Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (233)
- Science and Technology Law (163)
- Intellectual Property Law (120)
- Computer Law (102)
- Law and Society (81)
-
- Communications Law (65)
- Social and Behavioral Sciences (49)
- Law and Economics (45)
- Constitutional Law (40)
- International Law (34)
- Administrative Law (32)
- Contracts (30)
- Health Law and Policy (29)
- Criminal Law (27)
- Entertainment, Arts, and Sports Law (25)
- Consumer Protection Law (24)
- Economics (23)
- Commercial Law (21)
- Legal History (21)
- Civil Rights and Discrimination (19)
- Comparative and Foreign Law (19)
- Legislation (19)
- Antitrust and Trade Regulation (18)
- Criminal Procedure (18)
- Legal Profession (18)
- Public Law and Legal Theory (18)
- Civil Law (17)
- Environmental Law (17)
- First Amendment (17)
- Institution
-
- SelectedWorks (460)
- Selected Works (215)
- BLR (109)
- Chicago-Kent College of Law (25)
- The University of Akron (14)
-
- University of Pennsylvania Carey Law School (14)
- Louisiana State University Law Center (4)
- Nova Southeastern University (4)
- Singapore Management University (3)
- University of Dayton (3)
- University of North Carolina School of Law (3)
- Villanova University Charles Widger School of Law (3)
- Drexel University Thomas R. Kline School of Law (2)
- Howard University (2)
- Maurer School of Law: Indiana University (2)
- University of Tennessee College of Law (2)
- Widener University Commonwealth Law School (2)
- Cornell University Law School (1)
- Florida International University College of Law (1)
- Notre Dame Law School (1)
- Southern Methodist University (1)
- Syracuse University (1)
- The Peter A. Allard School of Law (1)
- University at Buffalo School of Law (1)
- University of Baltimore Law (1)
- University of Colorado Law School (1)
- University of Florida Levin College of Law (1)
- University of Georgia School of Law (1)
- University of Iowa (1)
- University of Missouri-Kansas City School of Law (1)
- Publication Year
- Publication
-
- ExpressO (107)
- All Faculty Scholarship (36)
- Rob Frieden (29)
- Akron Law Faculty Publications (14)
- Hezi Margalit (11)
-
- Jacqueline D Lipton (10)
- Robert Sprague (10)
- James Gibson (9)
- Lawrence J. Trautman Sr. (9)
- Richard Warner (9)
- William A. Herbert (9)
- Dr Rebecca Wong (8)
- Henry H. Perritt, Jr. (8)
- Joshua A.T. Fairfield (8)
- Ronald W Staudt (8)
- Professor Andrew D Murray (7)
- Michael D. Mann (6)
- Peter Lee (6)
- Deth Sao (5)
- H. Brian Holland (5)
- Journal Articles (5)
- Michael J. Malinowski (5)
- Olufunmilayo B. Arewa (5)
- Richard Li-dar Wang (5)
- Susan Brenner (5)
- Thomas F. Cotter (5)
- Tom W. Bell (5)
- Adam Lamparello (4)
- Corey A Ciocchetti (4)
- Faculty Publications (4)
- Publication Type
Articles 1 - 30 of 884
Full-Text Articles in Law
The Law And Politics Of Ransomware, Asaf Lubin
The Law And Politics Of Ransomware, Asaf Lubin
Articles by Maurer Faculty
What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between 20,000 and 30,000 per day in the United States alone. That is a ransomware attack every eleven seconds, each of which cost victims …
Technological 'Disruption' Of The Law's Imagined Scene: Some Lessons From Lex Informatica, Margot Kaminski
Technological 'Disruption' Of The Law's Imagined Scene: Some Lessons From Lex Informatica, Margot Kaminski
Publications
Joel Reidenberg in his 1998 Article Lex Informatica observed that technology can be a distinct regulatory force in its own right and claimed that law would arise in response to human needs. Today, law and technology scholarship continues to ask: does technology ever disrupt the law? This Article articulates one particular kind of “legal disruption”: how technology (or really, the social use of technology) can alter the imagined setting around which policy conversations take place—what Jack Balkin and Reva Siegal call the “imagined regulatory scene.” Sociotechnical change can alter the imagined regulatory scene’s architecture, upsetting a policy balance and undermining …
An Osm For Iot: Establishing An Office Of Special Masters To Resolve Certain Cases Involving The Internet Of Things, Abigail Perdue, Bethany Corbin
An Osm For Iot: Establishing An Office Of Special Masters To Resolve Certain Cases Involving The Internet Of Things, Abigail Perdue, Bethany Corbin
West Virginia Law Review
No abstract provided.
A Regulatory Roadmap For Financial Innovation, Cristie Ford
A Regulatory Roadmap For Financial Innovation, Cristie Ford
All Faculty Publications
Private sector innovation – whether it is fintech, biotechnology, the platformisation of the economy, or other developments – is the single most profound challenge that regulators confront today. Financial innovations, which are intangible and fast-moving, are especially challenging. Financial regulators are at the operational front line of making sense of the promise and the risks associated with fintech, and helping to ensure it operates for public benefit.
Faced with such a changeable and fast-moving problem, how can regulators “future proof” themselves?
This chapter outlines a roadmap for financial regulators who confront fast-moving and profound change in their sectors. It argues …
Insuring Evolving Technology, Asaf Lubin
Insuring Evolving Technology, Asaf Lubin
Articles by Maurer Faculty
The study of the interaction between law and technology is more critical today than ever before. Advancements in artificial intelligence, information communications, biological and chemical engineering, and space-faring technologies, to name but a few examples, are forcing us to reexamine our traditional understanding of basic concepts in torts and insurance law.
Yet, few insurance professionals and scholars will identify themselves as working in the field of “law-and-technology.” For many of them, technology is “just a fact about the world like any other,” as Ryan Calo once put it, not one that always merits “special care.”
This short paper is an …
Contracts Formed By Software: When Things Go Wrong, Vincent Ooi
Contracts Formed By Software: When Things Go Wrong, Vincent Ooi
Research Collection Yong Pung How School Of Law
The use of software in contract formation is likely to become increasingly pervasive in light of the digital economy. Consequently, software can also be expected to exhibit greater autonomy and take on increasingly complex transactions and contract negotiations. It is important that a legally coherent, fair, certain and economically justified approach be taken to regulate such contracts.A ‘contracting problem’ arises when software is used to autonomously enter into contracts without human input. The formation of a valid contract requires, inter alia, an agreement between two or more parties, where each party exhibits an objective intention to be legally bound (the …
Cryptocurrencies And Code Before The Courts, Vincent Ooi, Kian Peng Soh
Cryptocurrencies And Code Before The Courts, Vincent Ooi, Kian Peng Soh
Research Collection Yong Pung How School Of Law
In the rapidly developing cyber sphere dominated by cryptocurrencies and code, it is perhaps not uncommon for firms to focus on cutting-edge technological developments leaving the law behind as an afterthought. B2C2 Ltd v Quoine Pte Ltd (‘B2C2’)1 may serve as a timely reminder of the importance of the legal principles supporting e-commerce and Fintech. In the first case of its kind, B2C2 raised several key questions before the Singapore International Commercial Court (‘SICC’), seeking clarification on how the established legal concepts of breach of trust, mistake and unjust enrichment might apply in the context where an automated contract-forming software …
Contracts Formed By Software: An Approach From The Law Of Mistake, Vincent Ooi
Contracts Formed By Software: An Approach From The Law Of Mistake, Vincent Ooi
Centre for AI & Data Governance
A ‘Contracting Problem’ arises when software is used to autonomously enter into contracts without human input. Questions arise as to how and whether there can be an expression of an objective intention to be legally bound. This article considers three leading solutions to the Contracting Problem. The ‘Mere Tools Theory’, which views software as ‘mere tools’ of communication, is too harsh as it binds users to any software malfunction. The Agency Approach, which treats software as Electronic Agents, capable of contracting on behalf of their users, is untenable as it ascribes unrealistic characteristics to software. The article submits that the …
הורות משפטית מן הדין ומן הצדק - Legal Parenthood - Law And Justice, Yehezkel Margalit
הורות משפטית מן הדין ומן הצדק - Legal Parenthood - Law And Justice, Yehezkel Margalit
Hezi Margalit
The Rise And Fall Of Private Sector Unionism: What Next For The Nlra?, Jeffrey M. Hirsch, Barry T. Hirsch
The Rise And Fall Of Private Sector Unionism: What Next For The Nlra?, Jeffrey M. Hirsch, Barry T. Hirsch
Jeffrey M. Hirsch
No abstract provided.
Survey Of (Mostly Outdated And Often Ineffective) Laws Affecting Work-Related Monitoring, Robert Sprague
Survey Of (Mostly Outdated And Often Ineffective) Laws Affecting Work-Related Monitoring, Robert Sprague
Chicago-Kent Law Review
This article reviews various laws that affect work-related monitoring. It reveals that most of our privacy laws were adopted well before smartphones and the Internet became ubiquitous; they still hunt for physical secluded locations; and, because they are based on reasonable expectations of privacy, they can easily be circumvented by employer policies that eliminate that expectation by informing workers they have no right to privacy in the workplace. This article concludes that the future—indeed the present—does not bode well for worker privacy.
2016-2017 Oxford Business Law Blog Round-Up: Most Read Opinion Pieces, Maurice Stucke
2016-2017 Oxford Business Law Blog Round-Up: Most Read Opinion Pieces, Maurice Stucke
Scholarly Works
On 14 March 2017, the Oxford Business Law Blog (OBLB) marked its first anniversary. One year ago, we set out to create a leading and truly international forum for the exchange of ideas and reporting of new developments in business law. Since then, we have published over 530 posts from academics and practitioners from across the world and have reached readers from over 150 countries.
The OBLB is now a firmly entrenched part of the Oxford Law Faculty’s Business Law Hub. The purpose of this collection is to celebrate submissions created especially for publication on the OBLB. As such, this …
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Thomas E. Baker
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee
New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee
Larissa Lee
Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another, using a peer-to-peer …
Machine Learning, Automated Suspicion Algorithms, And The Fourth Amendment, Michael L. Rich
Machine Learning, Automated Suspicion Algorithms, And The Fourth Amendment, Michael L. Rich
Michael L Rich
At the conceptual intersection of machine learning and government data collection lie Automated Suspicion Algorithms, or ASAs, algorithms created through the application of machine learning methods to collections of government data with the purpose of identifying individuals likely to be engaged in criminal activity. The novel promise of ASAs is that they can identify data-supported correlations between innocent conduct and criminal activity and help police prevent crime. ASAs present a novel doctrinal challenge, as well, as they intrude on a step of the Fourth Amendment’s individualized suspicion analysis previously the sole province of human actors: the determination of when reasonable …
Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit
Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit
Hezi Margalit
The last few decades have witnessed dramatic changes in the conceptualization and methodologies of determining legal parentage in the U.S. and other countries in the western world. Through various sociological shifts, growing social openness and bio-medical innovations, the traditional definitions of family and parenthood have been dramatically transformed. This transformation has led to an acute and urgent need for legal and social frameworks to regulate the process of determining legal parentage. Moreover, instead of progressing in a piecemeal, ad-hoc manner, the framework for determining legal parentage should be comprehensive. Only a comprehensive solution will address the differing needs of today’s …
From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit
From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit
Hezi Margalit
In 1985, when Kim Cotton became Britain’s first commercial surrogate mother, Europe was exposed to the issue of surrogacy for the first time on a large scale. Three years later, in 1988, the famous case of Baby M drew the attention of the American public to surrogacy as well. These two cases implicated fundamental ethical and legal issues regarding domestic surrogacy and triggered a fierce debate about motherhood, child-bearing, and the relationship between procreation, science and commerce. These two cases exemplified the debate regarding domestic surrogacy - a debate that has now been raging for decades. Contrary to the well-known …
Modularity Theory And Internet Regulation, Christopher S. Yoo
Modularity Theory And Internet Regulation, Christopher S. Yoo
All Faculty Scholarship
Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.
The literature on innovation indicates that modules should be determined by the nature of …
Friends, Followers, Connections, Lend Me Your Ears: A New Test For Determining The Sufficiency Of Service Of Process Via Social Media, Christopher M. Finke
Friends, Followers, Connections, Lend Me Your Ears: A New Test For Determining The Sufficiency Of Service Of Process Via Social Media, Christopher M. Finke
University of Baltimore Law Review
The emergence of social media as a driving force in modern society has brought it to the forefront of legal discussion in all areas of law. Fields of study such as evidence, ethics, and constitutional law are all currently wrestling with how social media ought to be handled. In particular, courts have attempted to determine whether service of process (or simply “service”) should be satisfied by the use of communication through social media. Since 1950, courts have relied upon the same test, regardless of the method used, to determine the sufficiency of service: the Mullane test. Mullane as currently applied, …
Moving Beyond Bitcoin To An Endogenous Theory Of Decentralized Ledger Technology Regulation: An Initial Proposal, Carla L. Reyes
Moving Beyond Bitcoin To An Endogenous Theory Of Decentralized Ledger Technology Regulation: An Initial Proposal, Carla L. Reyes
Faculty Journal Articles and Book Chapters
Current regulation of decentralized ledger technology leaves industry actors in confusion, facing high risk, and confronting significant disincentives to innovate. This Article argues that an endogenous regulatory approach offers an avenue for alleviating these obstacles while still providing sufficient tools for government oversight. In particular, this Article proposes regulation that is endogenous at two levels: first, in that it is created through an iterative, cooperative process involving both regulators and industry actors, and second, that it is implemented as regulation-through-code, that is, regulation written into the code itself. In so doing, this Article also investigates whether successful implementation of such …
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Robert Sprague
Just Cause Discipline For Social Networking In The New Gilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally
Just Cause Discipline For Social Networking In The New Gilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally
William A. Herbert
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start? (With Albert J. Plawinski", Henry H. Perritt Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start? (With Albert J. Plawinski", Henry H. Perritt Jr.
Henry H. Perritt, Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
All Faculty Scholarship
The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.
Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …
Some Key Things Entrepreneurs Need To Know About The Law And Lawyers, Lawrence J. Trautman, Anthony Luppino, Malika S. Simmons
Some Key Things Entrepreneurs Need To Know About The Law And Lawyers, Lawrence J. Trautman, Anthony Luppino, Malika S. Simmons
Lawrence J. Trautman Sr.
New business formation is a powerful economic engine that creates jobs. Diverse legal issues are encountered as a start-up entity approaches formation, initial capitalization and fundraising, arrangements with employees and independent contractors, and relationships with other third parties. The endeavors of a typical start-up in the United States will likely implicate many of the following areas of law: intellectual property; business organizations; tax laws; employment and labor laws; securities regulation; contracts and licensing agreements; commercial sales; debtor-creditor relations; real estate law; health and safety laws/codes; permits and licenses; environmental protection; industry specific regulatory laws and approval processes; tort/personal injury, products …
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Giancarlo Francesco Frosio
In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …
Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman
Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman
Lawrence J. Trautman Sr.
Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …
Mindful Justice: The Search For Gandhi’S Sympathetic State After Bhopal, Nehal A. Patel
Mindful Justice: The Search For Gandhi’S Sympathetic State After Bhopal, Nehal A. Patel
Nehal A. Patel
One of the most startling examples of unmitigated disaster occurred in Bhopal, India, in 1984, when a Union Carbide pesticide plant exploded tons of methyl isocyanate into the air, killing 3800 people overnight. 30 years later, the plant site has not been remediated, and the estimated death toll from the explosion now has reached over 20,000. Disaster victims repeatedly have sought relief directly from the government. Yet, the Indian and US governments and Union Carbide have refused to provide the necessary resources for proper remediation. In this Article, I examine the state’s response to the Bhopal disaster using the thought …
Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest
Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest
Sean Pager
INFRINGEMENT AS UNFAIR COMPETITION: A BLUEPRINT FOR GLOBAL GOVERNANCE?
Sean A. Pager Michigan State University College of Law
Eric Priest University of Oregon School of Law
ABSTRACT
This Article examines a new approach to address persistent regulatory failures in global supply chains. In a series of recent cases, unfair competition actions have been brought in U.S. court against foreign manufacturers who infringe software overseas under the theory that the cost savings from infringement confers an unfair advantage in U.S. markets. While this theory has been advanced in the intellectual property context, the same approach could work to target abuses in …