Open Access. Powered by Scholars. Published by Universities.®

Transnational Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Transnational Law

Targeted Killing: A Legal And Political History, Markus Gunneflo Dec 2015

Targeted Killing: A Legal And Political History, Markus Gunneflo

Markus Gunneflo

Looking beyond the current debate’s preoccupation with the situations of insecurity of the second intifada and 9/11, this book reveals how targeted killing is intimately embedded in both Israeli and US statecraft and in the problematic relation of sovereign authority and lawful violence underpinning the modern state system. The book details the legal and political issues raised in targeted killing as it has emerged in practice including questions of domestic constitutional authority, the norms on the use of force in international law, the law of targeting and human rights. The distinctiveness of Israeli and US targeted killing is accounted for …


Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim May 2015

Regulating Access To Databases Through Antitrust Law, 2006 Stan. Tech. L. Rev. 7 (2006), Daryl Lim

Daryl Lim

It is largely uncontroversial that the “creative” effort in a database will be protected by copyright. However, any effort to extend protection to purely factual databases creates difficulties in determining the proper method and scope of protection. This Paper argues that antitrust law can be used to supplement intellectual property law in maintaining the “access-incentive” balance with respect to databases. It starts from the premise that a trend toward “TRIPs-plus” rights in databases, whatever its form, is inevitable. The reason is a simple, but compelling one: business needs shape the law. Various means of database access regulation are explored and …


Internet Casinos: A Sure Bet For Money Laundering, Jon Mills Apr 2015

Internet Casinos: A Sure Bet For Money Laundering, Jon Mills

Jon L. Mills

Since the end of World War II, American society has seen the emergence of technology promising to make life easier, better and longer lasting. The more recent explosion of the Internet is fulfilling the dreams of the high-tech pundits as it provides global real-time communication links and makes the world's knowledge universally available. Privacy concerns surrounding the develop-ment of the Internet have mounted, and in response, service providers and web site operators have enabled web users to conduct transactions in nearly complete anonymity. While anonymity respects individual privacy, anonymity also facilitates criminal activities needing secrecy. One such activity is money …