Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication Year
- Publication
-
- Fredric I. Lederer (4)
- Stephen E Henderson (3)
- Ben Depoorter (2)
- Corey A Ciocchetti (2)
- Michael J. Malinowski (2)
-
- Adam Thierer (1)
- Anna P. Hemingway (1)
- Charles E. MacLean (1)
- Cynthia R. Farina (1)
- Edward Lee (1)
- Frank A. Pasquale (1)
- Gary E. Marchant (1)
- Jorge R Roig (1)
- Lori B. Andrews (1)
- Michele R. Pistone (1)
- Molly K. Land (1)
- Orin Kerr (1)
- Peter Lee (1)
- Prof. Elizabeth Burleson (1)
- Sam Hanna (1)
- Shruti Rana (1)
- William J. Magnuson (1)
- File Type
Articles 1 - 30 of 30
Full-Text Articles in Entire DC Network
Technology Comes To The Courtroom, And . . ., Fredric I. Lederer
Technology Comes To The Courtroom, And . . ., Fredric I. Lederer
Fredric I. Lederer
No abstract provided.
Special Challenges To 21st Century Lawyers: The Use And Misuse Of Technology, Fredric I. Lederer, Richard K. Herrmann, Jan Michelsen, Andrew Mertens
Special Challenges To 21st Century Lawyers: The Use And Misuse Of Technology, Fredric I. Lederer, Richard K. Herrmann, Jan Michelsen, Andrew Mertens
Fredric I. Lederer
No abstract provided.
Some Thoughts On Technology And The Practice Of Law, Fredric I. Lederer
Some Thoughts On Technology And The Practice Of Law, Fredric I. Lederer
Fredric I. Lederer
No abstract provided.
Empirical Research Report: The Use Of Technology In The Jury Room To Enhance Deliberations, Fredric I. Lederer
Empirical Research Report: The Use Of Technology In The Jury Room To Enhance Deliberations, Fredric I. Lederer
Fredric I. Lederer
Modern courtroom technology permits the use of technology in the jury deliberation room to enhance deliberations in both traditional trials and technology-augmented cases. SJI-funded research conducted by the Courtroom 21 Project surveyed the law of the United States with respect to statutory and case law governing the use of exhibits during deliberations; surveyed the state courts and, with the assistance of the Federal Judicial Center, the United States district courts concerning their deliberation practices and courtroom technology use; and conducted two controlled studies of the use of deliberation room technology in both traditional and technology-augmented trials. The Courtroom 21 protocol …
The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr
The Fourth Amendment And New Technologies: Constitutional Myths And The Case For Caution, Orin S. Kerr
Orin Kerr
To one who values federalism, federal preemption of state law may significantly threaten the autonomy and core regulatory authority of The Supreme Court recently considered whether a1mmg an infrared thermal imaging device at a suspect's home can violate the Fourth Amendment. Kyllo v. United States announced a new and comprehensive rule: the government's warrantless use of senseenhancing technology that is "not in general use" violates the Fourth Amendment when it yields "details of the home that would previously have been unknowable without physical intrusion." Justice Scalia's majority opinion acknowledged that the Court's rule was not needed to resolve the case …
Regulating Fintech, William Magnuson
Regulating Fintech, William Magnuson
William J. Magnuson
The financial crisis of 2008 has led to dramatic changes in the way that finance is regulated: the Dodd-Frank Act imposed broad and systemic regulation on the industry on a level not seen since the New Deal. But the financial regulatory reforms enacted since the crisis have been premised on an outdated idea of what financial services look like and how they are provided. Regulation has failed to take into account the rise of financial technology (or “fintech”) firms and the fundamental changes they have ushered in on a variety of fronts, from the way that banking works, to the …
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Rulemaking Vs. Democracy: Judging And Nudging Public Participation That Counts , Cynthia R. Farina, Mary Newhart, Josiah Heidt
Cynthia R. Farina
This Article considers how open government “magical thinking” around technology has infused efforts to increase public participation in rulemaking. We propose a framework for assessing the value of technology-enabled rulemaking participation and offer specific principles of participation-system design, which are based on conceptual work and practical experience in the Regulation Room project at Cornell University. An underlying assumption of open government enthusiasts is that more public participation will lead to better government policymaking: If we use technology to give people easier opportunities to participate in public policymaking, they will use these opportunities to participate effectively. However, experience thus far with …
Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone
Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone
Michele R. Pistone
1. For many years, the question of how to use technology to teach the law has been a minor concern of the legal academy. That era of general indifference to developments in learning technologies is now coming to an end. There are many reasons for the change. Law schools are facing such a host of difficulties— declining enrollments, declining job prospects for graduates, reduced public funding, and understandable concerns about cost and debt—that sometimes it seems the only debate is over whether the situation is best described as a “tsunami” or “a perfect storm.” Against this backdrop, technology offers the …
Patent Trolls: Moral Panics, Motions In Limine, And Patent Reform, Edward Lee
Patent Trolls: Moral Panics, Motions In Limine, And Patent Reform, Edward Lee
Edward Lee
No abstract provided.
