Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (107)
- Internet Law (69)
- Privacy Law (62)
- Computer Law (56)
- Criminal Law (40)
-
- Evidence (36)
- International Law (29)
- Comparative and Foreign Law (27)
- Law and Society (25)
- Fourth Amendment (23)
- Administrative Law (22)
- Constitutional Law (21)
- Health Law and Policy (21)
- Communications Law (18)
- Criminal Procedure (17)
- First Amendment (17)
- Entertainment, Arts, and Sports Law (16)
- Consumer Protection Law (15)
- Military, War, and Peace (15)
- Law and Economics (14)
- National Security Law (14)
- Legislation (13)
- Antitrust and Trade Regulation (11)
- Civil Rights and Discrimination (11)
- Courts (11)
- Engineering (11)
- Property Law and Real Estate (11)
- Social and Behavioral Sciences (11)
- Institution
-
- UIC School of Law (46)
- Selected Works (45)
- Schulich School of Law, Dalhousie University (19)
- University of Michigan Law School (14)
- Brooklyn Law School (13)
-
- American University Washington College of Law (11)
- The Catholic University of America, Columbus School of Law (9)
- University of Minnesota Law School (9)
- UC Law SF (8)
- University of Pennsylvania Carey Law School (8)
- Case Western Reserve University School of Law (7)
- University of Colorado Law School (7)
- Boston University School of Law (6)
- Santa Clara Law (6)
- University of Georgia School of Law (6)
- Columbia Law School (5)
- New York Law School (5)
- Seattle University School of Law (5)
- SelectedWorks (5)
- Embry-Riddle Aeronautical University (4)
- Maurer School of Law: Indiana University (4)
- Southern Methodist University (4)
- Duke Law (3)
- Fordham Law School (3)
- Mitchell Hamline School of Law (3)
- Pace University (3)
- Pepperdine University (3)
- Roger Williams University (3)
- University of Miami Law School (3)
- Vanderbilt University Law School (3)
- Keyword
-
- Technology (18)
- Privacy (16)
- Fourth Amendment (9)
- Biotechnology (8)
- Evidence (8)
-
- Copyright (7)
- Fourth amendment (7)
- Innovation (7)
- Law (7)
- Law and Technology (7)
- Patents (7)
- Big data (6)
- Data (6)
- Science and Technology (6)
- Search (6)
- DNA databases (5)
- Intellectual property (5)
- Probability (5)
- Regulation (5)
- Search and seizure (5)
- Administrative law (4)
- Algorithms (4)
- DNA (4)
- Health Law and Policy (4)
- Internet (4)
- Law and Society (4)
- Neuroscience (4)
- Patent (4)
- Public Law and Legal Theory (4)
- SSRN (4)
- Publication
-
- UIC Review of Intellectual Property Law (32)
- David Kaye (23)
- Canadian Journal of Law and Technology (17)
- Faculty Scholarship (15)
- UIC John Marshall Journal of Information Technology & Privacy Law (13)
-
- All Faculty Scholarship (9)
- Minnesota Journal of Law, Science & Technology (9)
- Catholic University Journal of Law and Technology (8)
- Publications (8)
- UC Law Science and Technology Journal (8)
- Articles in Law Reviews & Other Academic Journals (7)
- Journal of Law, Technology, & the Internet (7)
- Joelle A. Moreno (6)
- Santa Clara High Technology Law Journal (6)
- Brooklyn Journal of Corporate, Financial & Commercial Law (5)
- Michigan Telecommunications & Technology Law Review (5)
- Seattle University Law Review (5)
- Stephen E Henderson (5)
- American University National Security Law Brief (4)
- Brooklyn Journal of International Law (4)
- Georgia Journal of International & Comparative Law (4)
- Articles (3)
- Articles & Chapters (3)
- Faculty Journal Articles and Book Chapters (3)
- Michigan Law Review (3)
- University of Miami Law Review (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Duke Law & Technology Review (2)
- Faculty Works (2)
- Fordham Urban Law Journal (2)
- Publication Type
- File Type
Articles 1 - 30 of 313
Full-Text Articles in Science and Technology Law
Quintavalle: The Quandary In Bioethics, Lisa Cherkassky
Quintavalle: The Quandary In Bioethics, Lisa Cherkassky
Journal of Law and Health
