Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (59)
- Selected Works (15)
- University of Michigan Law School (11)
- University of Pennsylvania Carey Law School (10)
- SelectedWorks (8)
-
- Boston University School of Law (6)
- University of Colorado Law School (6)
- American University Washington College of Law (4)
- Brooklyn Law School (4)
- Maurer School of Law: Indiana University (4)
- University of Maryland Francis King Carey School of Law (4)
- Chicago-Kent College of Law (2)
- Pace University (2)
- Schulich School of Law, Dalhousie University (2)
- Vanderbilt University Law School (2)
- Columbia Law School (1)
- Cornell University Law School (1)
- Duke Law (1)
- Emory University School of Law (1)
- Penn State Law (1)
- Roger Williams University (1)
- Seattle University School of Law (1)
- Singapore Management University (1)
- University at Buffalo School of Law (1)
- University of Baltimore Law (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of Richmond (1)
- University of San Diego (1)
- Villanova University Charles Widger School of Law (1)
- Keyword
-
- Cyberspace Law (7)
- Privacy (7)
- Surveillance (6)
- Technology (6)
- Civil rights (5)
-
- Cyber crime (4)
- ECR (4)
- Fourth Amendment (4)
- Internet (4)
- Skimming (4)
- Telecommunications (4)
- Web 2.0 (4)
- Zapper (4)
- Administrative Law (3)
- Antitrust (3)
- Climate change (3)
- Cyber law (3)
- Cyberspace (3)
- Global warming (3)
- Information Technology (3)
- Innovation (3)
- Intellectual Property (3)
- Negligence (3)
- Network economic effects (3)
- Open source (3)
- POS system (3)
- Phantom-ware (3)
- Tax fraud (3)
- Transaction costs (3)
- Cash register (2)
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (30)
- UIC Review of Intellectual Property Law (29)
- Faculty Scholarship (15)
- All Faculty Scholarship (13)
- Danielle Keats Citron (7)
-
- Articles (5)
- Publications (5)
- Articles by Maurer Faculty (4)
- Articles, Book Chapters, & Popular Press (2)
- Elisabeth Haub School of Law Faculty Publications (2)
- Law Faculty Scholarship (2)
- Michigan Telecommunications & Technology Law Review (2)
- Susan Freiwald (2)
- Sustainable Development Law & Policy (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Articles in Law Reviews & Other Academic Journals (1)
- Bruno L. Costantini García (1)
- Buffalo Law Review (1)
- Carolina Altoé Velasco (1)
- Christopher Wadlow (1)
- Cornell Law Faculty Publications (1)
- David A. Bray (1)
- David S Caudill (1)
- Duke Law & Technology Review (1)
- Faculty Articles (1)
- Franck Dumortier (1)
- George H Baker (1)
- Horacio M. LYNCH (1)
- J. Jonas Anderson (1)
- Jason John Du Mont (1)
- Publication Type
- File Type
Articles 1 - 30 of 155
Full-Text Articles in Law
Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski
Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski
Sascha Vitzthum
Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …
Cyber Civil Rights, Danielle Keats Citron
Cyber Civil Rights, Danielle Keats Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …
Cyber Civil Rights, Danielle Keats Citron
Cyber Civil Rights, Danielle Keats Citron
Danielle Keats Citron
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …
The Case For Collaborative Tools, Lucie Olejnikova
The Case For Collaborative Tools, Lucie Olejnikova
Elisabeth Haub School of Law Faculty Publications
This article shares our experiences and outlines how we used free online collaborative tools to make the long distance seem short. This article also discusses the advantages and disadvantages of long-distance collaboration and how to apply the same tools and principles to a variety of work settings, such as law firms, firm libraries, court libraries, public libraries, and academic libraries. In addition, we mention the psycho-sociological aspects of a long-distance, Web-based communication, as well as its impact on project administration and budget.
Toward A Unified Theory Of Access To Local Telephone Systems, Daniel F. Spulber, Christopher S. Yoo
Toward A Unified Theory Of Access To Local Telephone Systems, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
One of the most distinctive developments in telecommunications policy over the past few decades has been the increasingly broad array of access requirements regulatory authorities have imposed on local telephone providers. In so doing, policymakers did not fully consider whether the justifications for regulating telecommunications remained valid. They also allowed each access regime to be governed by its own pricing methodology and set access prices in a way that treated each network component as if it existed in isolation. The result was a regulatory regime that was internally inconsistent, vulnerable to regulatory arbitrage, and unable to capture the interactions among …
The Enduring Lessons Of The Breakup Of At&T: A Twenty-Five Year Retrospective, Christopher S. Yoo
The Enduring Lessons Of The Breakup Of At&T: A Twenty-Five Year Retrospective, Christopher S. Yoo
All Faculty Scholarship
On April 18-19, 2008, the University of Pennsylvania Law School hosted a landmark conference on “The Enduring Lessons of the Breakup of AT&T: A Twenty-Five Year Retrospective.” This conference was the first major event for Penn’s newly established Center for Technology, Innovation, and Competition, a research institute committed to promoting basic research into foundational frameworks that will shape the way policymakers think about technology-related issues in the future. The breakup of AT&T represents an ideal starting point for reexamining the major themes of telecommunications policy that have emerged over the past quarter century. The conference featured a keynote address by …
Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski
Towards Self-Organizing, Smart Business Networks: Let’S Create ‘Life’ From Inert Information, David Bray, Benn Konsynski
David A. Bray
We review three different theories that can inform how researchers can determine the performance of smart business networks, to include: (1) the Theory of Evolution, (2) the Knowledge-Based Theory of the Firm, and (3) research insights into computers and cognition. We suggest that each of these theories demonstrate that to be generally perceived as smart, an organism needs to be self-organizing, communicative, and tool-making. Consequentially, to determine the performance of a smart business network, we suggest that researchers need to determine the degree to which it is self-organizing, communicative, and tool-making. We then relate these findings to the Internet and …
El Fallo Ate Y Sus Circunstancias (Elementos Para Su Estudio), Horacio M. Lynch
El Fallo Ate Y Sus Circunstancias (Elementos Para Su Estudio), Horacio M. Lynch
Horacio M. LYNCH
Estudio sobre el histórico fallo de la Corte Suprema sobre la libertad sindical (el fallo ATE).
Reflexões Sobre A Natureza Jurídica Dos Embriões Excedentários Na Experiência Brasileira Contemporânea, Carolina Altoé Velasco
Reflexões Sobre A Natureza Jurídica Dos Embriões Excedentários Na Experiência Brasileira Contemporânea, Carolina Altoé Velasco
Carolina Altoé Velasco
O presente trabalho tem por finalidade examinar algumas das implicações trazidas pela biotecnologia para a sociedade contemporânea. São analisados os fatores geradores dos embriões excedentários, bem como a busca pela melhor forma de repensar os reflexos revelados pelo biodireito neste contexto. Constata-se como fundamental o equilíbrio entre tecnologia, direito e moral, a fim de compatibilizar o progresso científico – que não tem o objetivo ultrapassar os limites do próprio ser humano. São demonstradas, ainda, as divergências existentes sobre a natureza jurídica do embrião humano excedentário, bem como as questões éticas decorrentes. Os embriões excedentários devem, contudo, receber a tutela jurídica …
Torts And Innovation, Gideon Parchomovsky, Alex Stein
Torts And Innovation, Gideon Parchomovsky, Alex Stein
Michigan Law Review
This Essay exposes and analyzes a hitherto overlooked cost of tort law: its adverse effect on innovation. Tort liability for negligence, defective products, and medical malpractice is determined by reference to custom. We demonstrate that courts' reliance on custom and conventional technologies as the benchmark of liability chills innovation and distorts its path. Specifically, recourse to custom taxes innovators and subsidizes replicators of conventional technologies. We explore the causes and consequences of this phenomenon and propose two possible ways to modify tort law in order to make it more welcoming to innovation.
Open Code Governance, Danielle Keats Citron
Open Code Governance, Danielle Keats Citron
Danielle Keats Citron
Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person’s eligibility for public benefits. Computer systems store sensitive personal information. These systems’ closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program’s source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …
Cyber Civil Rights (Mp3), Danielle Citron
Hiding Behind Reciprocity: The Temporary Presence Exception And Patent Infringement Avoidance, Jonas Anderson
Hiding Behind Reciprocity: The Temporary Presence Exception And Patent Infringement Avoidance, Jonas Anderson
J. Jonas Anderson
The temporary presence exception provides vessels engaged in international transport with a defense to patent infringement when traveling outside of the vessel’s home nation. The exception was adopted internationally and added to the Paris Convention in an effort to (1) minimize the costs associated with transporting between various countries with distinct national patent systems and (2) eliminate international tensions arising from charges of patent infringement when in foreign lands. Although the modern enactments of the temporary presence exception further these goals, this article argues that the exception is overbroad. Specifically, this article argues that the exception’s reciprocity requirement, in concert …
Electronic Tax Fraud - Are There 'Sales Zappers' In Japan?, Richard Thompson Ainsworth
Electronic Tax Fraud - Are There 'Sales Zappers' In Japan?, Richard Thompson Ainsworth
Faculty Scholarship
Although there is no public acknowledgement - in the press, in a court case, though any announcement by the Japanese National Tax Administration, or in any academic studies or papers - that Zappers and Phantom-ware are a fraud problem in Japan, a number of factors suggest that Japan may be very fertile ground for technology-assisted cash skimming fraud. Those factors include: (1) a high concentration of small to medium sized businesses; (2) the fact that the retail economy is highly cash-based; and (3) the high level of technology acceptance in the Japanese retail sector - electronic cash registers (ECRs) and …
Torts And Innovation, Gideon Parchomovsky, Alex Stein
Torts And Innovation, Gideon Parchomovsky, Alex Stein
All Faculty Scholarship
This Essay exposes and analyzes a hitherto overlooked cost of the current design of tort law: its adverse effect on innovation. Tort liability for negligence, defective products, and medical malpractice is determined by reference to custom. We demonstrate that courts’ reliance on custom and conventional technologies as the benchmark of liability chills innovation and distorts its path. Specifically, the recourse to custom taxes innovators and subsidizes replicators of conventional technologies. We explore the causes and consequences of this phenomenon and propose two possible ways to modify tort law in order to make it more welcoming to innovation.
Cyber Civil Rights, Danielle Keats Citron
Cyber Civil Rights, Danielle Keats Citron
Danielle Keats Citron
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital “scarlet letters” that ruin reputations. Today’s …
Legal Approaches To Promote Technological Solutions To Climate Change, Daniel Van Fleet
Legal Approaches To Promote Technological Solutions To Climate Change, Daniel Van Fleet
Duke Law & Technology Review
Technological advancement is widely viewed as an essential component to any effective climate change strategy. However, there is no consensus as to the degree to which the law should promote technological innovation and development. This iBrief analyzes government involvement in encouraging such technology and divides the various policies into four categories. On one end are policies that rely mainly on market forces to encourage scientific advancement naturally, requiring minimal government involvement. A second category of policies involves technological development promoted indirectly through laws addressing climate change generally. A third type of policy involves directly offering government funding and financing for …
The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies
The Clear And Present Internet: Terrorism, Cyberspace, And The First Amendment, Peter Margulies
Law Faculty Scholarship
No abstract provided.
Shattering And Moving Beyond The Gutenberg Paradigm: The Dawn Of The Electronic Will, Joseph Karl Grant
Shattering And Moving Beyond The Gutenberg Paradigm: The Dawn Of The Electronic Will, Joseph Karl Grant
University of Michigan Journal of Law Reform
Legislators in Nevada have already acted to modernize the law of wills. This Article advocates that other states follow their lead and depart from what is described as the "Gutenberg Paradigm" by adopting similar legislation and embracing electronic technology. Part One of this Article explores the history of print, Johann Gutenberg's role in this development, and the emergence of the "Gutenberg Paradigm." Part Two examines the history and policy underpinnings of will execution formalities, and the role of the "writing" requirement. Part Three explores the use of electronic wills as conforming and nonconforming testamentary instruments. More specifically, Part Three highlights …
Federal Search Commission - Access, Fairness, And Accountability In The Law Of Search, Frank Pasquale, Oren Bracha
Federal Search Commission - Access, Fairness, And Accountability In The Law Of Search, Frank Pasquale, Oren Bracha
Faculty Scholarship
No abstract provided.
Network Neutrality, Consumers, And Innovation, Christopher S. Yoo
Network Neutrality, Consumers, And Innovation, Christopher S. Yoo
All Faculty Scholarship
In this Article, Professor Christopher Yoo directly engages claims that mandating network neutrality is essential to protect consumers and to promote innovation on the Internet. It begins by analyzing the forces that are placing pressure on the basic network architecture to evolve, such as the emergence of Internet video and peer-to-peer architectures and the increasing heterogeneity in business relationships and transmission technologies. It then draws on the insights of demand-side price discrimination (such as Ramsey pricing) and the two-sided markets, as well as the economics of product differentiation and congestion, to show how deviating from network neutrality can benefit consumers, …
Technological Due Process, Danielle Keats Citron
Technological Due Process, Danielle Keats Citron
Danielle Keats Citron
Distinct and complementary procedures for adjudications and rulemaking lie at the heart of twentieth-century administrative law. Due process required agencies to provide individuals notice and an opportunity to be heard. Agencies could foreclose policy issues that individuals might otherwise raise in adjudications through public rulemaking. One system allowed focused advocacy; the other featured broad participation. Each procedural regime compensated for the normative limits of the other. Both depended on clear statements of reason. The dichotomy between these procedural regimes has become outmoded. This century’s automated decision-making systems collapse individual adjudications into rulemaking while adhering to the procedural safeguards of neither. …
Zappers And Phantom-Ware At The Fta: Are They Listening Now?, Richard Thompson Ainsworth
Zappers And Phantom-Ware At The Fta: Are They Listening Now?, Richard Thompson Ainsworth
Faculty Scholarship
When the Federation of Tax Administrators (FTA) held a national Compliance and Education Workshop in Louisville, Kentucky (February 25-27, 2001) one of the invited speakers was Kevin Pratt, Manager, Underground Economy, Canadian Customs and Revenue Authority (CCRA). He spoke on Zappers.
To the best of anyone's present recollection, this was the first time zappers had been discussed with a large group of state-level US tax compliance professionals. However, most of the information that the CCRA presented to the FTA in 2001 was not its own - it was derivative. Zapper investigations were not an in-house specialty of the CCRA (although …
Impractically Obscure? Privacy And Courtroom Proceedings In Light Of Webcasting And Other New Technologies, Fredric I. Lederer, Rebecca Green
Impractically Obscure? Privacy And Courtroom Proceedings In Light Of Webcasting And Other New Technologies, Fredric I. Lederer, Rebecca Green
Popular Media
No abstract provided.
Public Law, Private Law, And Legal Science, Chaim Saiman
Public Law, Private Law, And Legal Science, Chaim Saiman
Working Paper Series
This essay explores the historical and conceptual connections between private law and nineteenth century classical legal science from the perspective of German, American, and Jewish law. In each context, legal science flourished when scholars examined the confined doctrines traditional to private law, but fell apart when applied to public, administrative and regulatory law. Moving to the contemporary context, while traditional private law scholarship retains a prominent position in German law and academia, American law has increasingly shifted its focus from the language of substantive private law to a legal regime centered on public and procedural law. The essay concludes by …
Zappers & Phantom-Ware: A Global Demand For Tax Fraud Technology, Richard Thompson Ainsworth
Zappers & Phantom-Ware: A Global Demand For Tax Fraud Technology, Richard Thompson Ainsworth
Faculty Scholarship
There is a demand-market for technology that facilitates tax fraud. By all accounts the providers in this market are working in a growth industry.
In the short term this is bad news for those concerned with tax policy and information privacy. In the long term however, the fight against technology-assisted fraud is stimulating the development of a more robust technology base within tax administrations, and this is good news for those who believe that a sophisticated technological infrastructure is needed to resolve difficult questions of tax design.
This paper focuses on two technology-accelerants of SME tax fraud - zappers and …
Compliance With Advance Directives: Wrongful Living And Tort Law Incentives, Holly Fernandez Lynch, Michele Mathes, Nadia N. Sawicki
Compliance With Advance Directives: Wrongful Living And Tort Law Incentives, Holly Fernandez Lynch, Michele Mathes, Nadia N. Sawicki
All Faculty Scholarship
Modern ethical and legal norms generally require that deference be accorded to patients' decisions regarding treatment, including decisions to refuse life-sustaining care, even when patients no longer have the capacity to communicate those decisions to their physicians. Advance directives were developed as a means by which a patient's autonomy regarding medical care might survive such incapacity. Unfortunately, preserving patient autonomy at the end of life has been no simple task. First, it has been difficult to persuade patients to prepare for incapacity by making their wishes known. Second, even when they have done so, there is a distinct possibility that …
Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo
Rethinking Broadband Internet Access, Daniel F. Spulber, Christopher S. Yoo
All Faculty Scholarship
The emergence of broadband Internet technologies, such as cable modem and digital subscriber line (DSL) systems, has reopened debates over how the Internet should be regulated. Advocates of network neutrality and open access to cable modem systems have proposed extending the regulatory regime developed to govern conventional telephone and narrowband Internet service to broadband. A critical analysis of the rationales traditionally invoked to justify the regulation of telecommunications networks--such as natural monopoly, network economic effects, vertical exclusion, and the dangers of ruinous competition--reveals that those rationales depend on empirical and theoretical preconditions that do not apply to broadband. In addition, …
Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Tercer Congreso Nacional De Organismos Públicos Autónomos, Bruno L. Costantini García
Bruno L. Costantini García
Tercer Congreso Nacional de Organismos Públicos Autónomos
"Autonomía, Reforma Legislativa y Gasto Público"
Open Code Governance, Danielle Keats Citron
Open Code Governance, Danielle Keats Citron
Danielle Keats Citron
Automated information systems offer an opportunity to improve the democratic legitimacy of the administrative state. Today, agencies transfer crucial responsibilities to computer systems. Computers gather and interpret important information. For instance, electronic machines record and calculate votes. Automated systems execute policy and render decisions about important individual rights, such as a person’s eligibility for public benefits. Computer systems store sensitive personal information. These systems’ closed architecture, however, shields vital agency decisions from view. No one can see how a system operates without a software program’s source code. Closed code hides programming errors that disenfranchise voters, under-count communities for the census, …