Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

SelectedWorks

Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 256

Full-Text Articles in Law

3d Printing And Healthcare: Will Laws, Lawyers, And Companies Stand In The Way Of Patient Care?, Evan R. Youngstrom Apr 2016

3d Printing And Healthcare: Will Laws, Lawyers, And Companies Stand In The Way Of Patient Care?, Evan R. Youngstrom

Evan R. Youngstrom

Today, our society is on a precipice of significant advancement in healthcare because 3D printing will usher in the next generation of medicine. The next generation will be driven by customization, which will allow doctors to replace limbs and individualize drugs. However, the next generation will be without large pharmaceutical companies and their justifications for strong intellectual property rights. However, the current patent system (which is underpinned by a social tradeoff made from property incentives) is not flexible enough to cope with 3D printing’s rapid development. Very soon, the social tradeoff will no longer benefit society, so it must be …


Verification Methods In Cyber Attack Treaties, Grant Hodgson Feb 2016

Verification Methods In Cyber Attack Treaties, Grant Hodgson

Grant Hodgson

The fundamental differences between cyber weapons and traditional military weapons present challenges to verification techniques used in the past. This paper will discuss the challenges in constructing, implementing, and verifying a cyberattack treaty. Part I, will discuss the nature of cyberattacks and what makes them difficult for verification purposes. Part II will describe techniques that have previously been used to verify other treaties. Each technique is evaluated for its potential efficacy when applied to cyberattacks.


Crashing Into The Unknown: An Examination Of Crash Optimization Algorithms Through The Two Lanes Of Ethics And Law, Jeffrey K. Gurney Jan 2016

Crashing Into The Unknown: An Examination Of Crash Optimization Algorithms Through The Two Lanes Of Ethics And Law, Jeffrey K. Gurney

Jeffrey K Gurney

Autonomous vehicles will encounter situations where an accident is truly unavoidable, requiring the vehicle to decide whom or what to hit. In such situations, the vehicle will make difficult ethical decisions based upon its programming — more specifically, how its crash-optimization algorithm is programmed.This Article examines crash-optimization algorithms from an ethical and legal standpoint through the lenses of six moral dilemmas. Ethically, the Article focuses specifically on utilitarian and Kantian ethics. Legally, the Article considers the tort and criminal law implications of crash-optimization algorithms.In addition, the Article discusses whether autonomous vehicles should even make ethical decisions. Concluding that they should …


Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit Jan 2016

Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit

Hezi Margalit

The last few decades have witnessed dramatic changes in the conceptualization and methodologies of determining legal parentage in the U.S. and other countries in the western world. Through various sociological shifts, growing social openness and bio-medical innovations, the traditional definitions of family and parenthood have been dramatically transformed. This transformation has led to an acute and urgent need for legal and social frameworks to regulate the process of determining legal parentage. Moreover, instead of progressing in a piecemeal, ad-hoc manner, the framework for determining legal parentage should be comprehensive. Only a comprehensive solution will address the differing needs of today’s …


From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit Jan 2016

From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit

Hezi Margalit

In 1985, when Kim Cotton became Britain’s first commercial surrogate mother, Europe was exposed to the issue of surrogacy for the first time on a large scale. Three years later, in 1988, the famous case of Baby M drew the attention of the American public to surrogacy as well. These two cases implicated fundamental ethical and legal issues regarding domestic surrogacy and triggered a fierce debate about motherhood, child-bearing, and the relationship between procreation, science and commerce. These two cases exemplified the debate regarding domestic surrogacy - a debate that has now been raging for decades. Contrary to the well-known …


Experts, Statistics, Science & Bad Science, Curtis E.A. Karnow Nov 2015

Experts, Statistics, Science & Bad Science, Curtis E.A. Karnow

Curtis E.A. Karnow

Articles, books, and other online resources relating to expert testimony with a specific focus on problems with peer review, bad science, and statistics


Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford Aug 2015

Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford

Scott Shackelford

Although there has been a relative abundance of work done on exploring the contours of the law of cyber war, far less attention has been paid to defining a law of cyber peace applicable below the armed attack threshold. Among the most important unanswered questions is what exactly nations’ due diligence obligations are to one another and to their respective private sectors. The International Court of Justice (“ICJ”) has not yet explicitly considered this topic, though it has ruled in the Corfu Channel case that one country’s territory should not be “used for acts that unlawfully harm other States.” But …


E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Aug 2015

E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials …


Visualizing Dna Proof, Nicholas L. Georgakopoulos Aug 2015

Visualizing Dna Proof, Nicholas L. Georgakopoulos

Nicholas L Georgakopoulos

DNA proof inherently involves the use of probability theory, which is often counterintuitive. Visual depictions of probability theory, however, can clarify the analysis and make it tractable. A DNA hit from a large database is a notoriously difficult probabi­li­ty theory issue, yet the visuals should enable courts and juries to handle it. The Puckett facts are an example of a general approach: A search in a large DNA database produces a hit for a cold crime from 1972 San Francisco. Probability theory allows us to process the probabilities that someone else in the database, someone not in the database, or …


The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed Aug 2015

The Privacy Dilemma In Digital Arrestee Mug Shots Under The Foia 7(C) And State And Local Policy Recommendations, Ahad Syed

Ahad Syed

This Article examines the purpose and interpretation by courts of Freedom of Information Act’s 7(C) Exemption. Specifically, the Article sets out to unravel the current federal circuit court split over Exemption 7(C) by examining its application to the digital privacy dilemma as applied to arrestee photographs, commonly known as “mug shots.” Automated data-scraping programs continuously scour the internet, reaping, replicating, and reposting photographs of arrestees who may or may not have had charges dismissed in order to shame them into paying website owners for removal. While other commentators have argued for state law penalizing pay-to-remove mug shot websites only, this …


The Treatment For Malpractice – Physician, Enhance Thyself: The Impact Of Neuroenhancements For Medical Malpractice, Harvey L. Fiser Aug 2015

The Treatment For Malpractice – Physician, Enhance Thyself: The Impact Of Neuroenhancements For Medical Malpractice, Harvey L. Fiser

Harvey L. Fiser

No abstract provided.


Finding The Adequate Legal Framework For The Deployment Of Ocean Renewable Energy Through Area-Based Management, Xiao Recio-Blanco Aug 2015

Finding The Adequate Legal Framework For The Deployment Of Ocean Renewable Energy Through Area-Based Management, Xiao Recio-Blanco

Xiao Recio-Blanco

The world runs on electricity, but its global distribution is uneven and incomplete. The lack of access to electricity denies some people the most basic benefits, from healthcare and sanitation to security and economic development.

To increase access to electricity, most developing nations have relied on traditional sources of energy, namely fossil fuels, and the extension of a central electrical grid. Scholars and specialized International Organizations suggest that the implementation of renewable energy technologies through small-to-mid scale grid projects could be a reliable alternative. However, renewable energy technologies must overcome three formidable hurdles: low reliability, uneven availability, and the high …


The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden Jul 2015

The Evolution Of Internet Service Providers From Partners To Adversaries: Tracking Shifts In Interconnection Goals And Strategies In The Internet’S Fifth Generation, Rob Frieden

Rob Frieden

At the Internet’s inception, carriers providing the bit switching and transmission function largely embraced expanding connections and users as a primary service goal. These ventures refrained from metering traffic and charging for carriage based on the assumption that traffic volumes roughly matched, or that traffic measurement was not worth the bother in light of external funding from government grants. Most Internet Service Providers (“ISPs”) bartered network access through a process known as peering in lieu of metering traffic and billing for network use. As governments removed subsidies and commercial carriers invested substantial funds to build larger and faster networks, identifying …


Toward A New Language Of Legal Drafting, Matthew Roach Jul 2015

Toward A New Language Of Legal Drafting, Matthew Roach

Matthew Roach

Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.


Casos De Hermenéútica A La La Luz Del Estatuto De La Corte Penal Internacional®, Daniel Fernando Gómez Tamayo Jun 2015

Casos De Hermenéútica A La La Luz Del Estatuto De La Corte Penal Internacional®, Daniel Fernando Gómez Tamayo

Daniel Fernando Gómez Tamayo

En este ensayo se abordará el abuso del poder, el prevaricato por acción, el riesgo del robo digital de dinero a las empresas del sector privado por federales de la embajada americana (microsoft); el fuero militar de oficiales con antecedentes disciplinarios y penales. ¿ Se puede hablar de democracia cuando existen una política fascista?; ¿"que piensan los demócratas que el DAS coloque micrófonos a los congresistas del M-19?" ¿El TLC con Estados Unidos está vigente?, ¿hubo espionaje de la oficial americana en los intereses colombianos en el TLC.? ¿US Marschalls (Procuradores o víctima de delitos federales o crímenes de estado …


Cybercrime: A Saudi And American Perspective, Hussam M. Alkanbashi May 2015

Cybercrime: A Saudi And American Perspective, Hussam M. Alkanbashi

Hussam M. Alkanbashi

Cybercrime is one of the greatest threats facing the International community. Defined as criminal activity perpetrated using computers and the internet, cybercrime has developed into a trillion dollar a year industry, affecting millions of people around the world, as well as countless businesses and the governments of every nation. With nearly 431 million victims projected in 2015, cyber related crime is one of if not the most frequent, costly and pervasive crimes worldwide. This article examines and assesses the effectiveness of Saudi and American Cyber Laws in deterring the growing global threats posed by cybercrime. The article studies cyber identity …


Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden May 2015

Network Neutrality And Consumer Demand For “Better Than Best Efforts” Traffic Management, Rob Frieden

Rob Frieden

This paper assesses whether and how ISPs can offer quality of service enhancements, at premium prices for full motion video, while still complying with the new rules and regulations established by the Federal Communications Commission (“FCC”) in March, 2015. The paper explains that having made the controversial decision to reclassify all forms of Internet access as a telecommunications service, the FCC increases regulatory uncertainty. In particular, the FCC has failed to identify instances where “retail ISPs,” serving residential broadband subscribers, can offer quality of service enhancements that serve real consumer wants without harming competition and the ability of most content …


The World’S Laboratory: China’S Patent Boom, It Standards And The Implications For The Global Knowledge, Christopher Mcelwain, Dennis Fernandez Apr 2015

The World’S Laboratory: China’S Patent Boom, It Standards And The Implications For The Global Knowledge, Christopher Mcelwain, Dennis Fernandez

Christopher McElwain

Just as China’s factories disrupted the economics of IT hardware, its research labs have the potential to disrupt the economics of the technology itself. In 2014, China’s patent office received nearly 2.4 million patent applications, 93% from domestic applicants. China has also climbed to third place in terms of international applications, with over 21,000 WIPO PCT applications. Meanwhile, China has taken an assertive role in setting technology standards, both at the national and international levels. In the past, this has included developing and promoting alternatives to important IT standards as a means of challenging perceived monopolies by certain (foreign-dominated) technologies. …


Ninth Circuit Nine-Plus -- Settling The Law In Internet Keyword Advertising And Trademark Use, Andrew Leahey Apr 2015

Ninth Circuit Nine-Plus -- Settling The Law In Internet Keyword Advertising And Trademark Use, Andrew Leahey

Andrew Leahey

No abstract provided.


The Irrelevance Of Nanotechnology Patents, Emily Michiko Morris Apr 2015

The Irrelevance Of Nanotechnology Patents, Emily Michiko Morris

Emily Michiko Morris

Once the stuff of science fiction, nanotechnology is now expected to be the next technological revolution, but despite millions of dollars of investment, we still have yet to see the brave new world of cheap energy, cell-specific drug delivery systems, and self-replicating nanobots that nanotechnology promises. Instead, nanotechnology seems to be in a holding pattern, perpetually stuck in the status of “emerging science,” “immature field,” and “new technology” for over three decades now. Why? Professor Mark Lemley and a number of others have suggested that the answer to this puzzling question is simple: nanotechnology differs from the all of the …


Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell Apr 2015

Invisible Labor, Invisible Play: Online Gold Farming And The Boundary Between Jobs And Games, Julian Dibbell

Julian Dibbell

When does work become play, and play work? Courts have considered the question in a variety of economic contexts, from student athletes seeking recognition as employees to professional blackjack players seeking to be treated by casinos just like casual players. Here I apply the question to a relatively novel context: that of online gold farming, a gray-market industry in which wage-earning workers, largely based in China, are paid to play online fantasy games (MMOs) that reward them with virtual items their employers sell for profit to the same games’ casual players. Gold farming is clearly a job (and under the …


Law Enforcement And Technology: Requiring Technological Shields To Serve And Protect Citizen Rights, Ryan C. Pulley Mar 2015

Law Enforcement And Technology: Requiring Technological Shields To Serve And Protect Citizen Rights, Ryan C. Pulley

Ryan C Pulley

An often revisited topic is the tension between law enforcement and the citizens they aim to protect. One side of this discussion seeks to mitigate the tension by explaining the hard decisions that law enforcement officers must make to protect citizens and themselves, while the other emphasizes the corruption that exists within police departments. Recently, this discussion has begun a critical examination of the role of technology within police department to determine whether police officers are properly monitored and trained.

Both citizens and police forces alike should require that law enforcement officers utilize publicly available technologies that protect citizens’ rights. …


, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta Mar 2015

, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta

Jeffrey A. Van Detta

This article discusses the disruptive change in American (and trans-national) legal education that the convergence of technology and economics is bringing to legal education. It posits, and then defends, the following assertion about "law schools of the future":

“Law schools will no longer be ‘places’ in the sense of a single faculty located on a physical campus. In the future, law schools will consist of an array of technologies and instructional techniques brought to bear, in convergence, on particular educational needs and problems.”

This paper elaborates on that prediction, discussing the ways in which technology will positively impact legal education, …


The "Uberization" Of Healthcare: The Forthcoming Legal Storm Over Mobile Health Technology's Impact On The Medical Profession, Fazal Khan Mar 2015

The "Uberization" Of Healthcare: The Forthcoming Legal Storm Over Mobile Health Technology's Impact On The Medical Profession, Fazal Khan

Fazal Khan

The nascent field of mobile health technology is still very small but is predicted to grow exponentially as major technology companies such as Apple, Google, Samsung, and even Facebook have announced mobile health initiatives alongside influential healthcare provider networks. Given the highly regulated nature of healthcare, significant legal barriers stand in the way of mobile health’s potential ascension. I contend that the most difficult legal challenges facing this industry will be restrictive professional licensing and scope of practice laws. The primary reason is that mobile health threatens to disrupt historical power dynamics within the healthcare profession that have legally enshrined …


Through The Lens Of Innovation, Mirit Eyal-Cohen Feb 2015

Through The Lens Of Innovation, Mirit Eyal-Cohen

Mirit Eyal-Cohen

The legal system constantly follows the footsteps of innovation and attempts to discourage its migration overseas. Yet, present legal rules that inform and explain entrepreneurial circumstances lack a core understanding of the concept of innovation. By its nature, law imposes order. It provides rules, remedies, and classifications that direct behavior in a consistent manner. Innovation turns on the contrary. It entails making creative judgments about the unknown. It involves adapting to disarray. It thrives on deviations as opposed to traditional causation. This Article argues that these differences matter. It demonstrates that current laws lock entrepreneurs into inefficient legal routes. Using …


Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman Feb 2015

Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more easily understandable …


Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele Feb 2015

Holding Standards For Randsome: A Remedial Perspective On Rand Licensing Commitments, Layne S. Keele

Layne S. Keele

In Apple, Inc. v. Motorola, Inc., 757 F.3d 1286 (Fed. Cir. 2014), the four federal judges who considered the case—Judge Posner by designation at the trial level, and three Federal Circuit judges on appeal—all expressed differing opinions on the question of whether and to what extent extraordinary patent remedies should be available for the infringement of standard-essential patents. This article aims to simplify this muddled and confusing topic.

The article employs a teleological approach, examining the purposes behind remedies in general, the purposes of extraordinary remedies in patent law, and the purposes of RAND commitments (commitments to license standard-essential …


Bridgefunding Is Crowdfunding For Startups Across The Private Equity Gap, Seth C. Oranburg Feb 2015

Bridgefunding Is Crowdfunding For Startups Across The Private Equity Gap, Seth C. Oranburg

Seth C Oranburg

Title III of the JOBS Act of 2012, which attempts to encourage entrepreneurship by allowing startups and small business to sell stock to the general public over the Internet through “crowdfunding,” is completely backwards. Its ceiling should be a floor—the $1 million limit should be inverted. By capping startups at raising $1 million from crowdfunding, the JOBS Act does not address the private equity gap, a fundamental problem in startup markets, and exposes unsophisticated investors to risk and fraud. This Article presents a regulatory framework premised on “bridgefunding,” an approach that this article develops to protect new investors by encouraging …


Dumping Daubert, Popping Popper And Falsifying Falsifiability: A Re-Assessment Of First Principles, Barbara P. Billauer Esq Feb 2015

Dumping Daubert, Popping Popper And Falsifying Falsifiability: A Re-Assessment Of First Principles, Barbara P. Billauer Esq

barbara p billauer esq

Abstract: The Daubert mantra demands that judges, acting as gatekeepers, prevent para, pseudo or bad science from infiltrating the courtroom. To do so, the Judges must first determine what is ‘science’ and what is ‘good science.’ It is submitted that Daubert is deeply polluted with the notions of Karl Popper who sets ‘falsifiability’ and ‘falsification’ as the demarcation line for that determination. This philosophy has intractably infected case law, leading to bad decisions immortalized as stare decisis, and an unworkable system of decision-making, which negatively impacts litigant expectations. Among other problems is the intolerance of Popper’s system for multiple causation, …


Definitions, Religion, And Free Exercise Guarantees, Mark Strasser Jan 2015

Definitions, Religion, And Free Exercise Guarantees, Mark Strasser

Mark Strasser

The First Amendment to the United States Constitution protects the free exercise of religion. Non-religious practices do not receive those same protections, which makes the ability to distinguish between religious and non-religious practices important. Regrettably, members of the Court have been unable to agree about how to distinguish the religious from the non-religious—sometimes, the implicit criteria focus on the sincerity of the beliefs, sometimes the strength of the beliefs or the role that they play in an individual’s life, and sometimes the kind of beliefs. In short, the Court has virtually guaranteed an incoherent jurisprudence by sending contradictory signals with …