Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2014

Science and Technology

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 46

Full-Text Articles in Law

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian Dec 2014

The Unexamined Life In The Era Of Big Data: Toward A Udaap For Data, Sean Brian

Sean Brian

No abstract provided.


The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu Dec 2014

The Google Art Project: An Analysis From A Legal And Social Perspective On Copyright Implications, Katrina Wu

Katrina Wu

The Google Art Project is an ambitious attempt by Google to curate worldwide artwork online in the highest resolution possible. Google accomplishes this by partnering with museums where museums provide access to art collections and Google provides the technology to capture high quality images. Under this existing model, Google places the burden of copyright clearances on museums and removes images from online if requested by copyright owners. An endeavor like the Google Art Project is not unprecedented however, when Google attempted to put the world’s books online under the Google Books Project, scanning millions of titles and offering snippets for …


E-Elections: Time For Japan To Embrace Online Campaigning, Matthew J. Wilson Sep 2014

E-Elections: Time For Japan To Embrace Online Campaigning, Matthew J. Wilson

Akron Law Faculty Publications

Asia has embraced the Internet and social media. Japan and South Korea rank among the world’s leaders in technological innovation and Internet penetration. China boasts over 420 million Internet users, and other Asian countries have experienced the widespread acceptance of online technologies. With the rapid ascendency of the Internet and social media, however, Asian countries have sometimes struggled with striking the proper balance between individual rights and the legal regulation of online activities. One prime example of such struggle involves the clash between Japan’s election laws and individual political freedoms.

Although Japan generally subscribes to democratic traditions and the principle …


One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood Sep 2014

One Hundred Nos: An Empirical Analysis Of The First 100 Denials Of Institution For Inter Partes And Covered Business Method Patent Reviews, Jonathan R. K. Stroud, Jarrad Wood

Jonathan R. K. Stroud

Tasked in 2011 with creating three powerful new patent review trial regimes, the U.S. Patent and Trademark Office—through the efforts of their freshly empowered quasi-judicial body, the Patent Trial and Appeals Board—set to creating a fast-paced trial with minimal discovery and maximum efficiency. In the first two years of existence, the proceedings have proved potent, holding unpatentable many of the claims that reach decisions on the merits. Yet a small subsection of petitions never make it past the starting gate, resulting in wasted time and effort on the parts of petitioners—and likely sighs of relief from the rights-holders. Parties on …


"Smile, You're On Cellphone Camera!": Regulating Online Video Privacy In The Myspace Generation, Jacqueline D. Lipton Sep 2014

"Smile, You're On Cellphone Camera!": Regulating Online Video Privacy In The Myspace Generation, Jacqueline D. Lipton

Akron Law Faculty Publications

In the latest Batman movie, Bruce Wayne’s corporate right hand man, Lucius Fox, copes stoically with the death and destruction dogging his boss. Interestingly, the last straw for him is Bruce’s request that he use digital video surveillance created through the city’s cellphone network to spy on the people of Gotham City in order to locate the Joker. Does this tell us something about the increasing social importance of privacy, particularly in an age where digital video technology is ubiquitous and largely unregulated?

While much digital privacy law and commentary has focused on text files containing personal data, little attention …


Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton Sep 2014

Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton

Akron Law Faculty Publications

In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns ‘hillaryclinton.com’, the more generic ‘hillary.com’ is registered to a software firm, Hillary Software, Inc. What about ‘hillary2008.com’? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …


“We, The Paparazzi”: Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton Sep 2014

“We, The Paparazzi”: Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton

Akron Law Faculty Publications

In January 2009, the Camera Phone Predator Alert bill was introduced into Congress. It raised serious concerns about privacy rights in the face of digital video technology. In so doing, it brought to light a worrying gap in current privacy regulation – the lack of rules relating to digital video privacy. To date, digital privacy regulation has focused on text records that contain personal data. Little attention has been paid to privacy in video files that may portray individuals in inappropriate contexts, or in an unflattering or embarrassing light. As digital video technology, including inexpensive cellphone cameras, is now becoming …


To © Or Not To ©? Copyright And Innovation In The Digital Typeface Industry, Jacqueline D. Lipton Sep 2014

To © Or Not To ©? Copyright And Innovation In The Digital Typeface Industry, Jacqueline D. Lipton

