Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (184)
- Social and Behavioral Sciences (49)
- Science and Technology Law (37)
- Intellectual Property Law (22)
- Economics (20)
-
- Law and Economics (15)
- Business (14)
- Comparative and Foreign Law (14)
- International Trade Law (12)
- Public Affairs, Public Policy and Public Administration (12)
- Environmental Law (11)
- Antitrust and Trade Regulation (10)
- Evidence (10)
- International Economics (10)
- International Law (10)
- Internet Law (10)
- Political Science (10)
- Computer Law (8)
- Health Law and Policy (8)
- Securities Law (8)
- Sociology (8)
- Banking and Finance Law (7)
- Labor and Employment Law (7)
- Physical Sciences and Mathematics (7)
- Privacy Law (7)
- Technology and Innovation (7)
- Constitutional Law (6)
- Criminal Law (6)
- Finance (6)
- Law and Society (6)
- Keyword
-
- Law (17)
- Law and Technology (17)
- Environmental Law (10)
- Science and Technology (9)
- Law and Society (8)
-
- Securities regulation (8)
- Computer Law (6)
- Constitutional Law (6)
- International Law (6)
- International Trade (6)
- Norms (6)
- Privacy (6)
- Copyright Law (5)
- Hedge funds (5)
- Intellectual Property (5)
- Law & Psychology (5)
- Technology (5)
- Communications Law (4)
- Informational norms (4)
- Investment advisers (4)
- Labor Law (4)
- Women (4)
- Air and Space Law (3)
- Antitrust (3)
- Competition Law (3)
- Contracts (3)
- Copyright (3)
- Drones (3)
- Economics (3)
- Energy and Utilities Law (3)
Articles 1 - 30 of 185
Full-Text Articles in Entire DC Network
Algorithms And Human Freedom, Richard Warner, Robert Sloan
Algorithms And Human Freedom, Richard Warner, Robert Sloan
All Faculty Scholarship
Predictive analytics such as data mining, machine learning, and artificial intelligence drive algorithmic decision making. Its "all-encompassing scope already reaches the very heart of a functioning society". Unfortunately, the legal system and its various tools developed around human decisionmakers cannot adequately administer accountability mechanisms for computer decision making. Antiquated approaches require modernization to bridge the gap between governing human decision making and new technologies. We divide the bridge-building task into three questions. First, what features of the use of predictive analytics significantly contribute to incorrect, unjustified, or unfair outcomes? Second, how should one regulate those features to make outcomes more …
The Internet Adopts Two-Way Radio, Henry Perritt
The Internet Adopts Two-Way Radio, Henry Perritt
All Faculty Scholarship
The Internet, having displaced conventional correspondence with email, having displaced traditional libraries with online ones, having revolutionized shopping, having uprooted television and movies, now is absorbing police, fire, ambulance, and public utility two-radio systems.Digital radio technologies combine with Internet switching of transmitters, receivers, and networks, so that a police officer can talk to an ambulance driver or a train dispatcher across the state or across the country. Specialized cellphones are becoming indistinguishable from walkie-talkies. Cellular telephone channels replace two-way-radio air links.Integration of “private mobile radio” into the Internet is the result of specific advances in radio and networking technology that …
The Light Of Nature: John Locke, Natural Rights, And The Origins Of American Religious Liberty, Steven Heyman
The Light Of Nature: John Locke, Natural Rights, And The Origins Of American Religious Liberty, Steven Heyman
All Faculty Scholarship
No abstract provided.
Law’S Facilitating Role In The Field Of Social Enterprise., Evelyn Brody
Law’S Facilitating Role In The Field Of Social Enterprise., Evelyn Brody
All Faculty Scholarship
A Review of Dana Brakman Reiser and Steven A. Dean. Social Enterprise Law: Trust, Public Benefit, and Capital Markets. New York: Oxford University Press, 2017, 216 pp., $44.95 (hardback) ISBN 978-0-19-024978-6To appreciate the contribution of Professors Dana Brakman Reiser and Steven A. Dean in their pathbreaking volume on social enterprise law, we must begin by recognizing what we are not discussing. As the authors declare: “social enterprises are not charities” (p. 165). By definition, social enterprises are businesses, and thus not subject to the nondistribution constraint so familiar to nonprofit scholars and practitioners. An impact investor seeks profit, perhaps limited …
Liability For Mass Sexual Abuse, Tsachi Keren-Paz, Richard Wright
Liability For Mass Sexual Abuse, Tsachi Keren-Paz, Richard Wright
All Faculty Scholarship
When harm is caused to victims by multiple injurers, difficult issues arise indetermining causation of, legal responsibility for, and allocation of liability forthose harms. Nowhere is this truer than in child pornography and sex traffickingcases, in which individuals have been victimized over extended periods oftime by hundreds or even many thousands of injurers, with multiple and oftenoverlapping victims of each injurer. Courts (and lawyers) struggle with thesesituations for a simple reason: they insist on applying tests of causation thatfail when the effect was over-determined by multiple conditions. The failure toproperly understand the causation issue has exacerbated failures to properlyunderstand and …
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
All Faculty Scholarship
No abstract provided.
How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan
How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan
All Faculty Scholarship
A cost/benefit approach to privacy confronts two tradeoff issues. One is making appropriate tradeoffs between privacy and many goals served by the collection, distribution, and use of information. The other is making tradeoffs between investments in preventing unauthorized access to information and the variety of other goals that also make money, time, and effort demands. Much has been written about the first tradeoff. We focus on the second. The issue is critical. Data breaches occur at the rate of over three a day, and the aggregate social cost is extremely high. The puzzle is that security experts have long explained …
Flipping The Classroom To Teach Workplace Adr In An Intensive Environment, Martin H. Malin, Deborah Ginsberg
Flipping The Classroom To Teach Workplace Adr In An Intensive Environment, Martin H. Malin, Deborah Ginsberg
All Faculty Scholarship
No abstract provided.
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
All Faculty Scholarship
What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.
Foster V. Chatman: A Missed Opportunity For Batson And The Peremptory Challenge, Nancy Marder
Foster V. Chatman: A Missed Opportunity For Batson And The Peremptory Challenge, Nancy Marder
All Faculty Scholarship
In 2016, the United States Supreme Court decided that the prosecutors in Foster v. Chatman exercised race-based peremptory challenges in violation of Batson v. Kentucky. The Court reached the right result, but missed an important opportunity. The Court should have acknowledged that after thirty years of the Batson experiment, it is clear that Batson is unable to stop discriminatory peremptory challenges. Batson is easy to evade, so discriminatory peremptory challenges persist and the harms from them are significant. The Court could try to strengthen Batson in an effort to make it more effective, but in the end the only way …
A General Approach For Predicting The Behavior Of The Supreme Court Of The United States, Daniel Katz
A General Approach For Predicting The Behavior Of The Supreme Court Of The United States, Daniel Katz
All Faculty Scholarship
Building on developments in machine learning and prior work in the science of judicial prediction, we construct a model designed to predict the behavior of the Supreme Court of the United States in a generalized, out-of-sample context. To do so, we develop a time-evolving random forest classifier that leverages unique feature engineering to predict more than 240,000 justice votes and 28,000 cases outcomes over nearly two centuries (1816-2015). Using only data available prior to decision, our model outperforms null (baseline) models at both the justice and case level under both parametric and non-parametric tests. Over nearly two centuries, we achieve …
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
All Faculty Scholarship
No abstract provided.
Post-Trial Plea Bargaining And Predictive Analytics In Public Law, Harold Krent
Post-Trial Plea Bargaining And Predictive Analytics In Public Law, Harold Krent
All Faculty Scholarship
Adam Gershowitz’s article calling for post-trial plea bargaining in capital cases reasons that governors should commute sentences to life in prison, in exceptional cases, to limit the costs of protracted post-trial litigation over imposition of the death penalty. The commutation power, in his view, resembles pre-trial plea bargaining in that both the state and the criminal defendant can benefit—the state saves resources while the defendant gets off death row.Gershowitz’s article, therefore, affords a window into the increasing use of predictive analytics in deciding whether to bring or resolve litigation. Sifting through data on all prior capital cases can yield clues …
The Constitutionality Of Administrative Patent Cancellation (Symposium), Gregory Reilly
The Constitutionality Of Administrative Patent Cancellation (Symposium), Gregory Reilly
All Faculty Scholarship
No abstract provided.
Keeping The Internet Invisible: Television Takes Over, Henry Perritt
Keeping The Internet Invisible: Television Takes Over, Henry Perritt
All Faculty Scholarship
No abstract provided.
No Way To Run And "Airline": Surviving An Air Ambulance Ride, Henry Perritt
No Way To Run And "Airline": Surviving An Air Ambulance Ride, Henry Perritt
All Faculty Scholarship
No abstract provided.
