Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

2008

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 155

Full-Text Articles in Law

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski Jan 2010

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski

Sascha Vitzthum

Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …


Cyber Civil Rights, Danielle Keats Citron Dec 2008

Cyber Civil Rights, Danielle Keats Citron

Faculty Scholarship

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …


Cyber Civil Rights, Danielle Keats Citron Dec 2008

Cyber Civil Rights, Danielle Keats Citron

Danielle Keats Citron

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …


The Case For Collaborative Tools, Lucie Olejnikova Dec 2008

The Case For Collaborative Tools, Lucie Olejnikova

Elisabeth Haub School of Law Faculty Publications

This article shares our experiences and outlines how we used free online collaborative tools to make the long distance seem short. This article also discusses the advantages and disadvantages of long-distance collaboration and how to apply the same tools and principles to a variety of work settings, such as law firms, firm libraries, court libraries, public libraries, and academic libraries. In addition, we mention the psycho-sociological aspects of a long-distance, Web-based communication, as well as its impact on project administration and budget.


Toward A Unified Theory Of Access To Local Telephone Systems, Daniel F. Spulber, Christopher S. Yoo Dec 2008

Toward A Unified Theory Of Access To Local Telephone Systems, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

One of the most distinctive developments in telecommunications policy over the past few decades has been the increasingly broad array of access requirements regulatory authorities have imposed on local telephone providers. In so doing, policymakers did not fully consider whether the justifications for regulating telecommunications remained valid. They also allowed each access regime to be governed by its own pricing methodology and set access prices in a way that treated each network component as if it existed in isolation. The result was a regulatory regime that was internally inconsistent, vulnerable to regulatory arbitrage, and unable to capture the interactions among …


The Enduring Lessons Of The Breakup Of At&T: A Twenty-Five Year Retrospective, Christopher S. Yoo Dec 2008

The Enduring Lessons Of The Breakup Of At&T: A Twenty-Five Year Retrospective, Christopher S. Yoo

All Faculty Scholarship

On April 18-19, 2008, the University of Pennsylvania Law School hosted a landmark conference on “The Enduring Lessons of the Breakup of AT&T: A Twenty-Five Year Retrospective.” This conference was the first major event for Penn’s newly established Center for Technology, Innovation, and Competition, a research institute committed to promoting basic research into foundational frameworks that will shape the way policymakers think about technology-related issues in the future. The breakup of AT&T represents an ideal starting point for reexamining the major themes of telecommunications policy that have emerged over the past quarter century. The conference featured a keynote address by …


Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski Nov 2008

Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski

David A. Bray

We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …


El Fallo Ate Y Sus Circunstancias (Elementos Para Su Estudio), Horacio M. Lynch Nov 2008

El Fallo Ate Y Sus Circunstancias (Elementos Para Su Estudio), Horacio M. Lynch

Horacio M. LYNCH

Estudio sobre el histórico fallo de la Corte Suprema sobre la libertad sindical (el fallo ATE).


Reflexões Sobre A Natureza Jurídica Dos Embriões Excedentários Na Experiência Brasileira Contemporânea, Carolina Altoé Velasco Nov 2008

Reflexões Sobre A Natureza Jurídica Dos Embriões Excedentários Na Experiência Brasileira Contemporânea, Carolina Altoé Velasco

Carolina Altoé Velasco

O presente trabalho tem por finalidade examinar algumas das implicações trazidas pela biotecnologia para a sociedade contemporânea. São analisados os fatores geradores dos embriões excedentários, bem como a busca pela melhor forma de repensar os reflexos revelados pelo biodireito neste contexto. Constata-se como fundamental o equilíbrio entre tecnologia, direito e moral, a fim de compatibilizar o progresso científico – que não tem o objetivo ultrapassar os limites do próprio ser humano. São demonstradas, ainda, as divergências existentes sobre a natureza jurídica do embrião humano excedentário, bem como as questões éticas decorrentes. Os embriões excedentários devem, contudo, receber a tutela jurídica …


Torts And Innovation, Gideon Parchomovsky, Alex Stein Nov 2008

Torts And Innovation, Gideon Parchomovsky, Alex Stein

Michigan Law Review

This Essay exposes and analyzes a hitherto overlooked cost of tort law: its adverse effect on innovation. Tort liability for negligence, defective products, and medical malpractice is determined by reference to custom. We demonstrate that courts' reliance on custom and conventional technologies as the benchmark of liability chills innovation and distorts its path. Specifically, recourse to custom taxes innovators and subsidizes replicators of conventional technologies. We explore the causes and consequences of this phenomenon and propose two possible ways to modify tort law in order to make it more welcoming to innovation.


Open Code Governance, Danielle Keats Citron Oct 2008

Open Code Governance, Danielle Keats Citron

Danielle Keats Citron

Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person’s eligibility for public benefits. Computer systems store sensitive personal information. These systems’ closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program’s source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …


Cyber Civil Rights (Mp3), Danielle Citron Oct 2008

Cyber Civil Rights (Mp3), Danielle Citron

Danielle Keats Citron

No abstract provided.


Hiding Behind Reciprocity: The Temporary Presence Exception And Patent Infringement Avoidance, Jonas Anderson Oct 2008

Hiding Behind Reciprocity: The Temporary Presence Exception And Patent Infringement Avoidance, Jonas Anderson

J. Jonas Anderson

The temporary presence exception provides vessels engaged in international transport with a defense to patent infringement when traveling outside of the vessel’s home nation. The exception was adopted internationally and added to the Paris Convention in an effort to (1) minimize the costs associated with transporting between various countries with distinct national patent systems and (2) eliminate international tensions arising from charges of patent infringement when in foreign lands. Although the modern enactments of the temporary presence exception further these goals, this article argues that the exception is overbroad. Specifically, this article argues that the exception’s reciprocity requirement, in concert …


Electronic Tax Fraud - Are There 'Sales Zappers' In Japan?, Richard Thompson Ainsworth Oct 2008

Electronic Tax Fraud - Are There 'Sales Zappers' In Japan?, Richard Thompson Ainsworth

Faculty Scholarship

Although there is no public acknowledgement - in the press, in a court case, though any announcement by the Japanese National Tax Administration, or in any academic studies or papers - that Zappers and Phantom-ware are a fraud problem in Japan, a number of factors suggest that Japan may be very fertile ground for technology-assisted cash skimming fraud. Those factors include: (1) a high concentration of small to medium sized businesses; (2) the fact that the retail economy is highly cash-based; and (3) the high level of technology acceptance in the Japanese retail sector - electronic cash registers (ECRs) and …


Torts And Innovation, Gideon Parchomovsky, Alex Stein Oct 2008

Torts And Innovation, Gideon Parchomovsky, Alex Stein

All Faculty Scholarship

This Essay exposes and analyzes a hitherto overlooked cost of the current design of tort law: its adverse effect on innovation. Tort liability for negligence, defective products, and medical malpractice is determined by reference to custom. We demonstrate that courts’ reliance on custom and conventional technologies as the benchmark of liability chills innovation and distorts its path. Specifically, the recourse to custom taxes innovators and subsidizes replicators of conventional technologies. We explore the causes and consequences of this phenomenon and propose two possible ways to modify tort law in order to make it more welcoming to innovation.


Cyber Civil Rights, Danielle Keats Citron Oct 2008

Cyber Civil Rights, Danielle Keats Citron

Danielle Keats Citron

Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …


Legal Approaches To Promote Technological Solutions To Climate Change, Daniel Van Fleet Oct 2008

Legal Approaches To Promote Technological Solutions To Climate Change, Daniel Van Fleet

Duke Law & Technology Review

Technological advancement is widely viewed as an essential component to any effective climate change strategy. However, there is no consensus as to the degree to which the law should promote technological innovation and development. This iBrief analyzes government involvement in encouraging such technology and divides the various policies into four categories. On one end are policies that rely mainly on market forces to encourage scientific advancement naturally, requiring minimal government involvement. A second category of policies involves technological development promoted indirectly through laws addressing climate change generally. A third type of policy involves directly offering government funding and financing for …


The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies Oct 2008

The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies

Law Faculty Scholarship

No abstract provided.


Shattering And Moving Beyond The Gutenberg Paradigm: The Dawn Of The Electronic Will, Joseph Karl Grant Oct 2008

Shattering And Moving Beyond The Gutenberg Paradigm: The Dawn Of The Electronic Will, Joseph Karl Grant

University of Michigan Journal of Law Reform

Legislators in Nevada have already acted to modernize the law of wills. This Article advocates that other states follow their lead and depart from what is described as the "Gutenberg Paradigm" by adopting similar legislation and embracing electronic technology. Part One of this Article explores the history of print, Johann Gutenberg's role in this development, and the emergence of the "Gutenberg Paradigm." Part Two examines the history and policy underpinnings of will execution formalities, and the role of the "writing" requirement. Part Three explores the use of electronic wills as conforming and nonconforming testamentary instruments. More specifically, Part Three highlights …


Federal Search Commission - Access, Fairness, And Accountability In The Law Of Search, Frank Pasquale, Oren Bracha Sep 2008

Federal Search Commission - Access, Fairness, And Accountability In The Law Of Search, Frank Pasquale, Oren Bracha

Faculty Scholarship

No abstract provided.


Network Neutrality, Consumers, And Innovation, Christopher S. Yoo Aug 2008

Network Neutrality, Consumers, And Innovation, Christopher S. Yoo

All Faculty Scholarship

In this Article, Professor Christopher Yoo directly engages claims that mandating network neutrality is essential to protect consumers and to promote innovation on the Internet. It begins by analyzing the forces that are placing pressure on the basic network architecture to evolve, such as the emergence of Internet video and peer-to-peer architectures and the increasing heterogeneity in business relationships and transmission technologies. It then draws on the insights of demand-side price discrimination (such as Ramsey pricing) and the two-sided markets, as well as the economics of product differentiation and congestion, to show how deviating from network neutrality can benefit consumers, …


Technological Due Process, Danielle Keats Citron Aug 2008

Technological Due Process, Danielle Keats Citron

Danielle Keats Citron

Distinct and complementary procedures for adjudications and rulemaking lie at the heart of twentieth-century administrative law. Due process required agencies to provide individuals notice and an opportunity to be heard. Agencies could foreclose policy issues that individuals might otherwise raise in adjudications through public rulemaking. One system allowed focused advocacy; the other featured broad participation. Each procedural regime compensated for the normative limits of the other. Both depended on clear statements of reason. The dichotomy between these procedural regimes has become outmoded. This century’s automated decision-making systems collapse individual adjudications into rulemaking while adhering to the procedural safeguards of neither. …


Zappers And Phantom-Ware At The Fta: Are They Listening Now?, Richard Thompson Ainsworth Jul 2008

Zappers And Phantom-Ware At The Fta: Are They Listening Now?, Richard Thompson Ainsworth

Faculty Scholarship

When the Federation of Tax Administrators (FTA) held a national Compliance and Education Workshop in Louisville, Kentucky (February 25-27, 2001) one of the invited speakers was Kevin Pratt, Manager, Underground Economy, Canadian Customs and Revenue Authority (CCRA). He spoke on Zappers.

To the best of anyone's present recollection, this was the first time zappers had been discussed with a large group of state-level US tax compliance professionals. However, most of the information that the CCRA presented to the FTA in 2001 was not its own - it was derivative. Zapper investigations were not an in-house specialty of the CCRA (although …


Impractically Obscure? Privacy And Courtroom Proceedings In Light Of Webcasting And Other New Technologies, Fredric I. Lederer, Rebecca Green Jul 2008

Impractically Obscure? Privacy And Courtroom Proceedings In Light Of Webcasting And Other New Technologies, Fredric I. Lederer, Rebecca Green

Popular Media

No abstract provided.


Public Law, Private Law, And Legal Science, Chaim Saiman Jul 2008

Public Law, Private Law, And Legal Science, Chaim Saiman

Working Paper Series

This essay explores the historical and conceptual connections between private law and nineteenth century classical legal science from the perspective of German, American, and Jewish law. In each context, legal science flourished when scholars examined the confined doctrines traditional to private law, but fell apart when applied to public, administrative and regulatory law. Moving to the contemporary context, while traditional private law scholarship retains a prominent position in German law and academia, American law has increasingly shifted its focus from the language of substantive private law to a legal regime centered on public and procedural law. The essay concludes by …


Zappers & Phantom-Ware: A Global Demand For Tax Fraud Technology, Richard Thompson Ainsworth Jun 2008

Zappers & Phantom-Ware: A Global Demand For Tax Fraud Technology, Richard Thompson Ainsworth

Faculty Scholarship

There is a demand-market for technology that facilitates tax fraud. By all accounts the providers in this market are working in a growth industry.

In the short term this is bad news for those concerned with tax policy and information privacy. In the long term however, the fight against technology-assisted fraud is stimulating the development of a more robust technology base within tax administrations, and this is good news for those who believe that a sophisticated technological infrastructure is needed to resolve difficult questions of tax design.

This paper focuses on two technology-accelerants of SME tax fraud - zappers and …


Compliance With Advance Directives: Wrongful Living And Tort Law Incentives, Holly Fernandez Lynch, Michele Mathes, Nadia N. Sawicki Jun 2008

Compliance With Advance Directives: Wrongful Living And Tort Law Incentives, Holly Fernandez Lynch, Michele Mathes, Nadia N. Sawicki

All Faculty Scholarship

Modern ethical and legal norms generally require that deference be accorded to patients' decisions regarding treatment, including decisions to refuse life-sustaining care, even when patients no longer have the capacity to communicate those decisions to their physicians. Advance directives were developed as a means by which a patient's autonomy regarding medical care might survive such incapacity. Unfortunately, preserving patient autonomy at the end of life has been no simple task. First, it has been difficult to persuade patients to prepare for incapacity by making their wishes known. Second, even when they have done so, there is a distinct possibility that …


Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo Jun 2008

Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

The emergence of broadband Internet technologies, such as cable modem and digital subscriber line (DSL) systems, has reopened debates over how the Internet should be regulated. Advocates of network neutrality and open access to cable modem systems have proposed extending the regulatory regime developed to govern conventional telephone and narrowband Internet service to broadband. A critical analysis of the rationales traditionally invoked to justify the regulation of telecommunications networks--such as natural monopoly, network economic effects, vertical exclusion, and the dangers of ruinous competition--reveals that those rationales depend on empirical and theoretical preconditions that do not apply to broadband. In addition, …


Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García Jun 2008

Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García

Bruno L. Costantini García

Tercer Congreso Nacional de Organismos Públicos Autónomos

"Autonomía, Reforma Legislativa y Gasto Público"


Open Code Governance, Danielle Keats Citron May 2008

Open Code Governance, Danielle Keats Citron

Danielle Keats Citron

Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person’s eligibility for public benefits. Computer systems store sensitive personal information. These systems’ closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program’s source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …