Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (1382)
- University of Michigan Law School (325)
- Schulich School of Law, Dalhousie University (275)
- Seattle University School of Law (162)
- Santa Clara Law (134)
-
- The Catholic University of America, Columbus School of Law (133)
- UC Law SF (133)
- University of Montana (128)
- Southern Methodist University (123)
- Maurer School of Law: Indiana University (119)
- Case Western Reserve University School of Law (94)
- Duke Law (91)
- DePaul University (75)
- Vanderbilt University Law School (75)
- Brooklyn Law School (74)
- American University Washington College of Law (73)
- Pepperdine University (65)
- Washington and Lee University School of Law (65)
- Cleveland State University (54)
- Fordham Law School (52)
- William & Mary Law School (50)
- University of Minnesota Law School (43)
- University of Maryland Francis King Carey School of Law (42)
- Chicago-Kent College of Law (37)
- Villanova University Charles Widger School of Law (37)
- University of Georgia School of Law (35)
- Northwestern Pritzker School of Law (33)
- Notre Dame Law School (29)
- University of Pennsylvania Carey Law School (27)
- University of Washington School of Law (26)
- Keyword
-
- Technology (219)
- Privacy (113)
- Internet (81)
- Regulation (78)
- Patents & Technology (70)
-
- Artificial intelligence (60)
- Copyright (54)
- Intellectual property (54)
- AI (51)
- Law (47)
- Patent law (44)
- Science (43)
- Data (42)
- Biotechnology (38)
- Patents (38)
- Innovation (35)
- Law reform (35)
- Fourth Amendment (34)
- Information (34)
- Telecommunications (33)
- Blockchain (32)
- Genetics (32)
- Evidence (28)
- International law (28)
- Patent (28)
- Liability (27)
- Climate change (26)
- DNA (26)
- Surveillance (26)
- Social media (25)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (793)
- UIC Review of Intellectual Property Law (530)
- Canadian Journal of Law and Technology (263)
- Seattle University Law Review (139)
- Santa Clara High Technology Law Journal (134)
-
- UC Law Science and Technology Journal (133)
- Public Land & Resources Law Review (128)
- Catholic University Journal of Law and Technology (123)
- SMU Science and Technology Law Review (120)
- Michigan Law Review (108)
- Journal of Law, Technology, & the Internet (94)
- Duke Law & Technology Review (91)
- DePaul Journal of Art, Technology & Intellectual Property Law (72)
- UIC Law Review (59)
- Michigan Telecommunications & Technology Law Review (57)
- IP Theory (55)
- Vanderbilt Journal of Entertainment & Technology Law (53)
- Washington and Lee Law Review (51)
- University of Michigan Journal of Law Reform (49)
- Minnesota Journal of Law, Science & Technology (43)
- Indiana Law Journal (41)
- Chicago-Kent Law Review (37)
- Michigan Journal of International Law (35)
- Brooklyn Law Review (34)
- Fordham Law Review (32)
- Georgia Journal of International & Comparative Law (32)
- Cleveland State Law Review (31)
- William & Mary Law Review (30)
- Pepperdine Law Review (28)
- American University Law Review (27)
- File Type
Articles 301 - 330 of 4499
Full-Text Articles in Law
Equitable Ecosystem: A Two-Pronged Approach To Equity In Artificial Intelligence, Rangita De Silva De Alwis, Amani Carter, Govind Nagubandi
Equitable Ecosystem: A Two-Pronged Approach To Equity In Artificial Intelligence, Rangita De Silva De Alwis, Amani Carter, Govind Nagubandi
Michigan Technology Law Review
Lawmakers, technologists, and thought leaders are facing a once-in-a-generation opportunity to build equity into the digital infrastructure that will power our lives; we argue for a two-pronged approach to seize that opportunity. Artificial Intelligence (AI) is poised to radically transform our world, but we are already seeing evidence that theoretical concerns about potential bias are now being borne out in the market. To change this trajectory and ensure that development teams are focused explicitly on creating equitable AI, we argue that we need to shift the flow of investment dollars. Venture Capital (VC) firms have an outsized impact in determining …
How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid
How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid
American University Journal of Gender, Social Policy & the Law
In July 2021, Ziggi Tyler posted a video on TikTok, a popular video sharing platform, where he expressed his frustration with being a Black content creator on TikTok. The video showed Ziggi typing phrases such as “Black Lives Matter” or “Black success” into his Marketplace creator bio, which the app would immediately flag as inappropriate content. However, when Ziggi replaced those words with “white supremacy” or “white success,” no inappropriateness warning appeared. Although a TikTok spokesperson responded to the video clarifying that the app had mistakenly flagged phrases without considering word order, Ziggi refused to let an algorithm absolve TikTok …
Regulating The Use Of Military Human Enhancements That Can Cause Side Effects Under The Law Of Armed Conflict: Towards A Method-Based Approach, Yang Liu
American University National Security Law Brief
The development of human enhancement (HE) technology has rendered its military potential increasingly noticed by major military powers. It can be expected that “enhanced warfighters” or “super soldiers” will be used on the battleground in the foreseeable future, which can give rise to many legal issues.
Letter Form The Editor, Wayne Rash, Iii
Letter Form The Editor, Wayne Rash, Iii
American University National Security Law Brief
In our last issue of The National Security Law Brief, Vol. 13, No. 1, we highlighted the dynamism that makes National Security Law such an exciting field. In this issue, No. 2, we continue with the dynamism theme. National security law is a field in constant change that often leaves us questioning how these changes will shape the law.
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
American University National Security Law Brief
Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
American University National Security Law Brief
Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …
Regulatory Frameworks For Smart Mobility: Current U.S. Regulation Of Connected And Automated Vehicles And The Road Ahead, Olivia Dworkin, Jorge Ortiz, Nicholas Xenakis
Regulatory Frameworks For Smart Mobility: Current U.S. Regulation Of Connected And Automated Vehicles And The Road Ahead, Olivia Dworkin, Jorge Ortiz, Nicholas Xenakis
Journal of Law and Mobility
On June 7, 2023, Senator Gary Peters from Michigan gave an interview about autonomous vehicle technology where he stated that: “From a competitive standpoint, there’s no question that it is absolutely essential that this technology get developed here and deployed here in the United States. We’re facing significant international competition from other countries that understand that autonomy represents not only the future of mobility, but it drives other technologies in a significant way.” Just last year, Senator Peters and eleven of his colleagues had also written a letter to Secretary of Transportation Pete Buttigieg that: “The federal government has the …
Minerva I Am Not – The Materially Broader Claim Standard And Assignor Estoppel, David R. Soucy Esq.
Minerva I Am Not – The Materially Broader Claim Standard And Assignor Estoppel, David R. Soucy Esq.
UIC Review of Intellectual Property Law
No abstract provided.
Houston Security Camera Ordinance: Reasonable Safety Measure Or Orwellian Surveillance, Clint Nuckolls
Houston Security Camera Ordinance: Reasonable Safety Measure Or Orwellian Surveillance, Clint Nuckolls
SMU Science and Technology Law Review
A new ordinance went into effect in Houston, Texas in July 2022, which looks to leverage technology and require certain businesses to install surveillance cameras at their own cost and turn footage over to the police on demand without a warrant. The ordinance specifically requires bars, nightclubs, convenience stores, sexually oriented businesses, and game rooms to install surveillance cameras, with accompanying lighting at all places where customers are permitted, keep the cameras running at all times, even when the business is closed, and store the footage for at least thirty days, all at the expense of the business owners. The …
Employee Monitoring: As Technology Advances Yet The Electronic Communications Privacy Act Stays In The Past, Isabela Possino
Employee Monitoring: As Technology Advances Yet The Electronic Communications Privacy Act Stays In The Past, Isabela Possino
SMU Science and Technology Law Review
Since the Electronic Communications Privacy Act of 1986 was enacted, the United States has endured an evolution of technology. While progressive at its inception, the ECPA has since been met with a tumultuous response from scholars, courts, and others trying to understand its purpose and application regarding privacy rights and the monitoring of communications. Specifically, since the COVID-19 pandemic, the ECPA has remained at the forefront of debate with respect to employee monitoring and surveillance practices. This article provides an overview of the ECPA and explains why today’s technological advancements have surpassed the protections afforded by the Act, leaving employees …
Regulating The Digital Resonance, Hassan Salman
Regulating The Digital Resonance, Hassan Salman
UC Law Science and Technology Journal
The proliferation of automated content moderation in social media has negatively impacted users’ (individuals, businesses, and governments) selfexpressions. Major social media platforms like Facebook act as public forums for billions of users whose content may vary in terms of acceptability and legality. User content is colored by social as well as personal norms, values and experiences. For example, though blasphemy may be objectionable in Poland, it may not be so in France. However, despite facing some mistrust over how Facebook and other platforms handle user data and moderate content, users rely on the entities like Facebook to correctly filter this …
Redirecting The Herd: Informing Cryptocurrency Regulations Through The Lens Of Behavioral Science, Jonathan Su
Redirecting The Herd: Informing Cryptocurrency Regulations Through The Lens Of Behavioral Science, Jonathan Su
UC Law Science and Technology Journal
Conversations on cryptocurrencies have become a mainstay in society today, whether that be on social media or in individual conversations. The cultural and social impact of cryptocurrency is undeniable and, as conversations with cryptocurrency supporters would suggest, lead to a positive impact in the lives of those that invest in the currency. However, cracks are showing in the patchwork of cryptocurrency regulations throughout the United States as cryptocurrency scams run amok, resulting in losses for innocent investors. Although attention is placed upon the decisions of individual companies or executives in explaining cryptocurrency scams, little discussion is present regarding investor behaviors …
Introduction: Digital Transformation Of Government: Towards A Digital Leviathan?, Alfred C. Aman
Introduction: Digital Transformation Of Government: Towards A Digital Leviathan?, Alfred C. Aman
Indiana Journal of Global Legal Studies
A warm welcome to you all. It is a great pleasure to be able to participate in this exciting collaboration between Universidad Carlos III de Madrid (UC3M) and Indiana University—a conference that the Indiana Journal of Global Legal Studies is publishing in celebration of its thirtieth issue. This is a milestone for us, and we could not be happier to celebrate it in this way. Let me begin with a few words about the nature of this journal and its scholarly goals over the years.
Trust The Science But Do Your Research: A Comment On The Unfortunate Revival Of The Progressive Case For The Administrative State, Mark Tushnet
Indiana Law Journal
This Article offers a critique of one Progressive argument for the administrative state, that it would base policies on what disinterested scientific inquiries showed would best advance the public good and flexibly respond to rapidly changing technological, economic, and social conditions. The critique draws on recent scholarship in the field of Science and Technology Studies, which argues that what counts as a scientific fact is the product of complex social, political, and other processes. The critique is deployed in an analysis of the responses of the U.S. Centers for Disease Control and Food and Drug Administration to some important aspects …
Layered Fiduciaries In The Information Age, Zhaoyi Li
Layered Fiduciaries In The Information Age, Zhaoyi Li
Indiana Law Journal
Technology companies such as Facebook have long been criticized for abusing customers’ personal information and monetizing user data in a manner contrary to customer expectations. Some commentators suggest fiduciary law could be used to restrict how these companies use their customers’ data.1 Under this framework, a new member of the fiduciary family called the “information fiduciary” was born. The concept of an information fiduciary is that a company providing network services to “collect, analyze, use, sell, and distribute personal information” owes customers and end-users a fiduciary duty to use the collected data to promote their interests, thereby assuming fiduciary liability …
Middleware Technologies: Towards User-Determined News Curation In Social Media, Jose M. Marella
Middleware Technologies: Towards User-Determined News Curation In Social Media, Jose M. Marella
Catholic University Journal of Law and Technology
News distribution and consumption now largely occur within, and are subject to dynamics dictated by, social media platforms. Platforms create audiences, facilitate matching, provide basic services, and set interaction standards. But these networks are structured to maximize engagement and benefit the platforms’ main businesses, leaving individuals with little to no ability to tailor news consumption according to their preferences.
To re-orient platform-dictated dynamics towards user-determined exchanges, middleware technologies—software services appended to social media platforms to curate information flows—are touted as a promising solution. Still, not enough literature articulates middleware’s virtues and hurdles, especially in the context of online news. This …
Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman
Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman
Catholic University Journal of Law and Technology
The Model Rules of Professional Conduct seek to police the conduct of attorneys. Each jurisdiction adopts its own rules of professional conduct to apply to the attorneys licensed within it. Notably, the model rules prohibit any sexual relationship between the attorney and client unless that relationship precedes the attorney-client relationship. Traditionally, defining a "sexual relationship" was simple, particularly if the attorney and client engaged in sexual intercourse. The introduction of dating apps, however, has blurred the line.
This article outlines the inherent risks of attorneys using dating apps at a time when most newly-licensed attorneys make up the majority of …
Preemptive Federal Legislation For Ev Manufacturers To Sell Direct To Customers, Peter Luu
Preemptive Federal Legislation For Ev Manufacturers To Sell Direct To Customers, Peter Luu
Journal of Law and Mobility
This article advocates for federal legislation to implement a nationwide EV licensing system that would allow both EV manufacturers and dealers to sell and service their vehicles directly to consumers nationwide. This prospective legislation would preempt dealer franchise laws that prohibit or limit manufacturers from selling their vehicles directly to consumers. This article does not argue that direct distribution is the superior method of distribution; instead, this article argues that manufacturers should have the freedom to pursue direct distribution. As more EV companies enter the market, EV manufacturers need to have the flexibility to use a variety of distribution systems …
How Might We Reimagine Transportation Technology To Combat Forced Labor: Conference Explanations And Recommendations From The Law And Mobility Program’S Annual Conference 2023, Brittany Eastman
Journal of Law and Mobility
The University of Michigan Law School’s Law and Mobility Program (LAMP), a resource for scholarship about the legal implications of emerging transportation technology with a particular focus on connected and automated vehicles (CAVs), hosts an annual conference. The topic of the LAMP Annual Conference 2023 considered how we might reimagine transportation technology in a way that combats the systemic vulnerabilities that leave certain populations more likely to experience forced labor. This topic was selected because there are multiple lenses through which to consider the transportation equity outcomes for users, industry workers, and society at large; forced labor is just one …
A Comparative Look At Various Countries' Legal Regimes Governing Automated Vehicles, Brittany Eastman, Shay Collins, Ryan Jones, Jj Martin, Marjory S. Blumenthal, Karlyn D. Stanley
A Comparative Look At Various Countries' Legal Regimes Governing Automated Vehicles, Brittany Eastman, Shay Collins, Ryan Jones, Jj Martin, Marjory S. Blumenthal, Karlyn D. Stanley
Journal of Law and Mobility
News and commentary about automated vehicles (AVs) focus on how they look and appear to operate, along with the companies developing and testing them. Behind the scenes are legal regimes—laws, regulations, and implementing bodies of different kinds—that literally and figuratively provide the rules of the road for AVs. Legal regimes matter because public welfare hinges on aspects of AV design and operation. Legal regimes can provide gatekeeping for AV developers and operators seeking to use public roads, and they can allocate liability when something goes wrong. Guiding and complementing legal regimes is public policy. Policy documents such as articulations of …
Masthead, Lead Article Editor
Masthead, Lead Article Editor
Catholic University Journal of Law and Technology
No abstract provided.
In Memorial - Dorothy Erstling Cukier, Lead Article Editor
In Memorial - Dorothy Erstling Cukier, Lead Article Editor
Catholic University Journal of Law and Technology
No abstract provided.
Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley
Forensic Microbiome Evidence: Fourth Amendment Applications And Court Acceptance, Trason Lasley
Catholic University Journal of Law and Technology
No abstract provided.
Playing God In The 21st Century: How The Push For Human Embryonic Germline Gene Editing Sidelines Individual And Generational Autonomy, Anna E. Melo
Catholic University Journal of Law and Technology
Every four and a half minutes a child with a genetic birth defect is born in the United States. For some, these conditions are treatable and manageable, but sadly for others, they are a death sentence. Congenital malformations and chromosomal abnormalities are the leading cause of infant mortality. CRISPR-Cas9 presents hope for the future, a liberation from the heritable genetic shackles that a child would otherwise be trapped in. With such optimism for future applications of germline gene editing, there are also great concerns with what national and global limitations and auditing must be in place to permit “genetic hedging.” …
Welcome To The Land Of Trademark Cancellation––Where Not All Fraud Is Created Equal, Barbier, Janelle
Welcome To The Land Of Trademark Cancellation––Where Not All Fraud Is Created Equal, Barbier, Janelle
Santa Clara High Technology Law Journal
The intellectual property community is buzzing about a recent decision by the U.S. Court of Appeals for the Federal Circuit handing down a ruling on trademark cancellation under the Lanham Act. A divided panel grappled with whether the Agency had authority to cancel a trademark registration as a punishment for filing a false declaration. The majority held that the Agency was precluded from canceling the registration as a remedy for fraud unrelated to the issuance or maintenance of that mark. However, the dissent took aim at the majority’s reasoning, making a compelling argument that green- lighting any type of fraud …
Floating Liens Over Crypto-In-Commerce, Christopher K. Odinet, Andrea Tosato
Floating Liens Over Crypto-In-Commerce, Christopher K. Odinet, Andrea Tosato
Indiana Law Journal
Commercial law and crypto are colliding. Against the backdrop of explosive growth (and discord) in the digital asset market, there has been a series of recent revisions to American commercial law aimed at addressing new and emerging technologies. These changes to the Uniform Commercial Code (UCC) are designed to facilitate the buying and selling of digital assets as well as their use as collateral. However, to date, the literature exploring these changes has mainly focused on understanding the basics of the new regime. This Essay moves beyond that baseline by showing how the UCC amendments can be used to structure …
On Warrants & Waiting: Electronic Warrants & The Fourth Amendment, Tracy Hresko Pearl
On Warrants & Waiting: Electronic Warrants & The Fourth Amendment, Tracy Hresko Pearl
Indiana Law Journal
Police use of electronic warrant (“e-warrant”) technology has increased significantly in recent years. E-warrant technology allows law enforcement to submit, and magistrate judges to review and approve, warrant applications on computers, smartphones, and tablets, often without any direct communication. Police officers report that they favor e-warrants over their traditional, paper counterparts because they save officers a significant amount of time in applying for warrants by eliminating the need to appear in-person before a magistrate. Legal scholars have almost uniformly praised e-warrant technology as well, arguing that use of these systems will increase the number of warrants issued throughout the United …
Vicarious Liability For Ai, Mihailis E. Diamantis
Vicarious Liability For Ai, Mihailis E. Diamantis
Indiana Law Journal
When an algorithm harms someone—say by discriminating against her, exposing her personal data, or buying her stock using inside information—who should pay? If that harm is criminal, who deserves punishment? In ordinary cases, when A harms B, the first step in the liability analysis turns on what sort of thing A is. If A is a natural phenomenon, like a typhoon or mudslide, B pays, and no one is punished. If A is a person, then A might be liable for damages and sanction. The trouble with algorithms is that neither paradigm fits. Algorithms are trainable artifacts with “off” switches, …
Cyber Sit-Ins: Bringing Protest Online By Modernizing The Computer Fraud And Abuse Act, Blair V. Robinson
Cyber Sit-Ins: Bringing Protest Online By Modernizing The Computer Fraud And Abuse Act, Blair V. Robinson
Roger Williams University Law Review
No abstract provided.