Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Law
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Military Cyber Affairs
Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …
Revolt Against The U.S. Hegemony: Judicial Divergence In Cyberspace, Dongsheng Zang
Revolt Against The U.S. Hegemony: Judicial Divergence In Cyberspace, Dongsheng Zang
Articles
This Article contributes to our understanding of the current state of cyber law. The global perspective demonstrates an almost uniform response to the U.S. law in cyberspace from all of America's major trading partners. In the past, comparative studies tended to focus on a single jurisdiction-typically, the European Union-and compared it with the United States. This approach, informative as it was, significantly understated the gravity of the differences between that jurisdiction and the United States. Fundamentally, it was based on an American-centric outlook with primary interests in building convergence models. In cyberspace, however, this is simply not helpful. In recent …
Technologies Of Servitude Understanding Firmware Tpms As Interests In Personal Property, Anthony D. Rosborough
Technologies Of Servitude Understanding Firmware Tpms As Interests In Personal Property, Anthony D. Rosborough
Canadian Journal of Law and Technology
Widespread computerization and embedded system design has facilitated the pervasive and latent implementation of technological protection measures (‘‘TPMs”) to restrict device firmware access. Often referred to as ‘‘digital locks,” these restrictions impose a whole host of limitations on how owners use and manage the increasing number of products and devices in which they are incorporated. In many cases, TPM restrictions can prevent activities with social, environmental, and economical benefits, including repair, repurposing, and interoperability. In response, governments around the world are now revisiting and scrutinizing their TPM anti-circumvention laws within copyright and competition policy. Beyond these perspectives, this article looks …
A Compulsory Solution To The Machine Problem, Cole G. Merritt
A Compulsory Solution To The Machine Problem, Cole G. Merritt
Vanderbilt Law School Faculty Publications
Artificial Intelligence (AI) is already disrupting and will likely continue to disrupt many industries. Despite the role AI already plays, AI systems are becoming increasingly powerful. Ultimately, these systems may become a powerful tool that can lead to the discovery of important inventions or significantly reduce the time required to discover these inventions. Even now, AI systems are independently inventing. However, the resulting AI-generated inventions are unable to receive patent protection under current US patent law. This unpatentability may lead to inefficient results and ineffectively serves the goals of patent law.
To embrace the development and power of AI, Congress …