Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (29)
- Internet Law (29)
- Computer Law (24)
- Privacy Law (22)
- International Law (16)
-
- Environmental Law (9)
- Environmental Sciences (7)
- Evidence (7)
- Health Law and Policy (7)
- Physical Sciences and Mathematics (7)
- Social and Behavioral Sciences (7)
- Environmental Policy (6)
- Law and Society (6)
- Natural Resources Management and Policy (6)
- Public Affairs, Public Policy and Public Administration (6)
- Water Resource Management (6)
- Agriculture Law (5)
- Business Organizations Law (5)
- Medical Jurisprudence (5)
- Natural Resources Law (5)
- Natural Resources and Conservation (5)
- Sustainability (5)
- Water Law (5)
- Antitrust and Trade Regulation (4)
- Courts (4)
- Criminal Law (4)
- Food and Drug Law (4)
- Public Policy (4)
- Institution
-
- UIC School of Law (32)
- Maurer School of Law: Indiana University (11)
- University of Colorado Law School (11)
- Duke Law (7)
- Penn State Law (5)
-
- University of Michigan Law School (5)
- Georgetown University Law Center (4)
- Florida International University College of Law (3)
- William & Mary Law School (3)
- Boston University School of Law (2)
- Chicago-Kent College of Law (2)
- Selected Works (2)
- UC Law SF (2)
- Vanderbilt University Law School (2)
- Villanova University Charles Widger School of Law (2)
- Case Western Reserve University School of Law (1)
- Cleveland State University (1)
- Columbia Law School (1)
- Embry-Riddle Aeronautical University (1)
- Santa Clara Law (1)
- Schulich School of Law, Dalhousie University (1)
- SelectedWorks (1)
- The Catholic University of America, Columbus School of Law (1)
- University of Miami Law School (1)
- University of New Hampshire (1)
- University of Tulsa College of Law (1)
- University of Washington School of Law (1)
- University of the Pacific (1)
- Washington and Lee University School of Law (1)
- Keyword
-
- Patents & Technology (7)
- Science (5)
- Genetically Modified Organisms (4)
- Internet (4)
- Privacy (4)
-
- Biodiversity (3)
- Sustainable development (3)
- Technology (3)
- Africa (2)
- Agriculture (2)
- Bioethics (2)
- Biotechnology (2)
- California (2)
- Civil society (2)
- Climate change (2)
- Cyberspace (2)
- Daubert v. Merrell Dow Pharmaceutical (2)
- Environmental NGOs (2)
- Federal judiciary (2)
- Funding (2)
- Genetically modified foods (2)
- Government (2)
- Governments (2)
- Information technology (2)
- International trade (2)
- Internet regulation (2)
- Junk science (2)
- Justice Breyer (2)
- Law and technology (2)
- Non-governmental organizations (2)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (20)
- Indiana Journal of Global Legal Studies (9)
- UIC Review of Intellectual Property Law (9)
- Duke Law & Technology Review (7)
- Faculty Publications (7)
-
- Faculty Scholarship (5)
- Journal Articles (5)
- Two Decades of Water Law and Policy Reform: A Retrospective and Agenda for the Future (Summer Conference, June 13-15) (5)
- A Cartography of Governance: Exploring the Province of Environmental NGOs (April 7-8) (4)
- Georgetown Law Faculty Publications and Other Works (3)
- UIC Law Review (3)
- All Faculty Scholarship (2)
- Indiana Law Journal (2)
- Publications (2)
- University of Michigan Journal of Law Reform (2)
- Villanova Law Review (2)
- Articles, Chapters in Books and Other Contributions to Scholarly Works (1)
- Book Chapters (1)
- Book Reviews (1)
- Canadian Journal of Law and Technology (1)
- Horacio M. LYNCH (1)
- International Bulletin of Political Psychology (1)
- Joelle A. Moreno (1)
- Law Faculty Articles and Essays (1)
- Law Faculty Scholarship (1)
- McGeorge School of Law Scholarly Articles (1)
- Michigan Journal of International Law (1)
- Michigan Telecommunications & Technology Law Review (1)
- Scholarly Articles (1)
- Susan Freiwald (1)
- Publication Type
- File Type
Articles 91 - 107 of 107
Full-Text Articles in Science and Technology Law
Introduction, Toward More Reliable Jury Verdicts?: Law, Technology And Media Developments Since The Trials Of Dr. Sam Sheppard, Patricia J. Falk
Introduction, Toward More Reliable Jury Verdicts?: Law, Technology And Media Developments Since The Trials Of Dr. Sam Sheppard, Patricia J. Falk
Law Faculty Articles and Essays
As the Ohio Supreme Court noted almost one-half century ago, the Sheppard case had it all—“Murder, mystery, society, sex[,] and suspense were combined in this case in such a manner as to intrigue and captivate the public fancy to a degree perhaps unparalleled in recent annals.” But apart from the tantalizingly lurid details of the murder of Marilyn Sheppard and the curious way the case became a national cause celebre, the Sheppard case is of historical significance and academic interest because of the many important and ground-breaking aspects of the case. In actuality, there have been three (and perhaps four) …
Irreconcilable Differences: Congressional Treatment Of Internet Service Providers As Speakers, Raymond Shih Ray Ku
Irreconcilable Differences: Congressional Treatment Of Internet Service Providers As Speakers, Raymond Shih Ray Ku
Faculty Publications
