Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (23)
- Privacy Law (21)
- National Security Law (20)
- International Law (19)
- Law and Society (19)
-
- Arts and Humanities (18)
- Science and Technology Law (16)
- Criminal Law (15)
- Legal Profession (14)
- Internet Law (13)
- Law and Politics (13)
- Legal Education (13)
- Constitutional Law (12)
- Human Rights Law (11)
- Law and Gender (11)
- Civil Rights and Discrimination (10)
- Computer Law (10)
- Military, War, and Peace (10)
- Administrative Law (9)
- Legislation (8)
- Physical Sciences and Mathematics (8)
- Public Affairs, Public Policy and Public Administration (8)
- Courts (7)
- First Amendment (7)
- Immigration Law (7)
- Law Enforcement and Corrections (7)
- Fourth Amendment (6)
- Intellectual Property Law (6)
- Judges (6)
- Institution
-
- Roger Williams University (20)
- University of Wollongong (19)
- George Washington University Law School (11)
- University of Pennsylvania Carey Law School (10)
- University of Colorado Law School (9)
-
- Boston University School of Law (7)
- American University Washington College of Law (5)
- Bowdoin College (5)
- University of Michigan Law School (5)
- University of Tennessee College of Law (5)
- University of Kentucky (4)
- University of Maryland Francis King Carey School of Law (4)
- University of Massachusetts School of Law (4)
- Georgetown University Law Center (3)
- Louisiana State University (3)
- Schulich School of Law, Dalhousie University (3)
- University of Washington School of Law (3)
- Western Kentucky University (3)
- Case Western Reserve University School of Law (2)
- Cleveland State University (2)
- Columbia Law School (2)
- New York Law School (2)
- Notre Dame Law School (2)
- Penn State Dickinson Law (2)
- Singapore Management University (2)
- Texas A&M University School of Law (2)
- University of Maine School of Law (2)
- Chicago-Kent College of Law (1)
- City University of New York (CUNY) (1)
- Cornell University Law School (1)
- Publication Year
- Publication
-
- Faculty Scholarship (13)
- Life of the Law School (1993- ) (13)
- All Faculty Scholarship (12)
- Faculty Publications (11)
- Faculty of Law, Humanities and the Arts - Papers (Archive) (11)
-
- GW Law Faculty Publications & Other Works (11)
- Articles (8)
- Faculty of Law - Papers (Archive) (8)
- Scholarly Works (7)
- Publications (6)
- George J. Mitchell Oral History Project (5)
- Law Faculty Scholarly Articles (4)
- Articles in Law Reviews & Other Academic Journals (3)
- Articles, Book Chapters, & Popular Press (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Journal Articles (3)
- Law Library Newsletters/Blog (3)
- Student Senate Enrolled Legislation (3)
- WKU Archives Records (3)
- Articles & Chapters (2)
- Book Chapters (2)
- Faculty Scholarly Works (2)
- Innovation in Western Water Law and Management (Summer Conference, June 5-7) (2)
- Law Faculty Articles and Essays (2)
- Law School Blogs (2)
- Research Collection Yong Pung How School Of Law (2)
- School of Law Conferences, Lectures & Events (2)
- All Faculty Publications (1)
- Australian Security and Intelligence Conference (1)
- Columbia Center on Sustainable Investment Staff Publications (1)
Articles 1 - 30 of 168
Full-Text Articles in Law
Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky
Shields Up For Software, Derek E. Bambauer, Melanie J. Teplinsky
UF Law Faculty Publications
This Article contends that the National Cybersecurity Strategy's software liability regime should incorporate two safe harbors. The first would shield software creators and vendors from liability for decisions related to design, implementation, and maintenance, as long as those choices follow enumerated best practices. The second—the “inverse safe harbor”—would have the opposite effect: coders and distributors who engaged in defined worst practices would automatically become liable. This Article explains the design, components, and justifications for these twin safe harbors. The software safe harbors are key parts of the overall design of the new liability regime and work in tandem with the …
