Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- First Amendment (3)
- Privacy (3)
- Drone (2)
- Fourth amendment (2)
- Free speech (2)
-
- Technology (2)
- Uas (2)
- Uav (2)
- 875(c) (1)
- And pseudonymity (1)
- Anonymity (1)
- Artificial intelligence (1)
- Block chain (1)
- Civil Rights and Discrimination (1)
- Communications Law (1)
- Computers (1)
- Constitutional Law (1)
- Copyright (1)
- DNA (1)
- Data (1)
- Elonis (1)
- Encryption (1)
- Facebook (1)
- First amendment (1)
- Free Speech (1)
- General Law (1)
- Health Law and Policy (1)
- Information (1)
- Intellectual Property Law (1)
- Internet (1)
- Publication
- Publication Type
Articles 1 - 17 of 17
Full-Text Articles in First Amendment
Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton
Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton
Northwestern University Law Review
Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Stephen E Henderson
Prosecuting Online Threats After Elonis, Michael Pierce
Prosecuting Online Threats After Elonis, Michael Pierce
Northwestern University Law Review
In Elonis v. United States, decided last term, the Supreme Court vacated a conviction for online threats on the ground that the lower court erred in its instructions to the jury regarding mens rea. In doing so, however, the Court declined to articulate which mens rea standard would have sustained a conviction. It is thus currently uncertain which mens rea the government must prove when prosecuting online threats under 18 U.S.C. § 875(c). The Elonis Court discussed three potential mens rea standards; as universal standards for online threats, each leaves something to be desired. Fortunately, federal courts need not …
If You Fly A Drone, So Can Police, Stephen E. Henderson
If You Fly A Drone, So Can Police, Stephen E. Henderson
Stephen E Henderson
Table Of Contents
Catholic University Journal of Law and Technology
No abstract provided.
Exporting Internet Law Through International Trade Agreements: Recalibrating U.S. Trade Policy In The Digital Age, Markham C. Erickson, Sarah K. Leggin
Exporting Internet Law Through International Trade Agreements: Recalibrating U.S. Trade Policy In The Digital Age, Markham C. Erickson, Sarah K. Leggin
Catholic University Journal of Law and Technology
No abstract provided.
Baring All: Legal Ethics And Confidentiality Of Electronically Stored Information In The Cloud, Whitney Morgan
Baring All: Legal Ethics And Confidentiality Of Electronically Stored Information In The Cloud, Whitney Morgan
Catholic University Journal of Law and Technology
No abstract provided.
Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal
Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal
Catholic University Journal of Law and Technology
No abstract provided.
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton
Catholic University Journal of Law and Technology
No abstract provided.
Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye
Wearable Devices As Admissible Evidence: Technology Is Killing Our Opportunity To Lie, Nicole Chauriye
Catholic University Journal of Law and Technology
No abstract provided.
National Security Or Consumer Privacy? A Question Even Siri Couldn’T Answer, Rebecca Knight
National Security Or Consumer Privacy? A Question Even Siri Couldn’T Answer, Rebecca Knight
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard
The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard
American University National Security Law Brief
No abstract provided.
Following In The European Union’S Footsteps: Why The United States Should Adopt Its Own “Right To Be Forgotten” Law For Crime Victims, 32 J. Marshall J. Info. Tech. & Privacy L. 185 (2016), Erin Cooper
UIC John Marshall Journal of Information Technology & Privacy Law
This comment aims to look at this intersection between Google search results, their lack of removal options in the United States, and the potential harm this can cause crime victims. The comment will begin by assessing Google’s method for delivering search results, and its general removal process for most non-European nations. Then, this comment will continue by looking at the European Union and its “right to be forgotten” ruling that allows people in certain circumstances to remove their personal information from the Internet, and what the United States can learn from its implementation. Moreover, we will then contrast the European …
The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li
The Art Of Nailing Jell-O To The Wall: Reassessing The Political Power Of The Internet, Bryan Druzin, Jessica Li
Journal of Law and Policy
Political observers commonly argue that, given the unique characteristics of the Internet, democratization is an inevitability of its widespread use. The critical role that social media played in the wave of demonstrations, protests, and revolutions that swept across the Arab world in 2011 cemented this perception in the minds of many. Yet China defies this simplistic paradigm—China has been stunningly successful at constraining the political power of its Internet. We argue that the political importance of Internet technology has been overstated, particularly with respect to China. As support for this thesis, we cite recent political events in Hong Kong known …
Copyrights, Privacy, And The Blockchain, Tom W. Bell
Copyrights, Privacy, And The Blockchain, Tom W. Bell
Tom W. Bell
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig