Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D printing (1)
- Anthropology (1)
- Corporations (1)
- Cultural development (1)
- Culture (1)
-
- Economics (1)
- Food and Drug Law (1)
- General Law (1)
- Health Law and Policy (1)
- Health law (1)
- Healthcare (1)
- IP Law (1)
- Innovation (1)
- Intellectual Property Law (1)
- Intellectual property law (1)
- International Law (1)
- Law and Economics (1)
- Law and Society (1)
- Law and Technology (1)
- Legal History (1)
- Medicine (1)
- Patent law (1)
- Public Law and Legal Theory (1)
- Publication
Articles 1 - 2 of 2
Full-Text Articles in Law
3d Printing And Healthcare: Will Laws, Lawyers, And Companies Stand In The Way Of Patient Care?, Evan R. Youngstrom
3d Printing And Healthcare: Will Laws, Lawyers, And Companies Stand In The Way Of Patient Care?, Evan R. Youngstrom
Evan R. Youngstrom
Today, our society is on a precipice of significant advancement in healthcare because 3D printing will usher in the next generation of medicine. The next generation will be driven by customization, which will allow doctors to replace limbs and individualize drugs. However, the next generation will be without large pharmaceutical companies and their justifications for strong intellectual property rights. However, the current patent system (which is underpinned by a social tradeoff made from property incentives) is not flexible enough to cope with 3D printing’s rapid development. Very soon, the social tradeoff will no longer benefit society, so it must be …
Verification Methods In Cyber Attack Treaties, Grant Hodgson
Verification Methods In Cyber Attack Treaties, Grant Hodgson
Grant Hodgson
The fundamental differences between cyber weapons and traditional military weapons present challenges to verification techniques used in the past. This paper will discuss the challenges in constructing, implementing, and verifying a cyberattack treaty. Part I, will discuss the nature of cyberattacks and what makes them difficult for verification purposes. Part II will describe techniques that have previously been used to verify other treaties. Each technique is evaluated for its potential efficacy when applied to cyberattacks.