Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Science and Technology Law
A Toothless Tcpa: An Analysis Of Article Iii Standing, Personal Jurisdiction, And The Disjuncture Problem’S Impact On The Efficacy Of The Telephone Consumer Protection Act, Sebastian W. Johnson
A Toothless Tcpa: An Analysis Of Article Iii Standing, Personal Jurisdiction, And The Disjuncture Problem’S Impact On The Efficacy Of The Telephone Consumer Protection Act, Sebastian W. Johnson
University of Cincinnati Law Review
No abstract provided.
Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley
Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley
University of Cincinnati Law Review
Law enforcement officers performing drug interdiction on interstate highways have to decide nearly every day whether there is reasonable suspicion to detain motorists until a trained dog can sniff for the presence of drugs. The officers’ assessments are often wrong, however, and lead to unnecessary detentions of innocent persons and the suppression of drugs found on guilty ones. We propose a computational method of evaluating suspicion in these encounters and offer experimental results from early efforts demonstrating its feasibility. With the assistance of large language and predictive machine learning models, it appears that judges, advocates, and even police officers could …
The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson
The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson
University of Cincinnati Law Review
This Article sheds light on a unique but centrally important “twenty-first century” issue involving electronic discovery in federal civil litigation that is just beginning to percolate in federal district courts. Historically, courts have held that a document attached to or enclosed with another document must be produced together when produced in response to a discovery request, as that is how the document was “kept in the usual course of business” and how it is “ordinarily maintained or in a reasonably usable form,” as the Federal Rules of Civil Procedure have required for decades. Today, parties are pushing back on whether …
The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba
The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba
Faculty Scholarship
Whistleblowers and leakers wield significant influence in technology law and policy. On topics ranging from cybersecurity to free speech, tech whistleblowers spur congressional hearings, motivate the introduction of legislation, and animate critical press coverage of tech firms. But while scholars and policymakers have long called for transparency and accountability in the tech sector, they have overlooked the significance of individual disclosures by industry insiders—workers, employees, and volunteers—who leak information that firms would prefer to keep private.
This Article offers an account of the rise and influence of tech whistleblowing. Radical information asymmetries pervade tech law and policy. Firms exercise near-complete …