The case of R. (Quintavalle) v. Human Fertilisation Embryology Authority (and Secretary of State for Health) presents a handful of legal problems. The biggest legal query to arise from the case is the inevitable harvest of babies, toddlers and very young children for their bone marrow. This article unpacks the judicial story behind Quintavalle to reveal how the strict provisions of the Human Fertilisation and Embryology Act 1990 - namely ‘suitable condition’ under schedule 2 paragraph 1(1)(a) and ‘treatment services’ and ‘assisting’ under section 2(1) - were widely misinterpreted to introduce the social selection of embryos into law. The legal …
Et Tu, Android?: Regulating Dangerous And Dishonest Robots, Woodrow Hartzog
Et Tu, Android?: Regulating Dangerous And Dishonest Robots, Woodrow Hartzog
Faculty Scholarship
Consumer robots like personal digital assistants, automated cars, robot companions, chore-bots, and personal drones raise common consumer protection issues, such as fraud, privacy, data security, and risks to health, physical safety, and finances. They also raise new consumer protection issues, or at least call into question how existing consumer protection regimes might be applied to such emerging technologies. Yet it is unclear which legal regimes should govern these robots and what consumer protection rules for robots should look like.
This paper argues that the FTC's grant of authority and existing jurisprudence are well-suited for protecting consumers who buy and interact …
The Challenge Of Regulatory Excellence, Cary Coglianese
The Challenge Of Regulatory Excellence, Cary Coglianese
All Faculty Scholarship
Regulation is a high-stakes enterprise marked by tremendous challenges and relentless public pressure. Regulators are expected to protect the public from harms associated with economic activity and technological change without unduly impeding economic growth or efficiency. Regulators today also face new demands, such as adapting to rapidly changing and complex financial instruments, the emergence of the sharing economy, and the potential hazards of synthetic biology and other innovations. Faced with these challenges, regulators need a lodestar for what constitutes high-quality regulation and guidance on how to improve their organizations’ performance. In the book Achieving Regulatory Excellence, leading regulatory experts …
The Skeleton Of A Data Breach: The Ethical And Legal Concerns, Hilary G. Buttrick, Jason Davidson, Richard J. Mcgowan
The Skeleton Of A Data Breach: The Ethical And Legal Concerns, Hilary G. Buttrick, Jason Davidson, Richard J. Mcgowan
Richmond Journal of Law & Technology
After over thirty data breaches spanning the third and fourth quarter of 2012, Forbes magazine labeled the summer of 2012 as “The Summer of the Data Breach.” Four years later, businesses across multiple industries have suffered brand-image damage and paid millions of dollars in remedial expenses; we are living in the era of the mega breach. In 2014, companies such as Target, Home Depot, JP Morgan Chase, Anthem, Sony, UPS, Jimmy John’s, Kmart, Neiman Marcus, Community Health Systems, and the White House suffered data breaches. The Home Depot breach alone resulted in the loss of “56 million credit card accounts,” …
R-Egg-Ulation: A Call For Greater Regulation Of The Big Business Of Human Egg Harvesting, Danielle A. Vera
R-Egg-Ulation: A Call For Greater Regulation Of The Big Business Of Human Egg Harvesting, Danielle A. Vera
Michigan Journal of Gender & Law
When it comes to young healthy women “donating” their eggs, America has a regulation problem. This Note explains the science behind the harvesting of human eggs, focusing on potential egg donors, and describes the specific factors that make egg donation a unique type of transaction. It describes the current regulatory status of the assisted reproductive technology industry in the United States and highlights the ways in which this scheme fails to protect egg “donors.” This Note concludes with a call for comprehensive regulation of the assisted reproductive technology industry.
Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian
Preserving Human Agency In Automated Compliance, Onnig H. Dombalagian
Brooklyn Journal of Corporate, Financial & Commercial Law
As technology transforms financial services, so too must it transform the regulation of financial markets and intermediaries. The imperative of real-time, prophylactic regulation increasingly compels reallocation of regulatory and compliance budgets to surveillance and enforcement technology. At the same time, in light of the well-known weaknesses of automated systems, securities firms (and their regulators) must temper investment in automation with efforts to augment the agency of compliance professionals. This symposium contribution considers how investment in the professional development of compliance personnel can better integrate automated tools within established compliance and supervisory structures and thereby advance regulatory and operational objectives.
Mitigating Cyber Risk In It Supply Chains, Maureen Wallace
Mitigating Cyber Risk In It Supply Chains, Maureen Wallace
Global Business Law Review
This note argues that the United States needs to utilize current federal agencies to begin introducing cyber supply chain risk management regulation for IT supply chains. Cyber supply chain risk management is a critical area of cybersecurity that has barely been recognized by the United States government. The globalization of the digital world has introduced a new spectrum of risk management issues that affect the products exchanged by businesses and consumed by individuals and government agencies. While there have been some initiatives toward the promotion of tighter cybersecurity regulation, most initiatives only concern the public sector, leaving the private sector …
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
“Hello…It’S Me. [Please Don’T Sue Me!]” Examining The Fcc’S Overbroad Calling Regulations Under The Tcpa, Marissa A. Potts
Brooklyn Law Review
Americans have received unwanted telemarketing calls for decades. In response to a rapid increase in pre-recorded calls made using autodialer devices, Congress enacted the Telephone Consumer Protection Act (TCPA) in 1992. The TCPA imposes restrictions on calls made to consumers’ residences and wireless phones using autodialer devices, even if they are not telemarketing calls. Congress appointed the Federal Communications Commission (FCC) to prescribe rules and regulations to enforce the TCPA. In 2015, the FCC released an order that defined autodialer more broadly under the statute. Consequently, devices that have the potential to become autodialers in the future, even if they …
Playing Off-Key: Trans-Atlantic Data Regulation In A Discordant World, Jennifer L. Bauer
Playing Off-Key: Trans-Atlantic Data Regulation In A Discordant World, Jennifer L. Bauer
West Virginia Law Review
No abstract provided.
2016 – A Tumultuous Year Of The Revolt Against The Elites, Tan K. B. Eugene
2016 – A Tumultuous Year Of The Revolt Against The Elites, Tan K. B. Eugene
Research Collection Yong Pung How School Of Law
In a commentary, SMU Associate Professor of Law Eugene Tan noted that 2016 will probably be remembered as the year of the populist revolt against the elites, against the backdrop of bewildering disruptions and an abiding sense of displacement and control accentuated by technological advancements. He highlighted that the critical challenge is to bring trust back into the core of the relationship between those in power and the masses, adding that governments need to purposively deal with people's resentments, fury and fears.
The Question Concerning Technology In Compliance, Sean J. Griffith
The Question Concerning Technology In Compliance, Sean J. Griffith
Brooklyn Journal of Corporate, Financial & Commercial Law
In this symposium Essay, I apply insights from philosophy and psychology to argue that modes of achieving compliance that focus on technology undermine, and are undermined by, modes of achieving compliance that focus on culture. Insisting on both may mean succeeding at neither. How an organization resolves this apparent contradiction in program design, like the broader question of optimal corporate governance arrangements, is highly idiosyncratic. Firms should therefore be accorded maximum freedom in designing their compliance programs, rather than being forced by enforcement authorities into a set of de facto mandatory compliance structures.
