Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer Law (1)
- Copyright (1)
- Genetics & Society (1)
- Intellectual Property Law (1)
- Internet Law (1)
-
- Law & Ethics (1)
- Public Health (1)
- Software vulnerabilities research; Software bugs; Market in software vulnerabilities; Legality of software vulnerabilities research; Ethics of software vulnerabilities research; Hackers; Information security policy. (1)
- Transgenic plant agriculture; Transgenic plant foods; Substantial equivalence; Organic agriculture; Conventional agriculture; Regulatory science; Research science; Safety science; Science neutrality. (1)
Articles 1 - 2 of 2
Full-Text Articles in Law
The Limits Of Regulatory Science In Transnational Governance Of Transgenic Plant Agriculture And Food Systems, Taiwo Oriola
The Limits Of Regulatory Science In Transnational Governance Of Transgenic Plant Agriculture And Food Systems, Taiwo Oriola
Taiwo Oriola
The current national and transnational regulatory and policy framework for transgenic plant agriculture and food is arguably largely defined by science. Notably, transgenic plant agriculture policy deference to science is ostensibly premised on the general perception that science is neutral, objective, reliable, and agnostic. This is exemplified by cases ranging from Alliance for Bio-integrity v Donna Shalala, European Communities: Measures Affecting the Approval and Marketing of Biotech Products, to European Commission v Republic of Poland, in which conscientious, ethical, religious, and cultural oppositional grounds to transgenic plant agriculture and food were trumped by scientific imperatives. However, the lack of unanimity …
Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, Taiwo Oriola
Bugs For Sale: Legal And Ethical Proprieties Of The Market In Software Vulnerabilities, Taiwo Oriola
Taiwo Oriola
Software vulnerabilities are inherent errors or mistakes in software programming and designs, and arguably the weakest link in digital information architecture with high propensity for rendering information systems infrastructure susceptible to compromise and hacking. Given the increasing reliance of the global economy on digital platforms with concomitant imperatives for securing sensitive intelligence, business and personal data, the need for continual corrective patch of perennially recurring critical software bugs is at once urgent and sacrosanct. This has precipitated research and a thriving market in software vulnerabilities, an integral element of the burgeoning multi-million dollars information security industry that epitomizes the externalization …