Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (15)
- International Law (14)
- Computer Law (9)
- Internet Law (9)
- Business (8)
-
- Computer Sciences (8)
- Human Rights Law (8)
- Law and Society (8)
- Physical Sciences and Mathematics (8)
- Law and Politics (7)
- Public Affairs, Public Policy and Public Administration (7)
- Public Policy (7)
- Science and Technology Studies (7)
- Social Policy (7)
- Engineering (6)
- Political Science (6)
- Science and Technology Law (6)
- Technology and Innovation (6)
- Criminology (5)
- Other Engineering (5)
- Sociology (5)
- Civil Rights and Discrimination (4)
- Energy and Utilities Law (4)
- Environmental Law (4)
- Health Law and Policy (4)
- Legal Studies (4)
- Military, War, and Peace (4)
- National Security Law (4)
- Public Law and Legal Theory (4)
- Institution
- Publication Year
- Publication
-
- Associate Professor Katina Michael (5)
- Chris Rahman (4)
- Chris Jay Hoofnagle (3)
- Prof. Elizabeth Burleson (3)
- Felix Mormann (2)
-
- Matthew Hoisington (2)
- Mireille Hildebrandt (2)
- Peter G. Danchin (2)
- Professor Katina Michael (2)
- Stephen E Henderson (2)
- Tracy Mitrano (2)
- Adam Thierer (1)
- Adrian J Walters (1)
- Amy C. Gaudion (1)
- Ann Bartow (1)
- Brian M McCall (1)
- Charlotte Ku (1)
- Christopher C. Cooper Dr. (1)
- Christopher Chao-hung Chen (1)
- Dan Subotnik (1)
- Daphne Richemond-Barak (1)
- Derek Bambauer (1)
- Deth Sao (1)
- Douglass Cassel (1)
- Eric J. Miller (1)
- Gary M. Shaw (1)
- Gregory S Arnold (1)
- Ingrid Michelsen Hillinger (1)
- Isaac Kfir (1)
- Ithai Apter (1)
- File Type
Articles 1 - 30 of 60
Full-Text Articles in Law
When Can Nations Go To War? Politics And Change In The Un Securtiy System, Charlotte Ku
When Can Nations Go To War? Politics And Change In The Un Securtiy System, Charlotte Ku
Charlotte Ku
In an appreciation of Harold Jacobson written for the American Journal of International Law, the author concluded that following the events of September 11, 2001, we would need the kind of gentle wisdom Harold Jacobson brought to his tasks more than ever. The author also recalled Harold Jacobson's own observation in Networks of Interdependence that his assessment of the global political system was an optimistic, but not a naive one. These qualities of quiet determination to get to the bottom of an issue and of optimism stemmed from a fundamental belief that individuals, armed with information and the opportunity …
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
Amy C. Gaudion
Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.
Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …
Smarter Finance For Cleaner Energy: Open Up Master Limited Partnerships (Mlps) And Real Estate Investment Trusts (Reits) To Renewable Energy Investment, Felix Mormann, Dan Reicher
Smarter Finance For Cleaner Energy: Open Up Master Limited Partnerships (Mlps) And Real Estate Investment Trusts (Reits) To Renewable Energy Investment, Felix Mormann, Dan Reicher
Felix Mormann
This policy proposal makes the case for opening Master Limited Partnerships (MLPs) and Real Estate Investment Trusts (REITs) — both well-established investment structures — to renewable energy investment. MLPs and, more recently, REITs have a proven track record for promoting oil, gas, and other traditional energy sources. When extended to renewable energy projects these tools will help promote growth, move renewables closer to subsidy independence, and vastly broaden the base of investors in America’s energy economy.
Beyond Tax Credits: Smarter Tax Policy For A Cleaner, More Democratic Energy Future, Felix Mormann
Beyond Tax Credits: Smarter Tax Policy For A Cleaner, More Democratic Energy Future, Felix Mormann
Felix Mormann
Solar, wind, and other renewable energy technologies have the potential to mitigate climate change, secure America’s energy independence, and create millions of green jobs. In the absence of a price on carbon emissions, however, these long-term benefits will not be realized without near-term policy support for renewables. This Article assesses the efficiency of federal tax incentives for renewables and proposes policy reform to more cost-effectively promote renewable energy through capital markets and crowdfunding.
Federal support for renewable energy projects today comes primarily in the form of tax incentives such as accelerated depreciation and, critically, tax credits. Empirical evidence reveals that …
A Model Regime Of Privacy Protection (Version 2.0), Daniel J. Solove, Chris Jay Hoofnagle
A Model Regime Of Privacy Protection (Version 2.0), Daniel J. Solove, Chris Jay Hoofnagle
Chris Jay Hoofnagle
This version incorporates and responds to the many comments that we received to Version 1.1, which we released on March 10, 2005.
Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of the largest data brokers in the United States with records on almost every adult American citizen, sold data on about 145,000 people to fraudulent businesses set up by identity thieves. …
A Model Regime Of Privacy Protection (Version 1.1), Daniel J. Solove, Chris Jay Hoofnagle
A Model Regime Of Privacy Protection (Version 1.1), Daniel J. Solove, Chris Jay Hoofnagle
Chris Jay Hoofnagle
Privacy protection in the United States has often been criticized, but critics have too infrequently suggested specific proposals for reform. Recently, there has been significant legislative interest at both the federal and state levels in addressing the privacy of personal information. This was sparked when ChoicePoint, one of the largest data brokers in the United States with records on almost every adult American citizen, sold data on about 145,000 people to fraudulent businesses set up by identity thieves.
In the aftermath of the ChoicePoint debacle, both of us have been asked by Congressional legislative staffers, state legislative policymakers, journalists, academics, …
A Comparative Examination Of Counter-Terrorism Law And Policy, Laurent Mayali, John Yoo
A Comparative Examination Of Counter-Terrorism Law And Policy, Laurent Mayali, John Yoo
Laurent Mayali
This article conducts a comparative analysis of U.S. and European counter-terrorism law and policy. Recent attacks vy ISIS in the U.S., France, and Germany have revealed important differences between American and European approaches. Before September 11, 2001, the United States responded to terrorism primarily with existing law enforcement authorities, though in isolated cases it pursued military measures abroad. In this respect, it lagged behind the approach of European nations, which had confronted internal terrorism inspired vy leftwing ideology or separatist goals. But after the 9-11 attacks, the United States adopted a preventive posture that aimed to pre-empt terrorist groups before …
Introduction, Tracy Mitrano
Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano
Chapter Five: The San Bernardino Iphone Case, Tracy Mitrano
Tracy Mitrano
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Ou Professor: Fourth Amendment At Heart Of Dispute Between Fbi, Apple, Stephen E. Henderson
Stephen E Henderson
Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg
Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg
Jan Kallberg
Humanitarian cyber operations would allow democratic states to utilise cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on the nation state itself but when the state fails to protect its citizens, then the international community can act ignoring the repressive or failed states national sovereignty. Another support for humanitarian cyber operations is the ability to capture evidence to support future prosecution for crimes against humanity. The weakest link in the chain …
Concepts Of Maritime Security: A Strategic Perspective On Alternative Visions For Good Order And Security At Sea, With Policy Implications For New Zealand, Christopher Rahman
Concepts Of Maritime Security: A Strategic Perspective On Alternative Visions For Good Order And Security At Sea, With Policy Implications For New Zealand, Christopher Rahman
Chris Rahman
This project originated as a research report conducted for the Royal Australian Navy’s Sea Power Centre – Australia. Its intent is not to reprise well‐worn ideas of sea power or maritime strategy, but to address conceptually what is meant by the term “maritime security” in the context of contemporary ideas of the meaning of “security” itself. In doing so, I have purposefully delved into some of the often quite dense and sometimes arcane literature and ideas regarding conceptual treatments of security. This is important, because the ideas inherent in different perspectives on maritime security often have an intellectual or political …
Australia And Maritime Security In The Northeast Indian Ocean, Chris Rahman
Australia And Maritime Security In The Northeast Indian Ocean, Chris Rahman
Chris Rahman
Maritime security is vital to Australia and its neighbours in the ASEANAustralia- India "triangle" - or the area of the northeast Indian Ocean. It has become a leading sphere for the construction of deeper forms of security cooperation. Nonetheless, both the "region" in question and the topic of maritime security itself are underdeveloped ideas in the context of rapidly developing relationships. Therefore, the approach pursued in this chapter focuses on four themes. First, the maritime nature of the area's geography is established. Second, different perspectives on maritime security are introduced, with an emphasis on non-traditional factors, including responses to the …
Evolving U.S. Framework For Global Maritime Security From 9/11 To The 1000-Ship Navy , Christopher Rahman
Evolving U.S. Framework For Global Maritime Security From 9/11 To The 1000-Ship Navy , Christopher Rahman
Chris Rahman
No abstract provided.