Akron Law Faculty Publications

Intellectual property rights are often justified by utilitarian theory. However, recent scholarship suggests that creativity thrives in some industries in the absence of intellectual property protection. These industries might be called IP’s negative spaces. One such industry that has received little scholarly attention is the typeface industry. This industry has recently digitized. Its adoption of digital processes has altered its market structure in ways that necessitate reconsideration of its IP negative status, with particular emphasis on copyright. This article considers the historical denial of copyright protection for typefaces in the United States, and examines arguments both for and against extending …


Law Of The Intermediated Information Exchange, Jacqueline D. Lipton Sep 2014

Law Of The Intermediated Information Exchange, Jacqueline D. Lipton

Akron Law Faculty Publications

When Wikipedia, Google and other online service providers staged a ‘blackout protest’ against the Stop Online Piracy Act in January 2012, their actions inadvertently emphasized a fundamental truth that is often missed about the nature of cyberlaw. In attempts to address what is unique about the field, commentators have failed to appreciate that the field could – and should – be reconceputalized as a law of the global intermediated information exchange. Such a conception would provide a set of organizing principles that are lacking in existing scholarship. Nothing happens online that does not involve one or more intermediaries – the …


Cyberlaw 2.0, Jacqueline D. Lipton Sep 2014

Cyberlaw 2.0, Jacqueline D. Lipton

Akron Law Faculty Publications

In the early days of the Internet, Judge Frank Easterbrook famously dismissed the idea of an emerging field of cyberspace law as akin to a “law of the horse”— a pastiche of unrelated legal principles tied together only by virtue of applying to the Internet, having no unifying principles that would teach us anything meaningful. This article revisits Easterbrook’s assertions with the benefit of hindsight. It suggests that subsequent case law and legislative developments in fact do support a distinct cyberlaw field. It introduces the novel argument that cyberlaw is a global “law of the intermediated information exchange.” In other …


Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton Sep 2014

Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton

Akron Law Faculty Publications

In January of 2010 a United States District Court granted an injunction against a Twilight fan magazine for unauthorized use of copyrighted publicity stills . No surprise there. Intellectual property laws deal effectively – some would argue too effectively – with such cases. Nevertheless, recent Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright …


Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton Sep 2014

Celebrity In Cyberspace: A Personality Rights Paradigm For Personal Domain Name Disputes, Jacqueline D. Lipton

Akron Law Faculty Publications

When the Oscar™-winning actress Julia Roberts fought for control of the domain name, what was her aim? Did she want to reap economic benefits from the name? Probably not, as she has not used the name since it was transferred to her. Or did she want to prevent others from using it on either an unjust enrichment or a privacy basis? Was she, in fact, protecting a trademark interest in her name? Personal domain name disputes, particularly those in the space, implicate unique aspects of an individual’s persona in cyberspace. Nevertheless, most of the legal rules developed for these disputes …


Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property, And Restitution, Jacqueline D. Lipton Sep 2014

Bad Faith In Cyberspace: Grounding Domain Name Theory In Trademark, Property, And Restitution, Jacqueline D. Lipton

Akron Law Faculty Publications

The year 2009 marks the tenth anniversary of domain name regulation under the Anti-Cybersquatting Consumer Protection Act (ACPA) and the Uniform Domain Name Dispute Resolution Policy (UDRP). Adopted to combat cybersquatting, these rules left a confused picture of domain name theory in their wake. Early cybersquatters registered Internet domain names corresponding with other’s trademarks to sell them for a profit. However, this practice was quickly and easily contained. New practices arose in domain name markets, not initially contemplated by the drafters of the ACPA and the UDRP. One example is clickfarming – using domain names to generate revenues from click-on …


Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden Sep 2014

Ex Ante Versus Ex Post Approaches To Network Neutrality: A Cost Benefit Analysis, Rob Frieden

Rob Frieden

Many advocates for less intrusive government oversight of telecommunications support the migration from regulation by an expert agency to the use of adjudication remedies largely guided by antitrust/competition policy principles. They believe that competition authorities, or reviewing courts can resolve disputes after they have occurred in lieu of having expert regulatory agencies available to anticipate and resolve problems before they become acute. Such ex post remedies typically determine whether anticompetitive conduct has occurred and what marketplace harm has resulted. Advocates for retaining so-called ex ante regulation believe that an expert agency remains essential particularly in light of fast changing market …


What’S New In The Network Neutrality Debate, Rob Frieden Sep 2014

What’S New In The Network Neutrality Debate, Rob Frieden

Rob Frieden

For over ten years, academics, practitioners, policy makers, consumers and other stakeholders have debated whether and how governments should regulate the Internet with an eye toward promoting accessibility, affordability and neutrality. This issue has triggered grave concerns about the Internet’s ability to continue generating substantial and widespread benefits. Advocates for various outcomes have vastly different assessments about many baseline subjects including the viability of sustainable competition and self-regulation. Consumers become agitated and confused by different framing of the issues, particularly when participants in the Internet ecosystem cannot reach closure on interconnection and compensation issues. Increasingly these disputes trigger temporary degradation …


Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden Aug 2014

Internet Protocol Television And The Challenge Of “Mission Critical” Bits., Rob Frieden

Rob Frieden

The Internet increasingly provides an alternative distribution medium for video and other types of high value, bandwidth intensive content. Many consumers have become “technology agnostic” about what kind of wireline or wireless medium provides service. However, they expect carriers to offer access anytime, anywhere, via any device and in any format. These early adopters of new technologies and alternatives to “legacy” media have no patience with the concept of “appointment television” that limits access to a specific time, on a single channel and in only one presentation format. This paper assesses whether and how Internet Service Providers (“ISPs”) can offer …


Teaching The Biological Clock: Age-Related Fertility Decline And Sex Education, Kerry Macintosh Aug 2014

Teaching The Biological Clock: Age-Related Fertility Decline And Sex Education, Kerry Macintosh

Kerry L Macintosh

Fertility in women declines significantly at age thirty-two and takes a sharp downward turn at age thirty-seven. Miscarriages also increase with age. In vitro fertilization cannot reverse the effects of aging, and embryo screening, egg freezing, and egg donation are imperfect solutions.

Unfortunately, many women fail to grasp these facts until it is too late. Various factors are to blame, including physicians who shy away from the topic of age-related fertility decline, persistent messaging about the need for pregnancy prevention (implying that conception is easy), and media accounts of celebrities who are pregnant in their forties.

This Article argues that …


Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo Aug 2014

Self-Defense Against Robots, A. Michael Froomkin, Zak Colangelo

A. Michael Froomkin

This paper examines when, under U.S. law, humans may use force against robots to protect themselves, their property, and their privacy. May a landowner legally shoot down a trespassing drone? May she hold a trespassing autonomous car as security against damage done or further torts? Is the fear that a drone may be operated by a paparazzo or a peeping Tom sufficient grounds to disable or interfere with it? How hard may you shove if the office robot rolls over your foot? This paper addresses all those issues and one more: what rules and standards we could put into place …


"Step Into The Game": Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of "Terroristic Speech", Robert Hupf Jr Jul 2014

"Step Into The Game": Assessing The Interactive Nature Of Virtual Reality Video Games Through The Context Of "Terroristic Speech", Robert Hupf Jr

Robert Hupf Jr

This article will begin the discussion on video gaming’s next interactive jump – total VR immersion – and examine whether the interactivity of VR changes the ordinary First Amendment analysis . . . . Yet, even with the “terroristic speech” component, involving everything from instructions on bomb-making to anti-American “terrorist” recruitment messaging, the Court should affirm the speech-protective logic of Justice Learned Hand and Justice Brandeis and hold that the First Amendment protects the freedom of video game developers in making VR video games with problematic content. The video game medium and its depictions have already been recognized as “speech” …


“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves Jul 2014

“Can I Profit From My Own Name And Likeness As A College Athlete?” The Predictive Legal Analytics Of A College Player’S Publicity Rights Vs. First Amendment Rights Of Others, Roger M. Groves

Roger M. Groves

Two federal court decisions during 2013 have changed the game for college students versus the schools, the NCAA and video game makers. This article explores whether for the first time in history these athletes can profit from their own name and likeness and prevent others from doing so. But those cases still leave many untested applications to new facts – facts that the courts have not faced. Particularly intriguing is how 21st Century technology will apply to this area in future litigation. No publicity rights case or article to date has explored the application of predictive analytics, computer programs, algorithms, …


Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty Jul 2014

Protecting The Sender: Liability Protection For The Senders Of Electronic Communication, Meredith W. Doherty

Meredith W. Doherty

As the technology of smartphones has progressed, electronic communication has become an integral and portable part of our daily lives. A recent New Jersey case highlighted the issue of holding the sender of a text message liable for injuries resulting from a motor vehicle accident in which the driver at fault was reading a text message from the sender at the time of the accident. This note focuses on the implications of such liability being imposed on senders of text messages as well as the slippery slope that could result, taking all forms of electronic communication, social media and mobile …


Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander Jun 2014

Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander

Rachel Rose Ostrander

As the science of stem cell research progresses it is difficult to tell what implications it will have on our society and for women. I will begin this discussion by examining how science has viewed women in the past, and use this as a basis to conjecture about how they will be viewed and treated in the future. Prevalent gender bias in scientific writing should be a cause for concern as the science of stem cell research and commodification of the female egg becomes more of a reality.

The process of egg donation has stirred much debate in the feminist …


E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman Jun 2014

E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman

Lawrence J. Trautman Sr.

What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …


The Host's Dilemma: Strategic Forfeiture In Platform Markets For Informational Goods, Jonathan M. Barnett May 2014

The Host's Dilemma: Strategic Forfeiture In Platform Markets For Informational Goods, Jonathan M. Barnett

Jonathan M Barnett

Voluntary forfeiture of intellectual assets—often, exceptionally valuable assets--is surprisingly widespread in information technology markets. A simple economic rationale can account for these practices. By giving away access to core technologies, a platform holder commits against expropriating (and thereby induces) user investments that support platform value. To generate revenues that cover development and maintenance costs, the platform holder must regulate access to other goods and services within the total consumption bundle. The tradeoff between forfeiting access (to induce adoption) and regulating access (to recover costs) anticipates the substantial convergence of open and closed innovation models. Organizational patterns in the software and …


From Patent Thickets To Patent Networks: The Legal Infrastructure Of The Digital Economy, Jonathan M. Barnett May 2014

From Patent Thickets To Patent Networks: The Legal Infrastructure Of The Digital Economy, Jonathan M. Barnett

Jonathan M Barnett

Scholarly and popular commentary often assert that markets characterized by intensive patent issuance and enforcement suffer from “patent thickets” that suppress innovation. This assertion is difficult to reconcile with continuous robust levels of R&D investment, coupled with declining prices, in technology markets that have operated under intensive patent issuance and enforcement for several decades. Using network visualization software, I show that information and communication technology markets rely on patent pools and other cross-licensing structures to mitigate or avoid patent thickets and associated inefficiencies. Based on the composition, structure, terms and pricing of selected leading patent pools in the ICT market, …


Sharing Public Safety Helicopters, Henry H. Perritt Jr. Apr 2014

Sharing Public Safety Helicopters, Henry H. Perritt Jr.

All Faculty Scholarship

No abstract provided.


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

Henry H. Perritt, Jr.

Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …


Canceling The Order: How High Frequency Traders Are Disrupting The Derivatives Market, And What The Regulators Can Do To Stop Them, Andrew C. Burr Apr 2014

Canceling The Order: How High Frequency Traders Are Disrupting The Derivatives Market, And What The Regulators Can Do To Stop Them, Andrew C. Burr

Andrew C Burr

High Frequency Trading (“HFT”) is now a part of the modern financial lexicon, and inspires feelings of awe, fear, and ignorance. While millions of investors around the world are still trying to grapple with what exactly HFT is and does, the U.S. regulators who are tasked with investigating and charging manipulators are finding themselves in a quandary of how to prosecute the offenders. Further, while the media has focused its attention on the U.S. Securites Exchange Commission’s (“SEC”) new policies on the subject, few have noticed the progress made by the U.S. Commodity Futures Trading Commission (“CFTC”), and how the …


To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid Apr 2014

To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid

Shlomit Yanisky-Ravid Professor of Law

Social networking has increasingly become the most common venue of self-expression in the digital era. Although social networks started as a social vehicle, they have recently become a major source for employers to track personal data ("screening") of applicants, employees or former employees.

This article addresses the questions of whether this casual business routine harms employees' rights to privacy with regard to data users post in social networks, what the drawbacks of this routine may be, and why and how privacy rights should be protected to secure private zones within the virtual sphere. The article suggests that a privacy right …