Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Security

Discipline
Institution
Publication Year
Publication
File Type

Articles 31 - 60 of 168

Full-Text Articles in Law

Gendering Islamophobia To Better Understand Immigration Laws, Catherine Dauvergne Feb 2019

Gendering Islamophobia To Better Understand Immigration Laws, Catherine Dauvergne

All Faculty Publications

This paper examines two recent developments in immigration law in Western liberal democracies: security exclusions and forced marriage provisions. It aims to consider how both of these settings are influenced by a pernicious Islamophobia and by gender. And, of course, by the intersection that creates a gendered version of Islamophobia. The overarching aim of the work is to consider whether and how human rights arguments are likely to be effective in immigration law. The work proceeds by developing the ideas of ‘unknowability’ and ‘unintelligibility’ as two ways to describe how Western law responds to Islam, and in so doing, contributes …


Law Library Blog (January 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2019

Law Library Blog (January 2019): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Adoption Of 1325 Resolution, Christine M. Chinkin Jan 2019

Adoption Of 1325 Resolution, Christine M. Chinkin

Book Chapters

UN Security Council Resolution 1325 was not adopted in a vacuum, but rather can be read with a number of other programs within the Security Council (SC) and UN architecture. These include other thematic resolutions, as well as broader policy initiatives. Taken together, these diverse strands sought to shift the understanding of the SC’s role in the maintenance of international peace and security, away from a classic state-oriented approach to one that places people at its center. The adoption of Resolution 1325, along with these other developments, had implications for the making of international law (the place of civil society …


The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans Jan 2019

The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans

Faculty Scholarly Works

Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.

Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …


Technology Regulation By Default: Platforms, Privacy, And The Cfpb, Rory Van Loo Jul 2018

Technology Regulation By Default: Platforms, Privacy, And The Cfpb, Rory Van Loo

Faculty Scholarship

In the absence of a technology-focused regulator, diverse administrative agencies have been forced to develop regulatory models for governing their sphere of the data economy. These largely uncoordinated efforts offer a laboratory of regulatory experimentation on governance architecture. This symposium essay explores what the Consumer Financial Protection Bureau (CFPB) has done in its first several years to regulate financial technology (“fintech”), in the context of broader technology-related concerns identified in the literature. It begins with a survey of what the CFPB has undertaken using more traditional administrative agency tools—enforcement and rulemaking—in areas such as privacy, consumer control over data, and …


The Future Of Law And Mobility, Daniel A. Crane Jun 2018

The Future Of Law And Mobility, Daniel A. Crane

Articles

With the launch of the new Journal of Law and Mobility, the University of Michigan is recognizing the transformative impact of new transportation and mobility technologies, from cars, to trucks, to pedestrians, to drones. The coming transition towards intelligent, automated, and connected mobility systems will transform not only the way people and goods move about, but also the way human safety, privacy, and security are protected, cities are organized, machines and people are connected, and the public and private spheres are defined.


Guns In The Library | Safety & Security, Jennifer Dixon Feb 2018

Guns In The Library | Safety & Security, Jennifer Dixon

Staff Publications

No abstract provided.


How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan Jan 2018

How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan

All Faculty Scholarship

A cost/benefit approach to privacy confronts two tradeoff issues. One is making appropriate tradeoffs between privacy and many goals served by the collection, distribution, and use of information. The other is making tradeoffs between investments in preventing unauthorized access to information and the variety of other goals that also make money, time, and effort demands. Much has been written about the first tradeoff. We focus on the second. The issue is critical. Data breaches occur at the rate of over three a day, and the aggregate social cost is extremely high. The puzzle is that security experts have long explained …


Reading Reflection Privacy And Security, Paul Sujith Rayi Jan 2018

Reading Reflection Privacy And Security, Paul Sujith Rayi

School of Information Studies - Post-doc and Student Scholarship

No abstract provided.


Borders And Bits, Jennifer Daskal Jan 2018

Borders And Bits, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …


Saving Face: Unfolding The Screen Of Chinese Privacy Law, Tiffany Li, Jill Bronfman, Zhou Zhou Jan 2018

Saving Face: Unfolding The Screen Of Chinese Privacy Law, Tiffany Li, Jill Bronfman, Zhou Zhou

Faculty Scholarship

Privacy is often a subjective value, taking on meaning from specific social, historical, and cultural contexts. Western privacy scholars have so far generally limited academic study to focus on Western ideals of privacy. However, privacy – or some notion of it – can be found in almost every culture and every nation, including the growing economic powerhouse that is the People’s Republic of China. Focusing on China as a case study of non-Western privacy norms is important today, given the rapid rise of the Chinese economy and its corresponding impact on worldwide cultural norms and law. Simply put, it is …


Maritime Security And The Blue Economy: Intersections And Interdependencies In The Indian Ocean, Michelle A. Voyer, Clive H. Schofield, Kamal Azmi, Robin M. Warner, Alistair Mcilgorm, Genevieve Quirk Jan 2018

Maritime Security And The Blue Economy: Intersections And Interdependencies In The Indian Ocean, Michelle A. Voyer, Clive H. Schofield, Kamal Azmi, Robin M. Warner, Alistair Mcilgorm, Genevieve Quirk

Faculty of Law, Humanities and the Arts - Papers (Archive)

Maritime security is essential to supporting the Blue Economy. Many maritime security forums have been key supporters of the Blue Economy concept, particularly in the Indian Ocean region (IOR). This paper will explore the co-evolution and co-dependence of Blue Economy and maritime security agendas, with a particular focus on the IOR. It identifies two primary interactions between Blue Economy and maritime security interests. Firstly, maritime security is an enabler of the Blue Economy, for example, through safeguarding navigation routes, providing important oceanographic data to marine industries and protecting rights over valuable marine resources and activities within claimed zones of maritime …


Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law Sep 2017

Newsroom: Representing Private Manning 09-18-2017, Edward Fitzpatrick, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Data Collection And The Regulatory State, Ahmed Ghappour Sep 2017

Data Collection And The Regulatory State, Ahmed Ghappour

Faculty Scholarship

The following remarks were given on January 27, 2017 during the Connecticut Law Review’s symposium, “Privacy, Security & Power: The State of Digital Surveillance.” Hillary Greene, the Zephaniah Swift Professor of Law at the University of Connecticut School of Law, offered introductory remarks and moderated the panel. The panel included Dr. Cooper, Associate Professor of Law and Director of the Program on Economics & Privacy at Antonin Scalia Law School at George Mason University, Professor Ghappour, Visiting Assistant Professor at UC Hastings College of the Law, Attorney Lieber, Senior Privacy Policy Counsel at Google, and Dr. Wu, Professor of Law …


Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick May 2017

Newsroom: As Manning Released, Trial Attorney Coombs Looks Back On Case, Looks Forward To Teaching Again At Rwu Law 05-17-2017, Edward Fitzpatrick

Life of the Law School (1993- )

No abstract provided.


Law Library Blog (March 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law Mar 2017

Law Library Blog (March 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein Feb 2017

Newsroom: Slate: Goldstein On Travel Ban 02-17-2017, Jared A. Goldstein

Life of the Law School (1993- )

No abstract provided.


Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein Jan 2017

Rwu First Amendment Blog: Jared A. Goldstein's Blog: Trump's Order Violates Bedrock Principles Of Roger Williams And Ri 01-30-2017, Jared A. Goldstein

Law School Blogs

No abstract provided.


Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law Jan 2017

Newsroom: Order Violates Roger Williams' Principles 01-30-2017, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog Jan 2017

Privacy's Trust Gap, Neil M. Richards, Woodrow Hartzog

Faculty Scholarship

It can be easy to get depressed about the state of privacy these days. In an age of networked digital information, many of us feel disempowered by the various governments, companies, and criminals trying to peer into our lives to collect our digital data trails. When so much is in flux, the way we think about an issue matters a great deal. Yet while new technologies abound, our ideas and thinking — as well as our laws — have lagged in grappling with the new problems raised by the digital revolution. In their important new book, Obfuscation: A User’s Guide …


"Toiling In The Danger And In The Morals Of Despair": Risk, Security, Danger, The Constitution, And The Clinician's Dilemma, Michael L. Perlin, Alison Lynch Jan 2017

"Toiling In The Danger And In The Morals Of Despair": Risk, Security, Danger, The Constitution, And The Clinician's Dilemma, Michael L. Perlin, Alison Lynch

Articles & Chapters

Persons institutionalized in psychiatric hospitals and “state schools” for those with intellectual disabilities have always been hidden from view. Such facilities were often constructed far from major urban centers, availability of transportation to such institutions was often limited, and those who were locked up were, to the public, faceless and often seen as less than human.

Although there has been regular litigation in the area of psychiatric (and intellectual disability) institutional rights for 40 years, much of this case law entirely ignores forensic patients – mostly those awaiting incompetency-to-stand trial determinations, those found permanently incompetent to stand trial, those acquitted …


Getting Specific About The Policy And Tools Of Securities Regulation: A Limited Response To Diversifying To Mitigate Risk: Can Dodd-Frank Section 342 Help Stabilize The Financial Sector?, Joan Macleod Heminway Jan 2017

Getting Specific About The Policy And Tools Of Securities Regulation: A Limited Response To Diversifying To Mitigate Risk: Can Dodd-Frank Section 342 Help Stabilize The Financial Sector?, Joan Macleod Heminway

Scholarly Works

No abstract provided.


Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy Jan 2017

Paying For Privacy And The Personal Data Economy, Stacy-Ann Elvy

Articles & Chapters

Growing demands for privacy and increases in the quantity and variety of consumer data have engendered various business offerings to allow companies, and in some instances consumers, to capitalize on these developments. One such example is the emerging “personal data economy” (PDE) in which companies, such as Datacoup, purchase data directly from individuals. At the opposite end of the spectrum, the “pay-for-privacy” (PFP) model requires consumers to pay an additional fee to prevent their data from being collected and mined for advertising purposes. This Article conducts a simultaneous in-depth exploration of the impact of burgeoning PDE and PFP models. It …


Qualitative Collective Case Study Of Targeted Violence Preparedness At Institutions Of Higher Education, Tim Gunter Dec 2016

Qualitative Collective Case Study Of Targeted Violence Preparedness At Institutions Of Higher Education, Tim Gunter

Doctoral Dissertations and Projects

An increase in targeted violence incidents (TVIs), primarily active shooter events, at institutions of higher education (IHEs) has exposed gaps in campus security plan preparation and exercises. The purpose of this qualitative collective case study was to discover barriers to and best practices of universities and colleges conducting security preparedness activities for TVIs. The theory that guided this study was vested interest theory which predicts how attitudes will influence behavior in a commitment to preparedness fundamentals. The setting for this study was two institutions of higher education along the East Coast of the United States. Data collection techniques included site …


Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky Jun 2016

Trending @ Rwu Law: Dean Yelnosky's Post: What The Tragedy In Orlando Means For Rwu Law 6/17/2016, Michael Yelnosky

Law School Blogs

No abstract provided.


13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law Apr 2016

13th Annual Diversity Symposium Dinner 04-07-2016, Roger Williams University School Of Law

School of Law Conferences, Lectures & Events

No abstract provided.


Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein Mar 2016

Newsroom: Closing Guantanamo Isn't Enough 03-14-2016, Jared Goldstein

Life of the Law School (1993- )

No abstract provided.


Guide To Land Contracts: Agricultural Projects, International Senior Lawyers Project, Kaitlin Y. Cordes, Sam Szoke-Burke Mar 2016

Guide To Land Contracts: Agricultural Projects, International Senior Lawyers Project, Kaitlin Y. Cordes, Sam Szoke-Burke

Columbia Center on Sustainable Investment Staff Publications

Agricultural investment contracts can be complex, with complicated provisions that are difficult to understand. This Guide provides explanations for a range of common provisions, and includes a Glossary of legal and technical terms. It assists non-lawyers in better understanding agricultural investment contracts, such as those available on the Open Land Contracts repository.

The Guide was prepared by International Senior Lawyers Project staff and volunteers in collaboration with the Columbia Center on Sustainable Investment.


How The War Against Isis Changed International Law, Michael P. Scharf Jan 2016

How The War Against Isis Changed International Law, Michael P. Scharf

Faculty Publications

In an effort to destroy ISIS, beginning in August 2014, the United States, assisted by a handful of other Western and Arab countries, carried out thousands of bombing sorties and cruise missile attacks against ISIS targets in Iraq and Syria. Iraq had consented to the airstrikes in its territory, but Syria had not, and Russia blocked the UN Security Council from authorizing force against ISIS in Syria. The United States invoked several different legal arguments to justify its airstrikes, including the right of humanitarian intervention, the right to use force in a failed state, and the right of hot pursuit, …


The Internet Of Heirlooms And Disposable Things, Woodrow Hartzog, Evan Selinger Jan 2016

The Internet Of Heirlooms And Disposable Things, Woodrow Hartzog, Evan Selinger

Faculty Scholarship

The Internet of Things (“IoT”) is here, and we seem to be going all in. We are trying to put a microchip in nearly every object that is not nailed down and even a few that are. Soon, your cars, toasters, toys, and even your underwear will be wired up to make your lives better. The general thought seems to be that “Internet connectivity makes good objects great.” While the IoT might be incredibly useful, we should proceed carefully. Objects are not necessarily better simply because they are connected to the Internet. Often, the Internet can make objects worse and …