The Implications Of Climate Change For Maritime Security Forces, Chris Rahman
The Implications Of Climate Change For Maritime Security Forces, Chris Rahman
Chris Rahman
Although a consensus on the reality of climate change now prevails, the details of the problem remain unsettled. In particular, the precise local and regional impacts of the global phenomenon of climate change are unknown. The security-related consequences of such impacts are thus inherently speculative. Nevertheless, it has become an increasingly important aspect of the national security policy deliberations of many States, including both civil and defence force capability planning, to consider the potential security implications of climate change. Despite the prevailing uncertainty over specific impacts and their security implications, longrange planning can be undertaken based on the most likely …
United Nations Peacekeeping Operations And Security And Reconstruction, Muna Ndulo
United Nations Peacekeeping Operations And Security And Reconstruction, Muna Ndulo
Muna B Ndulo
Several studies show that despite recent increases in the number of minor conflicts, long-term trends suggest that international and civil wars are declining. Analyzing the causes of the improvement in global security since 1990, the 2006 Human Security Report argues that the United Nations played a critically important role in spearheading a huge upsurge of international conflict prevention, peacekeeping and peacebuilding activities. Although the number of wars has decreased, far too many remain — and there are still several places of instability around the globe that could easily turn into conflict areas. In August 2000, a famous UN report, the …
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
Adam Thierer
This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …
"Toiling In The Danger And In The Morals Of Despair": Risk, Security, Danger, The Constitution, And The Clinician's Dilemma, Michael L. Perlin, Alison Julia Lynch
"Toiling In The Danger And In The Morals Of Despair": Risk, Security, Danger, The Constitution, And The Clinician's Dilemma, Michael L. Perlin, Alison Julia Lynch
Michael L Perlin
Abstract: Persons institutionalized in psychiatric hospitals and “state schools” for those with intellectual disabilities have always been hidden from view. Such facilities were often constructed far from major urban centers, availability of transportation to such institutions was often limited, and those who were locked up were, to the public, faceless and often seen as less than human.
Although there has been regular litigation in the area of psychiatric (and intellectual disability) institutional rights for 40 years, much of this case law entirely ignores forensic patients – mostly those awaiting incompetency-to-stand trial determinations, those found permanently incompetent to stand trial, those …
"To Kill A Cleric?: The Al-Awlaki Case And The Chaplaincy Exception Under The Laws Of War", K Benson
"To Kill A Cleric?: The Al-Awlaki Case And The Chaplaincy Exception Under The Laws Of War", K Benson
K Benson
Anwar al-Awlaki was the first American citizen to be targeted for extrajudicial assassination by the Obama administration. While scholarly attention has focused on legality of his killing under domestic law, his status as a chaplain under International Humanitarian Law (IHL) has gone unexamined. The possibility that Anwar al-Awlaki may have been a protected person as a chaplain has profound ramifications for the legality of his killing and for the conduct of the war on terror more generally. As the definition of a "Chaplain" under IHL is under-developed at best and vague at worst, ideologues such as Mr. al-Awlaki operate in …
American Exceptionalism And The International Law Of Self-Defense, Mary Ellen O'Connell
American Exceptionalism And The International Law Of Self-Defense, Mary Ellen O'Connell
Mary Ellen O'Connell
No abstract provided.
