Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (34)
- Internet Law (25)
- Computer Law (18)
- Intellectual Property Law (11)
- Law and Society (8)
-
- Communications Law (7)
- International Law (7)
- Comparative and Foreign Law (6)
- Entertainment, Arts, and Sports Law (6)
- Torts (6)
- Economics (5)
- Law and Economics (5)
- Medical Jurisprudence (5)
- Securities Law (5)
- Social and Behavioral Sciences (5)
- State and Local Government Law (5)
- Administrative Law (4)
- Commercial Law (4)
- Constitutional Law (4)
- Contracts (4)
- Evidence (4)
- Health Law and Policy (4)
- Property Law and Real Estate (4)
- Transportation Law (4)
- Water Law (4)
- Air and Space Law (3)
- Antitrust and Trade Regulation (3)
- Business Organizations Law (3)
- Civil Law (3)
- Institution
- Publication
-
- Lawrence J. Trautman Sr. (3)
- Rob Frieden (3)
- barbara p billauer esq (3)
- Henry H. Perritt, Jr. (2)
- Hezi Margalit (2)
-
- Scott Shackelford (2)
- Ahad Syed (1)
- Andrew Leahey (1)
- Andrew P. Morriss (1)
- Christopher McElwain (1)
- Constance E. Bagley (1)
- Dana Beldiman (1)
- Emily Michiko Morris (1)
- Fazal Khan (1)
- Giancarlo Francesco Frosio (1)
- Harvey L. Fiser (1)
- Hussam M. Alkanbashi (1)
- Jeffrey A. Van Detta (1)
- Jesse D Lively (1)
- Julian Dibbell (1)
- Layne S. Keele (1)
- Mark Strasser (1)
- Matthew Roach (1)
- Mirit Eyal-Cohen (1)
- Nehal A. Patel (1)
- Nicholas L Georgakopoulos (1)
- Patricia J. Zettler (1)
- Richard Warner (1)
- Robert Sprague (1)
- Ryan C Pulley (1)
- File Type
Articles 31 - 42 of 42
Full-Text Articles in Law
Promoting “Academic Entrepreurship” In Europe And The United States: Creating An Intellectual Property Regime To Facilitate The Efficient Transfer Of Knowledge From The Lab To The Patient, Constance Bagley, Christina Tvarno
Promoting “Academic Entrepreurship” In Europe And The United States: Creating An Intellectual Property Regime To Facilitate The Efficient Transfer Of Knowledge From The Lab To The Patient, Constance Bagley, Christina Tvarno
Constance E. Bagley
In 2014, the European Commission announced the launch of a study of knowledge transfer by public research organizations and other institutes of higher learning “to determine which additional measures might be needed to ensure an optimal flow of knowledge between the public research organisations and business thereby contributing to the development of the knowledge based economy.” As the European Commission has recognized, the EU needs to take action to “unlock the potential of IPRs [intellectual property rights] that lie dormant in universities, research institutes and companies.” This article builds on our earlier work on structuring efficient pharmaceutical public-private partnerships (PPPPs) …
Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman
Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman
Lawrence J. Trautman Sr.
During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more easily understandable …
Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele
Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele
Layne S. Keele
In Apple, Inc. v. Motorola, Inc., 757 F.3d 1286 (Fed. Cir. 2014), the four federal judges who considered the case—Judge Posner by designation at the trial level, and three Federal Circuit judges on appeal—all expressed differing opinions on the question of whether and to what extent extraordinary patent remedies should be available for the infringement of standard-essential patents. This article aims to simplify this muddled and confusing topic.
The article employs a teleological approach, examining the purposes behind remedies in general, the purposes of extraordinary remedies in patent law, and the purposes of RAND commitments (commitments to license standard-essential …
Bridgefunding Is Crowdfunding For Startups Across The Private Equity Gap, Seth C. Oranburg
Bridgefunding Is Crowdfunding For Startups Across The Private Equity Gap, Seth C. Oranburg
Seth C Oranburg
Title III of the JOBS Act of 2012, which attempts to encourage entrepreneurship by allowing startups and small business to sell stock to the general public over the Internet through “crowdfunding,” is completely backwards. Its ceiling should be a floor—the $1 million limit should be inverted. By capping startups at raising $1 million from crowdfunding, the JOBS Act does not address the private equity gap, a fundamental problem in startup markets, and exposes unsophisticated investors to risk and fraud. This Article presents a regulatory framework premised on “bridgefunding,” an approach that this article develops to protect new investors by encouraging …
Dumping Daubert, Popping Popper And Falsifying Falsifiability: A Re-Assessment Of First Principles, Barbara P. Billauer Esq
Dumping Daubert, Popping Popper And Falsifying Falsifiability: A Re-Assessment Of First Principles, Barbara P. Billauer Esq
barbara p billauer esq
Abstract: The Daubert mantra demands that judges, acting as gatekeepers, prevent para, pseudo or bad science from infiltrating the courtroom. To do so, the Judges must first determine what is ‘science’ and what is ‘good science.’ It is submitted that Daubert is deeply polluted with the notions of Karl Popper who sets ‘falsifiability’ and ‘falsification’ as the demarcation line for that determination. This philosophy has intractably infected case law, leading to bad decisions immortalized as stare decisis, and an unworkable system of decision-making, which negatively impacts litigant expectations. Among other problems is the intolerance of Popper’s system for multiple causation, …
Definitions, Religion, And Free Exercise Guarantees, Mark Strasser
Definitions, Religion, And Free Exercise Guarantees, Mark Strasser
Mark Strasser
The First Amendment to the United States Constitution protects the free exercise of religion. Non-religious practices do not receive those same protections, which makes the ability to distinguish between religious and non-religious practices important. Regrettably, members of the Court have been unable to agree about how to distinguish the religious from the non-religious—sometimes, the implicit criteria focus on the sincerity of the beliefs, sometimes the strength of the beliefs or the role that they play in an individual’s life, and sometimes the kind of beliefs. In short, the Court has virtually guaranteed an incoherent jurisprudence by sending contradictory signals with …
Managing Cyberthreat, Lawrence J. Trautman
Managing Cyberthreat, Lawrence J. Trautman
Lawrence J. Trautman Sr.
Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …
Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic
Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic
Scott Shackelford
There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …
Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively
Can A One Star Review Get You Sued? The Right To Anonymous Speech On The Internet And The Future Of Internet “Unmasking” Statutes, Jesse D. Lively
Jesse D Lively
This Comment argues that the Supreme Court of Virginia should first reverse the Virginia Court of Appeal’s decision when it hears the Yelp case later this year. Secondly, the court hold that the Virginia statute for identifying persons communicating anonymously over the Internet violates the First Amendment's required showing of merit on both law and facts before a subpoena duces tecum to identify an anonymous speaker can be enforced. Lastly, it should adopt a new “unveiling standard” similar to the standards used in either Dendrite or Cahill. Part II examines the jurisprudential history of identifying anonymous Internet speakers in defamation …
The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden
Rob Frieden
This paper will examine new models for the carriage of Internet traffic with an eye toward providing insights on how the interconnection process has changed and what positive and negative consequences have resulted. Internet Service Provider (“ISP”) interconnection used to constitute a cooperative undertaking, but now it increasingly requires difficult and protracted negotiations between ventures that consider themselves adversaries in a winner take all transaction. The paper concludes that new commercial arrangements, such as paid peering, can achieve mutually beneficial outcomes. However, the paper also identifies instances where migration from traditional interconnection arrangements can harm consumers by reducing some of …
Artificial Insemination From Donor (Aid) – From Status To Contract And Back Again?, Yehezkel Margalit
Artificial Insemination From Donor (Aid) – From Status To Contract And Back Again?, Yehezkel Margalit
Hezi Margalit
The last few decades have witnessed dramatic changes in the institutions of family and parenthood and an abandonment of the historical emphasis on their bionormative structures. These changes are the result of societal shifts with respect to public openness and technological innovations that segregate marital relations from sexuality and fertility. The resultant parenthood structures, which depart from traditional spousal and parental models, intensify the ability and need to determine legal parenthood in numerous unprecedented contexts. Sir Henry Maine famously stated that mankind is pacing from status toward contract. This theme has had particular resonance during the past half century in …
Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague