Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Law and Technology (11)
- Law and Society (10)
- Privacy (6)
- Emerging Technologies (5)
- Location-Based Services (5)
-
- Science and Technology (5)
- Social Implications of ICT (5)
- Constitutional Law (4)
- Criminal Law and Procedure (4)
- General Law (4)
- Global Positioning Systems (4)
- National Security (4)
- Public Law and Legal Theory (4)
- Civil Rights and Discrimination (3)
- Computer Law (3)
- Emergency Management (3)
- Ethics (3)
- First Amendment (3)
- Intellectual Property Law (3)
- Law and Economics (3)
- Arts and Entertainment (2)
- Copyright (2)
- Cybercrime (2)
- Fourth Amendment (2)
- Jurisprudence (2)
- Law and society (2)
- Law, DNA (2)
- Legal History (2)
- People (2)
- Radio (2)
- Publication
- Publication Type
- File Type
Articles 1 - 25 of 25
Full-Text Articles in Law and Society
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Alexander Hayes Mr.
- From in-car video recording to body-worn video recording
- Exploring available technologies: how do they work, pros and cons
- Storing direct evidence in secure storage: factors to consider
- Citizens “shooting” back with POV tech – what are their rights?
- Crowdsourced sousveillance- harnessing public data for forensic profiling
- Police force policies and practices on the application of new media
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
Akiva A Miller
New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …
Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland
Cell Phone Searches In A Digital World: Blurred Lines, New Realities And Fourth Amendment Pluralism, Steven I. Friedland
Steven I. Friedland
State and federal courts are split over whether cell phone searches incident to a lawful arrest are permissible under the Fourth Amendment. The Supreme Court has the opportunity to create uniformity by accepting a certiorari petition in a cell phone search incident to arrest case, either United States v. Wurie or Riley v. California. The Court should do so to create an analysis that incorporates sensory enhancing technology, not avoids it, as it has done to date.
The split in case law evidences a central contradiction. Fourth Amendment rules need to be predictable and based on clear guidelines for effective …
Biometric Id Cybersurveillance, Margaret Hu
Biometric Id Cybersurveillance, Margaret Hu
Faculty Publications
The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …
Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner
Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner
Dru Stevenson
Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement – based on perceptions of likely outcomes at trial and anticipated litigation costs. Lawyers practicing in the shadow of trial have, in turn, traditionally formed their perception of the likely outcome at trial based on their knowledge of case precedents, intuition, and previous interactions with the presiding judge and opposing counsel in similar cases. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in …
Legal Mirrors Of Entrepreneurship, Mirit Eyal-Cohen
Legal Mirrors Of Entrepreneurship, Mirit Eyal-Cohen
Mirit Eyal-Cohen
Small businesses are regarded the engine of the economy. But just what is a “small” business? Depending on where one looks in the law, the definitions vary and they differ from one section to another. Unfortunately, what these various size classifications fail to assess, are the policy considerations and the legislative intent for granting regulatory preferences to small concerns to begin with.
In the last century, the U.S. government has been cultivating one such policy of fiscal and economic growth. Consequently, Congress and private institutions have been acting to incentivize, support and reward entrepreneurship through the law in order to …
Lights, Camera, Arrest: The Stage Is Set For A Federal Resolution Of A Citizen's Right To Record The Police In Public, Taylor R. Robertson
Lights, Camera, Arrest: The Stage Is Set For A Federal Resolution Of A Citizen's Right To Record The Police In Public, Taylor R. Robertson
Taylor R Robertson
Grab your cellphone, press the record button, and amaze your friends!
No advertisement like this exists in real life, of course, because the action is already universally automatic—it needs no encouragement or instruction. But aim the camera at the police and you could be arrested and face up to fifteen years in prison under some eavesdropping or wiretapping laws simply for recording the police in public speaking at volumes audible to any unassisted ear. While wiretapping laws were originally intended to protect citizens from the snooping detective, some states have effectively turned these laws into government protection from the watchful …
Malas Leyes, Peores Reglamentos. Apuntes Críticos Sobre El Porvenir De La Tutela De La Persona Frente Al Tratamiento De Datos En El Perú, Leysser L. Leon
Malas Leyes, Peores Reglamentos. Apuntes Críticos Sobre El Porvenir De La Tutela De La Persona Frente Al Tratamiento De Datos En El Perú, Leysser L. Leon
Leysser L. León
Se comentan críticamente algunas de las más controvertidas disposiciones contenidas en el reciente Reglamento de la Ley peruana de Protección de Datos Personales. Se echa de menos, en especial, y atendiendo a la labor reglamentaria del Ministerio de Justicia reflejada en este dispositivo, una actitud consciente de los funcionarios acerca la importancia de la tutela de la autodeterminación informativa en los países que, como el Perú, siguen sin resolver graves males sociales, como la discriminación.
Rediscovering Cumulative Creativity From The Oral Formulaic Tradition To Digital Remix: Can I Get A Witness?, Giancarlo Francesco Frosio
Rediscovering Cumulative Creativity From The Oral Formulaic Tradition To Digital Remix: Can I Get A Witness?, Giancarlo Francesco Frosio
Giancarlo Francesco Frosio
For most of human history the essential nature of creativity was understood to be cumulative and collective. This notion has been largely forgotten by modern policies regulating creativity and speech. As hard as it may be to believe, the most valuable components of our immortal culture were created under a fully open regime with regard to access to pre-existing expressions and reuse. From the Platonic mimēsis to the Roman imitatio, from Macrobius’ Saturnalia to the imitatio Vergili, from medieval auctoritas and Chaucer the compilator to Anon the singer and social textuality, from Chrétien’s art of rewriting to Shakespeare’s “borrowed feathers,” …
The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer
The Surveillance Society And The Third-Party Privacy Problem, Shaun Spencer
Shaun Spencer
This article examines a question that has become increasingly important in the emerging surveillance society: should the law treat information as private even though others know about it? This is the third-party privacy problem. Part I explores two competing conceptions of privacy: the binary and contextual conceptions. Part II describes two features of the emerging surveillance society that should change the way we address the third-party privacy problem. One feature, “surveillance on demand,” results from exponential increases in data collection and aggregation. The other feature, “uploaded lives,” reflects a revolution in the type and amount of information that we share …
Contextual Expectations Of Privacy, Andrew Selbst
Contextual Expectations Of Privacy, Andrew Selbst
Andrew Selbst
Fourth Amendment search jurisprudence is nominally based on a “reasonable expectation of privacy,” but actual doctrine is detached from society’s conception of privacy. Courts rely on various binary distinctions: Is a piece of information secret or not? Was the observed conduct inside or outside? While often convenient, none of these binary distinctions can adequately capture the complicated range of ideas encompassed by “privacy.” Privacy theorists have begun to understand that a consideration of social context is essential to a full understanding of privacy. Helen Nissenbaum’s theory of contextual integrity, which characterizes a right to privacy as the preservation of expected …
Patents And The University, Peter Lee
Patents And The University, Peter Lee
Peter Lee
This Article advances two novel claims about the internalization of academic science within patent law and the concomitant evolution of “academic exceptionalism.” Historically, relations between patent law and the university were characterized by mutual exclusion, based in part on normative conflicts between academia and exclusive rights. These normative distinctions informed “academic exceptionalism”—the notion that the patent system should exclude the fruits of academic science or treat academic entities differently than other actors—in patent doctrine. As universities began to embrace patents, however, academic science has become internalized within the traditional commercial narrative of patent protection. Contemporary courts frequently invoke universities’ commercial …
Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael
Wie Featured Person Of The Month Highlights (Katina Michael), Keyana Tenant, Katina Michael
Professor Katina Michael
The WIE Featured Person of the Month is Katina Michael, editor-in-chief of IEEE Technology and Society Magazine. After working at OTIS Elevator Company and Andersen Consulting, Katina was offered and exciting graduate engineering position at Nortel in 1996; and her career has been fast track from there. Read Katina’s story on Page 7.
Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston
Natural Disasters And Early Warning Systems In Australia, Emma Papaemanuel, Katina Michael, Peter Johnston
Professor Katina Michael
Australia's national emergency warning system alerts. Radio program in Greek.
Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes
Are Disaster Early Warnings Effective?, Kerri Worthington, Katina Michael, Peter Johnson, Paul Barnes
Professor Katina Michael
Australia's summer is traditionally a time of heightened preparation for natural disasters, with cyclones and floods menacing the north and bushfires a constant threat in the south. And the prospect of more frequent, and more intense, disasters thanks to climate change has brought the need for an effective early warning system to the forefront of policy-making. Technological advances and improved telecommunication systems have raised expectations that warning of disasters will come early enough to keep people safe. But are those expectations too high? Kerri Worthington reports. Increasingly, the world's governments -- and their citizens -- rely on technology-based early warning …
Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser
Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates, Lily M. Strumwasser
Lily M Strumwasser
Dear Editor:
I am a third-year student at The John Marshall Law School in Chicago, Illinois, where I serve as the executive student publications editor of The John Marshall Law Review. In September 2013, I will work as an associate at Seyfarth Shaw in its labor and employment practice group. I am writing to submit my article, "Testing The Social Media Waters - First Amendment Entanglement Beyond The Schoolhouse Gates" My article considers the contours of student free speech rights within the context of public schools. I think and hope you will find it to be interesting and …
Concern People Without Latest Technology Will Miss Fire Warnings, Sally Sara, Ashley Hall, Peter Johnson, Katina Michael
Concern People Without Latest Technology Will Miss Fire Warnings, Sally Sara, Ashley Hall, Peter Johnson, Katina Michael
Professor Katina Michael
But what if the website goes down in the way Victoria's Country Fire Authority website crashed as fires raged a few weeks ago? What about those people who don't own the latest technology? And what happens when the power goes out?
KATINA MICHAEL: Well there's no television, there isn't ability to access the internet potentially.
ASHLEY HALL: Professor Katina Michael is Associate Professor at the School of Information Systems and Technology at the University of Wollongong.
KATINA MICHAEL: I would suggest a long lasting powered radio because we don't want is we don't want when the lights go out, or …
"Linguistic Cleansing": Strategies For Redesigning Human Perception And Behavior, David Barnhizer
"Linguistic Cleansing": Strategies For Redesigning Human Perception And Behavior, David Barnhizer
David Barnhizer
James Madison recognized the need to balance competing interests in his analysis of factious groups. In Federalist No. 10, Madison sets out the idea of faction in the following words. “By a faction I understand a number of citizens, whether amounting to a majority or minority of the whole, who are united and actuated by some common impulse of passion, or of interest, adverse to the rights of other citizens, or to the permanent and aggregate interests of the community.” Madison goes on to describe two “cures” for faction. One is to “destroy the liberty” that allows it to bloom, …
Dependence On Cyberscribes - Issues In E-Security, Thomas R. Mclean, Alexander B. Mclean
Dependence On Cyberscribes - Issues In E-Security, Thomas R. Mclean, Alexander B. Mclean
Journal of Business & Technology Law
No abstract provided.
Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw
Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw
Articles
Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.
At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …
Book Review -- William Patry, How To Fix Copyright, Michael J. Madison
Book Review -- William Patry, How To Fix Copyright, Michael J. Madison
Articles
I review William Patry’s book How to Fix Copyright. The book is noteworthy for its ambitious yet measured effort to diagnose where copyright law has gone astray in recent years. It is less successful with respect to proposing possible changes to the law. Most interesting are parallels between How to Fix Copyright and an earlier comprehensive look at copyright law in the digital era: Paul Goldstein’s Copyright’s Highway: From Gutenberg to the Celestial Jukebox. William Patry and Paul Goldstein each have a lot of faith in the power of consumer choice in the cultural marketplace. That faith leads …
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke
Professor Katina Michael
During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Professor Katina Michael
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael
Professor Katina Michael
Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Emerging Technologies And Dwindling Speech, Jorge R. Roig
Jorge R Roig