18)
- Cleveland State University (17)
- Georgia State University College of Law (17)
- Nova Southeastern University (17)
- Publication
-
- Northwestern Journal of Technology and Intellectual Property (111)
- Faculty Scholarship (97)
- Articles (69)
- Michigan Telecommunications & Technology Law Review (55)
- All Faculty Scholarship (38)
-
- Faculty Publications (30)
- Fordham Law Review (29)
- Articles in Law Reviews & Other Academic Journals (27)
- South Carolina Law Review (24)
- International Law Studies (22)
- Scholarly Works (22)
- Michigan Law Review (21)
- Federal Communications Law Journal (20)
- Pepperdine Law Review (17)
- Georgia State University Law Review (16)
- Presentations (16)
- Touro Law Review (16)
- Publications (15)
- Research Collection Yong Pung How School Of Law (15)
- Seattle University Law Review (15)
- University of Miami Law Review (14)
- University of Richmond Law Review (14)
- Vanderbilt Journal of Entertainment & Technology Law (14)
- Articles & Chapters (13)
- Fordham Intellectual Property, Media and Entertainment Law Journal (13)
- Life of the Law School (1993- ) (13)
- Duke Law & Technology Review (12)
- Faculty Articles (12)
- Michigan Journal of International Law (12)
- Indiana Law Journal (11)
- Publication Type
Articles 1 - 30 of 1639
Full-Text Articles in Law
From The Editor In Chief, Antulio J. Echevarria Ii
From The Editor In Chief, Antulio J. Echevarria Ii
The US Army War College Quarterly: Parameters
Welcome to the Summer 2024 issue of Parameters. We open this issue with a special “In Memoriam” by General Charles A. Flynn, Commander US Army Pacific, honoring the life and legacies of our director and consummate colleague, Carol V. Evans. We dedicate this issue to her. General Flynn’s memoriam is followed by an In Focus commentary on China’s Belt and Road Initiative. We then feature three forums covering the Russia-Ukraine War, the Middle East, and Professional Development. This issue also contains special essays on the role of professional writing, the US Army War College’s Civil-Military Relations Center, …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Downstreaming, Rachel Landy
Downstreaming, Rachel Landy
Articles
Spotify and its competitors all offer the same product at the same price. Why? Scholars have argued that relationships can be designed in a way that naturally promotes innovation. By “braiding” certain formal contracting practices with informal enforcement norms, parties develop a frame-work that supports trust and positive, long-term collaboration. This Article takes on this consensus and shows that not all braiding is good. Using the multibillion-dollar subscription music streaming business as an illustration, it demonstrates just how industry forces can, and do, overcome braiding’s positive slant. In that industry, the major record labels (Universal, Warner, and Sony) weaponize braiding …
The Use Of Virtual Technology In Federal Criminal Detention Proceedings During Covid-19, The Honorable Karen Wells Roby
The Use Of Virtual Technology In Federal Criminal Detention Proceedings During Covid-19, The Honorable Karen Wells Roby
Georgia Criminal Law Review
The COVID Pandemic presented unparalleled challenges to court operations and the administration of pretrial criminal proceedings. The combination of health concerns and constitutional considerations collided in a way requiring unprecedented creativity in court operations. While scholars have given guidance on how the state courts were functioning during the pandemic, researchers have not conducted an empirical analysis on how federal courts conducted pretrial detention hearings during COVID-19.
This analysis reports the results of both qualitative and empirical findings pretrial detention hearings in federal courts during COVID-19. I examined the state of operations of the district court in several the Fourth, Fifth, …
The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba
The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba
Northwestern University Law Review
Whistleblowers and leakers wield significant influence in technology law and policy. On topics ranging from cybersecurity to free speech, tech whistleblowers spur congressional hearings, motivate the introduction of legislation, and animate critical press coverage of tech firms. But while scholars and policymakers have long called for transparency and accountability in the tech sector, they have overlooked the significance of individual disclosures by industry insiders—workers, employees, and volunteers—who leak information that firms would prefer to keep private.
This Article offers an account of the rise and influence of tech whistleblowing. Radical information asymmetries pervade tech law and policy. Firms exercise near-complete …
The Future Of The International Financial System: The Emerging Cbdc Network And Its Impact On Regulation, Heng Wang, Simin Gao
The Future Of The International Financial System: The Emerging Cbdc Network And Its Impact On Regulation, Heng Wang, Simin Gao
Research Collection Yong Pung How School Of Law
Central bank digital currency (CBDC) is a digital form of fiat currency. CBDC has the potential to be a game challenger in the international financial system, bringing increased complexities arising from technology and regulatory considerations, as well as generating greater currency competition. As more states begin exploring CBDC, the interactions between actors may lead to the emergence of a new CBDC network. What shape would the emerging CBDC network take? What would its network effects be? What would be the impact of the CBDC network on the international financial system, or the global financial network? This article explores these questions …
The Consumer Bundle, Shelly Kreiczer-Levy
The Consumer Bundle, Shelly Kreiczer-Levy
Washington Law Review
Can property law have a consumer protection purpose? One of the most important consumer law concerns today is the limited control consumers have over the digital assets and software-embedded products they purchase. Current proposals for reform focus on classifying the transaction as either license or sale and rely mostly on contract law and consumer protection regulation with a few calls for restoring ownership rights. This Article argues that property law can protect consumers by establishing a minimum bundle of rights for consumers: the “consumer’s bundle.” Working with property theory and an analysis of property values, this Article explains the importance …
Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin
Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin
Washington Law Review
Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.
Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …
New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd
New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd
Fellow, Adjunct, Lecturer, and Research Scholar Works
This Article explores how fintech has disrupted the traditional rent-to-own (RTO) industry, giving rise to new, virtual RTO agreements (VirTOs). These VirTOs have enabled the RTO industry to expand into the service industry and to markets for products not traditionally associated with rentals, such as vehicle repairs, pet ownership, and medical devices. This Article analyzes this development.
RTO agreements purport to rent products to a consumer until the conclusion of a set number of renewable rental payments, at which point ownership transfers. The fundamental characteristic of these agreements – and why they are not regulated as loans – are that …
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real
Washington Law Review Online
In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …
Contract-Wrapped Property, Danielle D'Onfro
Contract-Wrapped Property, Danielle D'Onfro
Scholarship@WashULaw
For nearly two centuries, the law has allowed servitudes that “run with” real property while consistently refusing to permit servitudes attached to personal property. That is, owners of land can establish new, specific requirements for the property that bind all future owners—but owners of chattels cannot. In recent decades, however, firms have increasingly begun relying on contract provisions that purport to bind future owners of chattels. These developments began in the context of software licensing, but they have started to migrate to chattels not encumbered by software. Courts encountering these provisions have mostly missed their significance, focusing instead on questions …
How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein
How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein
Emerging Writers
This paper explores the danger of emerging artificial intelligence technology perpetuating racial injustice in law enforcement and how police can ensure the protection of citizens amid this information age. We dissect a real-world case in which AI predictive policing technology resulted in alarming racial discrimination against American minority citizens. We discuss the possible explanations for this result and explore the limitations of artificial intelligence technology. Furthermore, we brainstorm methods for ensuring American citizens' just and constitutional protection as new technology is developed and tested. We propose implementing transparency laws that make the details about any policing technology and surveillance available …
Open Source Perfume, Amanda Levendowski
Open Source Perfume, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
ABRIDGED ABSTRACT: Perfume is a powerful art and technology, but its secrets are closely held by a privileged few - by some counts, there are more astronauts than there are perfumers. As critics have noted increasingly since 2020, those select few perfumers often share similar backgrounds. As interviews with American, British, and French perfumemakers reveal, intellectual property (IP) also plays a gatekeeping role in perfumery. Drawing on work by perfumer and educator Saskia Wilson-Brown, this Article suggests that perfumery is overdue for a transformation. One is emerging: open source perfume. For those seeking ways to share scents and signal commitment …
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Faculty Scholarship
Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.
Privacy nicks come from the …
The Public’S Companies, Andrew K. Jennings
The Public’S Companies, Andrew K. Jennings
Fordham Journal of Corporate & Financial Law
This Essay uses a series of survey studies to consider how public understandings of public and private companies map into urgent debates over the role of the corporation in American society. Does a social-media company, for example, owe it to its users to follow the free-speech principles embodied in the First Amendment? May corporate managers pursue environmental, social, and governance (“ESG”) policies that could reduce short-term or long-term profits? How should companies respond to political pushback against their approaches to free expression or ESG?