International Human Rights Law And Security Detention, Douglass Cassel
International Human Rights Law And Security Detention, Douglass Cassel
Douglass Cassel
This article analyzes the grounds, procedures, and conditions required by International Human Rights Law for preventive detention of suspected terrorists as threats to security. Such detention is generally permitted, provided it is based on grounds and procedures previously established by law; is not arbitrary, discriminatory, or disproportionate; is publicly registered and subject to fair and effective judicial review; and the detainee is not mistreated and is compensated for any unlawful detention. In Europe, however, preventive detention for security purposes is generally not permitted. If allowed at all, it is permitted only when a State in time of national emergency formally …
Can Self-Regulation Work? Lessons From The Private Security And Military Industry, Daphne Richemond-Barak
Can Self-Regulation Work? Lessons From The Private Security And Military Industry, Daphne Richemond-Barak
Daphne Richemond-Barak
Various efforts have been undertaken in recent years to clarify the legal framework governing the outsourcing of security and military functions to private actors. While national and international legislation have made little progress, self-regulation has advanced steadily. The article provides the first normative assessment of self-regulation in the private security and military industry – and as such offers interesting insights for other industries that are transnational in reach and under-regulated by domestic, regional, and international law. Though industry critics tend to deplore the normative 'softness' of self-regulation and its voluntary nature, it appears to have shifted behavioral norms and triggered …
Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael
Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael
Associate Professor Katina Michael
It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …
Getting The Balance Right Between Information Security And Privacy Rights, Katina Michael
Getting The Balance Right Between Information Security And Privacy Rights, Katina Michael
Associate Professor Katina Michael
- Laws, regulations, industry guidelines, and codes for new technologies and their use - The balance between encouraging innovation and future proofing technology-related policy - The difference between the existence of legislation and the enforcement of that legislation - Citizen responses to the fear of policing and security controls
Due Process In American Military Tribunals After September 11, 2001, Gary Shaw
Due Process In American Military Tribunals After September 11, 2001, Gary Shaw
Gary M. Shaw
The Authorization for Use of Military Force ("AUMF") provides broad powers for a president after September 11, 2001. President Bush, under the AUMF, claimed he had the power to hold "enemy combatants" without due process. This gave rise to two questions that the article addresses: "Could they be held indefinitely without charges or proceedings being initiated? If proceedings had to be initiated, what process was due to the defendants?"
International Law And Ungoverned Space, Matthew Hoisington
International Law And Ungoverned Space, Matthew Hoisington
Matthew Hoisington
Ungoverned spaces, strictly defined as “spaces not effectively governed by the state” exist all over the world, presenting particular difficulties to public international law, which is historically premised on sovereignty and state control. Examples of such spaces include cyberspace, south-central Somalia and the Federally Administered Tribal Areas along the Afghan-Pakistan border. These spaces destabilize the international system in novel ways—and they might also be dangerous. Many of the terrorism plots from the late twentieth and early twenty-first century emanated from “safe havens” afforded by ungoverned spaces. The lack of governance over certain spaces also raises concerns over development, including the …
Balance Or Trade-Off? Online Security Technologies And Fundamental Rights, Mireille Hildebrandt
Balance Or Trade-Off? Online Security Technologies And Fundamental Rights, Mireille Hildebrandt
Mireille Hildebrandt
In this contribution I argue that the image of the balance is often used to defend the idea of a trade-off. To understand the drawbacks of this line of thought I will explore the relationship between online security technologies and fundamental rights, notably privacy, non-discrimination, freedom of speech and due process. After discriminating between three types of online security technologies I will trace the reconfiguration of the notion of privacy in the era of smart environments. This will lead to an inquiry into the metaphor of the scale, building on the triple test regarding the justification of the limitation of …
Securing Maritime Australia: Developments In Maritime Surveillance And Security, Clive Schofield, Ben Tsamenyi, Mary Ann Palma
Securing Maritime Australia: Developments In Maritime Surveillance And Security, Clive Schofield, Ben Tsamenyi, Mary Ann Palma
Professor Ben M Tsamenyi
A long coastline and extensive maritime claims mean that Australia benefits from and has responsibility for an enormous maritime jurisdiction.Within this offshore area Australia faces significant, varied, and complex maritime security and ocean policy challenges. In response, Australia has taken a number of innovative steps toward enhancing its maritime security. This article will review Australia’s past practice together with some of the more recent developments in this context, particularly efforts to enhance offshore maritime surveillance and enforcement, such as the creation of the Taskforce on Offshore Maritime Security and Border Protection Command, establishment of the Australian Maritime Identification System, and …
International Law And Ungoverned Space, Matthew Hoisington
International Law And Ungoverned Space, Matthew Hoisington
Matthew Hoisington
Ungoverned spaces, strictly defined as “spaces not effectively governed by the state” exist all over the world, presenting particular difficulties to public international law, which is historically premised on sovereignty and state control. Examples of such spaces include cyberspace, south-central Somalia and the Federally Administered Tribal Areas along the Afghan-Pakistan border. These spaces destabilize the international system in novel ways—and they might also be dangerous. Many of the terrorism plots from the late twentieth and early twenty-first century emanated from “safe havens” afforded by ungoverned spaces. The lack of governance over certain spaces also raises concerns over development, including the …
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …