Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (9)
- Boston University School of Law (6)
- University of Colorado Law School (6)
- University of Michigan Law School (5)
- Brooklyn Law School (4)
-
- Maurer School of Law: Indiana University (4)
- University of Maryland Francis King Carey School of Law (4)
- Chicago-Kent College of Law (2)
- Pace University (2)
- Schulich School of Law, Dalhousie University (2)
- American University Washington College of Law (1)
- Columbia Law School (1)
- Cornell University Law School (1)
- Emory University School of Law (1)
- Penn State Law (1)
- Roger Williams University (1)
- Singapore Management University (1)
- University of Baltimore Law (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of Richmond (1)
- Villanova University Charles Widger School of Law (1)
- William & Mary Law School (1)
- Keyword
-
- ECR (4)
- Skimming (4)
- Zapper (4)
- Antitrust (3)
- Network economic effects (3)
-
- POS system (3)
- Phantom-ware (3)
- Privacy (3)
- Surveillance (3)
- Tax fraud (3)
- Telecommunications (3)
- Transaction costs (3)
- Administrative Law (2)
- Cash register (2)
- Civil rights (2)
- Climate change (2)
- Competition (2)
- Complex systems (2)
- Copyright (2)
- Cyber law (2)
- Evidence (2)
- Fourth Amendment (2)
- Global warming (2)
- Graph theory (2)
- Human genome (2)
- Information Technology (2)
- Innovation (2)
- Intellectual Property (2)
- Intellectual Property Law (2)
- Intellectual property (2)
- Publication
-
- Faculty Scholarship (15)
- All Faculty Scholarship (12)
- Articles (5)
- Publications (5)
- Articles by Maurer Faculty (4)
-
- Articles, Book Chapters, & Popular Press (2)
- Elisabeth Haub School of Law Faculty Publications (2)
- Law Faculty Scholarship (2)
- Articles in Law Reviews & Other Academic Journals (1)
- Cornell Law Faculty Publications (1)
- Faculty Articles (1)
- Journal Articles (1)
- Law Faculty Publications (1)
- Other Publications (1)
- Popular Media (1)
- Research Collection Yong Pung How School Of Law (1)
- Securing Environmental Flows on the Colorado River in an Era of Climate Change: Issues, Challenges and Opportunities (March 21) (1)
- Working Paper Series (1)
Articles 1 - 30 of 57
Full-Text Articles in Law
Cyber Civil Rights, Danielle Keats Citron
Cyber Civil Rights, Danielle Keats Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …
Toward A Unified Theory Of Access To Local Telephone Systems, Daniel F. Spulber, Christopher S. Yoo
Toward A Unified Theory Of Access To Local Telephone Systems, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
One of the most distinctive developments in telecommunications policy over the past few decades has been the increasingly broad array of access requirements regulatory authorities have imposed on local telephone providers. In so doing, policymakers did not fully consider whether the justifications for regulating telecommunications remained valid. They also allowed each access regime to be governed by its own pricing methodology and set access prices in a way that treated each network component as if it existed in isolation. The result was a regulatory regime that was internally inconsistent, vulnerable to regulatory arbitrage, and unable to capture the interactions among …
The Enduring Lessons Of The Breakup Of At&T: A Twenty-Five Year Retrospective, Christopher S. Yoo
The Enduring Lessons Of The Breakup Of At&T: A Twenty-Five Year Retrospective, Christopher S. Yoo
All Faculty Scholarship
On April 18-19, 2008, the University of Pennsylvania Law School hosted a landmark conference on “The Enduring Lessons of the Breakup of AT&T: A Twenty-Five Year Retrospective.” This conference was the first major event for Penn’s newly established Center for Technology, Innovation, and Competition, a research institute committed to promoting basic research into foundational frameworks that will shape the way policymakers think about technology-related issues in the future. The breakup of AT&T represents an ideal starting point for reexamining the major themes of telecommunications policy that have emerged over the past quarter century. The conference featured a keynote address by …
The Case For Collaborative Tools, Lucie Olejnikova
The Case For Collaborative Tools, Lucie Olejnikova
Elisabeth Haub School of Law Faculty Publications
This article shares our experiences and outlines how we used free online collaborative tools to make the long distance seem short. This article also discusses the advantages and disadvantages of long-distance collaboration and how to apply the same tools and principles to a variety of work settings, such as law firms, firm libraries, court libraries, public libraries, and academic libraries. In addition, we mention the psycho-sociological aspects of a long-distance, Web-based communication, as well as its impact on project administration and budget.
Electronic Tax Fraud - Are There 'Sales Zappers' In Japan?, Richard Thompson Ainsworth
Electronic Tax Fraud - Are There 'Sales Zappers' In Japan?, Richard Thompson Ainsworth
Faculty Scholarship
Although there is no public acknowledgement - in the press, in a court case, though any announcement by the Japanese National Tax Administration, or in any academic studies or papers - that Zappers and Phantom-ware are a fraud problem in Japan, a number of factors suggest that Japan may be very fertile ground for technology-assisted cash skimming fraud. Those factors include: (1) a high concentration of small to medium sized businesses; (2) the fact that the retail economy is highly cash-based; and (3) the high level of technology acceptance in the Japanese retail sector - electronic cash registers (ECRs) and …
Torts And Innovation, Gideon Parchomovsky, Alex Stein
Torts And Innovation, Gideon Parchomovsky, Alex Stein
All Faculty Scholarship
This Essay exposes and analyzes a hitherto overlooked cost of the current design of tort law: its adverse effect on innovation. Tort liability for negligence, defective products, and medical malpractice is determined by reference to custom. We demonstrate that courts’ reliance on custom and conventional technologies as the benchmark of liability chills innovation and distorts its path. Specifically, the recourse to custom taxes innovators and subsidizes replicators of conventional technologies. We explore the causes and consequences of this phenomenon and propose two possible ways to modify tort law in order to make it more welcoming to innovation.
The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies
The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Federal Search Commission - Access, Fairness, And Accountability In The Law Of Search, Frank Pasquale, Oren Bracha
Federal Search Commission - Access, Fairness, And Accountability In The Law Of Search, Frank Pasquale, Oren Bracha
Faculty Scholarship
No abstract provided.
Network Neutrality, Consumers, And Innovation, Christopher S. Yoo
Network Neutrality, Consumers, And Innovation, Christopher S. Yoo
All Faculty Scholarship
In this Article, Professor Christopher Yoo directly engages claims that mandating network neutrality is essential to protect consumers and to promote innovation on the Internet. It begins by analyzing the forces that are placing pressure on the basic network architecture to evolve, such as the emergence of Internet video and peer-to-peer architectures and the increasing heterogeneity in business relationships and transmission technologies. It then draws on the insights of demand-side price discrimination (such as Ramsey pricing) and the two-sided markets, as well as the economics of product differentiation and congestion, to show how deviating from network neutrality can benefit consumers, …
Zappers And Phantom-Ware At The Fta: Are They Listening Now?, Richard Thompson Ainsworth
Zappers And Phantom-Ware At The Fta: Are They Listening Now?, Richard Thompson Ainsworth
Faculty Scholarship
When the Federation of Tax Administrators (FTA) held a national Compliance and Education Workshop in Louisville, Kentucky (February 25-27, 2001) one of the invited speakers was Kevin Pratt, Manager, Underground Economy, Canadian Customs and Revenue Authority (CCRA). He spoke on Zappers.
To the best of anyone's present recollection, this was the first time zappers had been discussed with a large group of state-level US tax compliance professionals. However, most of the information that the CCRA presented to the FTA in 2001 was not its own - it was derivative. Zapper investigations were not an in-house specialty of the CCRA (although …
Impractically Obscure? Privacy And Courtroom Proceedings In Light Of Webcasting And Other New Technologies, Fredric I. Lederer, Rebecca Green
Impractically Obscure? Privacy And Courtroom Proceedings In Light Of Webcasting And Other New Technologies, Fredric I. Lederer, Rebecca Green
Popular Media
No abstract provided.
Public Law, Private Law, And Legal Science, Chaim Saiman
Public Law, Private Law, And Legal Science, Chaim Saiman
Working Paper Series
This essay explores the historical and conceptual connections between private law and nineteenth century classical legal science from the perspective of German, American, and Jewish law. In each context, legal science flourished when scholars examined the confined doctrines traditional to private law, but fell apart when applied to public, administrative and regulatory law. Moving to the contemporary context, while traditional private law scholarship retains a prominent position in German law and academia, American law has increasingly shifted its focus from the language of substantive private law to a legal regime centered on public and procedural law. The essay concludes by …
Zappers & Phantom-Ware: A Global Demand For Tax Fraud Technology, Richard Thompson Ainsworth
Zappers & Phantom-Ware: A Global Demand For Tax Fraud Technology, Richard Thompson Ainsworth
Faculty Scholarship
There is a demand-market for technology that facilitates tax fraud. By all accounts the providers in this market are working in a growth industry.
In the short term this is bad news for those concerned with tax policy and information privacy. In the long term however, the fight against technology-assisted fraud is stimulating the development of a more robust technology base within tax administrations, and this is good news for those who believe that a sophisticated technological infrastructure is needed to resolve difficult questions of tax design.
This paper focuses on two technology-accelerants of SME tax fraud - zappers and …
Compliance With Advance Directives: Wrongful Living And Tort Law Incentives, Holly Fernandez Lynch, Michele Mathes, Nadia N. Sawicki
Compliance With Advance Directives: Wrongful Living And Tort Law Incentives, Holly Fernandez Lynch, Michele Mathes, Nadia N. Sawicki
All Faculty Scholarship
Modern ethical and legal norms generally require that deference be accorded to patients' decisions regarding treatment, including decisions to refuse life-sustaining care, even when patients no longer have the capacity to communicate those decisions to their physicians. Advance directives were developed as a means by which a patient's autonomy regarding medical care might survive such incapacity. Unfortunately, preserving patient autonomy at the end of life has been no simple task. First, it has been difficult to persuade patients to prepare for incapacity by making their wishes known. Second, even when they have done so, there is a distinct possibility that …
Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo
Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
The emergence of broadband Internet technologies, such as cable modem and digital subscriber line (DSL) systems, has reopened debates over how the Internet should be regulated. Advocates of network neutrality and open access to cable modem systems have proposed extending the regulatory regime developed to govern conventional telephone and narrowband Internet service to broadband. A critical analysis of the rationales traditionally invoked to justify the regulation of telecommunications networks--such as natural monopoly, network economic effects, vertical exclusion, and the dangers of ruinous competition--reveals that those rationales depend on empirical and theoretical preconditions that do not apply to broadband. In addition, …
Technological Due Process, Danielle Keats Citron
Technological Due Process, Danielle Keats Citron
Faculty Scholarship
Distinct and complementary procedures for adjudications and rulemaking lie at the heart of twentieth-century administrative law. Due process required agencies to provide individuals notice and an opportunity to be heard. Agencies could foreclose policy issues that individuals might otherwise raise in adjudications through public rulemaking. One system allowed focused advocacy; the other featured broad participation. Each procedural regime compensated for the normative limits of the other. Both depended on clear statements of reason.
The dichotomy between these procedural regimes has become outmoded. This century’s automated decision-making systems collapse individual adjudications into rulemaking while adhering to the procedural safeguards of neither. …
Science On Trial, Valerie P. Hans
Science On Trial, Valerie P. Hans
Cornell Law Faculty Publications
The increasing complexity of both criminal and civil jury trials raises a host of issues for lawyers and judges. For the litigator, the first question is whether a jury can be trusted with a case that turns on highly technical evidence. For the trial judge, there are decisions about the admissibility of expert testimony, whether it is based on sound science, and whether a jury is likely to be misled by scientific claims. Should the judge permit jury innovations such as note taking, question asking, and juror discussions of evidence during the trial, hoping to increase jury comprehension of the …
Agenda: Securing Environmental Flows On The Colorado River In An Era Of Climate Change: Issues, Challenges, And Opportunities, Western Water Policy Program, University Of Colorado Boulder. Natural Resources Law Center, Nature Conservancy (U.S.), Trout Unlimited, Environmental Defense (Organization), Western Water Assessment (Program), Western Resource Advocates, United States. Bureau Of Reclamation
Agenda: Securing Environmental Flows On The Colorado River In An Era Of Climate Change: Issues, Challenges, And Opportunities, Western Water Policy Program, University Of Colorado Boulder. Natural Resources Law Center, Nature Conservancy (U.S.), Trout Unlimited, Environmental Defense (Organization), Western Water Assessment (Program), Western Resource Advocates, United States. Bureau Of Reclamation
Securing Environmental Flows on the Colorado River in an Era of Climate Change: Issues, Challenges and Opportunities (March 21)
The Colorado River is the primary surface water resource of the Southwest, providing water to approximately 30 million residents. Studies and policy decisions associated with a recently completed EIS point to an ever-tightening water supply due to longstanding growth pressures exacerbated by significant climate change impacts. Given these trends, how can the river’s environmental needs be satisfied?
On March 21st, the Center’s Western Water Policy Program brought together four leading Colorado River experts along with an audience of approximately 70 water professionals to discuss “Securing Environmental Flows on the Colorado River in an Era of Climate Change: Issues, Challenges, and …
Mtic (Carousel) Fraud: Twelve Ways Forward; Two Ways 'Preferred' - Has The Technology-Based Administrative Solution Been Rejected?, Richard Thompson Ainsworth
Mtic (Carousel) Fraud: Twelve Ways Forward; Two Ways 'Preferred' - Has The Technology-Based Administrative Solution Been Rejected?, Richard Thompson Ainsworth
Faculty Scholarship
In a May 31, 2006 Communication to the Council, the European Parliament, and the European Economic and Social Committee, the European Commission indicated a need to develop a co-ordinated strategy to improve the fight against fiscal fraud [COM(2006) 254 final]. Although the Communication considers fiscal fraud broadly (VAT, excise duties and direct taxes) the most pressing need seems to be for a VAT strategy that will effectively deal with MTIC (Missing Trader Intra-Community) or carousel fraud. To this end the Commission hosted a conference: Fiscal Fraud - Tackling VAT Fraud: Possible Ways Forward. The March 29, 2007 conference was constructed …
Zappers: Tax Fraud, Technology And Terrorist Funding, Richard Thompson Ainsworth
Zappers: Tax Fraud, Technology And Terrorist Funding, Richard Thompson Ainsworth
Faculty Scholarship
"Zappers," or automated sales suppression devices, have brought unheard of efficiencies and economies of scale to a very simple tax fraud - skimming cash sales at point of sale (POS) terminals (electronic cash registers). Until recently the largest tax fraud case in Connecticut, also the "largest computer driven tax-evasion case in the nation," was a zapper case. Stew Leonard's Dairy in Norwalk Connecticut skimmed $17 million in receipts and hid the cash in St. Martin (a Caribbean island). Talal Chahine and his wife, Elfat El Aouar, owners of the La Shish restaurant chain in Detroit Michigan have the dubious honor …
Tales From The Crypt: Scientific, Ethical, And Legal Considerations For Biohistorical Analysis Of Deceased Historical Figures, Lori B. Andrews, Jordan K. Paradise
Tales From The Crypt: Scientific, Ethical, And Legal Considerations For Biohistorical Analysis Of Deceased Historical Figures, Lori B. Andrews, Jordan K. Paradise
All Faculty Scholarship
Biohistorical analysis involves using historic specimens of human remains or human material extracted or derived from historical artifacts to gather evidence about specimens that are identifiable or at least attributed to a historic figure at the time of the research. Biohistorical studies are being undertaken for myriad reasons, such as identification and authentication of remains, investigation into alleged criminal behavior, investigation into medical or psychological conditions, and even for purposes of commercialization. This article analyzes federal statutes, case law, and codes and guidelines from twenty-six professional organizations and societies informative to the field of biohistory. We surveyed the field, identified …
The Uneasy Relationship Between Science And Law: An Essay And Introduction, Lawrence Solan, Margaret Berger
The Uneasy Relationship Between Science And Law: An Essay And Introduction, Lawrence Solan, Margaret Berger
Faculty Scholarship
No abstract provided.
Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale
Internet Nondiscrimination Principles: Commercial Ethics For Carriers And Search Engines, Frank Pasquale
Faculty Scholarship
No abstract provided.
The Need For Speed (And Grace): Issues In A First-Inventor-To-File World, Margo A. Bagley
The Need For Speed (And Grace): Issues In A First-Inventor-To-File World, Margo A. Bagley
Faculty Articles
“One is the loneliest number that you’ll ever do.” This lyric applies to the United States which, since 1998, stands alone among the world’s patent systems in awarding patents to the first person to invent a claimed invention (first to invent, or “FTI”) as opposed to the first inventor to file an application claiming the invention (“FITF”). But its lonely days may soon be over: a provision in pending patent reform legislation will (if passed) move the United States from FTI to FITF and end its solitary stance.
Some argue that the U.S. already has a de facto FITF system, …
Turned On Its Head?: Norms, Freedom, And Acceptable Terms In Internet Contracting, Richard Warner
Turned On Its Head?: Norms, Freedom, And Acceptable Terms In Internet Contracting, Richard Warner
All Faculty Scholarship
Is the Internet turning contract law on its head? Many commentators contend it is. Precisely this issue arises in current controversies over end user license agreements (EULAs) and Terms of Use agreements (TOUs, the agreements governing our use of web sites). Commentators complain that, in both cases, the formation process unduly restricts buyers’ freedom; and, that sellers and web site owners exploit the process to impose terms that deprive consumers of important intellectual property and privacy rights. The courts ignore the criticisms and routinely enforce EULAs and TOUs. There is truth on both sides of this court/commentator divide. EULAs and …
The 'High Crime Area' Question: Requiring Verifiable And Quantifiable Evidence For Fourth Amendment Reasonable Suspicion Analysis, Andrew Ferguson, Damien Bernache
The 'High Crime Area' Question: Requiring Verifiable And Quantifiable Evidence For Fourth Amendment Reasonable Suspicion Analysis, Andrew Ferguson, Damien Bernache
Articles in Law Reviews & Other Academic Journals
This article proposes a legal framework to analyze the "high crime area" concept in Fourth Amendment reasonable suspicion challenges.Under existing Supreme Court precedent, reviewing courts are allowed to consider that an area is a "high crime area" as a factor to evaluate the reasonableness of a Fourth Amendment stop. See Illinois v. Wardlow, 528 U.S. 119 (2000). However, the Supreme Court has never defined a "high crime area" and lower courts have not reached consensus on a definition. There is no agreement on what a "high-crime area" is, whether it has geographic boundaries, whether it changes over time, whether it …
Open Code Governance, Danielle Keats Citron
Open Code Governance, Danielle Keats Citron
Faculty Scholarship
Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person’s eligibility for public benefits. Computer systems store sensitive personal information. These systems’ closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program’s source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2007-2008, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
In this survey, we discuss electronic contracting cases decided between July 1, 2007 and June 30, 2008. In addition to cases adding to the literature on the enforceability of online contracts, this survey includes cases discussing modification of online contracts, incorporation by reference, and unconscionability. We conclude that our common law is developing nicely to address the issues presented by internet contracting.
Case Comment - People V. Nelson: A Tale Of Two Statistics, David H. Kaye
Case Comment - People V. Nelson: A Tale Of Two Statistics, David H. Kaye
Journal Articles
In recent years, defendants who were identified as a result of a search through a database of DNA profiles have argued that the probability that a randomly selected person would match a crime-scene stain overstates the probative value of the match. The statistical literature is divided, with most statisticians who have written on the subject rejecting this claim. In People v. Nelson, the Supreme Court of California held that when the random-match probability is so small as to make it exceedingly unlikely that any unrelated individual has the incriminating DNA profile, this statistic is admissible in a database-search case. …
The Electronic Workplace, Ann C. Hodges
The Electronic Workplace, Ann C. Hodges
Law Faculty Publications
The American workplace of the twenty-first century is in the midst of a vast transformation not unlike the Industrial Revolution of the late nineteenth century. The United States has moved from a manufacturing-based economy to a knowledge-based economy. This new era has been variously denominated the Technological Revolution, the Electronic Revolution, or the Digital Revolution. Thomas Friedman has described the transformative change as a flattening of the world. Historians will almost certainly have a name for this monumental change in the economy, which, of course, is affecting not only the United Sttttes but many other countries in the world as …