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews
Digital Peepholes | Remote Activation Of Webcams: Technology, Law And Policy, Lori Andrews
Lori B. Andrews
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer
Adam Thierer
This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …
Social Innovation, Peter Lee
Social Innovation, Peter Lee
Peter Lee
This Article provides the first legal examination of the immensely valuable but underappreciated phenomenon of social innovation. Innovations such as cognitive behavioral therapy, microfinance, and strategies to reduce hospital-based infections greatly enhance social welfare yet operate completely outside of the patent system, the primary legal mechanism for promoting innovation. This Article draws on empirical evidence to elucidate this significant kind of innovation and explore its divergence from the classic model of technological innovation championed by the patent system. In so doing, it illustrates how patent law exhibits a rather crabbed, particularistic conception of innovation. Among other characteristics, innovation in the …
Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean
Katz On A Hot Tin Roof: The Reasonable Expectation Of Privacy Is Rudderless In The Digital Age Unless Congress Continually Resets The Privacy Bar, Charles E. Maclean
Charles E. MacLean
The Katz reasonable expectation of privacy doctrine has lasting relevance in the digital age, but that relevance must be carefully and clearly guided in great detail by Congressional and state legislative enactments continually resetting the privacy bar as technology advances. In that way, the Katz “reasonableness” requirements are actually set by the legislative branch, thereby precluding courts from applying inapposite analogies to phone booths, cigarette packs, and business records. Once legislation provides the new contours of digital privacy, those legislative contours become the new “reasonable.”
This article calls upon Congress, and to a lesser extent, state legislatures, to control that …
Orwellian Surveillance Of Vehicular Travels, Sam Hanna
Orwellian Surveillance Of Vehicular Travels, Sam Hanna
Sam Hanna
What would someone learn about you if all your automobile travels were ubiquitously tracked beginning today? Creating an indefinite database of a person’s previous automobile travels to formulate deductions on intimate details of people's lives is precisely what law enforcement agencies are currently able to accomplish with automatic license plate recognition (“ALPR”). With the ubiquity of ALPR cameras, continuous government surveillance of automobile travels is no longer a figment of the imagination. Consequently, the judicial and legislative branches of government must embark on balancing the private and public interests implicated by this technology. Failure to set suitable boundaries around the …
Technology, Competition, And Values, Frank Pasquale
Technology, Competition, And Values, Frank Pasquale
Frank A. Pasquale
Law can advance or retard the distributive effects of innovation and its diffusion in many ways. Certain technologies merit special monitoring because they promote the leveraging of economic advantage into social or cultural advantage without substantially increasing overall social welfare. Others threaten to undermine collective values and perceptions commonly used to evaluate technology. A final category threatens to do both, creating unfair or wasteful competition while blunting our capacity to recognize its morally dubious character. As new sectors of life become more game-like and competitive, methods of leveling the playing field developed in sports and college admissions might become more …
Throwing Dirt On Doctor Frankenstein's Grave: Accesss To Experimental Treatments At The End Of Life, Michael J. Malinowski
Throwing Dirt On Doctor Frankenstein's Grave: Accesss To Experimental Treatments At The End Of Life, Michael J. Malinowski
Michael J. Malinowski
Abstract
All U.S. federal research funding triggers regulations to protect human subjects known as the Common Rule, a collaborative government effort that spans seventeen federal agencies. The Department of Health and Human Services has been in the process of re-evaluating the Common Rule comprehensively after decades of application and in response to the jolting advancement of biopharmaceutical science. The Common Rule designates specific groups as “vulnerable populations”—pregnant women, fetuses, children, prisoners, and those with serious mental comprehension challenges—and imposes heightened protections of them. This article addresses a question at the cornerstone of regulations to protect human subjects as biopharmaceutical research …
A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski
A Discourse On The Public Nature Of Research In Contemporary Life Science: A Law-Policy Proposal To Promote The Public Nature Of Science In An Era Of Academia-Industry Integration, Michael J. Malinowski
Michael J. Malinowski
This article addresses the impact of integration of academia, industry, and government on the public nature of research. The article concludes that, while the integration has benefited science immensely, regulatory measures should be taken to restore the public nature of research in an age of integration.
Keeping It Real: Using Facebook Posts To Teach Professionalism And Professional Responsibility, Anna P. Hemingway
Keeping It Real: Using Facebook Posts To Teach Professionalism And Professional Responsibility, Anna P. Hemingway
Anna P. Hemingway
The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti
The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti
Corey A Ciocchetti
In the midst of massive government involvement in the financial, real estate and automotive sectors, other important problems linger without sufficient governmental attention. This article focuses on one area where federal intervention has been particularly absent - the realm of individual privacy in the Information Age. The problem is that monitoring in the United States is increasingly powerful and takes many forms. Online, prominent Web sites collect, store and disseminate a great deal of personally identifying information (PII) without clearly and simply informing users. This is the case even though such notice is cheap and can be effective. Offline, technology …
Water, Climate, And Energy Security, Prof. Elizabeth Burleson
Water, Climate, And Energy Security, Prof. Elizabeth Burleson
Prof. Elizabeth Burleson
Civil society participation can facilitate sound energy, climate, and water governance. This article analyzes the dynamics of transnational decision-making. Part II discusses sound energy strategy in light of a shrinking water-resources base due to climate change. Part III considers how public participation in international decision-making can sustain trust in governments and strengthen the legitimacy of legal decisions. Part IV concludes that process and outcome are both integral to addressing water, climate, and energy challenges.
Technology & Torts: A Theory Of Memory Costs, Nondurable Precautions And Interference Effects, Ben Depoorter
Technology & Torts: A Theory Of Memory Costs, Nondurable Precautions And Interference Effects, Ben Depoorter
Ben Depoorter
This Article examines the influence of nondurable precaution technologies on the expansion of tort awards. We provide four contributions to the literature. First, we present a general, formal model on durable and non-durable precaution technology that focuses on memory costs. Second, because liability exposure creates interference, we argue that tort law perpetuates the expansion of awards. Third, because plaintiffs do not consider the social costs of interference effects, private litigation induces socially excessive suits. Fourth, while new harm-reducing technologies likely increase accident rates, such technologies also raise the ratio of trial costs to harm, leaving undetermined the overall effect of …
The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti
The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti
Corey A Ciocchetti
The twenty-first century continues to usher in new and increasingly-powerful technology. This technology is both a blessing and a curse in the employment arena. Sophisticated monitoring software and hardware allow businesses to conduct basic business transactions, avoid liability, conduct investigations and, ultimately, achieve success in a competitive global environment. Employees can also benefit when monitoring provides immediate feedback, keeps the workforce efficient and focused and discourages unethical/illegal behavior. The same technology, however, allows employers to monitor every detail of their employees’ actions, communications and whereabouts both inside and outside the workplace. As more and more employers conduct some form of …
Fulfilling Technology's Promise: Enforcing The Rights Of Women Caught In The Global High-Tech Underclass, Shruti Rana
Fulfilling Technology's Promise: Enforcing The Rights Of Women Caught In The Global High-Tech Underclass, Shruti Rana
Shruti Rana
In the early 1980s, Malaysian women working in electronics factories began to experience hallucinations and seizures. Factory bosses manipulated their employees' religious and cultural beliefs, convincing the women that their bodies were inhabited by demons. In this manner, they avoided confronting the more likely causes: the rigid, paternalistic work environment, the intense production pressures placed on the women, and the lengthy shifts and potentially hazardous conditions that the women were forced to endure. This example illustrates the use of gender, religion, and to control and exploit women's labor in the high-tech industry. Unfortunately, this is not an isolated situation. This …
International Harmonization Of Regulation Of Nanomedicine, Gary E. Marchant, Douglas J. Sylvester, Kenneth W. Abbott, Tara Lynn Danforth
International Harmonization Of Regulation Of Nanomedicine, Gary E. Marchant, Douglas J. Sylvester, Kenneth W. Abbott, Tara Lynn Danforth
Gary E. Marchant
