Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (57)
- Science and Technology Law (40)
- Computer Law (20)
- Law and Society (20)
- Privacy Law (19)
-
- Intellectual Property Law (18)
- Labor and Employment Law (17)
- Communications Law (14)
- Constitutional Law (12)
- Health Law and Policy (12)
- Administrative Law (11)
- First Amendment (10)
- Contracts (9)
- State and Local Government Law (8)
- Criminal Law (7)
- Fourth Amendment (7)
- International Law (7)
- Legislation (7)
- Air and Space Law (6)
- Business (6)
- Criminal Procedure (6)
- Legal Education (6)
- Entertainment, Arts, and Sports Law (5)
- Family Law (5)
- Food and Drug Law (5)
- Law and Gender (5)
- Legal Remedies (5)
- Medical Jurisprudence (5)
- Medicine and Health Sciences (5)
- Publication Year
- Publication
-
- Ronald W Staudt (24)
- Robert Sprague (21)
- Joshua A.T. Fairfield (10)
- Michael J. Malinowski (10)
- Richard Warner (10)
-
- William A. Herbert (10)
- Henry H. Perritt, Jr. (8)
- Andrea L Roth (5)
- O. Carter Snead (5)
- Olufunmilayo B. Arewa (5)
- Peter Lee (5)
- Richard Li-dar Wang (5)
- Susan Freiwald (5)
- Tom W. Bell (5)
- Allison W Chan (4)
- Parker Tresemer (4)
- Daniel Lyons (3)
- Dorit R. Reiss (3)
- H. Brian Holland (3)
- J. Armand Musey, CFA (3)
- Jennifer Jackson (3)
- Jorge R Roig (3)
- Michael D. Mann (3)
- Michael Katz (3)
- Nicola Lucchi (3)
- Robert B. Ahdieh (3)
- Roger M. Groves (3)
- A. Michael Froomkin (2)
- Alfred C. Yen (2)
- Andrea Matwyshyn (2)
Articles 1 - 30 of 297
Full-Text Articles in Law
הורות משפטית מן הדין ומן הצדק - Legal Parenthood - Law And Justice, Yehezkel Margalit
הורות משפטית מן הדין ומן הצדק - Legal Parenthood - Law And Justice, Yehezkel Margalit
Hezi Margalit
The Rise And Fall Of Private Sector Unionism: What Next For The Nlra?, Jeffrey M. Hirsch, Barry T. Hirsch
The Rise And Fall Of Private Sector Unionism: What Next For The Nlra?, Jeffrey M. Hirsch, Barry T. Hirsch
Jeffrey M. Hirsch
No abstract provided.
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Thomas E. Baker
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Robert Sprague
Just Cause Discipline For Social Networking In The New Gilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally
Just Cause Discipline For Social Networking In The New Gilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally
William A. Herbert
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig
Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges
Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges
Patrick T. Ryan
This essay looks at the the different roles that institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the layered model of the Internet. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications to show why it is important for different institutions within the governance system to focus on their areas of expertise (e.g., the ITU, ICANN, and IGF). Several areas of conflict are reviewed, such as the desire to promote more broadband infrastructure (a topic that is in the …
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start? (With Albert J. Plawinski", Henry H. Perritt Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start? (With Albert J. Plawinski", Henry H. Perritt Jr.
Henry H. Perritt, Jr.
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Shlomit Yanisky-Ravid Professor of Law
Increasingly, there has been a focus on creating democratic standards and procedures in order to best facilitate open exchange of information and communication online—a goal that fits neatly within the feminist aim to democratize content creation and community. Collaborative websites, such as blogs, social networks, and, as focused on in this Article, Wikipedia, represent both a Cyberspace community entirely outside the strictures of the traditional (intellectual) proprietary paradigm and one that professes to truly embody the philosophy of a completely open, free, and democratic resource for all. In theory, collaborative websites are the solution that social activists, Intellectual Property opponents …
Using Occam’S Razor To Solve International Attorney-Client Privilege Choice Of Law Issues: An Old Solution To A New Problem, Nathan M. Crystal, Francesca Giannoni-Crystal
Using Occam’S Razor To Solve International Attorney-Client Privilege Choice Of Law Issues: An Old Solution To A New Problem, Nathan M. Crystal, Francesca Giannoni-Crystal
Nathan M. Crystal
The practice of law is increasingly becoming “delocalized.” Globalization and the use of technology are two important factors in this fundamental change in practice. Delocalization is affecting almost all areas of practice, including issues involving attorney-client privilege (ACP). To some extent the choice-of-law rules governing ACP are also – like other fields of the law - being “delocalized,” but in our view only partially. This paper discusses six approaches to choice of law issues governing ACP that are being used by the courts. Aside from the traditional lex loci approach (which simply applies the law of the forum to the …
Overestimating Wireless Demand: Policy And Investment Implications Of Upward Bias In Mobile Data Forecasts, J. Armand Musey Cfa, Aalok Mehta
Overestimating Wireless Demand: Policy And Investment Implications Of Upward Bias In Mobile Data Forecasts, J. Armand Musey Cfa, Aalok Mehta
J. Armand Musey, CFA
In this paper, we present evidence of persistent errors in projections of wireless demand and examine the implications for wireless policy and investment. Mobile demand projections are relied upon in academic and government research and used for critically important telecommunications policy decisions, both domestically and internationally. The Federal Communications Commission, for example, used such projections to estimate a 275 MHz spectrum shortage by 2014 and featured such estimates in the U.S. National Broadband Plan as evidence for allocating additional spectrum for cellular services. The International Telecommunications Union Radiocommunication Sector endorsed in 2006 an estimate of a 1,280- to 1,720-MHz spectrum …
One Hundred Twenty Years Of U.S. Privacy Law Scholarship: A Latent Semantic Analysis, Robert Sprague, Kevin Grauberger, Nicole Barberis
One Hundred Twenty Years Of U.S. Privacy Law Scholarship: A Latent Semantic Analysis, Robert Sprague, Kevin Grauberger, Nicole Barberis
Robert Sprague
This paper reports results from a research project aimed at identifying fundamental privacy law principles derived from the writings of legal scholars and commentators using probabilistic topic modeling, which is comprised of a suite of algorithms that attempt to discover hidden thematic structures in large archives of documents. Topic modeling algorithms are statistical methods that analyze the words of texts to discover topics (themes) contained within, how those topics are connected to each other, and how they change over time. A latent Dirichlet allocation process, which identifies sets of terms that more tightly co-occur, is incorporated into the topic modeling …
New Technology, New Information Privacy: Social-Value-Oriented Information Privacy Theory, Chen-Hung Chang
New Technology, New Information Privacy: Social-Value-Oriented Information Privacy Theory, Chen-Hung Chang
Chen-Hung Chang
Today’s innovative technologies offer remarkable advantages in our daily lives, but they also give rise to concerns that these technological advancements will adversely impact individuals’ privacy. The traditional notions of information privacy were based on personal control over data about oneself, an antiqued notion in a time where pervasive surveillance has rendered it nearly impossible for individuals to protect information privacy on their own. Key privacy concerns arise because it is nearly impossible to be left out of the intertwined digital and Internet world. Those who choose not to use the Internet, smartphones, tablet computers, electronic mail and online social …
Right-Sizing Spectrum Auction Licenses: The Case For Smaller Geographic License Areas In The Tv Broadcast Incentive Auction, William H. Lehr Phd, J. Armand Musey Cfa
Right-Sizing Spectrum Auction Licenses: The Case For Smaller Geographic License Areas In The Tv Broadcast Incentive Auction, William H. Lehr Phd, J. Armand Musey Cfa
J. Armand Musey, CFA
The wireless sector is a key contributor to economic activity and growth. Over the next several years, wireless service providers are expected to invest $25 to $53 billion upgrading and expanding their networks to deploy 4G mobile broadband across the nation. All told, wireless broadband investment and the services and innovation supported by such investment are expected to add between $259 and $355 billion to US GDP each year through 2017. The Federal Communications Commission ("Commission" or "FCC") is currently designing the largest ever auction of terrestrial wireless spectrum, currently planned for late 2014 (the "Incentive Auction"). The purpose is …
Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone
Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone
Michele R. Pistone
1. For many years, the question of how to use technology to teach the law has been a minor concern of the legal academy. That era of general indifference to developments in learning technologies is now coming to an end. There are many reasons for the change. Law schools are facing such a host of difficulties— declining enrollments, declining job prospects for graduates, reduced public funding, and understandable concerns about cost and debt—that sometimes it seems the only debate is over whether the situation is best described as a “tsunami” or “a perfect storm.” Against this backdrop, technology offers the …
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague
Robert Sprague
Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter
Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter
Megan M Carpenter
This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
Richard Warner
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
The Harmonization Of Browsewrap Agreements Abroad And The Protection Of American Consumers, Tinsley A. Ashley
The Harmonization Of Browsewrap Agreements Abroad And The Protection Of American Consumers, Tinsley A. Ashley
Tinsley A Ashley
No abstract provided.
Worker (Mis)Classification In The Sharing Economy: Trying To Fit Square Pegs Into Round Holes, Robert Sprague
Worker (Mis)Classification In The Sharing Economy: Trying To Fit Square Pegs Into Round Holes, Robert Sprague
Robert Sprague
Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague
Law Abiding Drones, Henry H. Perritt Jr., Eliot O. Sprague
Henry H. Perritt, Jr.
'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino
'I Know My Rights, You Go'n Need A Warrant For That:' The Fourth Amendment, Riley's Impact, And Warrantless Searches Of Third-Party Clouds, Laurie Buchan Serafino
Laurie B. Serafino
Scholars have frequently suggested that the Fourth Amendment ought to be applied with varying degrees of rigor depending on the seriousness of the crime investigated. Courts have largely rejected such an offense-specific approach to constitutional protections, but have demonstrated deference to the Executive Branch in matters of national security in other contexts. The particularly heightened concern raised by the threat of terrorism suggests that, at least in the context of these most serious of cases, courts ought to engage in some form of balance that recognizes the uniquely strong government interest. Such an approach, however, has to recognize that the …
One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood
One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood
Jonathan R. K. Stroud
Tasked in 2011 with creating three powerful new patent review trial regimes, the U.S. Patent and Trademark Office—through the efforts of their freshly empowered quasi-judicial body, the Patent Trial and Appeals Board—set to creating a fast-paced trial with minimal discovery and maximum efficiency. In the first two years of existence, the proceedings have proved potent, holding unpatentable many of the claims that reach decisions on the merits. Yet a small subsection of petitions never make it past the starting gate, resulting in wasted time and effort on the parts of petitioners—and likely sighs of relief from the rights-holders. Parties on …
Weeds, Seeds, & Deeds Redux: Natural And Legal Evolution In The U.S. Seed Wars, Rebecca Stewart
Weeds, Seeds, & Deeds Redux: Natural And Legal Evolution In The U.S. Seed Wars, Rebecca Stewart
Rebecca K Stewart
Ever since the U.S. Patent and Trademark Office began issuing utility patents for plants, the United States has sat squarely on the frontlines of what have come to be known as the “seed wars.” In the last two decades, the majority of battles in the U.S. seed wars have been waged in the form of patent infringement lawsuits. Typically these suits are filed by biotechnology corporations such as Monsanto against farmers accused of saving and planting patented seed that self-replicates to produce progeny embodying—and thus infringing—the biotech corporations’ patented inventions.
Yet in recent years, the seed wars have begun to …
Antitrust Analysis After Actavis: Applying The Rule Of Reason To Reverse Payments, Benjamin Miller
Antitrust Analysis After Actavis: Applying The Rule Of Reason To Reverse Payments, Benjamin Miller
Benjamin Miller
Abstract In F.T.C. v. Actavis, Inc. the Supreme Court resolved a circuit split regarding the proper evaluation of reverse payment settlements under federal antitrust law, holding that they must be evaluated under a rule of reason analysis. However, the Court simultaneously created significant uncertainty by declaring that the lower courts were responsible for structuring the analysis. While a few cases are currently in the pre-trial phase, the only decisions relating to reverse payments since Actavis have been rulings on pre-trial motions—there have been no decisions on the merits. Given the intricate intersection between antitrust and intellectual property principles in these …
Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo
Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo
A. Michael Froomkin
This paper examines when, under U.S. law, humans may use force against robots to protect themselves, their property, and their privacy. May a landowner legally shoot down a trespassing drone? May she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or a peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This paper addresses all those issues and one more: what rules and standards we could put into place …
“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves
Roger M. Groves
Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …
Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald
Light In The Darkness: How Leatpr Standards Guide Legislators In Regulating Law Enforcement Access To Cell Site Location Records, Susan Freiwald
Susan Freiwald
This article measures the new ABA Standards for Criminal Justice: Law Enforcement Access to Third Party Records (LEATPR Standards) success by assessing the guidance they provide legislators interested in updating pertinent law regarding one specific type of data. Scholars should not expect the Standards to yield the same conclusions they would have furnished had they been able to draft a set of standards by themselves. The Standards emerged after years of painstaking consensus building and compromise no individual committee member got entirely what he wanted. Nonetheless, not every product of a committee turns out to have been worth the effort, …
Nlrb And Social Media, Robert Sprague
Nlrb And Social Media, Robert Sprague
Robert Sprague
Focus: (1) when do employee social media posts constitute concerted activities protected under Section 7 of the National Labor Relations Act?; and (2) when do employers' social media policies restrict protected concerted activities?
Drones, Henry H. Perritt Jr., Eliot O. Sprague