Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,812 Full-Text Articles 4,425 Authors 2,058,341 Downloads 122 Institutions

All Articles in Science and Technology Law

Faceted Search

4,812 full-text articles. Page 7 of 120.

Social Media Searches And The Reasonable Expectation Of Privacy, Brian Mund 2018 Yale Law School

Social Media Searches And The Reasonable Expectation Of Privacy, Brian Mund

Yale Journal of Law and Technology

Under existing law, social media information communicated through behind password -protected pages receives no reasonable expectation of privacy. The Note argues that the Fourth Amendment requires a greater degree of privacy protection for social media data. Judicial and legislative activity provides indicia of a willingness to reconsider citizens' reasonable expectation of privacy and reverse an anachronistic equation of privacy with secrecy.
Government monitoring of private social media pages constitutes a deeply invasive form of surveillance and, if government agents employ covert tactics to gain access to private social media network s, then the Fourth Amendment controls government use of that ...


Don't Fence Me In: Reforming Trade And Investment Law To Better Facilitate Cross-Border Data Transfer, Andrew D. Mitchell, Jarrod Hepburn 2018 Professor, Melbourne Law School, University of Melbourne

Don't Fence Me In: Reforming Trade And Investment Law To Better Facilitate Cross-Border Data Transfer, Andrew D. Mitchell, Jarrod Hepburn

Yale Journal of Law and Technology

The transfer of data across borders support s trade in most service industries around the world as well as the growth of traditional manufacturing sectors. However, several countries have begun to adopt laws impeding the cross-border transfer of data, ostensibly in pursuit of policy objectives such as national security, public morals or public order, and privacy. Such domestic measures create potential concerns under both international trade law and international investment law. Accordingly, recent trade and investment negotiations such as the Trans-Pacific Partnership Agreement (TPP) include specific provisions mandating the permissibility of cross-border data transfer and prohibiting data localization in certain ...


Tackling The Algorithmic Control Crisis -The Technical, Legal, And Ethical Challenges Of Research Into Algorithmic Agents, B. Bodo, N Helberger, K Irion, K Zuiderveen Borgesius, J Moller, B van de Velde, N Bol, B van Es, C de Vreese 2018 Institute for Information Law, University of Amsterdam

Tackling The Algorithmic Control Crisis -The Technical, Legal, And Ethical Challenges Of Research Into Algorithmic Agents, B. Bodo, N Helberger, K Irion, K Zuiderveen Borgesius, J Moller, B Van De Velde, N Bol, B Van Es, C De Vreese

Yale Journal of Law and Technology

Algorithmic agents permeate every instant of our online existence. Based on our digital profiles built from the massive surveillance of our digital existence, algorithmic agents rank search results, filter our emails, hide and show news items on social networks feeds, try to guess what products we might buy next for ourselves and for others, what movies we want to watch, and when we might be pregnant. Algorithmic agents select, filter, and recommend products,
information, and people; they increasingly customize our physical environments, including the temperature and the mood .


Going Native: Can Consumers Recognize Native Advertising? Does It Matter?, David A. Hyman, David Franklyn, Calla Yee, Mohammad Rahmati 2018 Georgetown University

Going Native: Can Consumers Recognize Native Advertising? Does It Matter?, David A. Hyman, David Franklyn, Calla Yee, Mohammad Rahmati

Yale Journal of Law and Technology

Native advertising, which matches the look and feel of unpaid news and editorials, has exploded online. The Federal Trade Commission has long required advertising to be clearly and conspicuously labeled, and it recently reiterated that these requirements apply to native advertising. We explore whether respondents can distinguish native advertising and "regular" ads from unpaid content, using 16 native ads, 5 ''regular" ads, and 8 examples of news / editorial content, drawn from multiple sources and plat forms. Overall, only 37% of respondents thought that the tested examples of native
advertising were paid content, compared to 81% for "regular" advertising, with variation ...


When Timekeeping Software Undermines Compliance, Elizabeth Tippett, Charlotte S. Alexander, Zev J. Eigen 2018 University of Oregon School of Law

When Timekeeping Software Undermines Compliance, Elizabeth Tippett, Charlotte S. Alexander, Zev J. Eigen

Yale Journal of Law and Technology

Electronic timekeeping is a ubiquitous feature of the modern workplace. Time and attendance software enables employers to record employees' hours worked, breaks taken, and related data to determine compensation. Sometimes this software also undermines wage and hour law, allowing bad actor employers more readily to manipulate employee time cards, set up automatic default rules that shave hours from employees' paychecks, and disguise edits to records of wages and hours. Software could enable transparency, but when it serves to obfuscate instead, it misses an opportunity to reduce costly legal risk for employers and protect employee rights. This article examines thirteen commonly ...


Live Sports Virtual Reality Broadcasts: Copyright And Other Protections, Marie Hopkins 2018 Duke Law

Live Sports Virtual Reality Broadcasts: Copyright And Other Protections, Marie Hopkins

Duke Law & Technology Review

As virtual reality rapidly progresses, broadcasts are able to increasingly mimic the experience of actually attending a game. As the technology advances and the viewer can freely move about the game and virtual reality can simulate the in-stadium attendance, the virtual reality broadcast nears the point where the broadcast is indistinguishable from the underlying game. Thus, novel copyright protection issues arise regarding the ability to protect the experience through copyright. Although normal broadcasts may be copyrighted, virtual reality broadcasts of live sports could lack protection under the Copyright Act because the elements of originality, authorship, and fixation are harder to ...


Sb 219 - Autonomous Vehicles, W. Perry Hicks, Alan J. Ponce 2018 Georgia State University College of Law

Sb 219 - Autonomous Vehicles, W. Perry Hicks, Alan J. Ponce

Georgia State University Law Review

The Act amends Georgia’s Motor Vehicles and Traffic Code to create a legal framework for autonomous vehicles to operate in Georgia. Persons responsible for operating fully autonomous vehicles are exempted from holding a driver’s license. In the event of an accident involving an autonomous vehicle, the vehicle must remain at the scene and the operator of the autonomous vehicle must provide necessary information to law enforcement. Minimum liability insurance requirements for autonomous vehicles will be the same as minimum coverages required for the taxi and limousine industry after January 1, 2020. Minimum coverages are set at 250 percent ...


Hb 1 - Space Flight, Malissa Caroline Barger, Ethan L. Smith 2018 Georgia State University College of Law

Hb 1 - Space Flight, Malissa Caroline Barger, Ethan L. Smith

Georgia State University Law Review

The Act limits the civil and criminal liability of a space flight entity for injuries sustained by space flight participants arising from ordinary negligence. The Act defines new terms and provides a statutory waiver form that participants with informed consent must sign. The Act mandates space flight participants sign the waiver before participating in any space flight activity. The Act does not limit the liability of space flight entities for gross negligence or intentional acts, nor does it prevent suits from anyone other than the space flight participant.


Patent "Trespass" And The Royalty Gap: Exploring The Nature And Impact Of Patent Holdout, Bowman Heiden, Nicolas Petit 2018 Santa Clara Law

Patent "Trespass" And The Royalty Gap: Exploring The Nature And Impact Of Patent Holdout, Bowman Heiden, Nicolas Petit

Santa Clara High Technology Law Journal

Patent "Trespass" and the Royalty Gap: Exploring the Nature and Impact of Patent Holdout


Rethinking The Dormant Commerce Clause?: Climate Change And Food Security, Michael Barsa 2018 Northwestern Pritzker School of Law

Rethinking The Dormant Commerce Clause?: Climate Change And Food Security, Michael Barsa

Northwestern Journal of Law & Social Policy

No abstract provided.


Revisiting The Intellectual Property Dilemma: How Did We Get To A Strong Wto Ipr Regime?, Julien Chaisse, Xinjie Luan 2018 Santa Clara Law

Revisiting The Intellectual Property Dilemma: How Did We Get To A Strong Wto Ipr Regime?, Julien Chaisse, Xinjie Luan

Santa Clara High Technology Law Journal

Revisiting the Intellectual Property Dilemma: How Did We Get to a Strong WTO IPR Regime?


Digital Transformation And Jobs: Building A Cloud For Everyone, Robert Ivanschitz, Daniel Korn 2018 University of Miami Law School

Digital Transformation And Jobs: Building A Cloud For Everyone, Robert Ivanschitz, Daniel Korn

University of Miami Inter-American Law Review

No abstract provided.


Algorithms And Automation: Fostering Trustworthiness In Artificial Intelligence, Andrew B. Ware 2018 University of New Hampshire, Durham

Algorithms And Automation: Fostering Trustworthiness In Artificial Intelligence, Andrew B. Ware

Honors Theses and Capstones

No abstract provided.


Privacy Vs. Protection: Why Tracking Mobile-Device Location Data Without A Warrant Requires A Fourth Amendment Exception, Andrew Stover 2018 Michigan State University College of Law

Privacy Vs. Protection: Why Tracking Mobile-Device Location Data Without A Warrant Requires A Fourth Amendment Exception, Andrew Stover

Catholic University Journal of Law and Technology

No abstract provided.


Changing Governance Models By Applying Blockchain Computing, Steve Young 2018 The Catholic University of America, Columbus School of Law

Changing Governance Models By Applying Blockchain Computing, Steve Young

Catholic University Journal of Law and Technology

No abstract provided.


Masthead, 2018 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Law, Brands, And Innovation: How Trademark Law Helps To Create Fashion Innovation, 17 J. Marshall Rev. Intell. Prop. L. 492 (2018), Dayoung Chung 2018 John Marshall Law School

Law, Brands, And Innovation: How Trademark Law Helps To Create Fashion Innovation, 17 J. Marshall Rev. Intell. Prop. L. 492 (2018), Dayoung Chung

The John Marshall Review of Intellectual Property Law

This Article explores the role of trademark law in the fashion industry. For years, the fashion industry has drawn legal scholars’ attention for its maintenance of creative endeavors within a legal environment that offers limited protection against design copying. Some influential legal studies argued that copying paradoxically helps the fashion industry as unregulated copying stimulates the creation of new designs. Yet, this Article observes that the driver for new design creation is already built into the contemporary fashion industry. The question should rather be directed at who creates fashion and how the role of the law, if any, aids the ...


Blockchain Technology: An Interconnected Legal Framework For An Interconnected System, Marina Fyrigou-Koulouri 2018 Case Western Reserve University School of Law

Blockchain Technology: An Interconnected Legal Framework For An Interconnected System, Marina Fyrigou-Koulouri

Journal of Law, Technology, & the Internet

In 2018, someone hiding behind the pseudonym Satoshi Nakamoto created Bitcoin, the first decentralized cryptocurrency operating without a central bank or authority. However, the true revolution seems to be its underlying technology; blockchain. Today, a lot of discussion is taking place around the legal issues of this nascent technology. This paper focuses on blockchain and the law. After exploring blockchain’s basic features, it will propose an international regulatory framework suitable for this technology’s characteristics and its borderless nature.


Is Tricking A Robot Hacking?, Ryan Calo, Ivan Evtimov, Earlence Fernandes, Tadayoshi Kohno, David O'Hair 2018 University of Washington School of Law

Is Tricking A Robot Hacking?, Ryan Calo, Ivan Evtimov, Earlence Fernandes, Tadayoshi Kohno, David O'Hair

Tech Policy Lab

The authors of this essay represent an interdisciplinary team of experts in machine learning, computer security, and law. Our aim is to introduce the law and policy community within and beyond academia to the ways adversarial machine learning (ML) alter the nature of hacking and with it the cybersecurity landscape. Using the Computer Fraud and Abuse Act of 1986—the paradigmatic federal anti-hacking law—as a case study, we mean to evidence the burgeoning disconnect between law and technical practice. And we hope to explain what is at stake should we fail to address the uncertainty that flows from the ...


Categories Of Anti-Obviousness Case Law: (1) Laundry Lists; (2) Redundant Advantages; And (3) Advantage Not Needed And Not Relevant, 17 J. Marshall Rev. Intell. Prop. L. 395 (2018), Tom Brody 2018 John Marshall Law School

Categories Of Anti-Obviousness Case Law: (1) Laundry Lists; (2) Redundant Advantages; And (3) Advantage Not Needed And Not Relevant, 17 J. Marshall Rev. Intell. Prop. L. 395 (2018), Tom Brody

The John Marshall Review of Intellectual Property Law

Obviousness rejections are most commonly rebutted by arguments that the prior art fails to disclose all the claim elements or that the examiner had failed to assert a proper rationale for combining references. Additional rebuttal strategies include those based on Federal Circuit case law on: (1) Non-analogous art, (2) Rendering the prior art unsatisfactory for its intended purpose, (3) Proposed modification cannot change the principle of operation of a reference, (4) Redundant advantages, (5) Advantage provided by the secondary reference is not needed by and not relevant to the primary reference, (6) Disparate references, (7) Context differs between cited references ...


Digital Commons powered by bepress