Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (48)
- Selected Works (26)
- SelectedWorks (23)
- UIC School of Law (21)
- Schulich School of Law, Dalhousie University (12)
-
- Maurer School of Law: Indiana University (8)
- Pepperdine University (6)
- University of Maryland Francis King Carey School of Law (6)
- University of Pennsylvania Carey Law School (4)
- Pace University (3)
- Seattle University School of Law (3)
- American University Washington College of Law (2)
- Chicago-Kent College of Law (2)
- Loyola University Chicago, School of Law (2)
- Northwestern Pritzker School of Law (2)
- SJ Quinney College of Law, University of Utah (2)
- University of Georgia School of Law (2)
- University of Pittsburgh School of Law (2)
- University of Richmond (2)
- University of Washington School of Law (2)
- University of the Pacific (2)
- California State University, San Bernardino (1)
- Columbia Law School (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Penn State Law (1)
- Singapore Management University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- Vanderbilt University Law School (1)
- Washington and Lee University School of Law (1)
- Keyword
-
- Computer Law (21)
- Law and Technology (18)
- Privacy (15)
- Intellectual Property Law (13)
- Science and Technology (12)
-
- Internet (8)
- Communications Law (7)
- Copyright (7)
- Consumer Protection Law (6)
- Cybersecurity (6)
- First Amendment (6)
- Data protection (5)
- Emerging Technologies (5)
- Evidence (5)
- Facebook (5)
- Google (5)
- Location-Based Services (5)
- Social Implications of ICT (5)
- Commercial Law (4)
- Computers (4)
- Constitutional Law (4)
- Cybercrime (4)
- Data privacy (4)
- Economics (4)
- Global Positioning Systems (4)
- National Security (4)
- Risk (4)
- Antitrust (3)
- Cloud computing (3)
- Computer (3)
- Publication
-
- Journal of Digital Forensics, Security and Law (35)
- UIC John Marshall Journal of Information Technology & Privacy Law (14)
- Annual ADFSL Conference on Digital Forensics, Security and Law (13)
- Canadian Journal of Law and Technology (11)
- Professor Katina Michael (7)
-
- All Faculty Scholarship (5)
- Articles by Maurer Faculty (5)
- Journal of Business & Technology Law (4)
- UIC Review of Intellectual Property Law (4)
- Journal of the National Association of Administrative Law Judiciary (3)
- Pepperdine Law Review (3)
- Rodolfo C. Rivas (3)
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Children's Legal Rights Journal (2)
- Curtis E.A. Karnow (2)
- Faculty Scholarship (2)
- Frank A. Pasquale (2)
- Georgia Journal of International & Comparative Law (2)
- Guido Noto La Diega (2)
- Jonathan I. Ezor (2)
- McGeorge Law Review (2)
- Northwestern Journal of Technology and Intellectual Property (2)
- Richmond Journal of Law & Technology (2)
- Seattle University Law Review (2)
- Technology Law and Public Policy Clinic (2)
- UIC Law Review (2)
- Ulf Maunsbach (2)
- Utah OnLaw: The Utah Law Review Online Supplement (2)
- Vincent J Roth Esq (2)
- Publication Type
- File Type
Articles 1 - 30 of 189
Full-Text Articles in Law
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Alexander Hayes Mr.
- From in-car video recording to body-worn video recording
- Exploring available technologies: how do they work, pros and cons
- Storing direct evidence in secure storage: factors to consider
- Citizens “shooting” back with POV tech – what are their rights?
- Crowdsourced sousveillance- harnessing public data for forensic profiling
- Police force policies and practices on the application of new media
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Seattle Journal for Social Justice
No abstract provided.
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
Akiva A Miller
New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …
The Copyrightability Of Nonliteral Elements Of Computer Programs, Julian Velasco
The Copyrightability Of Nonliteral Elements Of Computer Programs, Julian Velasco
Julian Velasco
No abstract provided.
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors provide a brief overview of the domain name system and its dispute resolution regulation. The authors then delve into the new gTLDs and tackle some of the questions brought forward by its imminent introduction. /////////////////////////////////////////////////////////////////////////////////////////////////////////////// Los autores ofrecen un panorama general del sistema de nombres de dominio y la regulación de sus procedimientos de solución de controversias. Posteriormente, los autores profundizan en los nuevos gTLDs y tratan de responder a algunas de las preguntas presentadas por su inminente introducción.
Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum
Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum
Georgia Journal of International & Comparative Law
No abstract provided.
The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl
The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl
Georgia Journal of International & Comparative Law
No abstract provided.
Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall
Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall
Benton C. Martin
This short essay acknowledges certain efficiencies in enforcing copyright law against "secondary" infringers like filesharing services through criminal proceedings, but it proposes guidelines for prosecutors to use in limiting prosecutions against this type of infringer.
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
Research Collection Yong Pung How School Of Law
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
Indiana Law Journal
No abstract provided.
Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz
Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz
Journal of Digital Forensics, Security and Law
Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
T. Noble Foster
This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …
Tor Exit Nodes: Legal And Policy Considerations, Sarah Campbell Eagle, Abigail St. Hilaire, Kelly Sherwood
Tor Exit Nodes: Legal And Policy Considerations, Sarah Campbell Eagle, Abigail St. Hilaire, Kelly Sherwood
Technology Law and Public Policy Clinic
Anonymity Networks
The Internet is a constant companion to people the world over and as technology improves it is becoming more accessible every day. With the amount of communication that occurs online, it was only a matter of time before anonymity became an important topic of discussion. Several so-called “anonymity networks” have been developed to facilitate anonymous communication by the citizens of the web. Because the use of these networks is already so widespread, the time is ripe for a discussion of their merits and potential government responses to this phenomenon. An anonymity network “enables users to access the Web …
The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang
The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang
Northwestern Journal of Technology and Intellectual Property
With the growing availability of Internet access across the globe, social media has transformed the traditional relationship between government authority and its citizens by providing the people with an innovative and powerful means to harmonize their efforts in expressing their political and social concerns. The importance of safeguarding Internet availability is more critical than ever before as access to the Internet is now the means by which the world communicates, stays informed, and engages in daily tasks. In the face of potential social unrest fueled by social media, the United States must take a preventative approach, one that matches our …
International Cryptography Regulation And The Global Information Economy, Nathan Saper
International Cryptography Regulation And The Global Information Economy, Nathan Saper
Northwestern Journal of Technology and Intellectual Property
With the meteoric rise of the Internet and e-commerce in the 1990s came great attention to the problems and opportunities associated with cryptography. Throughout that decade, the United States and many foreign countries debated and experimented with various forms of cryptography regulation, and attempts were made at international harmonization. Since then, however, policy-making activity around cryptography has slowed, if not halted altogether, leaving individuals and companies to face a bewildering array of regulations—or, in many cases, to face regulations that are extraordinarily unclear and haphazardly applied.
This Note seeks to introduce the reader to the issue of international cryptography regulation …
What To Do About Google?, James Grimmelmann
What To Do About Google?, James Grimmelmann
James Grimmelmann
Observers have debated whether is a conduit for websites' speech or an editor that speaks for itself. The best answer is neither: search engines should be advisors helping their users find the websites they seek. Good search engine policy would put users first; I give examples including search bias and user privacy.
A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian
Vahagn Amirian
No abstract provided.
Rankings, Reductionism, And Responsibility , Frank Pasquale
Rankings, Reductionism, And Responsibility , Frank Pasquale
Frank A. Pasquale
After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Frank A. Pasquale
Internet service providers and search engines have mapped the web, accelerated e-commerce, and empowered new communities. They also pose new challenges for law. Individuals are rapidly losing the ability to affect their own image on the web - or even to know what data are presented about them. When web users attempt to find information or entertainment, they have little assurance that a carrier or search engine is not biasing the presentation of results in accordance with its own commercial interests. Technology’s impact on privacy and democratic culture needs to be at the center of internet policy-making. Yet before they …
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
Vincent J Roth Esq
Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
The Mhealth Conundrum: Smartphones & Mobile Medical Apps – How Much Fda Medical Device Regulation Is Required?, Vincent J. Roth Esq
Vincent J Roth Esq
Smartphones and tablets have provided a plethora of new business opportunities for a number of industries including healthcare. Technology, however, appears to have outpaced the regulatory environment, which has spawned criticism over the current guidance of the Food and Drug Administration (“FDA”) with regard to software and what level of regulation is required for mobile medical applications. Commentators have remarked that the FDA’s guidance in this area is complex and unclear. This article explores the current FDA regulatory scheme for mobile medical applications and adapters for mobile devices designed to provide mobile healthcare, or “mHealth.” Attention is given to further …
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Allyson Haynes Stuart
This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …