Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Security

Discipline
Institution
Publication Year
Publication
File Type

Articles 1 - 30 of 168

Full-Text Articles in Law

Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky Dec 2023

Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky

UF Law Faculty Publications

This Article contends that the National Cybersecurity Strategy's software liability regime should incorporate two safe harbors. The first would shield software creators and vendors from liability for decisions related to design, implementation, and maintenance, as long as those choices follow enumerated best practices. The second—the “inverse safe harbor”—would have the opposite effect: coders and distributors who engaged in defined worst practices would automatically become liable. This Article explains the design, components, and justifications for these twin safe harbors. The software safe harbors are key parts of the overall design of the new liability regime and work in tandem with the …


Learning To Do Good While Doing Well 11-2023, Roger Williams University School Of Law Nov 2023

Learning To Do Good While Doing Well 11-2023, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


6th Annual Stonewall Lecture 2-2-2023, Roger Williams University School Of Law Feb 2023

6th Annual Stonewall Lecture 2-2-2023, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Regulatory Innovation And Permission To Fail: The Case Of Suptech, Hilary J. Allen Jan 2023

Regulatory Innovation And Permission To Fail: The Case Of Suptech, Hilary J. Allen

Articles in Law Reviews & Other Academic Journals

The recent U.S. Supreme Court decision West Virginia v. EPA has cast a pall over the discretion of administrative agencies at a very inopportune time. The private sector is currently adopting new technologies at a rapid pace, and as regulated industries become more technologically complex, administrative agencies must innovate technological tools of their own in order to keep up. Agencies will increasingly struggle to do their jobs without that innovation, but the private sector is afforded something that is both critical to the innovation process, and often denied to administrative agencies: “permission to fail.” Without some grace for the inevitable …


The Conflict Among African American Penal Interests: Rethinking Racial Equity In Criminal Procedure, Trevor George Gardner Jan 2023

The Conflict Among African American Penal Interests: Rethinking Racial Equity In Criminal Procedure, Trevor George Gardner

Scholarship@WashULaw

This Article argues that neither the criminal justice reform platform nor the penal abolition platform shows the ambition necessary to advance each of the primary African American interests in penal administration. It contends, first, that abolitionists have rightly called for a more robust conceptualization of racial equity in criminal procedure. Racial equity in criminal procedure should be considered in terms of both process at the level of the individual, and the number of criminal procedures at the level of the racial group—in terms of both the quality and “quantity” of stops, arrests, convictions, and the criminal sentencings that result in …


Introduction: There Must Be Something In The Water - Or The Bourbon - In Kentucky: Voting Rights In The Bluegrass State, Joshua A. Douglas Jan 2023

Introduction: There Must Be Something In The Water - Or The Bourbon - In Kentucky: Voting Rights In The Bluegrass State, Joshua A. Douglas

Law Faculty Scholarly Articles

Kentucky is best known for three things: horses, bourbon, and basketball. Add positive improvements for the right to vote to the list.

The Bluegrass state has made national news in recent years for its election rules. In 2020, many people in the media and advocacy world pointed to Kentucky as a model for administering an election during the COVID-19 pandemic. Under a bipartisan agreement between the Democratic Governor and Republican Secretary of State, Kentucky initially postponed the 2020 primary to provide for additional planning time. Then it implemented smart rules to ease access to vote-by-mail and made in-person voting safer …


Rwu Law News: The Newsletter Of Roger Williams University School Of Law, Michael M. Bowden, Gregory W. Bowman, Brooklyn Crockton Apr 2022

Rwu Law News: The Newsletter Of Roger Williams University School Of Law, Michael M. Bowden, Gregory W. Bowman, Brooklyn Crockton

Life of the Law School (1993- )

No abstract provided.


Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Mar 2022

Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Patents And Competition: Commercializing Innovation In The Global Ecosystem For 5g And The Internet Of Things, Thomas D. Grant, F. Scott Kieff Jan 2022

Patents And Competition: Commercializing Innovation In The Global Ecosystem For 5g And The Internet Of Things, Thomas D. Grant, F. Scott Kieff

GW Law Faculty Publications & Other Works

Times are changing as our global ecosystem for commercializing innovation helps bring new technologies to market, networks grow, interconnections and transactions become more complex around standards and otherwise, all to enable vast opportunities to improve the human condition, to further competition, and to improve broad access. The policies that governments use to structure their legal systems for intellectual property, especially patents, as well as for competition—or antitrust—continue to have myriad powerful impacts and raise intense debates over challenging questions. This Chapter explores a representative set of debates about policy approaches to patents, to elucidate particular ideas to bear in mind …


Women, Peace, And Security: A Human Rights Agenda?, Christine M. Chinkin Jan 2022

Women, Peace, And Security: A Human Rights Agenda?, Christine M. Chinkin

Book Chapters

The Women, Peace and Security (WPS) agenda emanates from the ground-breaking Security Council Resolution 1325 (2000) which centres upon bringing women’s experiences of armed conflict into decision and policymaking in the exercise of the Council’s primary responsibility for the maintenance of international peace and security. The chapter asks whether, despite its location within the Security Council, WPS can be understood as an international human rights agenda as envisaged by women activists who lobbied for the adoption of Resolution 1325. It traces the antecedents of WPS through women’s peace and human rights activism throughout the twentieth century. It examines the texts …


Law School News: Rwu Law Acquires Top Marine Law Journal 08-19-2021, Michael M. Bowden Jul 2021

Law School News: Rwu Law Acquires Top Marine Law Journal 08-19-2021, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Law School News: Adjunct Professor Of The Year 2021: David Coombs 05/19/2021, Michael M. Bowden May 2021

Law School News: Adjunct Professor Of The Year 2021: David Coombs 05/19/2021, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Sec No-Action Letter Request, Brian L. Frye Jan 2021

Sec No-Action Letter Request, Brian L. Frye

Law Faculty Scholarly Articles

No abstract provided.


Crime And The Mythology Of Police, Shima Baughman Jan 2021

Crime And The Mythology Of Police, Shima Baughman

Utah Law Faculty Scholarship

The legal policing literature has espoused one theory of policing after another in an effort to address the frayed relationship between police and the communities they serve. All have aimed to diagnose chronic policing problems in working towards structural police reform. The core principles emanating from these theoretical critiques is that the mistrust of police among communities of color results from maltreatment, illegitimacy and marginalization from the law and its enforcers. Remedies have included police training to encourage treating people with dignity, investing in body cameras and other technology, providing legal avenues to encourage constitutional action by police, and creating …


Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion Jan 2021

Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion

Faculty Scholarly Works

Months prior to the 2015 public disclosure of a data breach at the U.S. government’s Office of Personnel and Management (OPM), the Office of the Inspector General for OPM issued a report that identified significant deficiencies and material weaknesses in a number of the agency’s information systems and IT security programs. In response to the 2020 SolarWinds supply chain hack, attributed to Russia, calls are underway for inspectors general to conduct audits and inspections and to review prior inspector general assessments of information systems and vulnerabilities at federal agencies. The use of inspectors general to assess information system vulnerabilities and …


Built On Borders? Tensions With The Institution Liberalism (Thought It) Left Behind, Beth A. Simmons, Hein E. Goemans Jan 2021

Built On Borders? Tensions With The Institution Liberalism (Thought It) Left Behind, Beth A. Simmons, Hein E. Goemans

All Faculty Scholarship

The Liberal International Order is in crisis. While the symptoms are clear to many, the deep roots of this crisis remain obscured. We propose that the Liberal International Order is in tension with the older Sovereign Territorial Order, which is founded on territoriality and borders to create group identities, the territorial state, and the modern international system. The Liberal International Order, in contrast, privileges universality at the expense of groups and group rights. A recognition of this fundamental tension makes it possible to see that some crises that were thought to be unconnected have a common cause: the neglect of …


Contracting For Algorithmic Accountability, Cary Coglianese, Erik Lampmann Jan 2021

Contracting For Algorithmic Accountability, Cary Coglianese, Erik Lampmann

All Faculty Scholarship

As local, state, and federal governments increase their reliance on artificial intelligence (AI) decision-making tools designed and operated by private contractors, so too do public concerns increase over the accountability and transparency of such AI tools. But current calls to respond to these concerns by banning governments from using AI will only deny society the benefits that prudent use of such technology can provide. In this Article, we argue that government agencies should pursue a more nuanced and effective approach to governing the governmental use of AI by structuring their procurement contracts for AI tools and services in ways that …


“Time Is A-Wasting”: Making The Case For Cedaw Ratification By The United States, Rangita De Silva De Alwis, Melanne Verveer Jan 2021

“Time Is A-Wasting”: Making The Case For Cedaw Ratification By The United States, Rangita De Silva De Alwis, Melanne Verveer

All Faculty Scholarship

Since President Carter signed the Convention for the Elimination of All Forms of Discrimination Against Women (the “CEDAW” or the “Convention”) on July 17, 1980, the United States has failed to ratify the Convention time and again. As one of only a handful of countries that has not ratified the CEDAW, the United States is in the same company as Sudan, Somalia, Iran, Tonga, and Palau. When CEDAW ratification stalled yet again in 2002, then-Senator Joseph Biden lamented that “[t]ime is a-wasting.”

Writing in 2002, Harold Koh, former Assistant Secretary of State for Democracy, Human Rights, and Labor, bemoaned America’s …


Law School News: Mike Andrews '97 Nominated To U.S. Court Of Federal Claims 12-15-2020, Michael M. Bowden Dec 2020

Law School News: Mike Andrews '97 Nominated To U.S. Court Of Federal Claims 12-15-2020, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Rwu Law News: The Newsletter Of Roger Williams University School Of Law 12-2020, Barry Bridges, Michael M. Bowden, Nicole Dyszlewski, Louisa Fredey Dec 2020

Rwu Law News: The Newsletter Of Roger Williams University School Of Law 12-2020, Barry Bridges, Michael M. Bowden, Nicole Dyszlewski, Louisa Fredey

Life of the Law School (1993- )

No abstract provided.


Law School News: Introducing Rwu Law's Sixth Dean 07-01-2020, Michael M. Bowden Jul 2020

Law School News: Introducing Rwu Law's Sixth Dean 07-01-2020, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Law School News: Adjunct Professor Of The Year: David Coombs 05-13-2020, Michael M. Bowden May 2020

Law School News: Adjunct Professor Of The Year: David Coombs 05-13-2020, Michael M. Bowden

Life of the Law School (1993- )

No abstract provided.


Commentary To Professor Baker's Presentation, Gary Pulsinelli Apr 2020

Commentary To Professor Baker's Presentation, Gary Pulsinelli

Scholarly Works

No abstract provided.


The National Security Case For Breaking Up Big Tech, Ganesh Sitaraman Jan 2020

The National Security Case For Breaking Up Big Tech, Ganesh Sitaraman

Vanderbilt Law School Faculty Publications

In recent years, scholars, commentators, former tech company founders, and political leaders have made the case for breaking up and regulating big tech companies like Alphabet (the parent company of Google), Facebook, and Amazon. The proposals to break up and regulate big tech companies are specific: Unwind mergers, require tech platforms to separate from businesses that operate on the platform, regulate platforms with nondiscrimination principles drawn from public utilities and public accommodations laws, and adopt privacy regulations. Advocates for breaking up and regulating big tech hold that these companies have become a danger to the economy, society, and democracy. Opponents …


Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert Jan 2020

Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert

Articles, Book Chapters, & Popular Press

Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.

Now, research on adversarial …


Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar Jan 2020

Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar

Articles, Book Chapters, & Popular Press

In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …


Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar Jan 2020

Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar

Articles, Book Chapters, & Popular Press

This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …


Silenced Bodies: (En)Gendering Syrian Refugee Insecurity In Lebanon, Jessy Abouarab Mar 2019

Silenced Bodies: (En)Gendering Syrian Refugee Insecurity In Lebanon, Jessy Abouarab

FIU Electronic Theses and Dissertations

While there has been a shift in security studies from the security of states to that of people, realpolitik still takes place under the banner of an emerging discourse of ‘refugee crisis.’ Refugee insecurities are (en)gendered and experienced where their depth and breadth pose significant challenges to asylum seekers, neighboring host-states, and humanitarian agencies. To this end, this research captures the unique dynamics of a South-South refugee crisis in Lebanon, in which Syrians residents make up nearly one-third of its population. It applies a transnational feminist framework to trace how refugee security norms get defined, are managed, and how they …


Familiar Battles Yield Next Generation Victories, Karin Mika Mar 2019

Familiar Battles Yield Next Generation Victories, Karin Mika

Law Faculty Articles and Essays

No abstract provided.