The studies’ results are consistent with understandings that both public and private companies have greater public …
Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle
Code And Prejudice: Regulating Discriminatory Algorithms, Bernadette M. Coyle
Washington and Lee Law Review Online
In an era dominated by efficiency-driven technology, algorithms have seamlessly integrated into every facet of daily life, wielding significant influence over decisions that impact individuals and society at large. Algorithms are deliberately portrayed as impartial and automated in order to maintain their legitimacy. However, this illusion crumbles under scrutiny, revealing the inherent biases and discriminatory tendencies embedded in ostensibly unbiased algorithms. This Note delves into the pervasive issues of discriminatory algorithms, focusing on three key areas of life opportunities: housing, employment, and voting rights. This Note systematically addresses the multifaceted issues arising from discriminatory algorithms, showcasing real-world instances of algorithmic …
Shouldering The Burden Of Renewable Energy: Lithium Mining In Chile’S Indigenous Communities, Asha Wedemier-Allan
Shouldering The Burden Of Renewable Energy: Lithium Mining In Chile’S Indigenous Communities, Asha Wedemier-Allan
University of Miami Inter-American Law Review
Technology has improved society, from bridging digital divides to increasing efficiency. To power technology, energy sources were traditionally derived from diminishing and exhaustible resources like fossil fuels. The renewable energy revolution emerged to balance the global demand for technology with its impact on natural resources. Lithium is a critical, non-renewable mineral that clean technology relies on. Essentially, lithium makes renewable energy possible. As the pillar for a fossil fuel-free yet technology-driven society, it is imperative to examine the sustainability and impacts of lithium mining.
This Note discusses the legal and socio-political frameworks shaping foreign direct investments in Chile’s lithium mining …
Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen
Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen
Articles
In the brewing tech war between the United States and China, the quest for tech supremacy is in full force. Through enacting a series of laws and policies, China aims to reach its goal of tech supremacy. If China succeeds, U.S. corporations will face a daunting task in competing against Chinese products and services in core industries and in sectors where artificial intelligence and technological breakthroughs reign. This Article is the first to identify and analyze China’s 2022 Law on Science and Technology Progress, Personal Information Protection Law, Made in China 2025, National Intellectual Property Strategies, and digital currency e-CNY; …
A Public Technology Option, Hannah Bloch-Wehba
A Public Technology Option, Hannah Bloch-Wehba
Faculty Scholarship
Private technology increasingly underpins public governance. But the state’s growing reliance on private firms to provide a variety of complex technological products and services for public purposes brings significant costs for transparency: new forms of governance are becoming less visible and less amenable to democratic control. Transparency obligations initially designed for public agencies are a poor fit for private vendors that adhere to a very different set of expectations.
Aligning the use of technology in public governance with democratic values calls for rethinking, and in some cases abandoning, the legal structures and doctrinal commitments that insulate private vendors from meaningful …
Defragging Feminist Cyberlaw, Amanda Levendowski
Defragging Feminist Cyberlaw, Amanda Levendowski
Georgetown Law Faculty Publications and Other Works
In 1996, Judge Frank Easterbrook famously observed that any effort to create a field called cyberlaw would be “doomed to be shallow and miss unifying principles.” He was wrong, but not for the reason other scholars have stated. Feminism is a unifying principle of cyberlaw, which alternately amplifies and abridges the feminist values of consent, safety, and accessibility. Cyberlaw simply hasn’t been understood that way—until now.
In computer science, “defragging” means bringing together disparate pieces of data so they are easier to access. Inspired by that process, this Article offers a new approach to cyberlaw that illustrates how feminist values …
Deplatforming, Ganesh Sitaraman
Deplatforming, Ganesh Sitaraman
Vanderbilt Law School Faculty Publications
Deplatforming in the technology sector is hotly debated, and at times may even seem unprecedented. In recent years, scholars, commentators, jurists, and lawmakers have focused on the possibility of treating social-media platforms as common carriers or public utilities, implying that the imposition of a duty to serve the public would restrict them from deplatforming individuals and content.
But, in American law, the duty to serve all comers was never absolute. In fact, the question of whether and how to deplatform-—to exclude content, individuals, or businesses from critical services—- has been commonly and regularly debated throughout American history. In the common …
Leveraging Technology To Promote Access To Justice, Amy Emerson
Leveraging Technology To Promote Access To Justice, Amy Emerson
Faculty Publications
No abstract provided.
