Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (245)
- UIC School of Law (188)
- DePaul University (93)
- Seattle University School of Law (87)
- Southern Methodist University (71)
-
- University of Washington School of Law (44)
- University of Richmond (36)
- University of Michigan Law School (20)
- University of Cincinnati College of Law (15)
- Maurer School of Law: Indiana University (13)
- Brooklyn Law School (11)
- The Catholic University of America, Columbus School of Law (10)
- University of South Florida (9)
- Duke Law (8)
- University of Georgia School of Law (8)
- Washington and Lee University School of Law (8)
- Pepperdine University (7)
- Fordham Law School (6)
- Vanderbilt University Law School (6)
- Cleveland State University (5)
- Georgia State University College of Law (5)
- Mitchell Hamline School of Law (5)
- Brigham Young University Law School (4)
- Chicago-Kent College of Law (4)
- Florida International University College of Law (4)
- Pace University (4)
- American University Washington College of Law (3)
- Northwestern Pritzker School of Law (3)
- Touro University Jacob D. Fuchsberg Law Center (3)
- University at Buffalo School of Law (3)
- Keyword
-
- Copyright (45)
- Intellectual property (28)
- Software (28)
- Technology (18)
- Copyright law (17)
-
- Internet (17)
- Patent law (15)
- PIPEDA (14)
- Privacy (14)
- Artificial intelligence (12)
- Intellectual Property (12)
- Law (12)
- AI (11)
- Book reviews (10)
- E-commerce (10)
- Cybersecurity (9)
- Case comment (8)
- Copyright protection (8)
- DMCA (8)
- Patents (8)
- Social media (8)
- Trademark (8)
- Computer programs (7)
- Copyright Act (7)
- Copyright infringement (7)
- Cyberspace (7)
- Fair use (7)
- Infringement (7)
- Patent (7)
- Affirmative Action (6)
- Publication Year
- Publication
-
- Canadian Journal of Law and Technology (245)
- UIC John Marshall Journal of Information Technology & Privacy Law (138)
- Seattle University Law Review (83)
- DePaul Journal of Art, Technology & Intellectual Property Law (72)
- SMU Science and Technology Law Review (71)
-
- Washington Journal of Law, Technology & Arts (37)
- Richmond Journal of Law & Technology (35)
- UIC Review of Intellectual Property Law (30)
- DePaul Business & Commercial Law Journal (21)
- UIC Law Review (20)
- The University of Cincinnati Intellectual Property and Computer Law Journal (15)
- Michigan Telecommunications & Technology Law Review (11)
- Catholic University Journal of Law and Technology (9)
- Military Cyber Affairs (9)
- Duke Law & Technology Review (8)
- Journal of Intellectual Property Law (7)
- IP Theory (6)
- Washington Law Review (6)
- Washington and Lee Law Review (6)
- Cleveland State Law Review (5)
- Cybaris® (5)
- Fordham Law Review (5)
- Georgia State University Law Review (5)
- Pepperdine Law Review (5)
- Brooklyn Journal of International Law (4)
- Chicago-Kent Law Review (4)
- FIU Law Review (4)
- Indiana Law Journal (4)
- Michigan Journal of International Law (4)
- Seattle Journal of Technology, Environmental & Innovation Law (4)
Articles 1 - 30 of 955
Full-Text Articles in Intellectual Property Law
Google Searching For The Truth: Examining The Admissibility Of Internet Search History, Chisup Kim
Google Searching For The Truth: Examining The Admissibility Of Internet Search History, Chisup Kim
Washington Journal of Law, Technology & Arts
The internet has become more ubiquitously available than ever before, with search engines serving as the portals to an unparalleled amount of information. As a byproduct of this phenomenon, a vast amount of internet search history has also begun to enter legal proceedings as evidence. The most intimate questions that defendants have asked their search engines have begun to be examined under the scope of the Federal Rules of Evidence or a state equivalent. This Comment examines the admissibility of internet search history and provides a general legal framework based on the Federal Rules of Evidence. Drawing upon six cases, …
Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper
Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper
Washington Journal of Law, Technology & Arts
Some 130 central banks around the world are experimenting with various levels of a central bank digital currency (“CBDC”), a digitized form of a sovereign-backed, national currency that is a liability of that country’s central bank. Unlike fiat currency, CBDCs are trackable and potentially subject to interference and even freezing by government authorities. CBDCs will affect citizens’ control over commerce, payments, and savings, and impact their privacy rights. The Chinese government has piloted, refined, and rolled out its own CBDC called the Digital Currency/Electronic Payment initiative (“DC/EP”), also known as the digital yuan or e-CNY. The Chinese government is far …
When Ai Remembers Too Much: Reinventing The Right To Be Forgotten For The Generative Age, Cheng-Chi Chang
When Ai Remembers Too Much: Reinventing The Right To Be Forgotten For The Generative Age, Cheng-Chi Chang
Washington Journal of Law, Technology & Arts
The emergence of generative artificial intelligence (AI) systems poses novel challenges for the right to be forgotten. While this right gained prominence following the 2014 Google Spain v. Gonzalez case, generative AI’s limitless memory and ability to reproduce identifiable data from fragments threaten traditional conceptions of forgetting. This Article traces the evolution of the right to be forgotten from its privacy law origins towards an independent entitlement grounded in self-determination for personal information. However, it contends the inherent limitations of using current anonymization, deletion, and geographical blocking mechanisms to prevent AI models from retaining personal data render forgetting infeasible. Moreover, …
The Need For An International Ai Research Initiative: How To Create And Sustain A Virtuous Research-Regulation Cycle To Govern Ai, Kevin Frazier
The Need For An International Ai Research Initiative: How To Create And Sustain A Virtuous Research-Regulation Cycle To Govern Ai, Kevin Frazier
Washington Journal of Law, Technology & Arts
This paper explains the need for an international AI research initiative. The current focus of lawmakers at the subnational, national, and international level on regulation over research has created an imbalance, neglecting the critical role of continuous, informed research in developing laws that keep pace with rapid technological advancements in AI.
The proposed international AI research initiative would serve as a central hub for comprehensive AI risk analysis, modeled on successful precedents like CERN and the IPCC. CERN exemplifies a collaborative research environment with pooled resources from member states, leading to significant advancements in particle physics. Similarly, the IPCC has …
Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber
Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber
DePaul Business & Commercial Law Journal
No abstract provided.
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
DePaul Business & Commercial Law Journal
No abstract provided.
Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu
Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu
DePaul Business & Commercial Law Journal
No abstract provided.
Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani
Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani
DePaul Business & Commercial Law Journal
No abstract provided.
The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin
The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin
DePaul Business & Commercial Law Journal
No abstract provided.
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter
Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
A Timeless Principle: Copyright Before The Statute Of Anne, Victoria Lieberman
A Timeless Principle: Copyright Before The Statute Of Anne, Victoria Lieberman
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Innovation At A Crossroads: The Supreme Court's Influence On Pharmaceuticals, Trade Policies, And Public Health, Beau Reeves
Innovation At A Crossroads: The Supreme Court's Influence On Pharmaceuticals, Trade Policies, And Public Health, Beau Reeves
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Beautifying The Human Experience: The Road To Knocking Out The Knockoff Industry Through Adaptions To Copyright & Design Patent Protections For Clothing, Moira Mccabe
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
All Eyez On Rap & Hip-Hop: Analyzing How Black Expression Is Criminalized And The Language Of The Rap Act Of 2022, Maia Young
Washington Journal of Law, Technology & Arts
The Black existence, in the United States of America, has always been regarded as a conditional right. Conventionally, Blackness must always be nonviolent and non-disruptive to safely exist. Because of this, Blackness cannot be confined to restraints and disrupts these conventions with acts of joy and creative expression. Black creativity is both unconventional and sacred. Black creative expression documents, preserves, and unifies cultural lived experiences, from a first-hand lens of those oppressed. Creative and artistic expression celebrates the myriad of stories that are a part of the collective Black experience. Yet, Black creative expression is now being weaponized by prosecutors …
Constitutional Rights Of Artificial Intelligence, Mizuki Hashiguchi
Constitutional Rights Of Artificial Intelligence, Mizuki Hashiguchi
Washington Journal of Law, Technology & Arts
On February 8, 2022, the Italian Parliament approved constitutional amendments to protect the environment. A member of Parliament stated that the environment is an element of Italy, and that safeguarding the environment means safeguarding humans. The need to protect the environment seems to have become a critical component of public conscience. Likewise, if society perceives that artificial intelligence is vitally important for humanity, does constitutional law allow constitutional rights for artificial intelligence to be created?
Extending constitutional rights to artificial intelligence may be consistent with the jurisprudential history of rights. Constitutional rights have undergone metamorphosis over time to protect new …
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Washington Journal of Law, Technology & Arts
This article discusses contemporary problems related to Artificial Intelligence (AI), law and the visual arts. It suggests that the fallacies of copyright law are already visible in legal conundrums raised by AI in the creative sector. These include, for instance, the lack of uniformity in relation to creations’ copyrightability, the massive scale of copyright infringement affecting visual artists and the creative industry, and the difficulties in implementing media regulation and cyber-regulation. The deeply cherished ‘human authorship’ criterion that was sustained recently by a US Federal Appeals Court in Thaler, in particular, is a short-term solution to the legal challenges …
Foreword, Deborah W. Denno, Erica Valencia-Graham
Foreword, Deborah W. Denno, Erica Valencia-Graham
Fordham Law Review
This Foreword overviews an unprecedented Symposium on these wide ranging topics titled The New AI: The Legal and Ethical Implications of ChatGPT and Other Emerging Technologies. Hosted by the Fordham Law Review and cosponsored by Fordham University School of Law’s Neuroscience and Law Center on November 3, 2023, the Symposium brought together attorneys, judges, professors, and scientists to explore the opportunities and risks presented by AI, especially GenAI like ChatGPT. The discussion raised complex questions concerning AI sentience and personal privacy, as well as the future of legal ethics, education, and employment. Although the AI industry uniformly predicts ever more …
Robots As Pirates, Henry H. Perritt Jr.
Robots As Pirates, Henry H. Perritt Jr.
Catholic University Law Review
Generative AI has created much excitement over its potential to create new works of authorship in the literary and graphical realms. Its underling machine-learning technology works by analyzing the relations among elements of preexisting material in enormous databases assembled from publicly available and licensed sources. Its algorithms “learn” to predict “what comes next” in different types of expression. A complete system thus can become glib in creating new factual summaries, essays, fictional stories and images.
A number of authors of the raw material used by Generative AI engines claim that the machine learning process infringes their copyrights. Careful evaluation of …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
Privacy’S Next Act, Erik Lampmann-Shaver
Privacy’S Next Act, Erik Lampmann-Shaver
Washington Journal of Law, Technology & Arts
This Article identifies and describes three data privacy policy developments from recent legislative sessions that may seem unrelated, but which I contend together offer clues about privacy law’s future over the short-to-medium term.
The first is the proliferation, worldwide and in U.S. states, of legislative proposals and statutes referred to as “age-appropriate design codes.” Originating in the United Kingdom, age-appropriate design codes typically apply to online services “directed to children” and subject such services to transparency, default settings, and other requirements. Chief among them is an implied obligation to conduct ongoing assessments of whether a service could be deemed “directed …
Coded Social Control: China’S Normalization Of Biometric Surveillance In The Post Covid-19 Era, Michelle Miao
Coded Social Control: China’S Normalization Of Biometric Surveillance In The Post Covid-19 Era, Michelle Miao
Washington Journal of Law, Technology & Arts
This article investigates the longevity of health QR codes, a digital instrument of pandemic surveillance, in post-COVID China. From 2020 to 2022, China widely used this tri-color tool to combat the COVID-19 pandemic. A commonly held assumption is that health QR codes have become obsolete in post-pandemic China. This study challenges such an assumption. It reveals their persistence and integration - through mobile apps and online platforms - beyond the COVID-19 public health emergency. A prolonged, expanded and normalized use of tools which were originally intended for contact tracing and pandemic surveillance raises critical legal and ethical concerns. Moreover, their …
Limits Of Algorithmic Fair Use, Jacob Alhadeff, Cooper Cuene, Max Del Real
Limits Of Algorithmic Fair Use, Jacob Alhadeff, Cooper Cuene, Max Del Real
Washington Journal of Law, Technology & Arts
In this article, we apply historical copyright principles to the evolving state of text-to-image generation and explore the implications of emerging technological constructs for copyright’s fair use doctrine. Artificial intelligence (“AI”) is frequently trained on copyrighted works, which usually involves extensive copying without owners’ authorization. Such copying could constitute prima facie copyright infringement, but existing guidance suggests fair use should apply to most machine learning contexts. Mark Lemley and Bryan Casey argue that training machine learning (“ML”) models on copyrighted material should generally be permitted under fair use when the model’s outputs transcends the purpose of its inputs. Their arguments …
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Washington Journal of Law, Technology & Arts
If digital platforms are found liable on hybrid antitrust-data protection violations, by how much should individual users be compensated? While traditional antitrust literature offers some estimation techniques, these methods were developed mostly around the idea that anti-competitive conduct manifests in supra-competitive prices, lost profits, or lost customers, all of which are easily quantifiable using commercially available evidence.
In digital markets, where antitrust violations are often intertwined with data protection issues, several complications arise. First, unlike transactions covered by traditional treble damage estimation techniques, “data-for-services” dealings are not evidenced by receipts. Second, personal data valuation is highly contextual and prone to …
Robo-Voting: Does Delegated Proxy Voting Pose A Challenge For Shareholder Democracy?, John Matsusaka, Chong Shu
Robo-Voting: Does Delegated Proxy Voting Pose A Challenge For Shareholder Democracy?, John Matsusaka, Chong Shu
Seattle University Law Review
Robo-voting is the practice by an investment fund of mechanically voting in corporate elections according to the advice of its proxy advisor— in effect fully delegating its voting decision to its advisor. We examined over 65 million votes cast during the period 2008–2021 by 14,582 mutual funds to describe and quantify the prevalence of robo-voting. Overall, 33% of mutual funds robo-voted in 2021: 22% with ISS, 4% with Glass Lewis, and six percent with the recommendations of the issuer’s management. The fraction of funds that robo-voted increased until around 2013 and then stabilized at the current level. Despite the sizable …