Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Constitutional Law (18)
- Science and Technology Law (10)
- Legal Writing and Research (8)
- Supreme Court of the United States (8)
- Civil Rights and Discrimination (7)
-
- Administrative Law (6)
- First Amendment (6)
- Labor and Employment Law (6)
- Legal History (6)
- Legislation (6)
- Privacy Law (6)
- Business Organizations Law (5)
- Civil Procedure (5)
- Internet Law (5)
- Law and Gender (5)
- Litigation (5)
- Computer Law (4)
- Courts (4)
- Criminal Law (4)
- Indigenous, Indian, and Aboriginal Law (4)
- Jurisprudence (4)
- President/Executive Department (4)
- Criminal Procedure (3)
- Energy and Utilities Law (3)
- Health Law and Policy (3)
- Law and Economics (3)
- Law and Politics (3)
- Law and Psychology (3)
- Law and Race (3)
- Keyword
-
- Constitutional law (8)
- First Amendment (6)
- Administrative law (5)
- Algorithms (4)
- Privacy (4)
-
- Black box (3)
- Civil rights (3)
- Data security (3)
- Empirical (3)
- Equal protection (3)
- Executive branch (3)
- Free speech (3)
- Government surveillance (3)
- Human/computer interaction (3)
- Legal research (3)
- United States Supreme Court (3)
- Autonomy (2)
- Book review (2)
- Civil procedure (2)
- Class action (2)
- Cybersecurity (2)
- Data breach (2)
- Discrimination (2)
- Due process (2)
- Energy (2)
- Fourth Amendment (2)
- Freedom of speech (2)
- Indigenous (2)
- Law (2)
- Legal education (2)
Articles 1 - 30 of 47
Full-Text Articles in Law
Government Speech And The War On Terror, Helen Norton
Government Speech And The War On Terror, Helen Norton
Publications
The government is unique among speakers because of its coercive power, its substantial resources, its privileged access to national security and intelligence information, and its wide variety of expressive roles as commander-in-chief, policymaker, educator, employer, property owner, and more. Precisely because of this power, variety, and ubiquity, the government's speech can both provide great value and inflict great harm to the public. In wartime, more specifically, the government can affirmatively choose to use its voice to inform, inspire, heal, and unite -- or instead to deceive, divide, bully, and silence.
In this essay, I examine the U.S. government's role as …
Authorship, Disrupted: Ai Authors In Copyright And First Amendment Law, Margot E. Kaminski
Authorship, Disrupted: Ai Authors In Copyright And First Amendment Law, Margot E. Kaminski
Publications
Technology is often characterized as an outside force, with essential qualities, acting on the law. But the law, through both doctrine and theory, constructs the meaning of the technology it encounters. A particular feature of a particular technology disrupts the law only because the law has been structured in a way that makes that feature relevant. The law, in other words, plays a significant role in shaping its own disruption. This Essay is a study of how a particular technology, artificial intelligence, is framed by both copyright law and the First Amendment. How the algorithmic author is framed by these …
The Chow: Depictions Of The Criminal Justice System As A Character In Crime Fiction, Marianne Wesson
The Chow: Depictions Of The Criminal Justice System As A Character In Crime Fiction, Marianne Wesson
Publications
Having been honored by a request to contribute to a Symposium honoring my talented friend Alafair Burke, I composed this essay describing the various ways the criminal justice system has been depicted in English-language crime fiction. This survey, necessarily highly selective, considers portrayals penned by writers from Dickens to Tana French. Various dimensions of comparison include the authors’ apparent beliefs about the rule of law (from ridiculously idealistic to uncompromisingly cynical), the characters’ professional perspectives (private detective, police officer, prosecutor, defense lawyer, judge, victim, accused), and the protagonists’ status as institutional insiders or outsiders or occupants of the uncomfortable middle. …
Who Needs Contracts? Generalized Exchange Within Investment Accelerators, Brad Bernthal
Who Needs Contracts? Generalized Exchange Within Investment Accelerators, Brad Bernthal
Publications
This Article investigates why an expert volunteers on behalf of startups that participate in a novel type of small venture capital (“VC”) fund known as a mentor-driven investment accelerator (“MDIA”). A MDIA organizes a pool of seasoned individuals – called “mentors” – to help new companies. An obvi- ous organizational strategy would be to contract with mentors. Mentors in- stead voluntarily assist. Legal studies of norm-based exchanges do not explain what this Article calls the “mentorship conundrum”—i.e., the puzzling moti- vation of a mentor to volunteer within otherwise for-profit environments. This Article is the first to bridge the insights of …
Operationalizing Free, Prior, And Informed Consent, Carla F. Fredericks
Operationalizing Free, Prior, And Informed Consent, Carla F. Fredericks
Publications
The UN Declaration on the Rights of Indigenous Peoples (UNDRIP) has acknowledged varying ways in which international actors can protect, respect and remedy the rights of indigenous peoples. One of these methods is the concept of free, prior and informed consent (FPIC) as described in Articles 10, 19, 28 and 29. There has been much debate in the international community over the legal status of the UNDRIP, and member states have done little to implement it. In applied contexts, many entities like extractive industries and conservation groups are aware of risks inherent in not soliciting FPIC and have endeavored to …
The Impact Of Wal-Mart V. Dukes On Employment Discrimination Class Actions Five Years Out: A Forecast That Suggests More Of A Wave Than A Tsunami, Suzette M. Malveaux
The Impact Of Wal-Mart V. Dukes On Employment Discrimination Class Actions Five Years Out: A Forecast That Suggests More Of A Wave Than A Tsunami, Suzette M. Malveaux
Publications
No abstract provided.
Judges’ Varied Views On Textualism: The Roberts-Alito Schism And The Similar District Judge Divergence That Undercuts The Widely Assumed Textualism-Ideology Correlation, Scott A. Moss
Publications
No abstract provided.
Every Algorithm Has A Pov, Susan Nevelow Mart
Every Algorithm Has A Pov, Susan Nevelow Mart
Publications
When legal researchers search in online databases for the information they need to solve a legal problem, they need to remember that the algorithms that are returning results to them were designed by humans. The world of legal research is a human-constructed world, and the biases and assumptions the teams of humans that construct the online world bring to the task are imported into the systems we use for research. This article takes a look at what happens when six different teams of humans set out to solve the same problem: how to return results relevant to a searcher’s query …
The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart
The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart
Publications
The results of using the search algorithms in Westlaw, Lexis Advance, Fastcase, Google Scholar, Ravel, and Casetext are compared. Six groups of humans created six different algorithms, and the results are a testament to the variability of human problem solving. That variability has implications both for researching and teaching research.
Class Actions, Civil Rights, And The National Injunction, Suzette M. Malveaux
Class Actions, Civil Rights, And The National Injunction, Suzette M. Malveaux
Publications
This essay is a response to Professor Samuel Bray’s article proposing a blanket prohibition against injunctions that enjoin a defendant’s conduct with respect to nonparties. He argues that national injunctions are illegitimate under Article III and traditional equity and result in a number of difficulties.
This Response argues, from a normative lens, that Bray’s proposed ban on national injunctions should be rejected. Such a bright-line rule against national injunctions is too blunt an instrument to address the complexity of our tripartite system of government, our pluralistic society and our democracy. Although national injunctions may be imperfect and crude forms of …
Privacy And The Right To Record, Margot E. Kaminski
Privacy And The Right To Record, Margot E. Kaminski
Publications
Many U.S. laws protect privacy by governing recording. Recently, however, courts have recognized a First Amendment “right to record.” This Article addresses how courts should handle privacy laws in light of the developing First Amendment right to record.
The privacy harms addressed by recording laws are situated harms. Recording changes the way people behave in physical spaces by altering the nature of those spaces. Thus, recording laws can be placed within a long line of First Amendment case law that recognizes a valid government interest in managing the qualities of rivalrous physical space, so as not to allow one person’s …
An Expressive Theory Of Privacy Intrusions, Craig Konnoth
An Expressive Theory Of Privacy Intrusions, Craig Konnoth
Publications
The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."
Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by …
Cognitive Competence In Executive-Branch Decision Making, Anna Spain Bradley
Cognitive Competence In Executive-Branch Decision Making, Anna Spain Bradley
Publications
The decisions Presidents and those operating under their authority take determine the course of our nation and the trajectory of our lives. Consequently, understanding who has the power and authority to decide has captured both the attention of legal scholars across a variety of fields for many years and the immediate worry of the public since the 2016 Presidential election. Prevailing interventions look for ways that law can offer procedural and institutional reforms that aim to maintain separation of powers and avoid an authoritarian regime. Yet, these views commonly overlook a fundamental factor and a more human one: the individuals …
Performative Privacy, Scott Skinner-Thompson
Performative Privacy, Scott Skinner-Thompson
Publications
Broadly speaking, privacy doctrine suggests that the right to privacy is non-existent once one enters the public realm. Although some scholars contend that privacy ought to exist in public, “public privacy” has been defended largely with reference to other, ancillary values privacy may serve. For instance, public privacy may be necessary to make the freedom of association meaningful in practice.
This Article identifies a new dimension of public privacy, supplementing extant justifications for the right, by arguing that many efforts to maintain privacy while in “public” are properly conceptualized as forms of performative, expressive resistance against an ever-pervasive surveillance society. …
Checking The Government’S Deception Through Public Employee Speech, Helen Norton
Checking The Government’S Deception Through Public Employee Speech, Helen Norton
Publications
No abstract provided.
Royalty Securitization, Kristelia García
The Wages Of Genetic Entitlement: The Good, The Bad, And The Ugly In The Rape Survivor Child Custody Act, Jennifer S. Hendricks
The Wages Of Genetic Entitlement: The Good, The Bad, And The Ugly In The Rape Survivor Child Custody Act, Jennifer S. Hendricks
Publications
This Essay analyzes flaws and assumptions in the recently enacted Rape Survivor Child Custody Act. The RSCCA offers a window into the problems with defining parenthood in terms of genes instead of caretaking relationships, which is what led to the problem of rapists being able to claim parental rights in the first place. Rather than address that underlying defect in family law, the statute attempts a solution that might work if all rapists were strangers, all rapists were men, and all rape victims were women, but glosses over complicated problems of violence and coercion in relationships. Despite this failure to …
Rules For Digital Radicals, Scott Skinner-Thompson
Entrepreneurial Administration, Philip J. Weiser
Entrepreneurial Administration, Philip J. Weiser
Publications
A core failing of today’s administrative state and modern administrative law scholarship is the lack of imagination as to how agencies should operate. On the conventional telling, public agencies follow specific grants of regulatory authority, use the traditional tools of notice-and-comment rulemaking and adjudication, and are checked by judicial review. In reality, however, effective administration depends on entrepreneurial leadership that spearheads policy experimentation and trial-and-error problem-solving, including the development of regulatory programs that use non-traditional tools.
Entrepreneurial administration takes place both at public agencies and private entities, each of which can address regulatory challenges and earn regulatory authority as a …
Benefit Corporation Law, Mark J. Loewenstein
Benefit Corporation Law, Mark J. Loewenstein
Publications
This article compares the approaches to benefit corporation legislation, particularly the Model Legislation proposed by B Lab, on the one hand, and the Delaware and Colorado laws, on the other.
Firearms In The Family, Carolyn B. Ramsey
Firearms In The Family, Carolyn B. Ramsey
Publications
This Article considers firearms prohibitions for domestic violence offenders, in light of recent Supreme Court decisions and the larger, national debate about gun control. Unlike other scholarship in the area, it confronts the costs of ratcheting up the scope and enforcement of such firearms bans and argues that the politicization of safety has come at the expense of a sound approach to gun control in the context of intimate-partner abuse. In doing so, it expands scholarly arguments against mandatory, one-size-fits-all criminal justice responses to domestic violence in a direction that other critics have been reluctant to go, perhaps because of …
Employers' Duties Of Honesty And Accuracy, Helen Norton
Employers' Duties Of Honesty And Accuracy, Helen Norton
Publications
This short essay is a contribution to the Labor Law Group's chapter-by-chapter critique and analysis of the American Law Institute's effort to restate the common law of employment through its 2015 Restatement of Employment Law. This essay focuses specifically on sections 6.05 and 6.06 of the Restatement, which address employers’ duties of honesty and accuracy in their communications to workers themselves as articulated by the torts of fraudulent and negligent misrepresentation.
Employers speak to workers about a wide range of job-related topics that include the terms and conditions of employment, business projections, and applicable workplace legal protections. Employers’ …
Envisioning 100% Access To Justice In Colorado, Daniel M. Taubman, Melissa Hart
Envisioning 100% Access To Justice In Colorado, Daniel M. Taubman, Melissa Hart
Publications
No abstract provided.
Introducing Govinfo: A New Source For Federal Government Documents Online, Erik Beck
Introducing Govinfo: A New Source For Federal Government Documents Online, Erik Beck
Publications
No abstract provided.
Conservatives And The Court, Robert F. Nagel
Book Review, Ahmed White
Health Information Equity, Craig Konnoth
Health Information Equity, Craig Konnoth
Publications
In the last few years, numerous Americans’ health information has been collected and used for follow-on, secondary research. This research studies correlations between medical conditions, genetic or behavioral profiles, and treatments, to customize medical care to specific individuals. Recent federal legislation and regulations make it easier to collect and use the data of the low-income, unwell, and elderly for this purpose. This would impose disproportionate security and autonomy burdens on these individuals. Those who are well-off and pay out of pocket could effectively exempt their data from the publicly available information pot. This presents a problem which modern research ethics …
Book Review, Anna Spain Bradley
Is Legal Scholarship Worth Its Cost?, Paul Campos
Responsible Resource Development And Prevention Of Sex Trafficking: Safeguarding Native Women And Children On The Fort Berthold Reservation, Kathleen Finn, Erica Gajda, Thomas Perin, Carla Fredericks
Responsible Resource Development And Prevention Of Sex Trafficking: Safeguarding Native Women And Children On The Fort Berthold Reservation, Kathleen Finn, Erica Gajda, Thomas Perin, Carla Fredericks
Publications
In 2010, large deposits of oil and natural gas were found in the Bakken shale formation, much of which is encompassed by the Fort Berthold Indian reservation, home to the Mandan, Hidatsa, and Arikara Nation (“MHA Nation” or “Three Affiliated Tribes” or “the Tribe”). However, rapid oil and gas development has brought an unprecedented rise of violent crime on and near the Fort Berthold reservation. Specifically, the influx of well-paid male oil and gas workers, living in temporary housing often referred to as “man camps,” has coincided with a disturbing increase in sex trafficking of Native women. The social risks …