Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

PDF

Journal

Technology

Articles 1 - 24 of 24

Full-Text Articles in Law

From The Editor In Chief, Antulio J. Echevarria Ii May 2024

From The Editor In Chief, Antulio J. Echevarria Ii

The US Army War College Quarterly: Parameters

Welcome to the Summer 2024 issue of Parameters. We open this issue with a special “In Memoriam” by General Charles A. Flynn, Commander US Army Pacific, honoring the life and legacies of our director and consummate colleague, Carol V. Evans. We dedicate this issue to her. General Flynn’s memoriam is followed by an In Focus commentary on China’s Belt and Road Initiative. We then feature three forums covering the Russia-Ukraine War, the Middle East, and Professional Development. This issue also contains special essays on the role of professional writing, the US Army War College’s Civil-Military Relations Center, …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein Jan 2024

How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein

Emerging Writers

This paper explores the danger of emerging artificial intelligence technology perpetuating racial injustice in law enforcement and how police can ensure the protection of citizens amid this information age. We dissect a real-world case in which AI predictive policing technology resulted in alarming racial discrimination against American minority citizens. We discuss the possible explanations for this result and explore the limitations of artificial intelligence technology. Furthermore, we brainstorm methods for ensuring American citizens' just and constitutional protection as new technology is developed and tested. We propose implementing transparency laws that make the details about any policing technology and surveillance available …


Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis Jan 2022

Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis

Dickinson Law Review (2017-Present)

For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.

People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …


The Human Right To Science And Disability, Anne M. Bryden Phd Jul 2021

The Human Right To Science And Disability, Anne M. Bryden Phd

Societies Without Borders

No abstract provided.


How Should We Regulate The Internet? A Proposal, Natalie Petruzelli Jun 2021

How Should We Regulate The Internet? A Proposal, Natalie Petruzelli

The Review: A Journal of Undergraduate Student Research

With the invention of the internet providing newfangled methods of spreading information around the world, misinformation has also found home in these pathways, disrupting the general public’s ability to discern fact from fiction and creating divides in society. Regulation must be enacted to stop the effects of misinformation, but the efforts of technology companies and the general public have been insufficient thus far. Regulatory control of the internet and its content should be the responsibility of the government, based on their constitutional right to intervene under certain circumstances and the fact that previous efforts by other parties to mitigate misinformation …


Let's Stop Worrying And Learn To Love Transparency: Food And Technology In The Information Age, Scarlettah Schaefer Nov 2020

Let's Stop Worrying And Learn To Love Transparency: Food And Technology In The Information Age, Scarlettah Schaefer

Journal of Food Law & Policy

Food and technology have had a long and tempestuous relationship. Current methods of food production and processing in the industrialized world depend heavily on technological developments. However, all technologies are not created equal. Some can produce food that is safer, more sustainable, more nutritious, or longer lasting. Some can have the opposite effect: increasing opportunities for adulteration, increasing the difficulty in detecting food fraud, and contributing to both foreseeable and unforeseeable health or ecological costs. Increasingly sophisticated technologies often become less apparent to the average consumer. For example, consider irradiated meat or genetically modified foods as opposed to freezer storage …


Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor Oct 2019

Hardware, Heartware, Or Nightmare: Smart-City Technology And The Concomitant Erosion Of Privacy, Leila Lawlor

Journal of Comparative Urban Law and Policy

Smart city technology is being adopted in cities all around the world to simplify our lives, save us time, ease traffic, improve education, reduce energy usage and keep us safe. This article discusses smart city projects being utilized in crime prevention and investigations. Specifically, this article highlights examples of gunshot detection devices and surveillance that have led to improvements in public safety in Cape Town, Chicago and Atlanta, and discusses their impacts to privacy.


Disaster Legal Tech: Strategies For Providing Legal Information To Survivors, Jeanne Ortiz-Ortiz, Jessica Penkoff Jan 2019

Disaster Legal Tech: Strategies For Providing Legal Information To Survivors, Jeanne Ortiz-Ortiz, Jessica Penkoff

Touro Law Review

No abstract provided.


The Calm After The Storm: 45 Years Of The Aba Young Lawyers Division’S Disaster Legal Services Program, Andrew Jack Vansingel Jan 2019

The Calm After The Storm: 45 Years Of The Aba Young Lawyers Division’S Disaster Legal Services Program, Andrew Jack Vansingel

Touro Law Review

No abstract provided.


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Public Security & Digital Forensics In The United States: The Continued Need For Expanded Digital Systems For Security, Deborah G. Keeling, Michael Losavio Sep 2017

Public Security & Digital Forensics In The United States: The Continued Need For Expanded Digital Systems For Security, Deborah G. Keeling, Michael Losavio

Journal of Digital Forensics, Security and Law

Digital Forensics is one of the latest challenges for the use of forensics in the investigative process in the United States. Some of the challenges are created by conditions and circumstances present for law enforcement around the world. However, many are unique to the United States and created by the standards of evidence within our courts, nature of our law enforcement organizations, and structure of our judicial and prosecutorial systems. It is essential for the preservation of public security and individual safety that competent systems of digital forensics are developed for law enforcement at all levels. The failure to do …


Surveying The Landscape As Technology Revolutionizes Media Coverage Of Appellate Courts, Howard J. Bashman Apr 2017

Surveying The Landscape As Technology Revolutionizes Media Coverage Of Appellate Courts, Howard J. Bashman

The Journal of Appellate Practice and Process

No abstract provided.


Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland Jan 2017

Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland

Catholic University Journal of Law and Technology

No abstract provided.


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Examining Warfare In Wi-Fi: A Review, Usawc Parameters Sep 2013

Examining Warfare In Wi-Fi: A Review, Usawc Parameters

The US Army War College Quarterly: Parameters

No abstract provided.


The Aftermath Of Aftermath: The Impact Of Digital Music Distribution On The Recording Industry, Michael Mccubbin Oct 2012

The Aftermath Of Aftermath: The Impact Of Digital Music Distribution On The Recording Industry, Michael Mccubbin

The University of New Hampshire Law Review

[Excerpt] “This article will address the impact the shift from hard-copy recordings to digital music distribution has had on the recording industry. Specifically, it will apply F.B.T. Productions v. Aftermath Records, which correctly held that a label’s relationship with third-party-digital-music-providers is that of licensor-licensee, to the modern music industry. Based on this holding, record labels need to reconsider their relationships with artists, and create new business models that rely on licensing music, rather than the traditional sale-based distribution model. The decision in Aftermath will lead to increased royalties for artists in the Digital Age. This article will analyze the impact …


Enhancing The Senses: How Technological Advances Shape Our View Of The Law, Steven Goldberg Sep 2006

Enhancing The Senses: How Technological Advances Shape Our View Of The Law, Steven Goldberg

West Virginia Law Review

No abstract provided.


Biotechnology And The Law: A Consideration Of Intellectual Property Rights And Related Social Issues, Michael D. Mehta Mar 2004

Biotechnology And The Law: A Consideration Of Intellectual Property Rights And Related Social Issues, Michael D. Mehta

The University of New Hampshire Law Review

[Excerpt] “Recent advances in biotechnology are expected by many to improve crop yield, reduce reliance on agricultural inputs like pesticides and herbicides, alleviate world hunger, improve the safety and effectiveness of pharmaceuticals, assist in the discovery of genes that trigger diseases like cancer, and make more efficient our legal institutions through DNA testing. Clearly, innovations in biotechnology are a powerful force for social change, and they pose unique challenges and opportunities for legal scholars and institutions. This section of the Pierce Law Review focuses on the interface between law and technology by examining how innovations in biotechnology accelerate debates about …


American Warfare In The Twenty-First Century, Paul R. Camacho Sep 2003

American Warfare In The Twenty-First Century, Paul R. Camacho

New England Journal of Public Policy

Over the last several years there have been a number of calls for the development of a new theoretical doctrine to govern the force structure of the United States military. The last big change in doctrine occurred in the post-Vietnam era. It involved not simply the change to the all-volunteer force, but an abandonment of escalation brinkmanship and open-ended missions. The subsequent Powell Doctrine demanded the use of overwhelming force and clear objectives and boundaries for military intervention. As the new millennium approached, the deficiencies of the Powell Doctrine became apparent — the multilateral approach of coalition building and the …


Program - Which Scientist Do You Believe - Process Alternatives In Technological Controversies, Risk Editorial Board Mar 1995

Program - Which Scientist Do You Believe - Process Alternatives In Technological Controversies, Risk Editorial Board

RISK: Health, Safety & Environment (1990-2002)

Program of events and list of registered attendees for the October 6, 1994 conference Which Scientist Do You Believe? Process Alternatives in Technological Controversies held in Concord, NH.


Acceptable Risk: A Conceptual Proposal, Baruch Fischhoff Jan 1994

Acceptable Risk: A Conceptual Proposal, Baruch Fischhoff

RISK: Health, Safety & Environment (1990-2002)

Challenging the "de minimis risk" concept, Dr. Fischhoff argues that risks ought not to be considered apart from a particular technology's benefits. He argues, too, that the acceptability of particular kinds of risks should not be determined without considering the views of all persons who may be exposed. Finally, building upon the "reasonable person" construct, he suggests ways those goals might be achieved.


Consensus Development At Nih: What Went Wrong, Itzhak Jacoby Mar 1993

Consensus Development At Nih: What Went Wrong, Itzhak Jacoby

RISK: Health, Safety & Environment (1990-2002)

A close observer identifies the Science Court concept as inspiring consensus development conferences at the National Institutes of Health and describes the extent to which they have followed the model. Professor Jacoby also argues that, if the model were more closely followed, conference objectives would be better realized.


The Science Court: A Bibliography, Jon R. Cavicchi Mar 1993

The Science Court: A Bibliography, Jon R. Cavicchi

RISK: Health, Safety & Environment (1990-2002)

This bibliography lists articles that focus specifically on the Science Court as proposed by Professor Kantrowitz in the mid-sixties. In a separate part articles casually mentioning that proposal in assorted contexts are presented.