Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Criminal Law (32)
- Criminal Procedure (12)
- Property Law and Real Estate (10)
- Legislation (9)
- Torts (9)
-
- Intellectual Property Law (8)
- Banking and Finance Law (7)
- Law and Economics (6)
- Common Law (5)
- Jurisprudence (5)
- Antitrust and Trade Regulation (4)
- Evidence (4)
- Law Enforcement and Corrections (4)
- Law and Society (4)
- Social and Behavioral Sciences (4)
- State and Local Government Law (4)
- Business Organizations Law (3)
- Commercial Law (3)
- Comparative and Foreign Law (3)
- Computer Law (3)
- Constitutional Law (3)
- Consumer Protection Law (3)
- Contracts (3)
- Courts (3)
- Fourteenth Amendment (3)
- Labor and Employment Law (3)
- Science and Technology Law (3)
- Transportation Law (3)
- Business (2)
- Institution
-
- University of Michigan Law School (27)
- SelectedWorks (20)
- Selected Works (11)
- Fordham Law School (6)
- University of South Carolina (4)
-
- Chicago-Kent College of Law (3)
- Cleveland State University (3)
- Touro University Jacob D. Fuchsberg Law Center (3)
- University of Missouri School of Law (3)
- BLR (2)
- Georgia State University College of Law (2)
- Maurer School of Law: Indiana University (2)
- Notre Dame Law School (2)
- Schulich School of Law, Dalhousie University (2)
- University of Baltimore Law (2)
- University of Florida Levin College of Law (2)
- University of Georgia School of Law (2)
- Brooklyn Law School (1)
- Columbia Law School (1)
- Cornell University Law School (1)
- Duke Law (1)
- Florida State University College of Law (1)
- Georgetown University Law Center (1)
- Liberty University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Northwestern Pritzker School of Law (1)
- Roger Williams University (1)
- Seattle University School of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- Publication Year
- Publication
-
- Michigan Law Review (25)
- Carrie Leonetti (12)
- Alex Steel (10)
- All Faculty Scholarship (5)
- Faculty Publications (4)
-
- Fordham Law Review (4)
- South Carolina Law Review (4)
- Touro Law Review (3)
- Articles (2)
- Articles by Maurer Faculty (2)
- Bernadette Atuahene (2)
- Cleveland State Law Review (2)
- ExpressO (2)
- Faculty Scholarship (2)
- Fordham Intellectual Property, Media and Entertainment Law Journal (2)
- Georgia Journal of International & Comparative Law (2)
- Georgia State University Law Review (2)
- Innis Christie Collection (2)
- Notre Dame Journal on Emerging Technologies (2)
- Bart J Wilson (1)
- Bobby L. Dexter (1)
- Brooklyn Journal of Corporate, Financial & Commercial Law (1)
- Cornell Law Faculty Publications (1)
- David C. Gray (1)
- Donald J. Kochan (1)
- Eduardo M. Peñalver (1)
- Elizabeth A Rowe (1)
- Erik Ugland (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Justin Schwartz (1)
- Publication Type
- File Type
Articles 1 - 30 of 114
Full-Text Articles in Law
America’S “Kia Boys”: The Problem, Responses, And Recommendations, Drew Thornley
America’S “Kia Boys”: The Problem, Responses, And Recommendations, Drew Thornley
Seattle University Law Review SUpra
The landscape of automobile theft in the United States has undergone a dramatic transformation, marked by a notable surge in the theft of Kia and Hyundai vehicles. Once regarded as a routine occurrence, car thefts have taken on a novel dimension, propelled by a phenomenon driven by digital culture and social media virality. The thefts of these specific car brands have evolved into what is now widely recognized as the "Kia Challenge," a term echoing across popular platforms like TikTok. In this challenge, young teenage individuals, often referred to as the "Kia Boys" or variations thereof, orchestrate daring car heists, …
Note: Nft Art Heists: Analyzing Nfts Under U.S. Law And International Conventions On Art Theft, Kevin D. Brum
Note: Nft Art Heists: Analyzing Nfts Under U.S. Law And International Conventions On Art Theft, Kevin D. Brum
Notre Dame Journal on Emerging Technologies
The non-fungible token (“NFT”) is a type of digital asset that is usually associated with an image and has a unique identifier. An NFT cannot be copied or reproduced, and records of NFT transactions are stored on the blockchain. NFTs are a recent innovation and have swept the world by storm. NFT sales tripled from 2019 to 2020 and DappRadar—the premier platform for hosting decentralized NFT portfolio management applications—estimates that NFT sales hit twenty-five billion dollars in 2021. Many NFTs appear to be artistic works and, either individually or in a collection, can be given away for free, sold for …
United States Of America As The Global Steward, Grant Fuller
United States Of America As The Global Steward, Grant Fuller
Liberty University Journal of Statesmanship & Public Policy
The principle of subsidiarity states that local communities are best equipped to govern most of their affairs. In an increasingly connected world, this idea gets contested frequently. Since World War II, the world has experienced relative peace due to U.S. precedence. Today, we see U.S. leadership challenged by global players like China, which is doing so in a manner that prioritizes their people and goals. In order to maintain relevance, the United States must revisit trade policy, monetary policy, fiscal policy, and national security policy.
Hb 219 - Venue For Money Laundering And Theft Involving Digital Currency, Samuel P. Robertson, Lindsey N. Smith
Hb 219 - Venue For Money Laundering And Theft Involving Digital Currency, Samuel P. Robertson, Lindsey N. Smith
Georgia State University Law Review
The Act creates venue in cases of money laundering and theft that involve the transfer of digital currency by establishing that the crime may be considered to have happened wherever power was exercised over the property, wherever an act in furtherance of the crime occurred, or wherever the victim resides.
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn
Military Cyber Affairs
Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …
Theft, Extortion, And The Constitution: Land Use Practice Needs An Ethical Infusion, Michael M. Berger
Theft, Extortion, And The Constitution: Land Use Practice Needs An Ethical Infusion, Michael M. Berger
Touro Law Review
There are many ways in which property owners/developers interact with regulators. To the extent that texts and articles deal with the ethical duties of the regulators, they tend to focus on things like conflicts of interest. But there is more. This article will examine numerous other ways in which regulators may run afoul of ethical practice in dealing with those whom they regulate
Note: Improving The Defend Trade Secrets Act Of 2016: Against Preempting State Trade Secret Law, Victoria Hanson
Note: Improving The Defend Trade Secrets Act Of 2016: Against Preempting State Trade Secret Law, Victoria Hanson
Notre Dame Journal on Emerging Technologies
In order to better protect companies from losing their valuable trade secrets and prevent irreparable harm, Congress enacted the Defend Trade Secrets Act of 2016 (DTSA),8 the first federal civil protection given for trade secrets. In this paper, I argue that the DTSA has indeed not met its supposed goals, but the solution does not lie in preempting state law. Firstly, I explain the history, goals, and provisions of the DTSA and how it has failed to meet the original goals over the past three years. Secondly, I explain the argument for the DTSA to preempt state law and its …
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Life of the Law School (1993- )
No abstract provided.
The Issues Of Responsibility For Theft Crimes In Some Foreign Countries, T. Xasanov
The Issues Of Responsibility For Theft Crimes In Some Foreign Countries, T. Xasanov
Review of law sciences
This article presents a comparative legal analysis of the issues of responsibility for one of the most common crimes in the world – theft in the criminal codes of some foreign countries, given appropriate recommendations for improving the norms of the Criminal Code of the Republic of Uzbekistan, providing for responsibility for this crime.
The Misconstruction Of The Deductions For Business And Personal Casualty Losses, Jeffrey H. Kahn
The Misconstruction Of The Deductions For Business And Personal Casualty Losses, Jeffrey H. Kahn
Scholarly Publications
Losses suffered on an individual's personally used property generally are not deductible. Even after the changes made by the 2017 Tax Cuts and Jobs Act, in two circumstances an exception to this rule applies when "such losses arise from.fire, storm, shipwreck, or other casualty, or from theft." The principal issue that arises is determining the meaning of the term "other casualty." Taking what they deemed to be the common elements in the three explicitly identified casualties, the courts and the Internal Revenue Service determined that an event will qualify as an "other casualty" only if it is "sudden," "unusual," and …
Spite: Legal And Social Implications, Jeffrey L. Harrison
Spite: Legal And Social Implications, Jeffrey L. Harrison
UF Law Faculty Publications
Spite is not a simple concept. The same actions may be motivated by a desire to harm others as a source of the actor’s satisfaction. They may also be a reaction to a personal sense of injustice. Finally, spite-like actions are consistent with simply righting a wrong. This Article makes the case that spite, in its worst from, is comparable to theft. It is a taking of someone’s sense of well-being without consent. It also claims that the purchase of positional goods is ultimately spite driven. It canvasses tort law, contracts, tax law, trademark, and criminal law in an effort …
Provider Liability And Medical Identity Theft: Can I Get Your (Insurance) Number?, Thomas Clifford
Provider Liability And Medical Identity Theft: Can I Get Your (Insurance) Number?, Thomas Clifford
Northwestern Journal of Law & Social Policy
No abstract provided.
Some Comparative Legal History: Robbery And Brigandage, Bernard S. Jackson
Some Comparative Legal History: Robbery And Brigandage, Bernard S. Jackson
Georgia Journal of International & Comparative Law
No abstract provided.
Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar
Carrots And Sticks In Cyberspace: Addressing Key Issues In The Cybersecurity Information Sharing Act Of 2015, Jamil N. Jaffar
South Carolina Law Review
No abstract provided.
The Problem Of Appropriations Riders: The Bipartisan Budget Bill Of 2013 As A Case Study, Irene Scharf
The Problem Of Appropriations Riders: The Bipartisan Budget Bill Of 2013 As A Case Study, Irene Scharf
Faculty Publications
This article tells the story of the enactment of the bill containing Section 2013. It also provides context for Congress's widespread practice of inserting substantive provisions into appropriations bills, and argues that this practice is inappropriate and counterproductive. Enacted in haste, at the end of a lengthy and historically contentious legislative session plagued by threats of an unfunded government, Section 203 was slipped into a bill about a wholly different topic - "keeping the government open and functioning" - without input from key legislators or stakeholders. Hence, its difficulties were foreseeable.
Part II of this piece offers background about the …
Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo
Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo
Brooklyn Journal of Corporate, Financial & Commercial Law
Trade secrets are one of a corporation’s most valuable assets. However, they lack adequate protection under federal law, leaving them vulnerable to theft and misappropriation. As technology advances, it becomes easier and less time consuming for individuals and entities to access and steal trade secrets to a corporation’s detriment. Most often these thefts involve stealing trade secrets in an intangible form. Current legislation fails to adequately protect intangible trade secrets, leaving them vulnerable to theft. An amendment to the National Stolen Property Act that encompasses intangible trade secrets would close a loophole that currently exists relating to intangible assets, allowing …
United States - Mexican Relations - 1981 Convention For Recovery And Return Of Stolen Vehicles And Aircraft - Agreement Replaces 1936 Convention And Clarifies Process For Recovery Of Stolen Vehicles, J. Kennard Neal
Georgia Journal of International & Comparative Law
No abstract provided.
Keepings, Donald J. Kochan
Keepings, Donald J. Kochan
Donald J. Kochan
Property Outlaws, Eduardo Peñalver, Sonia Katyal
Property Outlaws, Eduardo Peñalver, Sonia Katyal
Eduardo M. Peñalver
Most people do not hold those who intentionally flout property laws in particularly high regard. The overridingly negative view of the property lawbreaker as a wrong-doer comports with the nearly sacrosanct status of property rights within our characteristically individualist, capitalist, political culture. This dim view of property lawbreakers is also shared to a large degree by property theorists, many of whom regard property rights as a fixed constellation of allocative entitlements that collectively produce stability and order through ownership. In this Article, we seek to rehabilitate, at least to a degree, the maligned character of the intentional property lawbreaker, and …
Exchange, Theft And The Social Formation Of Property, Bart Wilson, Erik Kimbrough, Vernon Smith
Exchange, Theft And The Social Formation Of Property, Bart Wilson, Erik Kimbrough, Vernon Smith
Bart J Wilson
No abstract provided.
Protecting Cultural Heritage By Strictly Scrutinizing Museum Acquisitions, Leila Alexandra Amineddoleh
Protecting Cultural Heritage By Strictly Scrutinizing Museum Acquisitions, Leila Alexandra Amineddoleh
Fordham Intellectual Property, Media and Entertainment Law Journal
There are many ways to protect cultural heritage as a valuable commodity. Although heightened security measures and extensive surveillance methods can deter theft, a more effective means for reducing theft is the elimination of the demand for black market art items. Trade in unprovenanced antiquities is a demand-driven crime; the market for illegal or undocumented items is driven by buyers’ wants. The most effective method of protection for cultural heritage is to eliminate the demand for black market for these precious objects, thereby reducing the market, a method known as the “market reduction approach.” There is a well-documented link between …
Irredeemably Inefficient Acts: A Threat To Markets, Firms, And The Fisc, Alex Raskolnikov
Irredeemably Inefficient Acts: A Threat To Markets, Firms, And The Fisc, Alex Raskolnikov
Faculty Scholarship
This Article defines and explores irredeemably inefficient acts – a conceptually distinct and empirically important category of socially undesirable conduct. Though inefficient behavior is, no doubt, pervasive, the standard view holds that inefficient conduct may be converted into efficient behavior by forcing actors to internalize the external harms of their decisions. For some acts, however such conversion is impossible. These acts are not just inefficient forms of otherwise socially beneficial activities – they are not just contingently inefficient. Rather, they are inefficient at their core; they reduce social welfare no matter what the regulator does. These irredeemably inefficient (or just …
Crimes Involving Intangible Property, Thomas G. Field
Crimes Involving Intangible Property, Thomas G. Field
The University of New Hampshire Law Review
[Excerpt] “A well-known cliché came to life when “[t]he pope’s butler was convicted . . . of stealing the pontiff’s private documents and leaking them to a journalist . . . .” His lawyer’s unsuccessful argument—that taking “only photocopies, not original documents” should not be criminal—prompted this paper.
When tangible property is taken, owners retain nothing. When documents or equivalents are duplicated, however, even if owners retain originals, they suffer loss of control and may lose substantial present and potential advantages, not necessarily economic. Civil redress for such losses has therefore long been available through copyright and trade secret laws. …
A Traditional And Textualist Analysis Of The Goals Of Antitrust: Efficiency, Preventing Theft From Consumers, And Consumer Choice, Robert H. Lande
A Traditional And Textualist Analysis Of The Goals Of Antitrust: Efficiency, Preventing Theft From Consumers, And Consumer Choice, Robert H. Lande
All Faculty Scholarship
This Article ascertains the overall purpose of the antitrust statutes in two very different ways. First, it performs a traditional analysis of the legislative history of the antitrust laws by analyzing relevant legislative debates and committee reports. Second, it undertakes a textualist or "plain meaning" analysis of the purpose of the antitrust statutes, using Justice Scalia's methodology. It does this by analyzing the meaning of key terms as they were used in contemporary dictionaries, legal treatises, common law cases, and the earliest U.s. antitrust cases, and it does this in light of the history of the relevant times.
Both approaches …
In Defense Of Specialized Theft Statutes, David Gray
In Defense Of Specialized Theft Statutes, David Gray
David C. Gray
This essay is an invited contribution to a symposium hosted by the New England Law Review in celebration of Stuart Green’s important book 13 Ways to Steal a Bicycle. As we note, Professor Green’s argument is so reasonable and executed in such elegant prose, there is little call for anything other than praise. Nevertheless, in the spirit of academic exchange, we challenge Professor Green’s skepticism of specialized theft statutes. Relying on retributivist theories of criminal punishment, we argue that specialized theft statutes have an important role to play in contemporary criminal law by educating the public about the necessary commitments …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
The Protection Of Digital Information And Prevention Of Its Unauthorized Access And Use In Criminal Law, Carrie Leonetti, Moonho Song
Carrie Leonetti
There are a number of valuable intangible properties that do not have specific legislation devoted to their criminal regulation and protection, which poses a vexing problem for the world’s legal systems, which have had an unsatisfactory track record in protecting valuable information over the course of the previous century, giving rise to the need for laws that specifically address issues related to the protection of the integrity of digital information-storage systems. This Article focuses on the protection of these intangibles, when they are stored within a computer system, from their unauthorized use by, or interference from, third parties.
The Article …