Nanomedicine holds enormous promise for the improved prevention, detection and treatment of disease. Yet, at the same time, countervailing concerns about the potential safety risks of nanotechnologies generally, and nanomedical products specifically, threaten to derail or at least delay the introduction and commercial viability of many nanomedicine applications. All around the globe, national governments are struggling with balancing these competing benefits and risks of nanotechnology in the medical and other sectors. It is becoming increasingly clear that reasonable, effective and predictable regulatory structures will be critical to the successful implementation of nanotechnology. The question examined in this paper is whether …
Peer Producing Human Rights, Molly Land
Peer Producing Human Rights, Molly Land
Molly K. Land
Can there be a Wikipedia for human rights? The growth of collaborative technologies has spurred the development of projects such as Wikipedia, in which large groups of volunteers contribute to production in a decentralized and open format. The author analyzes how these methods of peer-based production can be applied to advance international human rights as well as the limitations of such a model in this field. An underlying characteristic of peer-based production, amateurism, increases capacity and participation. However, the involvement of ordinary individuals in the production of human rights reporting is also its greatest disadvantage, since human rights reports generated …
Technology & Uncertainty: The Shaping Effect On Copyright Law, Ben Depoorter
Technology & Uncertainty: The Shaping Effect On Copyright Law, Ben Depoorter
Ben Depoorter
This Article examines the symbiotic relationship between copyright law and technology. I describe how an environment characterized by rapid technological change creates two conditions that determine the direction and evolution of copyright law: legal delay and legal uncertainty. I explain how uncertainty over the application of existing copyright law to newly emerging technology catalyzes the actions of copyright owners and users. I argue that uncertainty and delay (1) have an enabling effect on anticopyright sentiments, (2) lead to a greater reliance on self-help efforts by content providers and users, and (3) induce legislative involvement in copyright law. In the final …
Learning From All Fifty States: How To Apply The Fourth Amendment And Its State Analogs To Protect Third Party Information From Unreasonable Search, Stephen E. Henderson
Learning From All Fifty States: How To Apply The Fourth Amendment And Its State Analogs To Protect Third Party Information From Unreasonable Search, Stephen E. Henderson
Stephen E Henderson
We are all aware of, and many commentators are critical of, the Supreme Court's third-party doctrine, under which information provided to third parties receives no Fourth Amendment protection. This constitutional void becomes increasingly important as technology and social norms dictate that increasing amounts of disparate information are available to third parties. But we are not solely dependent upon the Federal Constitution. We may have more constitutional protection as citizens of states, each of which has a constitutional cognate or analog to the Federal Fourth Amendment. As Justice Brennan urged in a famous 1977 article, those provisions should be interpreted to …
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Nothing New Under The Sun? A Technologically Rational Doctrine Of Fourth Amendment Search, Stephen E. Henderson
Stephen E Henderson
The Fourth Amendment to the United States Constitution prohibits unreasonable searches and seizures. Yet as interpreted by the United States Supreme Court, the Amendment places no restriction on police combing through financial records; telephone, e-mail and website transactional records; or garbage left for collection. Indeed there is no protection for any information knowingly provided to a third party, because the provider is said to retain no reasonable expectation of privacy in that information. As technology dictates that more and more of our personal lives are available to anyone equipped to receive them, and as social norms dictate that more and …
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Suing The Insecure?: A Duty Of Care In Cyberspace, Stephen E. Henderson, Matthew E. Yarbrough
Stephen E Henderson
The Internet, already of major significance throughout much of the globe, is expected to become increasingly pervasive in diverse arenas, from health care, to commerce, to entertainment, and is expected to become increasingly critical to essential infrastructures, including banking, power, and telecommunications. Yet the medium is both inherently and unnecessarily insecure. In particular, today’s Internet can be crippled by distributed denial-of-service attacks launched by relatively unsophisticated and judgment-proof parties. Not every computing system involved in such attacks, however, is necessarily without resources. Application of traditional negligence liability, coupled with other government incentives and support institutions, will encourage better security and …