Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- ART (2)
- All Other Telecommunications (2)
- Assisted Reproductive Technology (2)
- Fertility Clinics (2)
- Fertility clinics (2)
-
- Internet advertising (2)
- Other telecommunications (2)
- Websites (2)
- Wired Telecommunications Carriers (2)
- A better License for Open Source Software (1)
- AG Colomer (1)
- Administration of General Economic Programs (1)
- Advertising function (1)
- Anais-anais (1)
- Antitrust (1)
- Apache License (1)
- Arsenal Football Club plc v. Reed (1)
- Art -- Scholarships (1)
- Article 5(1) (1)
- Artistic License (1)
- BSD (1)
- Bias (Law); Antitrust violations; Internet service providers -- Law & legislation (1)
- Biometric identification -- Law & legislation (1)
- California (1)
- Character (1)
- Commercialization (1)
- Computers -- Law & legislation; Internet -- Law & legislation (1)
- Constitutional Orders (1)
- Constitutional law (1)
- Constitutionalism (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Law
Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jim Hawkins
Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jim Hawkins
Indiana Law Journal
Scholarship on assisted reproductive technologies (ART) has emphasized the commercial nature of the interaction between fertility patients and their physicians, but little attention has been paid to precisely how clinics persuade patients to choose their clinics over their competitors’. This Article offers evidence about how clinics sell ART based on clinics’ advertising on their websites. To assess clinics’ marketing efforts, I coded advertising information on 372 fertility clinics’ websites. The results from the study confirm some suspicions of prior ART scholarship while contradicting others. For instance, in line with scholars who are concerned that racial minorities face barriers to accessing …
Biometric Id Cybersurveillance, Margaret Hum
Biometric Id Cybersurveillance, Margaret Hum
Indiana Law Journal
The implementation of a universal digitalized biometric ID system risks normalizing and integrating mass cybersurveillance into the daily lives of ordinary citizens. ID documents such as driver’s licenses in some states and all U.S. passports are now implanted with radio frequency identification (RFID) technology. In recent proposals, Congress has considered implementing a digitalized biometric identification card—such as a biometric-based, “high-tech” Social Security Card—which may eventually lead to the development of a universal multimodal biometric database (e.g., the collection of the digital photos, fingerprints, iris scans, and/or DNA of all citizens and noncitizens). Such “hightech” IDs, once merged with GPS-RFID tracking …
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
Indiana Law Journal
No abstract provided.
Selling Art Or Selling Out?: A Response To Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jody L. Madeira
Selling Art Or Selling Out?: A Response To Selling Art: An Empirical Assessment Of Advertising On Fertility Clinics' Websites, Jody L. Madeira
Indiana Law Journal
Roundtable on Regulating Assisted Reproductive Technology 2012
We And Cyberlaw: The Spatial Unity Of Constitutional Orders, Hans Lindahl
We And Cyberlaw: The Spatial Unity Of Constitutional Orders, Hans Lindahl
Indiana Journal of Global Legal Studies
This paper scrutinizes the fundamental assumption governing Gunther Teubner's theory of societal constitutionalism, namely that societal constitutions are ultimately about the regulation of inclusion and exclusion in global function systems. While endorsing the central role of inclusion/exclusion in constitutions, societal or otherwise, I argue that inclusion and exclusion are primordial categories of collective action, rather than functional categories. As a result, the self-closure which gives rise to a legal collective is spatial as much as it is temporal, and subjective no less than material. Inasmuch as legal orders must establish who ought to do what, where, and when, this entails, …
The Expansion Of Trademark Rights In Europe, Irina Pak
The Expansion Of Trademark Rights In Europe, Irina Pak
IP Theory
No abstract provided.
The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva
The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva
IP Theory
No abstract provided.
Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger
Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger
Books & Book Chapters by Maurer Faculty
This paper proposes revisions to the OECD Guidelines that include basic changes essential for the protection of individual privacy in the 21st century, while avoiding unnecessary restrictions on uses of personal information that are increasingly important.
Gmonopoly: Does Search Bias Warrant Antitrust Or Regulatory Intervention?, Andrew Langford
Gmonopoly: Does Search Bias Warrant Antitrust Or Regulatory Intervention?, Andrew Langford
Indiana Law Journal
No abstract provided.
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Articles by Maurer Faculty
Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …