Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

American University Washington College of Law

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 73

Full-Text Articles in Science and Technology Law

How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid Jan 2023

How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid

American University Journal of Gender, Social Policy & the Law

In July 2021, Ziggi Tyler posted a video on TikTok, a popular video sharing platform, where he expressed his frustration with being a Black content creator on TikTok. The video showed Ziggi typing phrases such as “Black Lives Matter” or “Black success” into his Marketplace creator bio, which the app would immediately flag as inappropriate content. However, when Ziggi replaced those words with “white supremacy” or “white success,” no inappropriateness warning appeared. Although a TikTok spokesperson responded to the video clarifying that the app had mistakenly flagged phrases without considering word order, Ziggi refused to let an algorithm absolve TikTok …


Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu Jan 2023

Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu

American University National Security Law Brief

The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.


Letter Form The Editor, Wayne Rash, Iii Jan 2023

Letter Form The Editor, Wayne Rash, Iii

American University National Security Law Brief

In our last issue of The National Security Law Brief, Vol. 13, No. 1, we highlighted the dynamism that makes National Security Law such an exciting field. In this issue, No. 2, we continue with the dynamism theme. National security law is a field in constant change that often leaves us questioning how these changes will shape the law.


The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant Jan 2023

The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant

American University National Security Law Brief

Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …


Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski Jan 2023

Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski

American University National Security Law Brief

Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …


Next Verse, Same As The First: Inadequacies In The Government's Legal Approach Toward Biotechnology, Kimberly Righter Mar 2020

Next Verse, Same As The First: Inadequacies In The Government's Legal Approach Toward Biotechnology, Kimberly Righter

Sustainable Development Law & Policy

No abstract provided.


The Patentability Of Gene Editing Technologies Such As Crispr & The Harmonization Of Laws Relating To Germline Editing, Jessica Wachowicz Feb 2020

The Patentability Of Gene Editing Technologies Such As Crispr & The Harmonization Of Laws Relating To Germline Editing, Jessica Wachowicz

Intellectual Property Brief

No abstract provided.


A Nonobvious Approach To Functional Claiming In Software Patents, Jennifer Chiang Feb 2020

A Nonobvious Approach To Functional Claiming In Software Patents, Jennifer Chiang

Intellectual Property Brief

No abstract provided.


A Break From Reality: Modernizing Authentication Standards For Digital Video Evidence In The Era Of Deepfakes, John P. Lamonaga Jan 2020

A Break From Reality: Modernizing Authentication Standards For Digital Video Evidence In The Era Of Deepfakes, John P. Lamonaga

American University Law Review

The legal standard for authenticating photographic and video evidence in court has remained largely static throughout the evolution of media technology in the twentieth century. The advent of “deepfakes,” or fake videos created using artificial intelligence programming, renders outdated many of the assumptions that the Federal Rules of Evidence are built upon.

Rule 901(b)(1) provides a means to authenticate evidence through the testimony of a “witness with knowledge.” Courts commonly admit photographic and video evidence by using the “fair and accurate portrayal” standard to meet this Rule’s intent. This standard sets an extremely low bar—the witness need only testify that …


Intergenerational Control: Why Genetic Modification Of Embryos Via Crispr-Cas9 Is Not A Fundamental Parental Right, Fernando Montoya Jan 2020

Intergenerational Control: Why Genetic Modification Of Embryos Via Crispr-Cas9 Is Not A Fundamental Parental Right, Fernando Montoya

American University Law Review

No abstract provided.


Artificially Intelligent And Free To Monopolize: A New Threat To Competitive Markets Around The World, Kaylynn Noethlich Jan 2019

Artificially Intelligent And Free To Monopolize: A New Threat To Competitive Markets Around The World, Kaylynn Noethlich

American University International Law Review

No abstract provided.


Products Liability In The Digital Age: Liability Of Commercial Sellers Of Cad Files For Injuries Committed With A 3d-Printed Gun, Mika Sharpe Jan 2019

Products Liability In The Digital Age: Liability Of Commercial Sellers Of Cad Files For Injuries Committed With A 3d-Printed Gun, Mika Sharpe

American University Law Review

No abstract provided.


Hey Alexa: Was It The Butter, In The Foyer, With The Candlestick? Understanding Amazon's Echo And Whether The Government Can Retrieve Its Data, Seth Weintraub Jan 2018

Hey Alexa: Was It The Butter, In The Foyer, With The Candlestick? Understanding Amazon's Echo And Whether The Government Can Retrieve Its Data, Seth Weintraub

American University Business Law Review

No abstract provided.


Robots, New Technology, And Industry 4.0 In Changing Workplaces. Impacts On Labor And Employment Laws, Ronald C. Brown Jan 2018

Robots, New Technology, And Industry 4.0 In Changing Workplaces. Impacts On Labor And Employment Laws, Ronald C. Brown

American University Business Law Review

No abstract provided.


"The Way I Felt": Creating A Model Statute To Address Sexual Offenses Which Utilize Virtual Reality, Ryan Esparza Jan 2018

"The Way I Felt": Creating A Model Statute To Address Sexual Offenses Which Utilize Virtual Reality, Ryan Esparza

Criminal Law Practitioner

No abstract provided.


Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy Jan 2017

Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy

American University Law Review

Smartphones have swiftly replaced most-if not all-conventional methods of sending, receiving, and storing personal information. Letters, address books, calendars, and trips to the bank have been rendered obsolete by tools such as text messaging, digital contacts, iCal, and mobile banking apps. Although these digital alternatives are convenient, they are not immune from attack. Therefore, to remain competitive, technology companies must maintain safe and secure platforms on which users may freely store and share their personal information.

Apple Inc., for example, strives to protect its users' intimate information, consequently earning a reputation for prioritizing security. Like a king protecting his castle, …


Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar Jan 2017

Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar

American University Law Review

The internet is a marvel of human accomplishment and a feat of technological engineering, which allows nearly instantaneous communication across the globe-an act once considered the stuff of science fiction. It has been lauded for its environmental benefits, such as reducing paper production and waste, but, as with any great accomplishment, there are unintended consequences. The increased proliferation of electronic devices to access the internet and the exponential advancement of those devices results in large amounts of electronic waste-a problem in its own right. Compounding the issue, for all of those internet-enabled devices to work, they must rely on the …


Fundamentally Unfair: Databases, Deportation, And The Crimmigrant Gang Member, Katherine Conway Jan 2017

Fundamentally Unfair: Databases, Deportation, And The Crimmigrant Gang Member, Katherine Conway

American University Law Review

Provocative language painting immigrants as dangerous criminals and promises of increased immigration enforcement were cornerstones of Donald j Trump's presidential candidacy. As president, he has maintained this rhetoric and made good on many of his promises by broadening the definition of "criminal conduct" for immigration enforcement purposes, touting a renewed focus on immigrant gangs and cartels, and conducting several nation-wide anti-gang sweeps that placed an estimated 1095 "known" gang members in Immigration and Customs Enforcement (ICE) custody. But the Trump Administration did not create the specter of the criminal immigrant, or "crimmigrant," gang member, nor did it create the detection …


Body Worn Cameras With Facial Recognition Technology: When It Constitutes A Search, Kelly Blount Jan 2017

Body Worn Cameras With Facial Recognition Technology: When It Constitutes A Search, Kelly Blount

Criminal Law Practitioner

No abstract provided.


The Implications Of Creating An Iphone Backdoor, Gregory Coutros Jan 2016

The Implications Of Creating An Iphone Backdoor, Gregory Coutros

American University National Security Law Brief

No abstract provided.


The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard Jan 2016

The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard

American University National Security Law Brief

No abstract provided.


The Law Of Armed Conflict, Unconventional Warfare, And Cyber Attacks, Thomas P. Jordan Jan 2016

The Law Of Armed Conflict, Unconventional Warfare, And Cyber Attacks, Thomas P. Jordan

American University National Security Law Brief

No abstract provided.


Applying The Law Of Neutrality While Transitioning The Seas Of Cyberspace, Danielle Higson Jan 2016

Applying The Law Of Neutrality While Transitioning The Seas Of Cyberspace, Danielle Higson

American University National Security Law Brief

No abstract provided.


A Spoof Of Justice: Double Jeopardy Implications For Convictions Of Both Spoofing And Commodities Fraud For The Same Transaction, Abram Olychyk Jan 2015

A Spoof Of Justice: Double Jeopardy Implications For Convictions Of Both Spoofing And Commodities Fraud For The Same Transaction, Abram Olychyk

American University Law Review

No abstract provided.


"Going Green" The Wrong Way: How Governments Are Unconstitutionally Delegating Their Legislative Powers In Pursuit Of Environmental Sustainability, Brandon L. Boxler Jun 2011

"Going Green" The Wrong Way: How Governments Are Unconstitutionally Delegating Their Legislative Powers In Pursuit Of Environmental Sustainability, Brandon L. Boxler

Legislation and Policy Brief

Through either executive or legislative power, state and local governments are rapidly effecting policies that encourage environmental sustainability. Many of these policies have logically targeted buildings and infrastructure, both of which have a significant adverse impact on the environment. In the United States, 38 percent of the nation’s carbon dioxide emissions and 67 percent of its electricity usage come from buildings. New laws and policies are attempting to decrease these figures by requiring construction projects to “go green” and implement sustainable building practices. These legal initiatives have the potential to create substantial environmental benefits by reducing energy consumption, greenhouse gas …


Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman Sep 2010

Disincentives To Data Breach: Problems With Notification And Future Legislative Possibilities, Ross Schulman

Legislation and Policy Brief

In the modern digitized and networked world, personal identifying information has quickly become a commodity that can be traded, sold, or given away like any other. The uses and potential abuses of personal identifying information, however, distinguish this commodity from any other. Personal identifying information can be copied infinitely, is often not protected nearly as well as physical commodities, and, most importantly, can have particular importance to the person identified by that information. The producer of a bushel of apples presumably cares very little about where his apples end up, as long as he is paid for them to begin …


Caster Semenya And The Myth Of A Level Playing Field, Erin E. Buzuvis Jan 2010

Caster Semenya And The Myth Of A Level Playing Field, Erin E. Buzuvis

The Modern American

No abstract provided.


Readily Deployable Approaches To Geoengineering: Cool Materials And Aggressive Reforestation, Max G. Bronstein Jan 2010

Readily Deployable Approaches To Geoengineering: Cool Materials And Aggressive Reforestation, Max G. Bronstein

Sustainable Development Law & Policy

No abstract provided.


Law, Science, And The Continental Shelf: The Russian Federation And The Promise Of Arctic Cooperation, Betsy Baker Jan 2010

Law, Science, And The Continental Shelf: The Russian Federation And The Promise Of Arctic Cooperation, Betsy Baker

American University International Law Review

No abstract provided.


Intellectual Property Rights To Enhance International Clean Tech Transfers, Anastasia Lewandoski Jan 2009

Intellectual Property Rights To Enhance International Clean Tech Transfers, Anastasia Lewandoski

Sustainable Development Law & Policy

No abstract provided.