The Dna Default And Its Discontents: Establishing Modern Parenthood, Katharine Baker
The Dna Default And Its Discontents: Establishing Modern Parenthood, Katharine Baker
All Faculty Scholarship
Most contemporary family law scholarship assumes that propriety of a DNA default for establishing parenthood - a presumption that, in the absence of marriage, whoever had the sex with the mother that resulted in the child should be the father of the child. This article problematizes that DNA default. It demonstrates how the DNA default necessarily magnifies the legal and social importance of sex, discounts the legal significance of women's reproductive labor, and marginalizes all children living outside the binary, heteronormative norm that a genetic regime necessarily edifies. When scrutinized, the DNA default looks just as moralistic and exclusionary as …
Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski
Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski
All Faculty Scholarship
With millions of small drones in private hands, the FAA continues its struggle to develop an effective regulatory regime to comply with Congress’s mandate to integrate them into the national airspace system. Thousands of individuals and small businesses have obtained authorization from the FAA—"section 333 exemptions"—allowing them to fly their drones commercially. Farmers, TV stations, surveyors, construction-site supervisors, real estate agents, people selling their properties, and managers seeking cheaper and safer ways to inspect their facilities, want to hire the exemption holders, but many are holding back until the FAA clarifies the groundrules.The FAA understands that its traditional approach for …
Preventing Preemption: Finding Space For States To Protect Consumers' Reputations, Elizabeth De Armond
Preventing Preemption: Finding Space For States To Protect Consumers' Reputations, Elizabeth De Armond
All Faculty Scholarship
The Great Recession awoke state legislators to the power of individuals’ credit reports to hinder their economic opportunities. Many legislators would like to assuage the effects of bad historical events on the futures of the citizens that they represent. Among the topics they can address are employers’ use of credit reports, the presence of criminal record information in credit reports, and the toxic effects of identity theft and medical debt on credit reports. However, the federal Fair Credit Reporting Act’s preemptive effects must be acknowledged and negotiated. This article evaluates potential state legislative efforts against the FCRA’s preemption provisions and …
Coitus Defunctus, Lori Andrews
Takings As A Sociolegal Concept: An Interdisciplinary Examination Of Involuntary Property Loss, Bernadette Atuahene
Takings As A Sociolegal Concept: An Interdisciplinary Examination Of Involuntary Property Loss, Bernadette Atuahene
All Faculty Scholarship
No abstract provided.
Comparison Excluding Commitments: Incommensurability, Adjudication, And The Unnoticed Example Of Trade Disputes, Sungjoon Cho, Richard Warner
Comparison Excluding Commitments: Incommensurability, Adjudication, And The Unnoticed Example Of Trade Disputes, Sungjoon Cho, Richard Warner
All Faculty Scholarship
We claim that there are important cases of “incommensurability” in public policymaking, in which all relevant reasons are not always comparable on a common scale as better, worse, or equally good. Courts often fail to confront this. We are by no means the first to contend that incommensurability exists. Yet incommensurability’s proponents have failed to sway the courts mainly because they overlook the fact that there are two types of incommensurability. The first (“incompleteness incommensurability”) consists of the lack of any appropriate metric for making the comparison. We argue that this type of incommensurability is relatively unproblematic in that courts …
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
All Faculty Scholarship
The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.
Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …
Investing And Pretending, Anita Krug
Investing And Pretending, Anita Krug
All Faculty Scholarship
One of the more prominent components of Dodd–Frank’s regulatory changes was Title VII, providing for the regulation of the over-the-counter derivatives known as “swaps.” A swap is a financial instrument whose value is based on an asset—the “reference asset”—that is wholly unrelated to the swap itself. Although there was much ado about swap regulation immediately after Dodd–Frank’s enactment, the same cannot be said of the many rules that the Commodity Futures Trading Commission (“CFTC”) has subsequently adopted pursuant to its authority under Title VII. This Article critically evaluates the CFTC’s “swap rules” and identifies the regulatory vision that they reflect. …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
All Faculty Scholarship
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
The Conservative-Libertarian Turn In First Amendment Jurisprudence, Steven J. Heyman
The Conservative-Libertarian Turn In First Amendment Jurisprudence, Steven J. Heyman
All Faculty Scholarship
Conservative constitutional jurisprudence in the United States has an important libertarian dimension. In recent years, a conservative majority of the Supreme Court has strengthened the constitutional protections for property rights, recognized an individual right to own firearms, imposed limits on the welfare state and the powers of the federal government, cut back on affirmative action, and held that closely held corporations have a right to religious liberty that permits them to deny contraceptive coverage to their female employees. This libertarian streak also can be seen in decisions on freedom of speech and association. In several leading cases, conservative judges have …
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
All Faculty Scholarship
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …
Downstream Securities Regulation, Anita Krug
Downstream Securities Regulation, Anita Krug
All Faculty Scholarship
Securities regulation wears two hats. Its “upstream” side governs firms in connection with their obtaining financing in the securities markets. That is, it regulates firms’ and issuers’ offers and sales of securities, whether in public offerings to retail investors or in private offerings to institutional investors. Its “downstream” side, by contrast, governs financial services providers, who assist with investors’ activities in those markets. Their services include providing advice regarding securities investments, as investment advisers do; aggregating investors’ assets for purposes of enabling those investors to invest their assets collectively, as mutual funds do; and acting as “middlemen” between buyers and …
Sharing Public Safety Helicopters, Henry H. Perritt Jr.
Sharing Public Safety Helicopters, Henry H. Perritt Jr.
All Faculty Scholarship
No abstract provided.
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
All Faculty Scholarship
Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …