Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- The Catholic University of America, Columbus School of Law (19)
- Schulich School of Law, Dalhousie University (13)
- Southern Methodist University (9)
- UIC School of Law (5)
- American University Washington College of Law (2)
-
- Georgia State University College of Law (1)
- Marquette University Law School (1)
- Maurer School of Law: Indiana University (1)
- Pepperdine University (1)
- University of Maine School of Law (1)
- University of Michigan Law School (1)
- University of Oklahoma College of Law (1)
- Vanderbilt University Law School (1)
- William & Mary Law School (1)
- Keyword
-
- Privacy (3)
- Copyright (2)
- Cyberspace (2)
- 23andMe (1)
- ADR (1)
-
- Acquired distinctiveness (1)
- Acquisition of knowledge (1)
- Affiar (1)
- Affiars (1)
- Aggregation and commercialization of data (1)
- Alternative dispute resolution (1)
- Ancestry.com (1)
- Artificial intelligence (1)
- Ashley Madison (1)
- Augmented reality (1)
- Auto (1)
- Automated agents (AA) (1)
- Autonomous (1)
- Autonomous cars (1)
- Bad news (1)
- Big data (1)
- Cheating (1)
- China (1)
- Chinese copyright law (1)
- Civil liberties (1)
- Cloud computing (1)
- Compulsory license (1)
- Computer as Social Agents (COSA) model (1)
- Computer programming (1)
- Cyber attacks (1)
- Publication
-
- Catholic University Journal of Law and Technology (19)
- Canadian Journal of Law and Technology (13)
- SMU Science and Technology Law Review (9)
- UIC John Marshall Journal of Information Technology & Privacy Law (3)
- American University Law Review (2)
-
- UIC Review of Intellectual Property Law (2)
- Georgia State University Law Review (1)
- Indiana Law Journal (1)
- Maine Law Review (1)
- Marquette Intellectual Property Law Review (1)
- Michigan Telecommunications & Technology Law Review (1)
- Oklahoma Journal of Law and Technology (1)
- Pepperdine Dispute Resolution Law Journal (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
- William & Mary Law Review (1)
Articles 1 - 30 of 57
Full-Text Articles in Science and Technology Law
Rethinking Ucita: Lessons From The Open Source Movement, Matthew D. Stein
Rethinking Ucita: Lessons From The Open Source Movement, Matthew D. Stein
Maine Law Review
For those within the information technology (IT) industry, the phrase “open source” has been as prominent at water cooler and boardroom discussions over the last several years as the phrase “out source.” Open source is at once a software development model, a business model, a social movement, and a philosophy that has recently garnered attention from outside of the IT sphere. As such, the topic has become increasingly fertile ground for academic scholarship from several disciplines. Economists, legal academics and practitioners, computer engineers, and social commentators have offered their varying perspectives on open source software. Whether or not this attention …
Property Rights In Augmented Reality, Declan T. Conroy
Property Rights In Augmented Reality, Declan T. Conroy
Michigan Telecommunications & Technology Law Review
Increasingly, cities, towns, and even rural communities are being slowly reshaped by a dynamic yet initially imperceptible phenomenon: the elaboration of augmented reality. Through applications that place virtual features over specific, real-world locations, layers of augmented reality are proliferating, adding new elements to an increasingly wide range of places. However, while many welcome the sudden appearance of arenas for battling digital creatures in their neighborhood or the chance to write virtual messages on their neighbor’s wall, the areas being augmented oftentimes are privately owned, thereby implicating property rights. Many intrusions, of course, are de minimis: an isolated, invisible Pikachu unexpectedly …
User-Friendly Taxpaying, Kathleen Delaney Thomas
User-Friendly Taxpaying, Kathleen Delaney Thomas
Indiana Law Journal
Technology is revolutionizing our lives. With the touch of a button or a simple voice command, we can instantly order groceries, get directions, or find the nearest sushi restaurant. Sensibly, the private sector has capitalized on these recent innovations to drive up profits. To sell more laundry detergent, Amazon now enables consumers to order refills by simply pressing the “dash button” mounted above their laundry machines. Starbucks lures more customers by allowing them to pre-order online and have their drink waiting when they arrive at the store. The theory behind this approach is simple: if you want someone to use …
Piracy On Peer-To-Peer File Sharing Networks: Why A Streamlined Online Dispute Resolution System Should Not Be Forgotten In The Shadow Of A Federal Small Claims Tribunal, Naomi Gemmell
Pepperdine Dispute Resolution Law Journal
This Article proposes application of an ADR system for resolving online copyright disputes related to P2P file sharing. Section II provides an overview of P2P file sharing networks and associated copyright infringement. Section III explores current approaches that fall short in resolving P2P copyright disputes, namely the Digital Millennium Copyright Act, litigation, and private agreements. Section IV examines the two primary proposed solutions to online copyright disputes: alternative dispute resolution and federal small claims. Section V recommends that a streamlined online dispute resolution system is necessary (even if a federal small claims tribunal is adopted), and concludes.
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
Oklahoma Journal of Law and Technology
No abstract provided.
Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard
Is Your Health Data Really Private? The Need To Update Hipaa Regulations To Incorporate Third-Party And Non-Covered Entities, Latena Hazard
Catholic University Journal of Law and Technology
This note argues that the current framework that governs health care applications and consumer privacy is slacking and outlines strategies to ensure protection against third party accessibility of information that consumers deem private.
Table Of Contents
Catholic University Journal of Law and Technology
No abstract provided.
Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini
Protecting Privacy In The Era Of Smart Toys: Does Hello Barbie Have A Duty To Report, Corinne Moini
Catholic University Journal of Law and Technology
No abstract provided.
#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu
#Cautionbusinesses: Using Competitors' Hashtags Could Possibly Lead To Trademark Infringement, Debbie Chu
Catholic University Journal of Law and Technology
No abstract provided.
Section 337 Of The Tariff Act Of 1930 And Its Impacts On China, Yiqing Yin
Section 337 Of The Tariff Act Of 1930 And Its Impacts On China, Yiqing Yin
Catholic University Journal of Law and Technology
337 of the Tariff Act of 1930 (“Section 337”) is one of the statutes that prohibit unfair trade or unfair competition in importation, and it aims at protecting intellectual property at the United States borders. Because of the international impacts of Section 337 and the injunctive nature of its remedies, the application of the statute has profound impacts on the trade between U.S. and other countries.
China is a country that has enormous trade with the U.S and imports large amounts of goods to the U.S. each year. Moreover, the weak intellectual property protection in China has been a serious …
Examining The Legalization Of Daily Fantasy Sports, Mark Dourmashkin
Examining The Legalization Of Daily Fantasy Sports, Mark Dourmashkin
Catholic University Journal of Law and Technology
No abstract provided.
Candidate Appearances, Equal Time, And The Fcc's Online Public File Database: Empirical Data On Tv Station Compliance During The 2016 Presidential Primary, Christopher Terry
Candidate Appearances, Equal Time, And The Fcc's Online Public File Database: Empirical Data On Tv Station Compliance During The 2016 Presidential Primary, Christopher Terry
Catholic University Journal of Law and Technology
Following the appearances of presidential candidates Donald Trump, Bernie Sanders and Hillary Clinton on episodes of Saturday Night Live, local television affiliates were required to upload documents related to the appearances to the FCC’s online public file database. After discussing the FCC’s database, the Bona Fide News Exception and the modern application of Section 315’s Equal Time Requirements, this study examines the compliance by the local NBC affiliates in the top 100 television markets with the public file requirements for candidate appearances and subsequent equal time requests as a test of station compliance with the requirements of the FCC’s online …
How Might The Supreme Court, If It Reviews The Federal Communication's 2015 Open Internet Order, Utilize The Chevron And Arbitrary And Capricious Tests?, John B. Meisel
Catholic University Journal of Law and Technology
The article focuses on two Supreme Court decisions, King v. Burwell and FCC v. Fox Televisions Stations, Inc., that provide diametrically different models for how deferential a court should be when it reviews administrative action. The former case addresses how deferential a court should be for an agency’s statutory interpretation of an ambiguous statute for a question that has significant economic and political effects but Congress had not expressly delegated the question to the agency. The latter case addresses how deferential a court should be when an agency’s changes a policy that is within its statutory authority. These two …
Nobody Puts Blockchain In A Corner: The Disruptive Role Of Blockchain Technology In The Financial Services Industry And Current Regulatory Issues, Elizabeth Sara Ross
Nobody Puts Blockchain In A Corner: The Disruptive Role Of Blockchain Technology In The Financial Services Industry And Current Regulatory Issues, Elizabeth Sara Ross
Catholic University Journal of Law and Technology
This Note examines the disruptive effects that distributed ledger technology will have on payment systems and the financial services industry. It discusses how financial technology companies and banks will need to adapt to ensure that American consumers and banks, as well as the American economy at large, remain secure and efficient within an increasingly online and global financial system. This Note argues that the disjointed digital currency licensing regimes and complex landscape of state-by-state money transmission licensing directly threaten to stifle innovation, capital formation, consumer protection, and national cybersecurity. To ensure the U.S. remains competitive in the global financial revolution, …
Having An Affair May Shorten Your Life: The Ashley Madison Suicides, Sakinah N. Jones
Having An Affair May Shorten Your Life: The Ashley Madison Suicides, Sakinah N. Jones
Georgia State University Law Review
Ashley Madison is an online dating service originally designed for people in committed relationships who want to cheat on their partners. In 2015, the website claimed to be “100% discreet.” Ashley Madison’s FAQs promised that its users would never compromise their “safety, privacy or security” and would never have to reveal their identities unless they chose to.
Ashley Madison’s concept attracted over forty million ostensibly anonymous members to its site. In July 2015, a group calling itself The Impact Team (Impact) hacked into Ashley Madison’s parent company, Avid Life Media, Inc. (Avid Life), breaching its security walls and reaching directly …
Forcing Players To Walk The Plank: Why End User License Agreements Improperly Control Players’ Rights Regarding Microtransactions In Video Games, Chelsea King
William & Mary Law Review
No abstract provided.
Table Of Contents
Catholic University Journal of Law and Technology
No abstract provided.
Telecommunications Infrastructure: Another O-Ring In The Economic Development Of The Third World, James Germano
Telecommunications Infrastructure: Another O-Ring In The Economic Development Of The Third World, James Germano
Catholic University Journal of Law and Technology
No abstract provided.
How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs
How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs
Catholic University Journal of Law and Technology
This comment asserts that there is a need for an update to the multifactor test considered by courts in determining the strength of a trademark. Traditional factors include the expenses an entity can afford to pay in advertising, but do not give any weight to the presence of the entity on social media to reach its target consumer group.
Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland
Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland
Catholic University Journal of Law and Technology
No abstract provided.
Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin
Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin
Catholic University Journal of Law and Technology
No abstract provided.
Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones
Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones
Catholic University Journal of Law and Technology
No abstract provided.
Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti
Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti
Catholic University Journal of Law and Technology
No abstract provided.
Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton
Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton
Catholic University Journal of Law and Technology
This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing an …
Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy
Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy
American University Law Review
Smartphones have swiftly replaced most-if not all-conventional methods of sending, receiving, and storing personal information. Letters, address books, calendars, and trips to the bank have been rendered obsolete by tools such as text messaging, digital contacts, iCal, and mobile banking apps. Although these digital alternatives are convenient, they are not immune from attack. Therefore, to remain competitive, technology companies must maintain safe and secure platforms on which users may freely store and share their personal information.
Apple Inc., for example, strives to protect its users' intimate information, consequently earning a reputation for prioritizing security. Like a king protecting his castle, …
Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar
Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar
American University Law Review
The internet is a marvel of human accomplishment and a feat of technological engineering, which allows nearly instantaneous communication across the globe-an act once considered the stuff of science fiction. It has been lauded for its environmental benefits, such as reducing paper production and waste, but, as with any great accomplishment, there are unintended consequences. The increased proliferation of electronic devices to access the internet and the exponential advancement of those devices results in large amounts of electronic waste-a problem in its own right. Compounding the issue, for all of those internet-enabled devices to work, they must rely on the …
Ignorance Of Technology A Pass For Violating Child Pornography Laws? – What’S The Cache?, 33 J. Marshall J. Info. Tech. & Privacy L. 47 (2017), Angela Lewosz
UIC John Marshall Journal of Information Technology & Privacy Law
This comment explains how the cache works, discusses computer forensic examinations, and provides a history of child pornography laws. It next explores how the courts have interpreted the changing pornography laws with advances in technology. It then specifically assesses the different approaches the courts take when reconciling the mens rea (the mental element) of knowledge in accordance with possession. Finally, this comment analyzes the strengths and flaws in the courts’ arguments and suggests a proposal for how the courts should deal with the cache in relation to the criminalization of possession within the federal child pornography laws.
Exposure To Police Brutality Allows For Transparency And Accountability Of Law Enforcement, 33 J. Marshall J. Info. Tech. & Privacy L. 75 (2017), Kendal Harden
UIC John Marshall Journal of Information Technology & Privacy Law
Thanks to the advancements in technology and valor of citizens, the public is finally able to understand the true severity of police brutality within the United States. The following considerations aim to address the lack of accountability and transparency of police brutality in the United States today. Part III will show how advancements in technology brings police brutality to the forefront of our nation’s issues by creating an informed society. Part IV will describe how individual states control the use of private cameras and cell phones of citizens to capture occurrences of police brutality. States do this by employing anti-wiretapping …