This Article argues that under the CDA and OCILLA, Congress adopted facially inconsistent approaches towards ISP liability for expression. Nonetheless, despite the overt differences, it is possible to discern an underlying principle for determining when ISPs should be considered speakers that reconciles this inconsistency. Put simply, the CDA and OCILLA support an approach toward determining when ISPs are speakers that focuses on whether an ISP exercises editorial control over its network. This approach is evidenced by the fact that both statutes recognize that ISPs are able to exercise editorial control over any and all content on their networks, and both …
Integration & Biocomplexity, Lakshman Guruswamy
Integration & Biocomplexity, Lakshman Guruswamy
Publications
Sustainable development (SD) is premised on the inescapable and integral role played by humans in shaping and impacting the natural world and has been recognized as a foundational norm of international environmental law and policy. Ecologicalism - an outlook that embraces a comprehensive approach to interdependent natural and human systems - provides the conceptual underpinnings for a creative and integrated environmental management philosophy for implementing SD. This Article argues that the daunting task of defining and applying such an integrated approach and philosophy to the multiple interacting changes affecting planetary life support systems can benefit from the U.S. experience in …
The Fourth Amendment And New Technologies: The Constitutionality Of Thermal Imaging, Jeffrey P. Campisi
The Fourth Amendment And New Technologies: The Constitutionality Of Thermal Imaging, Jeffrey P. Campisi
Villanova Law Review
No abstract provided.
The Uniform Computer Information Transactions Act: A Well Built Fence Or Barbed Wire Around The Intellectual Commons, Warigia M. Bowman
The Uniform Computer Information Transactions Act: A Well Built Fence Or Barbed Wire Around The Intellectual Commons, Warigia M. Bowman
Articles, Chapters in Books and Other Contributions to Scholarly Works
The Uniform Computer Information Transactions Act (UCITA) is a proposed state contract law developed to regulate transactions in intangible goods such as computer software, online databases and other digital products.' UCITA was intended to act as Article 2B of the Uniform Commercial Code (UCC). Article 2 comprises the law governing commercial transactions in the sale of goods and ensures consistent contract laws from state to state. The stated goal of UCITA is to provide clarity regarding computer information transactions.
Patenting Industry Standards, 34 J. Marshall L. Rev. 897 (2001), Janice M. Mueller
Patenting Industry Standards, 34 J. Marshall L. Rev. 897 (2001), Janice M. Mueller
UIC Law Review
No abstract provided.
Dna Patentability: Shutting The Door To The Utility Requirement, 34 J. Marshall L. Rev. 973 (2001), Donald L. Zuhn Jr.
Dna Patentability: Shutting The Door To The Utility Requirement, 34 J. Marshall L. Rev. 973 (2001), Donald L. Zuhn Jr.
UIC Law Review
No abstract provided.
Computer-Aided Drug Design Using Patented Compounds: Infringement In Cyberspace?, 34 J. Marshall L. Rev. 1001 (2001), Ted L. Field
Computer-Aided Drug Design Using Patented Compounds: Infringement In Cyberspace?, 34 J. Marshall L. Rev. 1001 (2001), Ted L. Field
UIC Law Review
No abstract provided.
Peer-To-Peer Sharing On The Internet: An Analysis Of How Gnutella Networks Are Used To Distribute Pornographic Material, Michael D. Mehta, Don Best, Nancy Poon
Peer-To-Peer Sharing On The Internet: An Analysis Of How Gnutella Networks Are Used To Distribute Pornographic Material, Michael D. Mehta, Don Best, Nancy Poon
Canadian Journal of Law and Technology
By our very nature, humans are creatures that communicate and network. Over the past several decades much of this communicating and networking has been facilitated by developments in information and communication technology. The social and economic transformations resulting from developments on the Internet have created several challenges for policymakers, lawmakers, courts and a wide range of other kinds of institutions. Some of these challenges are associated with the technologies and applications themselves. Other challenges result from content made available on the Internet and how users exchange data. Recent developments in peer-to-peer data exchange bring these two sets of challenges together.
Information Technology And Non-Legal Sanctions In Financing Transactions, Ronald J. Mann
Information Technology And Non-Legal Sanctions In Financing Transactions, Ronald J. Mann
Faculty Scholarship
This Essay investigates the effect of advances in information technology on the private institutions that businesses use to resolve information asymmetries in financing transactions. The first part of the Essay discusses how information technology can permit direct verification of the information, obviating the problem entirely; the Essay discusses the example of the substitution of the debit card for the check, which provides an immediate payment that obviates the need for the merchant to consider whether payment will be forthcoming when the check is presented to the bank on which it is drawn.