Learning To Do Good While Doing Well 11-2023, Roger Williams University School Of Law
Learning To Do Good While Doing Well 11-2023, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
6th Annual Stonewall Lecture 2-2-2023, Roger Williams University School Of Law
6th Annual Stonewall Lecture 2-2-2023, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Regulatory Innovation And Permission To Fail: The Case Of Suptech, Hilary J. Allen
Regulatory Innovation And Permission To Fail: The Case Of Suptech, Hilary J. Allen
Articles in Law Reviews & Other Academic Journals
The recent U.S. Supreme Court decision West Virginia v. EPA has cast a pall over the discretion of administrative agencies at a very inopportune time. The private sector is currently adopting new technologies at a rapid pace, and as regulated industries become more technologically complex, administrative agencies must innovate technological tools of their own in order to keep up. Agencies will increasingly struggle to do their jobs without that innovation, but the private sector is afforded something that is both critical to the innovation process, and often denied to administrative agencies: “permission to fail.” Without some grace for the inevitable …
The Conflict Among African American Penal Interests: Rethinking Racial Equity In Criminal Procedure, Trevor George Gardner
The Conflict Among African American Penal Interests: Rethinking Racial Equity In Criminal Procedure, Trevor George Gardner
Scholarship@WashULaw
This Article argues that neither the criminal justice reform platform nor the penal abolition platform shows the ambition necessary to advance each of the primary African American interests in penal administration. It contends, first, that abolitionists have rightly called for a more robust conceptualization of racial equity in criminal procedure. Racial equity in criminal procedure should be considered in terms of both process at the level of the individual, and the number of criminal procedures at the level of the racial group—in terms of both the quality and “quantity” of stops, arrests, convictions, and the criminal sentencings that result in …
Introduction: There Must Be Something In The Water - Or The Bourbon - In Kentucky: Voting Rights In The Bluegrass State, Joshua A. Douglas
Introduction: There Must Be Something In The Water - Or The Bourbon - In Kentucky: Voting Rights In The Bluegrass State, Joshua A. Douglas
Law Faculty Scholarly Articles
Kentucky is best known for three things: horses, bourbon, and basketball. Add positive improvements for the right to vote to the list.
The Bluegrass state has made national news in recent years for its election rules. In 2020, many people in the media and advocacy world pointed to Kentucky as a model for administering an election during the COVID-19 pandemic. Under a bipartisan agreement between the Democratic Governor and Republican Secretary of State, Kentucky initially postponed the 2020 primary to provide for additional planning time. Then it implemented smart rules to ease access to vote-by-mail and made in-person voting safer …
Rwu Law News: The Newsletter Of Roger Williams University School Of Law, Michael M. Bowden, Gregory W. Bowman, Brooklyn Crockton
Rwu Law News: The Newsletter Of Roger Williams University School Of Law, Michael M. Bowden, Gregory W. Bowman, Brooklyn Crockton
Life of the Law School (1993- )
No abstract provided.
Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Patents And Competition: Commercializing Innovation In The Global Ecosystem For 5g And The Internet Of Things, Thomas D. Grant, F. Scott Kieff
Patents And Competition: Commercializing Innovation In The Global Ecosystem For 5g And The Internet Of Things, Thomas D. Grant, F. Scott Kieff
GW Law Faculty Publications & Other Works
Times are changing as our global ecosystem for commercializing innovation helps bring new technologies to market, networks grow, interconnections and transactions become more complex around standards and otherwise, all to enable vast opportunities to improve the human condition, to further competition, and to improve broad access. The policies that governments use to structure their legal systems for intellectual property, especially patents, as well as for competition—or antitrust—continue to have myriad powerful impacts and raise intense debates over challenging questions. This Chapter explores a representative set of debates about policy approaches to patents, to elucidate particular ideas to bear in mind …
Women, Peace, And Security: A Human Rights Agenda?, Christine M. Chinkin
Women, Peace, And Security: A Human Rights Agenda?, Christine M. Chinkin
Book Chapters
The Women, Peace and Security (WPS) agenda emanates from the ground-breaking Security Council Resolution 1325 (2000) which centres upon bringing women’s experiences of armed conflict into decision and policymaking in the exercise of the Council’s primary responsibility for the maintenance of international peace and security. The chapter asks whether, despite its location within the Security Council, WPS can be understood as an international human rights agenda as envisaged by women activists who lobbied for the adoption of Resolution 1325. It traces the antecedents of WPS through women’s peace and human rights activism throughout the twentieth century. It examines the texts …
Law School News: Rwu Law Acquires Top Marine Law Journal 08-19-2021, Michael M. Bowden
Law School News: Rwu Law Acquires Top Marine Law Journal 08-19-2021, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Law School News: Adjunct Professor Of The Year 2021: David Coombs 05/19/2021, Michael M. Bowden
Law School News: Adjunct Professor Of The Year 2021: David Coombs 05/19/2021, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Sec No-Action Letter Request, Brian L. Frye
Sec No-Action Letter Request, Brian L. Frye
Law Faculty Scholarly Articles
No abstract provided.
Crime And The Mythology Of Police, Shima Baughman
Crime And The Mythology Of Police, Shima Baughman
Utah Law Faculty Scholarship
The legal policing literature has espoused one theory of policing after another in an effort to address the frayed relationship between police and the communities they serve. All have aimed to diagnose chronic policing problems in working towards structural police reform. The core principles emanating from these theoretical critiques is that the mistrust of police among communities of color results from maltreatment, illegitimacy and marginalization from the law and its enforcers. Remedies have included police training to encourage treating people with dignity, investing in body cameras and other technology, providing legal avenues to encourage constitutional action by police, and creating …
Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion
Recognizing The Role Of Inspectors General In The U.S. Government's Cybersecurity Restructuring Task, Amy Gaudion
Faculty Scholarly Works
Months prior to the 2015 public disclosure of a data breach at the U.S. government’s Office of Personnel and Management (OPM), the Office of the Inspector General for OPM issued a report that identified significant deficiencies and material weaknesses in a number of the agency’s information systems and IT security programs. In response to the 2020 SolarWinds supply chain hack, attributed to Russia, calls are underway for inspectors general to conduct audits and inspections and to review prior inspector general assessments of information systems and vulnerabilities at federal agencies. The use of inspectors general to assess information system vulnerabilities and …
Built On Borders? Tensions With The Institution Liberalism (Thought It) Left Behind, Beth A. Simmons, Hein E. Goemans
Built On Borders? Tensions With The Institution Liberalism (Thought It) Left Behind, Beth A. Simmons, Hein E. Goemans
All Faculty Scholarship
The Liberal International Order is in crisis. While the symptoms are clear to many, the deep roots of this crisis remain obscured. We propose that the Liberal International Order is in tension with the older Sovereign Territorial Order, which is founded on territoriality and borders to create group identities, the territorial state, and the modern international system. The Liberal International Order, in contrast, privileges universality at the expense of groups and group rights. A recognition of this fundamental tension makes it possible to see that some crises that were thought to be unconnected have a common cause: the neglect of …
Contracting For Algorithmic Accountability, Cary Coglianese, Erik Lampmann
Contracting For Algorithmic Accountability, Cary Coglianese, Erik Lampmann
All Faculty Scholarship
As local, state, and federal governments increase their reliance on artificial intelligence (AI) decision-making tools designed and operated by private contractors, so too do public concerns increase over the accountability and transparency of such AI tools. But current calls to respond to these concerns by banning governments from using AI will only deny society the benefits that prudent use of such technology can provide. In this Article, we argue that government agencies should pursue a more nuanced and effective approach to governing the governmental use of AI by structuring their procurement contracts for AI tools and services in ways that …
“Time Is A-Wasting”: Making The Case For Cedaw Ratification By The United States, Rangita De Silva De Alwis, Melanne Verveer
“Time Is A-Wasting”: Making The Case For Cedaw Ratification By The United States, Rangita De Silva De Alwis, Melanne Verveer
All Faculty Scholarship
Since President Carter signed the Convention for the Elimination of All Forms of Discrimination Against Women (the “CEDAW” or the “Convention”) on July 17, 1980, the United States has failed to ratify the Convention time and again. As one of only a handful of countries that has not ratified the CEDAW, the United States is in the same company as Sudan, Somalia, Iran, Tonga, and Palau. When CEDAW ratification stalled yet again in 2002, then-Senator Joseph Biden lamented that “[t]ime is a-wasting.”
Writing in 2002, Harold Koh, former Assistant Secretary of State for Democracy, Human Rights, and Labor, bemoaned America’s …
Law School News: Mike Andrews '97 Nominated To U.S. Court Of Federal Claims 12-15-2020, Michael M. Bowden
Law School News: Mike Andrews '97 Nominated To U.S. Court Of Federal Claims 12-15-2020, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Rwu Law News: The Newsletter Of Roger Williams University School Of Law 12-2020, Barry Bridges, Michael M. Bowden, Nicole Dyszlewski, Louisa Fredey
Rwu Law News: The Newsletter Of Roger Williams University School Of Law 12-2020, Barry Bridges, Michael M. Bowden, Nicole Dyszlewski, Louisa Fredey
Life of the Law School (1993- )
No abstract provided.
Law School News: Introducing Rwu Law's Sixth Dean 07-01-2020, Michael M. Bowden
Law School News: Introducing Rwu Law's Sixth Dean 07-01-2020, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Law School News: Adjunct Professor Of The Year: David Coombs 05-13-2020, Michael M. Bowden
Law School News: Adjunct Professor Of The Year: David Coombs 05-13-2020, Michael M. Bowden
Life of the Law School (1993- )
No abstract provided.
Commentary To Professor Baker's Presentation, Gary Pulsinelli
Commentary To Professor Baker's Presentation, Gary Pulsinelli
Scholarly Works
No abstract provided.
The National Security Case For Breaking Up Big Tech, Ganesh Sitaraman
The National Security Case For Breaking Up Big Tech, Ganesh Sitaraman
Vanderbilt Law School Faculty Publications
In recent years, scholars, commentators, former tech company founders, and political leaders have made the case for breaking up and regulating big tech companies like Alphabet (the parent company of Google), Facebook, and Amazon. The proposals to break up and regulate big tech companies are specific: Unwind mergers, require tech platforms to separate from businesses that operate on the platform, regulate platforms with nondiscrimination principles drawn from public utilities and public accommodations laws, and adopt privacy regulations. Advocates for breaking up and regulating big tech hold that these companies have become a danger to the economy, society, and democracy. Opponents …
Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert
Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert
Articles, Book Chapters, & Popular Press
Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.
Now, research on adversarial …
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …
Silenced Bodies: (En)Gendering Syrian Refugee Insecurity In Lebanon, Jessy Abouarab
Silenced Bodies: (En)Gendering Syrian Refugee Insecurity In Lebanon, Jessy Abouarab
FIU Electronic Theses and Dissertations
While there has been a shift in security studies from the security of states to that of people, realpolitik still takes place under the banner of an emerging discourse of ‘refugee crisis.’ Refugee insecurities are (en)gendered and experienced where their depth and breadth pose significant challenges to asylum seekers, neighboring host-states, and humanitarian agencies. To this end, this research captures the unique dynamics of a South-South refugee crisis in Lebanon, in which Syrians residents make up nearly one-third of its population. It applies a transnational feminist framework to trace how refugee security norms get defined, are managed, and how they …
Familiar Battles Yield Next Generation Victories, Karin Mika
Familiar Battles Yield Next Generation Victories, Karin Mika
Law Faculty Articles and Essays
No abstract provided.