Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (107)
- Internet Law (69)
- Privacy Law (62)
- Computer Law (56)
- Criminal Law (40)
-
- Evidence (36)
- International Law (29)
- Comparative and Foreign Law (27)
- Law and Society (25)
- Fourth Amendment (23)
- Administrative Law (22)
- Constitutional Law (21)
- Health Law and Policy (21)
- Communications Law (18)
- Criminal Procedure (17)
- First Amendment (17)
- Entertainment, Arts, and Sports Law (16)
- Consumer Protection Law (15)
- Military, War, and Peace (15)
- Law and Economics (14)
- National Security Law (14)
- Legislation (13)
- Antitrust and Trade Regulation (11)
- Civil Rights and Discrimination (11)
- Courts (11)
- Engineering (11)
- Property Law and Real Estate (11)
- Social and Behavioral Sciences (11)
- Institution
-
- UIC School of Law (46)
- Selected Works (45)
- Schulich School of Law, Dalhousie University (19)
- University of Michigan Law School (14)
- Brooklyn Law School (13)
-
- American University Washington College of Law (11)
- The Catholic University of America, Columbus School of Law (9)
- University of Minnesota Law School (9)
- UC Law SF (8)
- University of Pennsylvania Carey Law School (8)
- Case Western Reserve University School of Law (7)
- University of Colorado Law School (7)
- Boston University School of Law (6)
- Santa Clara Law (6)
- University of Georgia School of Law (6)
- Columbia Law School (5)
- New York Law School (5)
- Seattle University School of Law (5)
- SelectedWorks (5)
- Embry-Riddle Aeronautical University (4)
- Maurer School of Law: Indiana University (4)
- Southern Methodist University (4)
- Duke Law (3)
- Fordham Law School (3)
- Mitchell Hamline School of Law (3)
- Pace University (3)
- Pepperdine University (3)
- Roger Williams University (3)
- University of Miami Law School (3)
- Vanderbilt University Law School (3)
- Keyword
-
- Technology (18)
- Privacy (16)
- Fourth Amendment (9)
- Biotechnology (8)
- Evidence (8)
-
- Copyright (7)
- Fourth amendment (7)
- Innovation (7)
- Law (7)
- Law and Technology (7)
- Patents (7)
- Big data (6)
- Data (6)
- Science and Technology (6)
- Search (6)
- DNA databases (5)
- Intellectual property (5)
- Probability (5)
- Regulation (5)
- Search and seizure (5)
- Administrative law (4)
- Algorithms (4)
- DNA (4)
- Health Law and Policy (4)
- Internet (4)
- Law and Society (4)
- Neuroscience (4)
- Patent (4)
- Public Law and Legal Theory (4)
- SSRN (4)
- Publication
-
- UIC Review of Intellectual Property Law (32)
- David Kaye (23)
- Canadian Journal of Law and Technology (17)
- Faculty Scholarship (15)
- UIC John Marshall Journal of Information Technology & Privacy Law (13)
-
- All Faculty Scholarship (9)
- Minnesota Journal of Law, Science & Technology (9)
- Catholic University Journal of Law and Technology (8)
- Publications (8)
- UC Law Science and Technology Journal (8)
- Articles in Law Reviews & Other Academic Journals (7)
- Journal of Law, Technology, & the Internet (7)
- Joelle A. Moreno (6)
- Santa Clara High Technology Law Journal (6)
- Brooklyn Journal of Corporate, Financial & Commercial Law (5)
- Michigan Telecommunications & Technology Law Review (5)
- Seattle University Law Review (5)
- Stephen E Henderson (5)
- American University National Security Law Brief (4)
- Brooklyn Journal of International Law (4)
- Georgia Journal of International & Comparative Law (4)
- Articles (3)
- Articles & Chapters (3)
- Faculty Journal Articles and Book Chapters (3)
- Michigan Law Review (3)
- University of Miami Law Review (3)
- Vanderbilt Journal of Entertainment & Technology Law (3)
- Duke Law & Technology Review (2)
- Faculty Works (2)
- Fordham Urban Law Journal (2)
- Publication Type
- File Type
Articles 31 - 60 of 313
Full-Text Articles in Science and Technology Law
Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton
Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton
Northwestern University Law Review
Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …
Sales Suppression: The International Dimension, Richard Thompson Ainsworth
Sales Suppression: The International Dimension, Richard Thompson Ainsworth
Faculty Scholarship
Sales transaction taxes are highly susceptible to technology fraud, which is an inevitable result of today’s widespread reliance on technology to document taxed transactions. Technology can be (and is) manipulated to defeat the collection of these taxes. Both the U.S. retail sales tax (RST) and the European value added tax (VAT) are vulnerable to technology-based fraud. This Article concerns sales suppression — intentionally not recording sales — in the RST, and at the final stage of the VAT, the retail stage, when tax is collected from final consumers.
The modern electronic cash register (ECR)/point of sale (POS) system is vulnerable …
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Testimony On Unmanned Aircraft Systems Rules And Regulations, Stephen E. Henderson
Stephen E Henderson
Ebola, Experimental Medicine, Economics, And Ethics: An Evaluation Of International Disease Outbreak Law, Sara L. Dominey
Ebola, Experimental Medicine, Economics, And Ethics: An Evaluation Of International Disease Outbreak Law, Sara L. Dominey
Georgia Journal of International & Comparative Law
No abstract provided.
Marine Law Symposium: Legal And Policy Approaches To Reduce Marine Debris In New England 11/04/2016, Roger Wiliams University School Of Law
Marine Law Symposium: Legal And Policy Approaches To Reduce Marine Debris In New England 11/04/2016, Roger Wiliams University School Of Law
School of Law Conferences, Lectures & Events
No abstract provided.
Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder
Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder
The University of Cincinnati Intellectual Property and Computer Law Journal
Under the guise of consumer protection, lawyers and bar associations have used disparate litigious mechanisms to thwart, inadvertently or not, the use of self-help legal technology. This paper will demonstrate that such adversity is not logical after a consideration of the technical functions that the software performs and unduly restricts underserved populations’ access to the law because of the misapplication of policy to vaguely worded laws. This paper will provide a thorough analysis of legal action taken against the high-profile company LegalZoom under the theory of unauthorized practice of law provides direct support of this claim. Summary and critique of …
The Academy Standards Board For Firearms And Toolmarks, Robert M. Sanger
The Academy Standards Board For Firearms And Toolmarks, Robert M. Sanger
Robert M. Sanger
21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, And Wmds, Mary Ellen O'Connell
21st Century Arms Control Challenges: Drones, Cyber Weapons, Killer Robots, And Wmds, Mary Ellen O'Connell
Mary Ellen O'Connell
The world faces tough arms control challenges from preventing the development and use of weapons of mass destruction to regulating the new weapons of the computer revolution. This article considers what works in arms control. Using military force in violation of international law to destroy nuclear facilities, to stop weapons shipments, or to punish the use of prohibited weapons typically fails. Diplomacy paired with lawful counter-measures has the superior track record. Reviving the art of diplomacy and re-committing to authentic international law will pay dividends in peace and security.
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman
Law School Blogs
No abstract provided.
"I'Ll See": How Surveillance Undermines Privacy By Eroding Trust, Robert H. Sloan, Richard Warner
"I'Ll See": How Surveillance Undermines Privacy By Eroding Trust, Robert H. Sloan, Richard Warner
Santa Clara High Technology Law Journal
"I'll See": How Surveillance Undermines Privacy By Eroding Trust
Can Digital Speech Loosen The Gordian Knot Of Reputation Law?, Elizabeth A. Kirley
Can Digital Speech Loosen The Gordian Knot Of Reputation Law?, Elizabeth A. Kirley
Santa Clara High Technology Law Journal
Can Digital Speech Loosen the Gordian Knot of Reputation Law?
Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher
Anonymous Armies: Modern “Cyber-Combatants” And Their Prospective Rights Under International Humanitarian Law, Jake B. Sher
Pace International Law Review
Cyber-attacks take many forms, only some of which are applicable to the law of war. This Comment discusses only those attacks sponsored by a government or non-state entity that have the goal of affecting morale or gaining political advantage, or those attacks amounting to tactical strikes on state or civilian infrastructure. In that vein, this Comment proposes the adoption of a new legal framework for determining the threshold that marks a participant in such a cyber-attack as a “cyber-combatant” by adapting the framework set by the Geneva Conventions and existing custom. This definition should encompass cyber-attacks perpetrated by states, unrecognized …
After O2 Micro: The Court's Evolving Duty To Map Words To Things, Peter E. Gratzinger
After O2 Micro: The Court's Evolving Duty To Map Words To Things, Peter E. Gratzinger
Santa Clara High Technology Law Journal
After O2 Micro: The Court's Evolving Duty to Map Words to Things
The Lautenberg Act: Chemical Safety Overhaul Of The Toxic Substances Control Act, Alyssa S. Rosen
The Lautenberg Act: Chemical Safety Overhaul Of The Toxic Substances Control Act, Alyssa S. Rosen
Elisabeth Haub School of Law Faculty Publications
On June 22, 2016, President Obama signed the Frank Lautenberg Chemical Safety for the 21st Century Act (Lautenberg Act), a landmark bipartisan compromise legislation designed to overhaul the Toxic Substances Control Act (TSCA). The Lautenberg Act makes it easier for the U.S. Environmental Protection Agency (EPA) to regulate toxic substances while providing the chemical industry with regulatory clarity and certainty. Law Librarians, practicing lawyers, and academics have taken note of this groundbreaking law that most likely will set the template for the next generation of environmental reform by tackling issues such as preemption of state law, protection of vulnerable populations, …
The Erosion Of Autonomy In Online Consumer Transactions, Eliza Mik
The Erosion Of Autonomy In Online Consumer Transactions, Eliza Mik
Eliza Mik
Online businesses influence consumer behaviour by means of a wide range of technologies that determine what information is displayed as well as how and when it is displayed. This creates an unprecedented power imbalance between the transacting parties, raising questions not only about the permissible levels of procedural exploitation in contract law, together with the adequacy of existing consumer protections but also about the impact of technology on consumer autonomy. There is, however, no single technology that threatens the latter. It is the combined, mutually-enforcing effect of multiple technologies that influence consumer choices at different stages in the transacting process, …
Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico
Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico
University of Miami Law Review
Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …
Vatcoin: The Gcc's Cryptotaxcurrency, Richard Thompson Ainsworth, Musaad Alwohaibi, Mike Cheetham
Vatcoin: The Gcc's Cryptotaxcurrency, Richard Thompson Ainsworth, Musaad Alwohaibi, Mike Cheetham
Faculty Scholarship
Bitcoin is the world’s first peer-to-peer cryptocurrency. VATCoin is similar, but it is used in tax compliance. Both Bitcoin and VATCoin are distributive ledger applications built upon blockchain technology. Bitcoin’s ledger is public; VATCoin’s is private. If adopted, VATCoin could well become the world’s first government-mandated cryptotaxcurrency. Unlike Bitcoin, VATCoin will not be a speculative currency. It is always fixed to the home currency.
This paper proposes that the Gulf Cooperation Council (GCC) adopt VATCoin in its VAT Framework. The GCC is expected to have multiple 5% VATs in place by January 1, 2018. There is an ample amount of …
Vat In The Gcc - Missing Trader Frauds, Richard Thompson Ainsworth, Musaad Alwohaibi
Vat In The Gcc - Missing Trader Frauds, Richard Thompson Ainsworth, Musaad Alwohaibi
Faculty Scholarship
All VATs are susceptible to missing trader (MT) fraud. VATs adopted in an economic community are particularly more susceptible. The EU, for example, loses in excess of €100b annually to this fraud. Given the anticipated adoption of a European-style credit-invoice VAT in the GCC by January 1, 2018, this paper offers a technology-based solution involving the real-time tracking of taxable transactions with centrally collected (securely encrypted) data flows that are risk-analyzed by artificial intelligence (AI).
That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler
That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler
University of Miami Law Review
In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.
Neuroimaging Evidence: A Solution To The Problem Of Proving Pain And Suffering?, Brady Somers
Neuroimaging Evidence: A Solution To The Problem Of Proving Pain And Suffering?, Brady Somers
Seattle University Law Review
Envision a plaintiff who was injured on the job at a construction site due to his employer’s negligence. The plaintiff has chronic back pain, but it is not verifiable on an X-ray, nor is a physical injury readily discernible by any other technology. Presently, fact finders are given the broad discretion to decide whether they find this plaintiff credible, and accordingly, whether they believe he is truly in pain and deserves damages for pain and suffering. However, neuroimaging—specifically functional magnetic resonance imaging (fMRI)—could allow those fact finders to visualize whether this plaintiff was hurting by depicting the unique signatures that …
Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann
Wearable Fitness Devices: Personal Health Data Privacy In Washington State, Steven Spann
Seattle University Law Review
Private entities are increasingly targeting individuals in the United States and around the world to gather personal data for such purposes as product development, market identification, and insurance risk assessment. While credit card records and online browsing histories have long been the medium through which this data is gathered, in more recent years, wearable fitness devices have added a new dimension to data production and collection. These devices are capable of gathering a significant amount of data regarding a person’s physical and physiological characteristics, thereby exposing these data producers to personal privacy infringement. Washington State lawmakers and citizens must be …
Patents And Traditional Knowledge Of The Uses Of Plants: Is A Communal Patent Regime Part Of The Solution To The Scourge Of Bio Piracy, Ikechi Mgbeoji
Patents And Traditional Knowledge Of The Uses Of Plants: Is A Communal Patent Regime Part Of The Solution To The Scourge Of Bio Piracy, Ikechi Mgbeoji
Ikechi Mgbeoji
No abstract provided.
A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof
A New Take On An Old Problem: Employee Misclassification In The Modern Gig-Economy, Jennifer Pinsof
Michigan Telecommunications & Technology Law Review
For decades, U.S. labor and employment law has used a binary employment classification system, labeling workers as either employees or independent contractors. Employees are granted a variety of legal protections, while independent contractors are not. However, the explosion of the gig-economy—which connects consumers with underutilized resources—has produced a growing number of workers who do not seem to fit into either category. Though far from traditional employees, gig-workers bear little resemblance to independent contractors. Forced to choose, however, most gig-economy companies label their workers as independent contractors, depriving them of many basic worker-protections. Gig-workers have turned to the courts, hoping to …
Uncle Sam Is Watching You: A Recommendation For Minnesota Legislation Regarding Police Drone Use, Joe R. Paquette
Uncle Sam Is Watching You: A Recommendation For Minnesota Legislation Regarding Police Drone Use, Joe R. Paquette
Mitchell Hamline Law Review
No abstract provided.
Platform Neutrality: Enhancing Freedom Of Expression In Spheres Of Private Power, Frank Pasquale
Platform Neutrality: Enhancing Freedom Of Expression In Spheres Of Private Power, Frank Pasquale
Faculty Scholarship
No abstract provided.
Taxation By Condition: Spectrum Repurposing At The Fcc And The Prolonging Of Spectrum Exhaust, T. Randolph Beard, George S. Ford, Lawrence J. Spiwak, Michael Stern
Taxation By Condition: Spectrum Repurposing At The Fcc And The Prolonging Of Spectrum Exhaust, T. Randolph Beard, George S. Ford, Lawrence J. Spiwak, Michael Stern
UC Law Science and Technology Journal
In this article, we show how the Federal Communications Commission’s regulatory process may be used by special interests (and the Agency) to impede the efficient functioning of a secondary market for commercial spectrum. In particular, we show that imposing (and threatening to impose) significant conditions when firms seek to repurpose spectrum from a low-value to a highervalue use acts as a “tax” and thus reduces the incentives of firms to exchange spectrum in the secondary market. As a result, “taxation by condition” will discourage the larger scale transactions necessary to resolve the acknowledged spectrum shortages in the commercial mobile wireless …
You Can Dance If You Want To? Initial Interpretations Of The Bpcia’S Patent Dance With Sandoz And Amgen, Jenny M. Alsup
You Can Dance If You Want To? Initial Interpretations Of The Bpcia’S Patent Dance With Sandoz And Amgen, Jenny M. Alsup
UC Law Science and Technology Journal
As patents covering brand-name biologics begin to expire, biosimilar manufacturers are preparing to enter the market. Since its enactment in 2010, many have speculated on how the Biologics Price Competition and Innovation Act will influence competition and innovation, and whether the provisions struck the right balance. Now for the first time, the judiciary is interpreting the so-called “patent dance,” the Act’s information exchange and litigation provisions, in decisions that will impact the biosimilar landscape in the years to come. Two cases involving the biologic manufacturers Sandoz and Amgen illustrate the Act’s susceptibility to different interpretations.
The Standard Of Review For Claim Construction In Inter Partes Review, Alana Canfield Mannigé
The Standard Of Review For Claim Construction In Inter Partes Review, Alana Canfield Mannigé
UC Law Science and Technology Journal
The Court of Appeals for the Federal Circuit (Federal Circuit) hears appeals from the United States Patent & Trademark Office (PTO). Recently, the American Invents Act expanded the PTO’s power in the patent world by creating new types of proceedings, including Inter Partes Review (IPR), by which one may challenge the validity of a patent. To determine the validity of patent claims in IPR proceedings, the PTO must first perform claim construction. As an administrative agency, the decisions of the PTO (such as claim construction) should be accorded significant deference by way of the Administrative Procedure Act (APA). In the …
The Fcc And The “Pre-Internet”, John Blevins
The Fcc And The “Pre-Internet”, John Blevins
Indiana Law Journal
Network neutrality has dominated broadband policy debates for the past decade. While important, network neutrality overshadows other policy levers that are equally important to the goals of better, cheaper, and more open broadband service. This lack of perspective has historical precedent—and understanding this history can help refocus today’s policy debate. In the 1960s and 1970s, telephone companies threatened the growth of the nascent data industry. The FCC responded with a series of rulemakings known as the “Computer Inquiries” proceedings. In the literature, Computer Inquiries enjoys hallowed status as a key foundation of the Internet’s rise.
This Article, however, argues that …
Surrogacy And Citizenship: A Conjunctive Solution To A Global Problem, Caitlin Pyrce
Surrogacy And Citizenship: A Conjunctive Solution To A Global Problem, Caitlin Pyrce
Indiana Journal of Global Legal Studies
People around the world are turning to surrogacy when they are unable to conceive by traditional means. When surrogacy turns traditional notions of parentage upside down, however, countries struggle to find efficient regulations that protect their own citizens, while still recognizing the increasingly global nature of modern society. Children born through surrogacy arrangements between Thai surrogate mothers and Australian intended parents have been confronted with the consequences of inadequate regulation. This note argues that in addition to revising surrogacy legislation to reflect the increasingly transient nature of society, countries must make mirror citizenship reform so children born through surrogacy are …