Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Social and Behavioral Sciences

3d Printing And Healthcare: Will Laws, Lawyers, And Companies Stand In The Way Of Patient Care?, Evan R. Youngstrom Apr 2016

3d Printing And Healthcare: Will Laws, Lawyers, And Companies Stand In The Way Of Patient Care?, Evan R. Youngstrom

Evan R. Youngstrom

Today, our society is on a precipice of significant advancement in healthcare because 3D printing will usher in the next generation of medicine. The next generation will be driven by customization, which will allow doctors to replace limbs and individualize drugs. However, the next generation will be without large pharmaceutical companies and their justifications for strong intellectual property rights. However, the current patent system (which is underpinned by a social tradeoff made from property incentives) is not flexible enough to cope with 3D printing’s rapid development. Very soon, the social tradeoff will no longer benefit society, so it must be …


Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel Dec 2015

Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel

Nehal A. Patel

AbstractOver thirty years have passed since the Bhopal chemical disaster began,and in that time scholars of corporate social responsibility (CSR) havediscussed and debated several frameworks for improving corporate responseto social and environmental problems. However, CSR discourse rarelydelves into the fundamental architecture of legal thought that oftenbuttresses corporate dominance in the global economy. Moreover, CSRdiscourse does little to challenge the ontological and epistemologicalassumptions that form the foundation for modern economics and the role ofcorporations in the world.I explore methods of transforming CSR by employing the thought ofMohandas Gandhi. I pay particular attention to Gandhi’s critique ofindustrialization and principle of swadeshi (self-sufficiency) …


Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele Feb 2015

Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele

Layne S. Keele

In Apple, Inc. v. Motorola, Inc., 757 F.3d 1286 (Fed. Cir. 2014), the four federal judges who considered the case—Judge Posner by designation at the trial level, and three Federal Circuit judges on appeal—all expressed differing opinions on the question of whether and to what extent extraordinary patent remedies should be available for the infringement of standard-essential patents. This article aims to simplify this muddled and confusing topic.

The article employs a teleological approach, examining the purposes behind remedies in general, the purposes of extraordinary remedies in patent law, and the purposes of RAND commitments (commitments to license standard-essential …


The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello Oct 2014

The Internet Is The New Public Forum: Why Riley V. California Supports Net Neutrality, Adam Lamparello

Adam Lamparello

Technology has ushered civil liberties into the virtual world, and the law must adapt by providing legal protections to individuals who speak, assemble, and associate in that world. The original purposes of the First Amendment, which from time immemorial have protected civil liberties and preserved the free, open, and robust exchange of information, support net neutrality. After all, laws or practices that violate cherished freedoms in the physical world also violate those freedoms in the virtual world. The battle over net neutrality is “is absolutely the First Amendment issue of our time,” just as warrantless searches of cell phones were …


Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding Apr 2014

Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding

Dillon A Redding

This note argues that the preservation of Antarctica for peaceful research and internationally cooperative activity as envisioned originally by the Antarctic Treaty in 1961 has gone unrealized amid growing international interest in the strategic advantages offered by Antarctica, including the possibility of large swathes of mineral deposits and optimal locations for satellite stations. Part 1 describes the motivations behind the Antarctic Treaty System (ATS) and outlines the relevant provisions of the Antarctic Treaty. Part 2 examines the military advantages to a state presence in Antarctica and the ways in which the ATS allows for such a presence to be carried …


C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt Feb 2014

C(R)Ap And Trade: The Brave New World Of Non-Point Source Nutrient Trading And Using Lessons From Greenhouse Gas Markets To Make It Work, Victor B. Flatt

Victor B Flatt

After several decades of improvement, water quality in the United States is getting worse, and the problem is primarily caused by run-off from non-point sources, such as farms and urban development. These non-point sources have never had regulatory mandates in the Clean Water Act, and have proven very difficult to control. With little likelihood of comprehensive statutory changes, the EPA and the states that administer the Clean Water Act have looked to other regulatory means to address this problem. One of the most prominent has been the use of markets in pollution (particularly for nutrient pollution from run-off) to provide …


What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller Nov 2013

What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller

Akiva A Miller

New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …


Welcome To The Amazon: Leading Online Retail From Local Tax Avoidance Into Your Backyard, Sherry Tehrani Aug 2013

Welcome To The Amazon: Leading Online Retail From Local Tax Avoidance Into Your Backyard, Sherry Tehrani

Sherry Tehrani

Online sales in the United States have increased by over 250 percent in the last ten years, reaching over 250 billion dollars in 2012.[1] Spearheaded by Amazon.com, Inc. (“Amazon”), online retailers have fed off their competitive advantage of avoiding local sales tax, and have grown to capture roughly 7 percent of the retail market.[2] The juxtaposition of this upsurge of untaxed online sales and our nationwide recession has prompted state governments with crushing deficits to take on the tax loophole.

Local governments across the U.S. have passed legislation to enforce online sales tax collection, referred to as “Amazon …


Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower Apr 2013

Rescuing Access To Patented Essential Medicines: Pharmaceutical Companies As Tortfeasors Under The Prevented Rescue Tort Theory, Richard Cameron Gower

Richard Cameron Gower

Despite some difficulties, state tort law can be argued to create a unique exception to patent law. Specifically, the prevented rescue doctrine suggests that charities and others can circumvent patents on certain critical medications when such actions are necessary to save individuals from death or serious harm. Although this Article finds that the prevented rescue tort doctrines is preempted by federal patent law, all hope is not lost. A federal substantive due process claim may be brought that uses the common law to demonstrate a fundamental right that has long been protected by our Nation’s legal traditions. Moreover, this Article …


Copyright Freeconomics, John M. Newman Feb 2013

Copyright Freeconomics, John M. Newman

John M. Newman

Innovation has wreaked creative destruction on traditional content platforms. During the decade following Napster’s rise and fall, industry organizations launched litigation campaigns to combat the dramatic downward pricing pressure created by the advent of zero-price, copyright-infringing content. These campaigns attracted a torrent of debate, still ongoing, among scholars and stakeholders—but this debate has missed the forest for the trees. Industry organizations have abandoned litigation efforts, and many copyright owners now compete directly with infringing products by offering licit content at a price of $0.

This sea change has ushered in an era of “copyright freeconomics.” Drawing on an emerging body …


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


Minecraft As Web 2.0: Amateur Creativity In Digital Games, Greg Lastowka Jan 2012

Minecraft As Web 2.0: Amateur Creativity In Digital Games, Greg Lastowka

Greg Lastowka

This book chapter considers how the digital game Minecraft has both enabled and benefited from various Web 2.0 practices. I begin with an explanation of the concept of Web 2.0 and then consider how that concept applies to the space of digital games.


Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor Jan 2012

Privacy And Data Protection In Business: Laws And Practices (Sample Chapters), Jonathan I. Ezor

Jonathan I. Ezor

In the fields of digital privacy and data protection in the business world, effective compliance and risk management require not only knowledge of applicable laws and regulations, but at least a basic understanding of relevant technologies and the processes of the company or other organization that is collecting and/or using the personal information or monitoring behavior. This book is structured to provide a framework for law and other students to both learn the law and place it in the necessary technological and practical context, divided into topic areas such as children’s privacy, health information, governmental requirements, employee data and more. …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei Dec 2011

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Commons / Commodity: Peer Production Caught In The Web Of The Commercial Market, Bingchun Meng, Fei Wu Jan 2011

Commons / Commodity: Peer Production Caught In The Web Of The Commercial Market, Bingchun Meng, Fei Wu

Philip F Wu

The development of digital technology and computer networks has enabled many kinds of online collaboration. This article examines Zimuzu, a Chinese case of online peer production, which provides an opportunity to extend our understanding of how the tensions between the commodity and commons production models are being articulated in an online setting. Using empirical evidence collected from face-to-face interviews, online posts and online ethnographic observation, our analysis demonstrates that there is constant negotiation over which aspects of the two seemingly opposing models will be adopted by the community. We argue that it is important to conceptualize the peer production process …


Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes Jan 2010

Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes

Ronald Leenes

Social Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymo- ron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of ‘friend’. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network …


Looking For Fair Use In The Dmca's Safety Dance, Ira Nathenson Jan 2009

Looking For Fair Use In The Dmca's Safety Dance, Ira Nathenson

Ira Steven Nathenson

Like a ballet, the notice-and-take-down provisions of the Digital Millennium Copyright Act ("DMCA") provide complex procedures to obtain take-downs of online infringement. Copyright owners send notices of infringement to service providers, who in turn remove claimed infringement in exchange for a statutory safe harbor from copyright liability. But like a dance meant for two, the DMCA is less effective in protecting the "third wheel," the users of internet services. Even Senator John McCain - who in 1998 voted for the DMCA - wrote in exasperation to YouTube after some of his presidential campaign videos were removed due to take-downs. McCain …


Diabolical Frivolity Of Neoliberal Fundamentalism, Sefik Tatlic Jan 2009

Diabolical Frivolity Of Neoliberal Fundamentalism, Sefik Tatlic

Sefik Tatlic

Today, we cannot talk just about plain control, but we must talk about the nature of the interaction of the one who is being controlled and the one who controls, an interaction where the one that is “controlled” is asking for more control over himself/herself while expecting to be compensated by a surplus of freedom to satisfy trivial needs and wishes. Such a liberty for the fulfillment of trivial needs is being declared as freedom. But this implies as well the freedom to choose not to be engaged in any kind of socially sensible or politically articulated struggle.


Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson Jan 1998

Internet Infoglut And Invisible Ink: Spamdexing Search Engines With Meta Tags, Ira Nathenson

Ira Steven Nathenson

This Article addresses 'spamdexing,' namely, the practice of stuffing invisible keywords into webpages in order to try to get more favorable listings with search engines. For instance, some website owners will stuff the trademarks of competitors into a webpage’s code, particularly by using 'meta tags,' indexing keywords that can be hidden in a webpage’s source code. Although meta tags are not typically viewed by users, the code can be read by search engines, with the result that webpages may be improperly boosted in search engine rankings. Such practices can confuse the public and have also spurred trademark lawsuits. But the …