The second part of the Essay discusses how …
Privacy, Ideology, And Technology: A Response To Jeffrey Rosen, Julie E. Cohen
Privacy, Ideology, And Technology: A Response To Jeffrey Rosen, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
This essay reviews Jeffrey Rosen’s The Unwanted Gaze: The Destruction of Privacy in America (2000).
Rosen offers a compelling (and often hair-raising) account of the pervasive dissolution of the boundary between public and private information. This dissolution is both legal and social; neither the law nor any other social institution seems to recognize many limits on the sorts of information that can be subjected to public scrutiny. The book also provides a rich, evocative characterization of the dignitary harms caused by privacy invasion. Rosen’s description of the sheer unfairness of being “judged out of context” rings instantly true. Privacy, Rosen …
Bargaining Over The Transfer Of Proprietary Research Tools: Is This Market Failing Or Emerging?, Rebecca S. Eisenberg
Bargaining Over The Transfer Of Proprietary Research Tools: Is This Market Failing Or Emerging?, Rebecca S. Eisenberg
Book Chapters
This analysis highlights the importance of transactions between prior and subsequent innovators to permit valuable research to go forward across the boundaries of prior patent claims. In a recent article focusing on biomedical research,4 Michael Heller and I argue that too many patent rights on 'upstream' discoveries can stifle 'downstream' research and product development by increasing transaction costs and magnifying the risk of bargaining failures. Just as too few property rights leave communally held resources prone to overuse in a 'tragedy of the commons', too many property rights can leave resources prone to underuse in what Heller calls a 'tragedy …
Criminal Law In Cyberspace, Neal K. Katyal
Criminal Law In Cyberspace, Neal K. Katyal
Georgetown Law Faculty Publications and Other Works
Two of the most talked-about crimes of the year, the ILoveYou computer worm and the denial of service attacks on Yahoo, eBay, and ETrade, suggest that a new form of crime is emerging: cybercrime. Thousands of these crimes occur each year, and the results are often catastrophic; in terms of economic damage, the ILoveYou worm may have been the most devastating crime in history, causing more than $11 billion in losses.
This paper asks how cybercrime is best deterred. It identifies five constraints on crime - legal sanctions, monetary perpetration cost, social norms, architecture, and physical risks - and explains …
Genetic Testing For Susceptability To Disease From Exposure To Toxic Chemicals: Implications For Public And Worker Health Policies, Michael S. Baram
Genetic Testing For Susceptability To Disease From Exposure To Toxic Chemicals: Implications For Public And Worker Health Policies, Michael S. Baram
Faculty Scholarship
The Environmental Genome Program intends to identify "susceptibility genes" that would indicate if a person is more vulnerable to cancer or other disease as a result of exposure to certain chemicals in the workplace, the environment, foods, or other products. Research findings and the capability to test persons for such genes are likely to impugn and challenge health policies and regulatory programs that do not take genetic susceptibility into account when conferring health benefits and restricting chemical exposures. This article focuses on the Occupational Safety and Health Administration (OSHA) and discusses four options available to this agency for protecting genetically …
Embryonic Stem Cell Research As An Ethical Issue: On The Emptiness Of Symbolic Value, Kevin P. Quinn
Embryonic Stem Cell Research As An Ethical Issue: On The Emptiness Of Symbolic Value, Kevin P. Quinn
Georgetown Law Faculty Publications and Other Works
The debate over human embryonic stem cell research-scientific and clinical prospects as well as ethical implications-became front-page news only after two teams of university researchers reported in November 1998 that they had isolated and cultured human pluripotent stem cells. The discovery caused a flurry of excitement among patients and researchers and drew attention from President Clinton, who instructed the National Bioethics Advisory Commission (NBAC) to "conduct a thorough review of the issues associated with. .. human stem cell research, balancing all medical and ethical issues.”
Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald
Comparative Institutional Analysis In Cyberspace: The Case Of Intermediary Liability For Defamation, Susan Freiwald
Susan Freiwald
Almost every day brings reports that Congress is considering new cyberspace-targeted laws and the courts are deciding novel cyberspace legal questions. These developments lend urgency to the question of whether a particular cyberspace legal change should come through operation of new statutes, judicial decisions, or the free market. If we can develop sophisticated analytical methods to evaluate institutional competence in cyberspace, we can vastly improve the development of cyberspace law and public policy.
Comparative Institutional Analysis in Cyberspace: The Case of Intermediary Liability for Defamation promotes just such an approach. By describing and extending a recently proposed model of comparative …
Beyond The Polemic Against Junk Science: Navigating The Oceans That Divide Science And Law With Justice Breyer At The Helm, Joelle A. Moreno