Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (23)
- Privacy Law (21)
- National Security Law (20)
- International Law (19)
- Law and Society (19)
-
- Arts and Humanities (18)
- Science and Technology Law (16)
- Criminal Law (15)
- Legal Profession (14)
- Internet Law (13)
- Law and Politics (13)
- Legal Education (13)
- Constitutional Law (12)
- Human Rights Law (11)
- Law and Gender (11)
- Civil Rights and Discrimination (10)
- Computer Law (10)
- Military, War, and Peace (10)
- Administrative Law (9)
- Legislation (8)
- Physical Sciences and Mathematics (8)
- Public Affairs, Public Policy and Public Administration (8)
- Courts (7)
- First Amendment (7)
- Immigration Law (7)
- Law Enforcement and Corrections (7)
- Fourth Amendment (6)
- Intellectual Property Law (6)
- Judges (6)
- Institution
-
- Roger Williams University (20)
- University of Wollongong (19)
- George Washington University Law School (11)
- University of Pennsylvania Carey Law School (10)
- University of Colorado Law School (9)
-
- Boston University School of Law (7)
- American University Washington College of Law (5)
- Bowdoin College (5)
- University of Michigan Law School (5)
- University of Tennessee College of Law (5)
- University of Kentucky (4)
- University of Maryland Francis King Carey School of Law (4)
- University of Massachusetts School of Law (4)
- Georgetown University Law Center (3)
- Louisiana State University (3)
- Schulich School of Law, Dalhousie University (3)
- University of Washington School of Law (3)
- Western Kentucky University (3)
- Case Western Reserve University School of Law (2)
- Cleveland State University (2)
- Columbia Law School (2)
- New York Law School (2)
- Notre Dame Law School (2)
- Penn State Dickinson Law (2)
- Singapore Management University (2)
- Texas A&M University School of Law (2)
- University of Maine School of Law (2)
- Chicago-Kent College of Law (1)
- City University of New York (CUNY) (1)
- Cornell University Law School (1)
- Publication Year
- Publication
-
- Faculty Scholarship (13)
- Life of the Law School (1993- ) (13)
- All Faculty Scholarship (12)
- Faculty Publications (11)
- Faculty of Law, Humanities and the Arts - Papers (Archive) (11)
-
- GW Law Faculty Publications & Other Works (11)
- Faculty of Law - Papers (Archive) (8)
- Articles (7)
- Scholarly Works (7)
- Publications (6)
- George J. Mitchell Oral History Project (5)
- Law Faculty Scholarly Articles (4)
- Articles in Law Reviews & Other Academic Journals (3)
- Articles, Book Chapters, & Popular Press (3)
- Georgetown Law Faculty Publications and Other Works (3)
- Journal Articles (3)
- Law Library Newsletters/Blog (3)
- Student Senate Enrolled Legislation (3)
- WKU Archives Records (3)
- Articles & Chapters (2)
- Book Chapters (2)
- Faculty Articles (2)
- Faculty Scholarly Works (2)
- Innovation in Western Water Law and Management (Summer Conference, June 5-7) (2)
- Law Faculty Articles and Essays (2)
- Law School Blogs (2)
- Research Collection Yong Pung How School Of Law (2)
- School of Law Conferences, Lectures & Events (2)
- All Faculty Publications (1)
- Australian Security and Intelligence Conference (1)
Articles 31 - 60 of 168
Full-Text Articles in Law
Gendering Islamophobia To Better Understand Immigration Laws, Catherine Dauvergne
Gendering Islamophobia To Better Understand Immigration Laws, Catherine Dauvergne
All Faculty Publications
This paper examines two recent developments in immigration law in Western liberal democracies: security exclusions and forced marriage provisions. It aims to consider how both of these settings are influenced by a pernicious Islamophobia and by gender. And, of course, by the intersection that creates a gendered version of Islamophobia. The overarching aim of the work is to consider whether and how human rights arguments are likely to be effective in immigration law. The work proceeds by developing the ideas of ‘unknowability’ and ‘unintelligibility’ as two ways to describe how Western law responds to Islam, and in so doing, contributes …
Law Library Blog (January 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Adoption Of 1325 Resolution, Christine M. Chinkin
Adoption Of 1325 Resolution, Christine M. Chinkin
Book Chapters
UN Security Council Resolution 1325 was not adopted in a vacuum, but rather can be read with a number of other programs within the Security Council (SC) and UN architecture. These include other thematic resolutions, as well as broader policy initiatives. Taken together, these diverse strands sought to shift the understanding of the SC’s role in the maintenance of international peace and security, away from a classic state-oriented approach to one that places people at its center. The adoption of Resolution 1325, along with these other developments, had implications for the making of international law (the place of civil society …
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans
Faculty Scholarly Works
Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.
Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …
Technology Regulation By Default: Platforms, Privacy, And The Cfpb, Rory Van Loo
Technology Regulation By Default: Platforms, Privacy, And The Cfpb, Rory Van Loo
Faculty Scholarship
In the absence of a technology-focused regulator, diverse administrative agencies have been forced to develop regulatory models for governing their sphere of the data economy. These largely uncoordinated efforts offer a laboratory of regulatory experimentation on governance architecture. This symposium essay explores what the Consumer Financial Protection Bureau (CFPB) has done in its first several years to regulate financial technology (“fintech”), in the context of broader technology-related concerns identified in the literature. It begins with a survey of what the CFPB has undertaken using more traditional administrative agency tools—enforcement and rulemaking—in areas such as privacy, consumer control over data, and …
The Future Of Law And Mobility, Daniel A. Crane
The Future Of Law And Mobility, Daniel A. Crane
Articles
With the launch of the new Journal of Law and Mobility, the University of Michigan is recognizing the transformative impact of new transportation and mobility technologies, from cars, to trucks, to pedestrians, to drones. The coming transition towards intelligent, automated, and connected mobility systems will transform not only the way people and goods move about, but also the way human safety, privacy, and security are protected, cities are organized, machines and people are connected, and the public and private spheres are defined.
Guns In The Library | Safety & Security, Jennifer Dixon
Guns In The Library | Safety & Security, Jennifer Dixon
Staff Publications
No abstract provided.
How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan
How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan
All Faculty Scholarship
A cost/benefit approach to privacy confronts two tradeoff issues. One is making appropriate tradeoffs between privacy and many goals served by the collection, distribution, and use of information. The other is making tradeoffs between investments in preventing unauthorized access to information and the variety of other goals that also make money, time, and effort demands. Much has been written about the first tradeoff. We focus on the second. The issue is critical. Data breaches occur at the rate of over three a day, and the aggregate social cost is extremely high. The puzzle is that security experts have long explained …
Reading Reflection Privacy And Security, Paul Sujith Rayi
Reading Reflection Privacy And Security, Paul Sujith Rayi
School of Information Studies - Post-doc and Student Scholarship
No abstract provided.
Borders And Bits, Jennifer Daskal
Borders And Bits, Jennifer Daskal
Articles in Law Reviews & Other Academic Journals
Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …
Saving Face: Unfolding The Screen Of Chinese Privacy Law, Tiffany Li, Jill Bronfman, Zhou Zhou
Saving Face: Unfolding The Screen Of Chinese Privacy Law, Tiffany Li, Jill Bronfman, Zhou Zhou
Faculty Scholarship
Privacy is often a subjective value, taking on meaning from specific social, historical, and cultural contexts. Western privacy scholars have so far generally limited academic study to focus on Western ideals of privacy. However, privacy – or some notion of it – can be found in almost every culture and every nation, including the growing economic powerhouse that is the People’s Republic of China. Focusing on China as a case study of non-Western privacy norms is important today, given the rapid rise of the Chinese economy and its corresponding impact on worldwide cultural norms and law. Simply put, it is …
Maritime Security And The Blue Economy: Intersections And Interdependencies In The Indian Ocean, Michelle A. Voyer, Clive H. Schofield, Kamal Azmi, Robin M. Warner, Alistair Mcilgorm, Genevieve Quirk
Maritime Security And The Blue Economy: Intersections And Interdependencies In The Indian Ocean, Michelle A. Voyer, Clive H. Schofield, Kamal Azmi, Robin M. Warner, Alistair Mcilgorm, Genevieve Quirk
Faculty of Law, Humanities and the Arts - Papers (Archive)
Maritime security is essential to supporting the Blue Economy. Many maritime security forums have been key supporters of the Blue Economy concept, particularly in the Indian Ocean region (IOR). This paper will explore the co-evolution and co-dependence of Blue Economy and maritime security agendas, with a particular focus on the IOR. It identifies two primary interactions between Blue Economy and maritime security interests. Firstly, maritime security is an enabler of the Blue Economy, for example, through safeguarding navigation routes, providing important oceanographic data to marine industries and protecting rights over valuable marine resources and activities within claimed zones of maritime …
Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law
Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Data Collection And The Regulatory State, Ahmed Ghappour
Data Collection And The Regulatory State, Ahmed Ghappour
Faculty Scholarship
The following remarks were given on January 27, 2017 during the Connecticut Law Review’s symposium, “Privacy, Security & Power: The State of Digital Surveillance.” Hillary Greene, the Zephaniah Swift Professor of Law at the University of Connecticut School of Law, offered introductory remarks and moderated the panel. The panel included Dr. Cooper, Associate Professor of Law and Director of the Program on Economics & Privacy at Antonin Scalia Law School at George Mason University, Professor Ghappour, Visiting Assistant Professor at UC Hastings College of the Law, Attorney Lieber, Senior Privacy Policy Counsel at Google, and Dr. Wu, Professor of Law …
Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick
Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick
Life of the Law School (1993- )
No abstract provided.
Law Library Blog (March 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (March 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein
Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein
Life of the Law School (1993- )
No abstract provided.
Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein
Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein
Law School Blogs
No abstract provided.
Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law
Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog
Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog
Faculty Scholarship
It can be easy to get depressed about the state of privacy these days. In an age of networked digital information, many of us feel disempowered by the various governments, companies, and criminals trying to peer into our lives to collect our digital data trails. When so much is in flux, the way we think about an issue matters a great deal. Yet while new technologies abound, our ideas and thinking — as well as our laws — have lagged in grappling with the new problems raised by the digital revolution. In their important new book, Obfuscation: A User’s Guide …
"Toiling In The Danger And In The Morals Of Despair": Risk, Security, Danger, The Constitution, And The Clinician's Dilemma, Michael L. Perlin, Alison Lynch
"Toiling In The Danger And In The Morals Of Despair": Risk, Security, Danger, The Constitution, And The Clinician's Dilemma, Michael L. Perlin, Alison Lynch
Articles & Chapters
Persons institutionalized in psychiatric hospitals and “state schools” for those with intellectual disabilities have always been hidden from view. Such facilities were often constructed far from major urban centers, availability of transportation to such institutions was often limited, and those who were locked up were, to the public, faceless and often seen as less than human.
Although there has been regular litigation in the area of psychiatric (and intellectual disability) institutional rights for 40 years, much of this case law entirely ignores forensic patients – mostly those awaiting incompetency-to-stand trial determinations, those found permanently incompetent to stand trial, those acquitted …
Getting Specific About The Policy And Tools Of Securities Regulation: A Limited Response To Diversifying To Mitigate Risk: Can Dodd-Frank Section 342 Help Stabilize The Financial Sector?, Joan Macleod Heminway
Getting Specific About The Policy And Tools Of Securities Regulation: A Limited Response To Diversifying To Mitigate Risk: Can Dodd-Frank Section 342 Help Stabilize The Financial Sector?, Joan Macleod Heminway
Scholarly Works
No abstract provided.
Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy
Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy
Articles & Chapters
Growing demands for privacy and increases in the quantity and variety of consumer data have engendered various business offerings to allow companies, and in some instances consumers, to capitalize on these developments. One such example is the emerging “personal data economy” (PDE) in which companies, such as Datacoup, purchase data directly from individuals. At the opposite end of the spectrum, the “pay-for-privacy” (PFP) model requires consumers to pay an additional fee to prevent their data from being collected and mined for advertising purposes. This Article conducts a simultaneous in-depth exploration of the impact of burgeoning PDE and PFP models. It …
Qualitative Collective Case Study Of Targeted Violence Preparedness At Institutions Of Higher Education, Tim Gunter
Qualitative Collective Case Study Of Targeted Violence Preparedness At Institutions Of Higher Education, Tim Gunter
Doctoral Dissertations and Projects
An increase in targeted violence incidents (TVIs), primarily active shooter events, at institutions of higher education (IHEs) has exposed gaps in campus security plan preparation and exercises. The purpose of this qualitative collective case study was to discover barriers to and best practices of universities and colleges conducting security preparedness activities for TVIs. The theory that guided this study was vested interest theory which predicts how attitudes will influence behavior in a commitment to preparedness fundamentals. The setting for this study was two institutions of higher education along the East Coast of the United States. Data collection techniques included site …
Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky
Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky
Law School Blogs
No abstract provided.
13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law
13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein
Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein
Life of the Law School (1993- )
No abstract provided.
Guide To Land Contracts: Agricultural Projects, International Senior Lawyers Project, Kaitlin Y. Cordes, Sam Szoke-Burke
Guide To Land Contracts: Agricultural Projects, International Senior Lawyers Project, Kaitlin Y. Cordes, Sam Szoke-Burke
Columbia Center on Sustainable Investment Staff Publications
Agricultural investment contracts can be complex, with complicated provisions that are difficult to understand. This Guide provides explanations for a range of common provisions, and includes a Glossary of legal and technical terms. It assists non-lawyers in better understanding agricultural investment contracts, such as those available on the Open Land Contracts repository.
The Guide was prepared by International Senior Lawyers Project staff and volunteers in collaboration with the Columbia Center on Sustainable Investment.
How The War Against Isis Changed International Law, Michael P. Scharf
How The War Against Isis Changed International Law, Michael P. Scharf
Faculty Publications
In an effort to destroy ISIS, beginning in August 2014, the United States, assisted by a handful of other Western and Arab countries, carried out thousands of bombing sorties and cruise missile attacks against ISIS targets in Iraq and Syria. Iraq had consented to the airstrikes in its territory, but Syria had not, and Russia blocked the UN Security Council from authorizing force against ISIS in Syria. The United States invoked several different legal arguments to justify its airstrikes, including the right of humanitarian intervention, the right to use force in a failed state, and the right of hot pursuit, …
The Internet Of Heirlooms And Disposable Things, Woodrow Hartzog, Evan Selinger
The Internet Of Heirlooms And Disposable Things, Woodrow Hartzog, Evan Selinger
Faculty Scholarship
The Internet of Things (“IoT”) is here, and we seem to be going all in. We are trying to put a microchip in nearly every object that is not nailed down and even a few that are. Soon, your cars, toasters, toys, and even your underwear will be wired up to make your lives better. The general thought seems to be that “Internet connectivity makes good objects great.” While the IoT might be incredibly useful, we should proceed carefully. Objects are not necessarily better simply because they are connected to the Internet. Often, the Internet can make objects worse and …