Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 117

Full-Text Articles in Law

Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison Jan 2021

Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison

Articles

The soccer referee stands in for a judge. Soccer’s Video Assistant Referee (“VAR”) system stands in for algorithms that augment human deciders. Fair play stands in for justice. They are combined and set in a polycentric system of governance, with implications for designing, administering, and assessing human-machine combinations.


Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran Nov 2020

Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran

Articles

This article presents an in-depth analysis of the latent methodological issues that are as much a cause of U.S. federal court avoidance of foreign law as are judicial difficulties in obtaining foreign legal materials and difficulties in understanding foreign legal orders and languages. It explores Rule 44.1’s inadvertent introduction of a civil-law method into a common-law framework, and the results that have ensued, including an incomplete transition of foreign law from being an issue of fact to becoming an issue of law. It addresses the ways in which courts obtain information about foreign law today, suggesting among ...


Media Literacy Beyond The National Security Frame, Lili Levi Jan 2020

Media Literacy Beyond The National Security Frame, Lili Levi

Articles

No abstract provided.


Internet Architecture And Disability, Blake E. Reid Jan 2020

Internet Architecture And Disability, Blake E. Reid

Articles

The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive ...


Are Data Privacy Laws Trade Barriers?, Margot Kaminski Jan 2020

Are Data Privacy Laws Trade Barriers?, Margot Kaminski

Articles

No abstract provided.


The Uses And Abuses Of The Government's Tools Of Information Control, Helen Norton Jan 2019

The Uses And Abuses Of The Government's Tools Of Information Control, Helen Norton

Articles

No abstract provided.


Lessons From Literal Crashes For Code, Margot Kaminski Jan 2019

Lessons From Literal Crashes For Code, Margot Kaminski

Articles

No abstract provided.


Antitrust In Digital Markets, John M. Newman Jan 2019

Antitrust In Digital Markets, John M. Newman

Articles

Antitrust law has largely failed to address the challenges posed by digital markets. At the turn of the millennium, the antitrust enterprise engaged in intense debate over whether antitrust doctrine, much of it developed during a bygone era of smokestack industries, could or should evolve to address digital markets. Eventually, a consensus emerged: although the basic doctrine is supple enough to apply to new technologies, courts and enforcers should adopt a defendant-friendly, hands-off approach.

But this pro-defendant position is deeply- and dangerously- flawed. Economic theory, empirical research, and extant judicial and regulatory authority all contradict the prevailing views regarding power ...


Administrative Truth: Comments On Cortez’S Information Mischief, David Thaw Jan 2019

Administrative Truth: Comments On Cortez’S Information Mischief, David Thaw

Articles

This short essay responds to Professor Nathan Cortez’s argument describing an emerging “information policy” reflecting on the practices of President Donald J. Trump’s executive administration (the “Trump Administration”) regarding the development, release, and management of official information. Professor Cortez argues that viewed holistically, this information policy suggests a shift toward the use of information practices by administrative agencies for purposes other than “neutral principles” and rather focusing on a “more cynical [use] of government information.”

This argument may be well-founded, and the Trump Administration certainly has been criticized widely for the relationship between its public statements and widespread ...


Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton Jan 2019

Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton

Articles

In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with ...


Beyond Norms: Using International Economic Tools To Deter Malicious State-Sponsored Cyber Activities, Kathleen Claussen Jan 2018

Beyond Norms: Using International Economic Tools To Deter Malicious State-Sponsored Cyber Activities, Kathleen Claussen

Articles

In thinking about strategy and doctrine for cyberspace, one cannot ignore either the cyber domain's interaction with other domains or the applicability of existing legal tools to address cyberspace issues. This Comment focuses on the latter and argues that any discussion regarding deterrence and a playbook for consequences for cyber incidents by state actors ought necessarily to include a careful examination of existing plays, particularly where those incidents have an economic component as many do. Focusing on multilateral institutions, regional and bilateral trade and investment agreements, and unilateral tariff and non-tariff trade and investment tools, this Comment maintains that ...


What A Technical Services Librarian Wants Their Library Director To Know, Georgia Briscoe Jan 2018

What A Technical Services Librarian Wants Their Library Director To Know, Georgia Briscoe

Articles

Promoting the value of technical services librarians in the digital age.


Justice Beyond Dispute, Mary Anne Franks Jan 2018

Justice Beyond Dispute, Mary Anne Franks

Articles

No abstract provided.


The Evolution Of Entrepreneurial Finance: A New Typology, J. Brad Bernthal Jan 2018

The Evolution Of Entrepreneurial Finance: A New Typology, J. Brad Bernthal

Articles

There has been an explosion in new types of startup finance instruments. Whereas twenty years ago preferred stock dominated the field, startup companies and investors now use at least eight different instruments—six of which have only become widely used in the last decade. Legal scholars have yet to reflect upon the proliferation of instrument types in the aggregate. Notably missing is a way to organize instruments into a common framework that highlights their similarities and differences.

This Article makes four contributions. First, it catalogues the variety of startup investment forms. I describe novel instruments, such as revenue-based financing, which ...


Robotic Speakers And Human Listeners, Helen Norton Jan 2018

Robotic Speakers And Human Listeners, Helen Norton

Articles

In their new book, Robotica, Ron Collins and David Skover assert that we protect speech not so much because of its value to speakers but instead because of its affirmative value to listeners. If we assume that the First Amendment is largely, if not entirely, about serving listeners’ interests—in other words, that it’s listeners all the way down—what would a listener-centered approach to robotic speech require? This short symposium essay briefly discusses the complicated and sometimes even dark side of robotic speech from a listener-centered perspective.


Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott May 2017

Factors In Fairness And Emotion In Online Case Resolution Systems, Youyang Hou, Cliff Lampe, Maximilian Bulinski, J. J. Prescott

Articles

Courts are increasingly adopting online information and communication technology, creating a need to consider the potential consequences of these tools for the justice system. Using survey responses from 209 litigants who had recently used an online case resolution system, we investigate factors that influenced litigants’ experiences of fairness and emotional feelings toward court officials. Our results show that ease of using the online case resolution system, the outcome of the case, and a litigant’s perceptions of procedural justice are positively associated both with whether the litigant views the process as fair and whether the litigant ultimately feels positive emotions ...


Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski Jan 2017

Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski

Articles

Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis ...


An Expressive Theory Of Privacy Intrusions, Craig Konnoth Jan 2017

An Expressive Theory Of Privacy Intrusions, Craig Konnoth

Articles

The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."

Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by ...


Rules For Digital Radicals, Scott Skinner-Thompson Jan 2017

Rules For Digital Radicals, Scott Skinner-Thompson

Articles

No abstract provided.


Disruptive Platforms, Margot Kaminski Jan 2017

Disruptive Platforms, Margot Kaminski

Articles

No abstract provided.


Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello Jan 2017

Update Your Bookmarks! Great Sites For Effective Research, Nancy E. Vettorello

Articles

There are more than one billion websites available online. Many are useful tools for attorneys, so it makes sense to review and refresh your favorite bookmarks regularly. While none of the many free sites offer the sophisticated search abilities of fee-based research services, a few minutes spent exploring free sites can help researchers significantly narrow their searches once they turn to a fee-based system. Remember to always take advantage of the advancesearch option when available on a free site. Free sites are offering increasingly sophisticated search options, such as Boolean and proximity searches, which were previously exclusive to paid services.


"Revenge Porn" Reform: A View From The Front Lines, Mary Anne Franks Jan 2017

"Revenge Porn" Reform: A View From The Front Lines, Mary Anne Franks

Articles

The legal and social landscape of "revenge porn" has changed dramatically in the last few years. Before 2013, only three states criminalized the unauthorized disclosure of sexually explicit images of adults and few people had ever heard the ternm "revenge porn." As of July 2017, thirty-eight states and Washington, D.C. had criminalized the conduct; federal criminal legislation on the issue had been introduced in Congress; Google, Facebook, and Twitter had banned nonconsensual pornography from their platforms; and the term "revenge porn" had been added to the Merriam- Webster Dictionary. I have had the privilege of playing a role in ...


The Desert Of The Unreal: Inequality In Virtual And Augmented Reality, Mary Anne Franks Jan 2017

The Desert Of The Unreal: Inequality In Virtual And Augmented Reality, Mary Anne Franks

Articles

The world we live in is structured by inequality: of gender, race, class, sexual orientation, disability, and more. Virtual and augmented reality technologies hold out the promise of a more perfect world, one that offers us more stimulation, more connection, more freedom, more equality than the "real" world. But for such technologies to be truly innovative, they must move us beyond our current limitations and prejudices. When existing inequalities are unacknowledged and unaddressed in the "real" world, they tend to be replicated and augmented in virtual realities. We make new worlds based on who we are and what we do ...


Entrepreneurial Administration, Philip J. Weiser Jan 2017

Entrepreneurial Administration, Philip J. Weiser

Articles

A core failing of today’s administrative state and modern administrative law scholarship is the lack of imagination as to how agencies should operate. On the conventional telling, public agencies follow specific grants of regulatory authority, use the traditional tools of notice-and-comment rulemaking and adjudication, and are checked by judicial review. In reality, however, effective administration depends on entrepreneurial leadership that spearheads policy experimentation and trial-and-error problem-solving, including the development of regulatory programs that use non-traditional tools.

Entrepreneurial administration takes place both at public agencies and private entities, each of which can address regulatory challenges and earn regulatory authority as ...


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international ...


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread?

Through ...


U.S. Discovery In A Transnational And Digital Age And The Increasing Need For Comparative Analysis, Vivian Grosswald Curran Jan 2017

U.S. Discovery In A Transnational And Digital Age And The Increasing Need For Comparative Analysis, Vivian Grosswald Curran

Articles

U.S. Courts generally prefer applying the Federal Rules of Civil Procedure over The Hague Evidence Convention for the taking of documentary evidence located abroad. With respect to the French blocking statute with which the Supreme Court was dealing in the seminal case of Aérospatiale, and under the powerful influence of stare decisis, a line of cases developed dismissing the French blocking statute for having been intended by its legislature principally to thwart the sovereignty of the U.S. trial court, and never having been intended to be enforced. Criteria for the general assessment of blocking statutes have emerged from ...


The Secession Of The Successful: The Rise Of Amazon As Private Global Consumer Protection Regulator, Jane K. Winn Jan 2016

The Secession Of The Successful: The Rise Of Amazon As Private Global Consumer Protection Regulator, Jane K. Winn

Articles

In 2005, the Americans for Fair Electronic Commerce Transactions (“AFFECT”) coalition issued a list of 12 principles it hoped would contribute to a new consensus about what constitutes fairness in online consumer transactions. A decade later, a cursory review of different jurisdictions indicates that, while there has been little discernable progress in the direction of the principles in the United States, other jurisdictions such as the European Union have made more progress.

However, the one jurisdiction in the world that comes closest to implementing all 12 principles across the full spectrum of consumer transactions is not a government at all ...


When The Default Is No Penalty: Negotiating Privacy At The Ntia, Margot E. Kaminski Jan 2016

When The Default Is No Penalty: Negotiating Privacy At The Ntia, Margot E. Kaminski

Articles

Consumer privacy protection is largely within the purview of the Federal Trade Commission. In recent years, however, the National Telecommunications and Information Administration (NTIA) at the Department of Commerce has hosted multistakeholder negotiations on consumer privacy issues. The NTIA process has addressed mobile apps, facial recognition, and most recently, drones. It is meant to serve as a venue for industry self-regulation. Drawing on the literature on co-regulation and on penalty defaults, I suggest that the NTIA process struggles to successfully extract industry expertise and participation against a dearth of federal data privacy law and enforcement. This problem is most exacerbated ...


Authority And Authors And Codes, Michael J. Madison Jan 2016

Authority And Authors And Codes, Michael J. Madison

Articles

Contests over the meaning and application of the federal Computer Fraud and Abuse Act (“CFAA”) expose long-standing, complex questions about the sources and impacts of the concept of authority in law and culture. Accessing a computer network “without authorization” and by “exceeding authorized access” is forbidden by the CFAA. Courts are divided in their interpretation of this language in the statute. This Article first proposes to address the issue with an insight from social science research. Neither criminal nor civil liability under the CFAA should attach unless the alleged violator has transgressed some border or boundary that is rendered visible ...