The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman
The Ideal Approach To Artificial Intelligence Legislation: A Combination Of The United States And European Union, Dane Chapman
University of Miami Law Review
The evolution of Artificial Intelligence (“A.I.”) from a speculative concept depicted in science fiction to its integration into various aspects of everyday life has brought about complex challenges for contemporary legislators. The proliferation of A.I. technology has led to a growing recognition of the need for regulation, as it poses both promises and threats to society. On the one hand, A.I. has the potential to enhance efficiency in various fields, such as medicine and automation of routine tasks. On the other hand, if left unregulated, A.I. has the potential to undermine democratic principles and infringe upon fundamental rights. Thus, legislators …
For Freedom Or Full Of It? State Attempts To Silence Social Media, Grace Slicklen
For Freedom Or Full Of It? State Attempts To Silence Social Media, Grace Slicklen
University of Miami Law Review
Freedom of speech is, unsurprisingly, foundational to the “land of the free.” However, the “land of the free” has undergone some changes since the First Amendment’s ratification. Unprecedented technological evolution has ushered in a digital forum in which the volume, speed, and reach of words transcend the Framers’ visions of the First Amendment’s aims. Social media platforms have become central spaces for public discourse, where opportunities to create—and repress—speech are endless. From enabling individuals to freely express their views, to allowing state actors to limit open exchanges, it is about time that the Supreme Court tackles this complex issue of …
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Akron Law Review
This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …
Security In The Digital Age, Michael Gentithes
Security In The Digital Age, Michael Gentithes
Akron Law Review
Rapidly evolving technology allows governments and businesses to elevate our collective well-being in ways we could not have imagined just decades ago. Data is now a resource that governments and businesses alike can mine to address the world’s needs with greater efficiency, accuracy, and flexibility. But evolving technology and advanced data analytics also come with risk. New digital capabilities also create new means for nefarious actors to infiltrate the complex technological systems at the heart of nearly all of our daily activities. Just as new digital tools emerge to offer unique goods and services, new tools allow wrongdoers to invade …
Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan
Wrong Search At The Wrong Time: Keyword Search Warrants And The Fourth Amendment, Nicole Chan
Articles
This Note will advocate for the view that when presented with the issue, state and federal courts should establish that keyword search warrants are unconstitutional because they violate the Fourth Amendment. Keyword search warrants cannot meet the Fourth Amendment’s requirements of probable cause and particularity because the subjects of the search cannot be identified until after the search is completed. These warrants are unnecessary and have the potential of implicating millions of internet users who have no connection to a crime. This Note will contend that individuals have a reasonable expectation of privacy in their search history data, and that …
Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson
Training Is Everything: Artificial Intelligence, Copyright, And “Fair Training”, Andrew W. Torrance, Bill Tomlinson
Dickinson Law Review (2017-Present)
In this Essay, we analyze the arguments in favor of, and against, viewing the use of copyrighted works in training sets for AI as fair use. We call this form of fair use “fair training.” We identify both strong and spurious arguments on both sides of this debate. In addition, we attempt to take a broader perspective, weighing the societal costs (e.g., replacement of certain forms of human employment) and benefits (e.g., the possibility of novel AI-based approaches to global issues such as environmental disruption) of allowing AI to make easy use of copyrighted works as training sets to facilitate …
Exit Engineering, Rachel Landy
Exit Engineering, Rachel Landy
Articles
How do business lawyers create value? For nearly forty years, scholars have conceptualized the business lawyer as a “transaction cost engineer” who helps contracting parties efficiently break negotiation stalemates to create more valuable deals. This theory provides meaningful insights about sophisticated corporate law practice, where outside lawyers parachute in to make one-off deals happen. However, it fails to explain the behavior of startup lawyers, who develop long-term relationships with their clients and counsel them on seemingly routine matters, well before a major transaction materializes. These lawyers are not just transaction cost engineers, they are exit engineers.This Article offers a novel …
To Democratize Algorithms, Ngozi Okidegbe
To Democratize Algorithms, Ngozi Okidegbe
Faculty Scholarship
Jurisdictions increasingly employ algorithms in public sector decisionmaking. Facing public outcry about the use of such technologies, jurisdictions have begun to increase democratic participation in the processes by which algorithms are procured, constructed, implemented, used, and overseen. But what problem is the current approach to democratization meant to solve? Policymakers have tended to view the problem as the absence of public deliberation: agencies and courts often use algorithms without public knowledge or input. To redress this problem, jurisdictions have turned to deliberative approaches designed to foster transparency and public debate.
This Article contends that the current approach to democratization is …