Compliance, Technology, And Modern Finance, Tom C.W. Lin
Compliance, Technology, And Modern Finance, Tom C.W. Lin
Brooklyn Journal of Corporate, Financial & Commercial Law
An important transformation is happening in the financial industry. The rise of new technology and compliance has dramatically altered many of the key functions and functionaries of modern finance. Artificial intelligence, algorithmic programs, and supercomputers, instead of human actors, now constitute the core of many financial operations. Compliance officers have become just as critical to financial institutions as traders, bankers, and analysts. Finance as we knew it has changed and continues to change. This symposium Article offers a studied commentary on these unfolding changes, the crosscutting developments in compliance, technology, and modern finance. It examines the concurrent and intersecting ascents …
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Like A Bad Neighbor, Hackers Are There: The Need For Data Security Legislation And Cyber Insurance In Light Of Increasing Ftc Enforcement Actions, Jennifer Gordon
Brooklyn Journal of Corporate, Financial & Commercial Law
Privacy has come to the forefront of the technology world as third party hackers are constantly attacking companies for their customers’ data. With increasing instances of compromised customer information, the Federal Trade Commission (FTC) has been bringing suit against companies for inadequate data security procedures. The FTC’s newfound authority to bring suit regarding cybersecurity breaches, based on the Third Circuit’s decision in FTC v. Wyndham Worldwide Corp., is a result of inaction—Congress has been unable to pass sufficient cybersecurity legislation, causing the FTC to step in and fill the void in regulation. In the absence of congressional action, this self-proclaimed …
Spaceways: Airspace In Outer Space, Scott Haeffelin
Spaceways: Airspace In Outer Space, Scott Haeffelin
Space Traffic Management Conference
Forecasted future demand in space travel is driving the need for the development of space traffic management. Currently, orbital space traffic is mostly unregulated with internationally agreed upon best practices and self-interest driving space operators to avoid collisions with other spacecraft. This paper explores the future of space travel by presenting a concept of creating “airspace in space” or spaceways to manage the ever growing volumes of space traffic. Spaceways are analogous to airspace for aircraft with the goal of increasing levels of safety and reducing probabilities of collision. These goals can be achieved by creating traffic rules, defining valuable …
A Novel Approach For Controlled Deorbiting And Reentry Of Small Spacecraft, Larry H. Fineberg, Justin Treptow, Timothy Bass, Scott Clark, Yusef Johnson, Bradley Poffenberger
A Novel Approach For Controlled Deorbiting And Reentry Of Small Spacecraft, Larry H. Fineberg, Justin Treptow, Timothy Bass, Scott Clark, Yusef Johnson, Bradley Poffenberger
Space Traffic Management Conference
No abstract provided.
Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo
Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo
All Faculty Scholarship
Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the …
Optimal Property Rights For Emerging Natural Resources: A Case Study On Owning Atmospheric Moisture, Jianlin Chen
Optimal Property Rights For Emerging Natural Resources: A Case Study On Owning Atmospheric Moisture, Jianlin Chen
University of Michigan Journal of Law Reform
This Article critically examines the design of property rights for emerging natural resources—naturally occurring substances that humans have only recently come to be able to exploit viably—through a case study of how the fifty states allocate ownership in, and regulate the use of, atmospheric moisture, an issue that has emerged in the context of weather modification (particularly cloud seeding). Building on the surprising finding that legislative declarations of state ownership have not resulted in greater regulatory control or other substantial restrictions on private use, this Article highlights a dimension of property rights design that has yet to receive concerted scholarly …
Unconventional Methods For A Traditional Setting: The Use Of Virtual Reality To Reduce Implicit Racial Bias In The Courtroom, Natalie Salmanowitz
Unconventional Methods For A Traditional Setting: The Use Of Virtual Reality To Reduce Implicit Racial Bias In The Courtroom, Natalie Salmanowitz
The University of New Hampshire Law Review
The presumption of innocence and the right to a fair trial lie at the core of the United States justice system. While existing rules and practices serve to uphold these principles, the administration of justice is significantly compromised by a covert but influential factor: namely, implicit racial biases. These biases can lead to automatic associations between race and guilt, as well as impact the way in which judges and jurors interpret information throughout a trial. Despite the well-documented presence of implicit racial biases, few steps have been taken to ameliorate the problem in the courtroom setting. This Article discusses the …
Information Technology And Learning On-The-Job, James Bessen
Information Technology And Learning On-The-Job, James Bessen
Faculty Scholarship
Economists disagree how much technology raises demand for workers with pre-existing skills. But technology might affect wages another way: through skills learned on the job. Using instrumental variables on 9 panels of workers from 1989 to 2013, this paper estimates that workers who use information technology (IT) have wage growth that is about 2% greater than non-IT workers, all else equal, implying substantial learning. This effect persists over time, implying sustained productivity growth from IT. Also, it benefits workers both with and without college degrees. Because many more college-educated workers use IT, college wages grow faster, contributing to economic inequality.
The New Pcast Report To The President Of The United States On Forensic Science, Robert M. Sanger
The New Pcast Report To The President Of The United States On Forensic Science, Robert M. Sanger
Robert M. Sanger
Privatization Of The Judiciary, Eldar Haber
Privatization Of The Judiciary, Eldar Haber
Seattle University Law Review
The digital era invoked new challenges to judicial systems. The Internet enabled violation of privacy and intellectual property rights and enhanced the magnitude of criminal activity. Recognizing the inability of courts to handle a high magnitude of lawsuits, along with enforcement difficulties, policymakers worldwide chose to delegate quasi-judicial powers to online intermediaries that facilitate or enable such potential violations or infringements of rights. Search engines were first tasked to perform a quasi-judicial role under a notice-and-takedown regime to combat copyright infringement around the world. Recently, the European Union (EU) decided to delegate judicial authority to search engines by granting rights …
Newsroom: The Legal Impact Of Marine Debris 10-21-2016, Roger Williams University School Of Law
Newsroom: The Legal Impact Of Marine Debris 10-21-2016, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
The Internet Of Things: Where Privacy And Copyright Collide, Lidiya Mishchenko
The Internet Of Things: Where Privacy And Copyright Collide, Lidiya Mishchenko
Santa Clara High Technology Law Journal
The Internet of Things: Where Privacy and Copyright Collide
A Genre Theory Of Copyright, Omri Rachum-Twaig
A Genre Theory Of Copyright, Omri Rachum-Twaig
Santa Clara High Technology Law Journal
A Genre Theory of Copyright
Technological Neutrality: Recalibrating Copyright In The Information Age, Carys Craig
Technological Neutrality: Recalibrating Copyright In The Information Age, Carys Craig
Carys Craig
This article aims to draw the connection between how we conceptualize legal rights over information resources and our capacity to develop technologically neutral legal norms in the information age. More specifically, it identifies and critically examines three competing approaches to the idea of technological neutrality apparent in copyright jurisprudence. Ultimately, it is argued that true technological neutrality requires not simply the seamless expansion of legal rights into new technological contexts, but the careful, contextual recalibration of rights and interests in light of shifting values and changing circumstances. As a normative principle, technological neutrality in copyright law thus demands a nuanced …
Indifference And Secondary Liability For Copyright Infringement, Richard G. Kunkel
Indifference And Secondary Liability For Copyright Infringement, Richard G. Kunkel
Santa Clara High Technology Law Journal
Indifference and Secondary Liability for Copyright Infringement
Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow
Apple Watch-Ing You: Why Wearable Technology Should Be Federally Regulated, Grant Arnow
Loyola of Los Angeles Law Review
No abstract provided.
Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle
Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle
Michigan Journal of Race and Law
This Article examines how military automated surveillance and intelligence systems and techniques, when used by civilian police departments to enhance predictive policing programs, have reinforced racial bias in policing. I will focus on two facets of this problem. First, I investigate the role played by advanced military technologies and methods within civilian police departments. These approaches have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools and automates de facto penalization and containment based on race. Second, I will explore these …
How Computer Automation Affects Occupations: Technology, Jobs, And Skills, James Bessen
How Computer Automation Affects Occupations: Technology, Jobs, And Skills, James Bessen
Faculty Scholarship
This paper investigates basic relationships between technology and occupations. Building a general occupational model, I look at detailed occupations since 1980 to explore whether computers are related to job losses or other sources of wage inequality. Occupations that use computers grow faster, not slower. This is true even for highly routine and mid-wage occupations. Estimates reject computers as a source of significant net technological unemployment or job polarization. But computerized occupations substitute for other occupations, shifting employment and requiring new skills. Because new skills are costly to learn, computer use is associated with substantially greater within-occupation wage inequality.
Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton
Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton
Northwestern University Law Review
Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …