Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (4)
- Internet Law (3)
- Computer Law (2)
- Computer Sciences (2)
- Engineering (2)
-
- Legal Studies (2)
- Physical Sciences and Mathematics (2)
- Archival Science (1)
- Business (1)
- Communications Law (1)
- Computer Engineering (1)
- Consumer Protection Law (1)
- Criminology (1)
- Criminology and Criminal Justice (1)
- Education (1)
- Educational Leadership (1)
- Electrical and Computer Engineering (1)
- Evidence (1)
- First Amendment (1)
- Forensic Science and Technology (1)
- Information Security (1)
- Law Enforcement and Corrections (1)
- Law Librarianship (1)
- Law and Society (1)
- Library and Information Science (1)
- Litigation (1)
- Other Engineering (1)
- Public Affairs, Public Policy and Public Administration (1)
- Public Policy (1)
- Institution
- Publication Year
- Publication
-
- Duke Law Journal (5)
- Cornell Journal of Law and Public Policy (3)
- Law and Contemporary Problems (3)
- Alaska Law Review (2)
- All Capstone Projects (1)
-
- Associate Professor Katina Michael (1)
- Center for Contract and Economic Organization (1)
- Cornell International Law Journal (1)
- Duke Journal of Comparative & International Law (1)
- Journal of Digital Forensics, Security and Law (1)
- Law Faculty Publications (1)
- Law Publications (1)
- Pepperdine Law Review (1)
- Publication Type
Articles 1 - 22 of 22
Full-Text Articles in Law
Digital Locks, Physical Objects And Immaterial Works, Pascale Chapdelaine
Digital Locks, Physical Objects And Immaterial Works, Pascale Chapdelaine
Law Publications
One of the greatest controversies in contemporary copyright law is the introduction of technological protection measures (TPMs) at the international and national level. By creating a separate parallel regime for digital copyright works, TPMs shifted the paradigm by redefining the rules of engagement of how users would increasingly access and experience digital copyright works.
In this chapter of my book Copyright User Rights, Contracts, and the Erosion of Property (Oxford University Press, 2017) I look at the implementation of TPMs as a regulatory tool from a multi-jurisdictional perspective. Initially mainly intended to protect copyright holders’ works made accessible online or …
A Model Of Segmenting A High-Cost Crime Prevention Through Environmental Design Initiative, Paul Adams
A Model Of Segmenting A High-Cost Crime Prevention Through Environmental Design Initiative, Paul Adams
All Capstone Projects
This project aimed to create a working model worthy to include within Schneider, Walker, and Sprague's description of a five-stage process of parceling out high-cost Crime Prevention Through Environmental Design (CPTED) initiatives. In 2002, the Department of Education and Department of Justice sponsored Schneider as the lead author for introducing and promoting CPTED initiatives for the first time in schools. This project's funding mechanism was created to help assist with the procurement of a highly priced CPTED initiative (key-less card system) for Suburban College.
Suburban College had faced a reoccurring pattern of theft from its classrooms and common areas. The …
Smoking Out Big Tobacco: Some Lessons About Academic Freedom, The World Wide Web, Media Conglomeration, And Public Service Pedagogy From The Battle Over The Brown & Williamson Documents, Clay Calvert
Pepperdine Law Review
No abstract provided.
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael
Associate Professor Katina Michael
This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …
Documenting Death: Public Access To Government Death Records And Attendant Privacy Concerns, Jeffrey R. Boles
Documenting Death: Public Access To Government Death Records And Attendant Privacy Concerns, Jeffrey R. Boles
Cornell Journal of Law and Public Policy
This Article examines the contentious relationship between public rights to access government-held death records and privacy rights concerning the deceased, whose personal information is contained in those same records. This right of access dispute implicates core democratic principles and public policy interests. Open access to death records, such as death certificates and autopsy reports, serves the public interest by shedding light on government agency performance, uncovering potential government wrongdoing, providing data on public health trends, and aiding those investigating family history, for instance. Families of the deceased have challenged the release of these records on privacy grounds, as the records …
Welcome To The Wild West: Protecting Access To Cross Border Fertility Care In The United States, Kimberly M. Mutcherson
Welcome To The Wild West: Protecting Access To Cross Border Fertility Care In The United States, Kimberly M. Mutcherson
Cornell Journal of Law and Public Policy
As has been the case with other types of medical tourism, the phenomenon of cross border fertility care ("CBFC") has sparked concern about the lack of global or even national harmonization in the regulation of the fertility industry. The diversity of laws around the globe leads would-be parents to forum shop for a welcoming place to make babies. Focusing specifically on the phenomenon of travel to the United States, this Article takes up the question of whether there should be any legal barriers to those who come to the United States seeking CBFC. In part, CBFC suffers from the same …
A Polarizing Dilemma: Assessing Potential Regulatory Gap-Filling Measures For Arctic And Antarctic Marine Genetic Resource Access And Benefit Sharing, Pamela L. Schoenberg
A Polarizing Dilemma: Assessing Potential Regulatory Gap-Filling Measures For Arctic And Antarctic Marine Genetic Resource Access And Benefit Sharing, Pamela L. Schoenberg
Cornell International Law Journal
No abstract provided.
Preserving And Ensuring Long-Term Access To Digitally Born Legal Information, Sarah Rhodes, Dana Neacsu
Preserving And Ensuring Long-Term Access To Digitally Born Legal Information, Sarah Rhodes, Dana Neacsu
Law Faculty Publications
Written laws, records and legal materials form the very foundation of a democratic society. Lawmakers, legal scholars and everyday citizens alike need, and are entitled, to access the current and historic materials that comprise, explain, define, critique and contextualize their laws and legal institutions. The preservation of legal information in all formats is imperative. Thus far, the twenty-first century has witnessed unprecedented mass-scale acceptance and adoption of digital culture, which has resulted in an explosion in digital information. However, digitally born materials, especially those that are published directly and independently to the Web, are presently at an extremely high risk …
Privacy Protection: When Is “Adequate” Actually Adequate?, Nikhil S. Palekar
Privacy Protection: When Is “Adequate” Actually Adequate?, Nikhil S. Palekar
Duke Journal of Comparative & International Law
No abstract provided.
Network Neutrality And The False Promise Of Zero-Price Regulation, C. Scott Hemphill
Network Neutrality And The False Promise Of Zero-Price Regulation, C. Scott Hemphill
Center for Contract and Economic Organization
This Article examines zero-price regulation, the major distinguishing feature of many modern "network neutrality" proposals. A zero-price rule prohibits a broadband Internet access provider from charging an application or content provider (collectively, "content provider") to send information to consumers. The Article differentiates two access provider strategies thought to justify a zero-price rule. Exclusion is anticompetitive behavior that harms a content provider to favor its rival. Extraction is a toll imposed upon content providers to raise revenue. Neither strategy raises policy concerns that justify implementation of a broad zero-price rule. First, there is no economic exclusion argument that justifies the zero-price …
Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala
Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala
Journal of Digital Forensics, Security and Law
That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …
Taking The Sting Out Of Reporting Requirements: Reproductive Health Clinics And The Constitutional Right To Informational Privacy, Jessica Ansley Bodger
Taking The Sting Out Of Reporting Requirements: Reproductive Health Clinics And The Constitutional Right To Informational Privacy, Jessica Ansley Bodger
Duke Law Journal
No abstract provided.
Public Health Versus Court-Sponsored Secrecy, Daniel J. Givelber, Anthony Robbins
Public Health Versus Court-Sponsored Secrecy, Daniel J. Givelber, Anthony Robbins
Law and Contemporary Problems
Public health practice relies on access to information. Givelber and Robbins discuss the debate about "court-sponsored" secrecy: Whether or not courts should tolerate, edorse, or protect secrecy when the sequestered information might help protect the public health.
Open Secrets: The Widespread Availability Of Information About The Health And Environmental Effects Of Chemicals, James W. Conrad Jr.
Open Secrets: The Widespread Availability Of Information About The Health And Environmental Effects Of Chemicals, James W. Conrad Jr.
Law and Contemporary Problems
Conrad discusses the point of view of the chemical industry concerning when and how access to health effects information may be affected by financial interests. He argues that no qualitative distinction can be drawn between the financial and other incentives that might affect disclosure by for-profit entities and the incentives that might affect disclosure by other entities that may conduct, sponsor, or opine on scientific research.
The Pervasive Problem Of Court-Sanctioned Secrecy And The Exigency Of National Reform, David S. Sanson
The Pervasive Problem Of Court-Sanctioned Secrecy And The Exigency Of National Reform, David S. Sanson
Duke Law Journal
No abstract provided.
Job Reference Immunity Statutes: Prevalent But Irrelevant, Markita D. Cooper
Job Reference Immunity Statutes: Prevalent But Irrelevant, Markita D. Cooper
Cornell Journal of Law and Public Policy
No abstract provided.
Confronting The Future: Coping With Discovery Of Electronic Material, Richard L. Marcus
Confronting The Future: Coping With Discovery Of Electronic Material, Richard L. Marcus
Law and Contemporary Problems
No abstract provided.
A Proposal For Protecting Privacy During The Information Age, Carol R. Williams
A Proposal For Protecting Privacy During The Information Age, Carol R. Williams
Alaska Law Review
No abstract provided.
In Praise Of Public Access: Why The Government Should Disclose The Identities Of Alleged Crime Victims, Sarah Henderson Hutt
In Praise Of Public Access: Why The Government Should Disclose The Identities Of Alleged Crime Victims, Sarah Henderson Hutt
Duke Law Journal
No abstract provided.
Developments Under The Freedom Of Information Act—1989, S. Elizabeth Wilborn
Developments Under The Freedom Of Information Act—1989, S. Elizabeth Wilborn
Duke Law Journal
No abstract provided.
Developments Under The Freedom Of Information Act—1988, Gerard J. Waldron, Jeff A. Israel
Developments Under The Freedom Of Information Act—1988, Gerard J. Waldron, Jeff A. Israel
Duke Law Journal
No abstract provided.
The Alaska Lands Act’S Innovations In The Law Of Access Across Federal Lands: You Can Get There From Here, Steven P. Quarles, Thomas R. Lundquist
The Alaska Lands Act’S Innovations In The Law Of Access Across Federal Lands: You Can Get There From Here, Steven P. Quarles, Thomas R. Lundquist
Alaska Law Review
No abstract provided.