Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communications Law (22)
- Legislation (14)
- Science and Technology Law (11)
- Administrative Law (10)
- Internet Law (10)
-
- Antitrust and Trade Regulation (6)
- Intellectual Property Law (5)
- Comparative and Foreign Law (4)
- Constitutional Law (4)
- Consumer Protection Law (4)
- Law and Society (4)
- Privacy Law (4)
- Courts (3)
- First Amendment (3)
- Law and Economics (3)
- Law and Race (3)
- Common Law (2)
- Computer Law (2)
- Contracts (2)
- Criminal Law (2)
- International Trade Law (2)
- Labor and Employment Law (2)
- Law Enforcement and Corrections (2)
- Physical Sciences and Mathematics (2)
- Agency (1)
- Air and Space Law (1)
- Civil Rights and Discrimination (1)
- Commercial Law (1)
- Computer Sciences (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 42
Full-Text Articles in Law
Racializing Algorithms, Jessica M. Eaglin
Racializing Algorithms, Jessica M. Eaglin
Articles by Maurer Faculty
There is widespread recognition that algorithms in criminal law’s administration can impose negative racial and social effects. Scholars tend to offer two ways to address this concern through law—tinkering around the tools or abolishing the tools through law and policy. This Article contends that these paradigmatic interventions, though they may center racial disparities, legitimate the way race functions to structure society through the intersection of technology and law. In adopting a theoretical lens centered on racism and the law, it reveals deeply embedded social assumptions about race that propel algorithms as criminal legal reform in response to mass incarceration. It …
Introduction: Digital Transformation Of Government: Towards A Digital Leviathan?, Alfred C. Aman
Introduction: Digital Transformation Of Government: Towards A Digital Leviathan?, Alfred C. Aman
Indiana Journal of Global Legal Studies
A warm welcome to you all. It is a great pleasure to be able to participate in this exciting collaboration between Universidad Carlos III de Madrid (UC3M) and Indiana University—a conference that the Indiana Journal of Global Legal Studies is publishing in celebration of its thirtieth issue. This is a milestone for us, and we could not be happier to celebrate it in this way. Let me begin with a few words about the nature of this journal and its scholarly goals over the years.
The Policy Origins Of Wi-Fi, John Blevins
The Policy Origins Of Wi-Fi, John Blevins
Indiana Law Journal
Wi-Fi technology has become a necessary foundation of modern economic and cultural life. This Article explains its history. Specifically, it argues that Wi-Fi owes its existence and widespread adoption to federal policy choices that have been underexplored in the literature. Wi-Fi’s development is often portrayed as an unexpected and lucky accident following the FCC’s initial decision in the 1980s to allow more unlicensed and experimental uses. This view, however, obscures the more fundamental role that federal policy played. For one, the rise of modern Wi-Fi was the product of a series of policy decisions spanning decades. In addition, the FCC’s …
Layered Fiduciaries In The Information Age, Zhaoyi Li
Layered Fiduciaries In The Information Age, Zhaoyi Li
Indiana Law Journal
Technology companies such as Facebook have long been criticized for abusing customers’ personal information and monetizing user data in a manner contrary to customer expectations. Some commentators suggest fiduciary law could be used to restrict how these companies use their customers’ data.1 Under this framework, a new member of the fiduciary family called the “information fiduciary” was born. The concept of an information fiduciary is that a company providing network services to “collect, analyze, use, sell, and distribute personal information” owes customers and end-users a fiduciary duty to use the collected data to promote their interests, thereby assuming fiduciary liability …
Considering "Machine Testimony": The Impact Of Facial Recognition Software On Eyewitness Identifications, Valena Beety
Considering "Machine Testimony": The Impact Of Facial Recognition Software On Eyewitness Identifications, Valena Beety
Articles by Maurer Faculty
This Article uses a wrongful conviction lens to compare identifications by machines, notably facial recognition software, with identifications by humans. The Article advocates for greater reliability checks on both before use against a criminal defendant. The Article examines the cascading influence of facial recognition software on eyewitness identifications themselves and the related potential for greater errors. As a solution, the Article advocates the inclusion of eyewitness identification in the Organization of Scientific Area Committees' ("OSAC") review of facial recognition software for a more robust examination and consideration of software and its usage. The Article also encourages police departments to adopt …
When Standards Collide With Intellectual Property: Teaching About Standard Setting Organizations, Technology, And Microsoft V. Motorola, Cynthia L. Dahl
When Standards Collide With Intellectual Property: Teaching About Standard Setting Organizations, Technology, And Microsoft V. Motorola, Cynthia L. Dahl
IP Theory
No abstract provided.
Internet Architecture And Disability, Blake Reid
Internet Architecture And Disability, Blake Reid
Indiana Law Journal
The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …
Artificial Creativity: A Case Against Copyright For Ai-Created Visual Artwork, Megan Svedman
Artificial Creativity: A Case Against Copyright For Ai-Created Visual Artwork, Megan Svedman
IP Theory
Artificial intelligence is becoming increasingly complex, and provides examples of compelling, human-like performances. One such artificial intelligence technology is known as Creative Adversarial Network (“CAN”) technology, which relies on inputs of preexisting pieces of art to create pieces of original art that pass as human-made. Whether the coders responsible for CAN-technology should be granted coverage for the resultant art remains an open question in United States jurisprudence. This paper seeks to explore why, given both software’s historical legacy in copyright law and bedrock copyright justifications, extending copyright coverage to the coders responsible for CAN technology would be a grave misstep …
The Noisy "Silent Witness": The Misperception And Misuse Of Criminal Video Evidence, Aaron M. Williams
The Noisy "Silent Witness": The Misperception And Misuse Of Criminal Video Evidence, Aaron M. Williams
Indiana Law Journal
This Note examines recent developments in the research of situational video evidence biases. Part I examines the current and growing body of psychological research into the various situational biases that can affect the reliability of video evidence and the gaps in this research that require further attention from researchers and legal academics. Because these biases do not “operate in a vacuum,” Part I also examines some of the recent and exciting research into the interaction between situational and dispositional biases. Part II examines the development of camera and video processing technology and its limitations as a means of mitigating such …
Protecting Consumers As Sellers, Jim Hawkins
Protecting Consumers As Sellers, Jim Hawkins
Indiana Law Journal
When the majority of modern contract and consumer protection laws were written in the 1950s, ’60s, and ’70s, consumers almost always acted as buyers, and businesses almost always acted as sellers. As a result, these laws reflect a model of strong sellers and weak buyers. But paradigms are shifting. Advances in technology and constraints on consumers’ financial lives have pushed consumers into new roles. Consumers today often act as sellers—hawking gold to make ends meet, peddling durable goods on eBay, or offering services in the sharing economy to make a profit. Consumers and business models have changed, but the laws …
Bitcoin: Order Without Law In The Digital Age, John O. Mcginnis, Kyle Roche
Bitcoin: Order Without Law In The Digital Age, John O. Mcginnis, Kyle Roche
Indiana Law Journal
Modern law makes currency a creature of the state and ultimately the value of its currency depends on the public’s trust in that state. While some nations are more capable than others at instilling public trust in the stability of their monetary institutions, it is nonetheless impossible for any legal system to make the pre-commitments necessary to completely isolate the governance of its money supply from political pressure. This proposition is true not only today, where nearly all government institutions manage their money supply in the form of central banking, but also true of past private banking regimes circulating their …
Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf
Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf
Indiana Law Journal
Since the birth of the concept of a legally recognized right to privacy in Samuel D. Warren and Louis D. Brandeis’ influential 1890 law review article, “The Right to Privacy,” common law—with the aid of influential scholars—has massaged the concept of privacy torts into actionable claims. But now, one of the most innovative technological advancements in recent years, the unmanned aerial vehicle, or drone, has created difficult challenges for plaintiffs and courts navigating common law privacy tort claims.
This Article explores the challenges of prosecution of the specific privacy tort of intrusion upon seclusion involving nongovernmental use of drone technology. …
Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim
Indiana Journal of Global Legal Studies
Since the nineteenth century, privacy concerns have increased with the growth of technology. The invention of instantaneous photography, coupled with the enlarged presence of press, was met with concerns of degraded privacy. Society has formed expectations of privacy, but as time passes, those expectations continue to diminish. Younger generations have been socialized to accept lessened levels of privacy in this digitalized world of mass data and connectivity.
Individual privacy expectations vary globally. The construction of China's government and culture produces a lesser expectation of individual privacy than that of the United States. As outlined in the U.S. Constitution, U.S. citizens …
The New Writs Of Assistance, Ian Samuel
The New Writs Of Assistance, Ian Samuel
Articles by Maurer Faculty
The providers of network services (and the makers of network devices) know an enormous amount about our lives. Because they do, these network intermediaries are being asked with increasing frequency to assist the government in solving crimes or gathering intelligence. Given how much they know about us, if the government can secure the assistance of these intermediaries, it will enjoy a huge increase in its theoretical capacity for surveillance—the ability to learn, in principle, almost anything about anyone. That has the potential to create serious social harm, even assuming that the government continues to adhere to ordinary democratic norms and …
The Death Of Opec? The Displacement Of Saudi Arabia As The World's Swing Producer And The Futility Of An Output Freeze, Christopher Hanewald
The Death Of Opec? The Displacement Of Saudi Arabia As The World's Swing Producer And The Futility Of An Output Freeze, Christopher Hanewald
Indiana Journal of Global Legal Studies
On November 27, 2014, the Organization of Petroleum Exporting Countries met in Vienna and adopted a bold stance against increasing supply from beyond the reach of the cartel. Rather than reduce their own production, the cartel decided to allow market forces to dictate the price of a barrel of oil. By doing this, Saudi Arabia-the de-facto leader of the cartel-made a bet that the burgeoning shale gas industry within the United States would be unable to cope with a sharp fall in the price of oil. Over the course of the following two years, the U.S. energy sector-aided by further …
Frand's Forever: Standards, Patent Transfers, And Licensing Commitments, Jay P. Kesan, Carol M. Hayes
Frand's Forever: Standards, Patent Transfers, And Licensing Commitments, Jay P. Kesan, Carol M. Hayes
Indiana Law Journal
No abstract provided.
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn
Federal Communications Law Journal
Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.
In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …
The Future Of Digital Communications Research And Policy, Scott Wallsten
The Future Of Digital Communications Research And Policy, Scott Wallsten
Federal Communications Law Journal
Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.
Examining The Fcc's Indecency Regulations In Light Of Today's Technology, Elizabeth H. Steele
Examining The Fcc's Indecency Regulations In Light Of Today's Technology, Elizabeth H. Steele
Federal Communications Law Journal
Indecency regulations promulgated by the FCC used to be effective, but today's technological advances call those regulations into question. With the prevalence of digital video recorders and the availability of television shows on the Internet, children have unprecedented access to material broadcast at all times of day. As a result, the "safe harbor" rationale restricting the broadcast of indecent material no longer makes sense. A move toward deregulation is the most logical step to take, as it would prevent any First Amendment violations and would allow the networks freedom to broadcast material that the public may be interested in without …
Communicating During Emergencies: Toward Interoperability And Effective Information Management, Philip J. Weiser
Communicating During Emergencies: Toward Interoperability And Effective Information Management, Philip J. Weiser
Federal Communications Law Journal
Symposium: The Crisis in Public Safety Communications. Held at the Mercatus Center at George Mason University, December 8, 2006.
To change the culture and realities of public safety communications, this Article calls on policymakers to develop a new architecture for the use of information and communications technologies and provide a framework for leadership to transition to a next generation system for public safety communications. Such a culture change would include not only an embrace of new technologies, but a new framework for technology leadership--at the state or regional level-that spurs decision making in a coordinated fashion (and not through ad …
No Sight Like Hindsight: The 1996 Act And The View Ten Years Later, Donna N. Lampert
No Sight Like Hindsight: The 1996 Act And The View Ten Years Later, Donna N. Lampert
Federal Communications Law Journal
No abstract provided.
Looking Backwards And Looking Forwards In Contemplating The Next Rewrite Of The Communications Act, Johannes M. Bauer, Steven S. Wildman
Looking Backwards And Looking Forwards In Contemplating The Next Rewrite Of The Communications Act, Johannes M. Bauer, Steven S. Wildman
Federal Communications Law Journal
No abstract provided.
Swallows, Sausages, And The 1996 Act, Daniel B. Phythyon
Swallows, Sausages, And The 1996 Act, Daniel B. Phythyon
Federal Communications Law Journal
No abstract provided.
Politics And Telecommunications, Larry Pressler
Politics And Telecommunications, Larry Pressler
Federal Communications Law Journal
No abstract provided.
Securing The Freedom Of The Communications Revolution, Michael K. Powell
Securing The Freedom Of The Communications Revolution, Michael K. Powell
Federal Communications Law Journal
No abstract provided.
Four More Years... Of The Status Quo? How Simple Principles Can Lead Us Out Of The Regulatory Wilderness, Adam Thierer
Four More Years... Of The Status Quo? How Simple Principles Can Lead Us Out Of The Regulatory Wilderness, Adam Thierer
Federal Communications Law Journal
No abstract provided.
Employment In The New Age Of Trade And Technology: Implications For Labor And Employment Law, Kenneth G. Dau-Schmidt
Employment In The New Age Of Trade And Technology: Implications For Labor And Employment Law, Kenneth G. Dau-Schmidt
Indiana Law Journal
Symposium: New Rules for a New Game: Regulating Employment Relationships in the 21st Century, held at the Indiana University School of Law-Bloomington.
Equality In The Information Age, William E. Kennard
Equality In The Information Age, William E. Kennard
Federal Communications Law Journal
Forum: New Approaches to Minority Media Ownership, Columbia Institute for Tele-Information, Columbia University.
Judicial Intervention In A Twenty-First Century Republic: Shuffling Deck Chairs On The Titanic?, Kristofor J. Hammond
Judicial Intervention In A Twenty-First Century Republic: Shuffling Deck Chairs On The Titanic?, Kristofor J. Hammond
Indiana Law Journal
No abstract provided.
To Net Or Not To Net: Singapore’S Regulation Of The Internet, Sarah B. Hogan
To Net Or Not To Net: Singapore’S Regulation Of The Internet, Sarah B. Hogan
Federal Communications Law Journal
Internet access has become almost commonplace, as has the unfettered exchange of ideas through cyberspace. Several nations, Singapore among them, have attempted to control their citizens’ Internet access in order to preserve and protect a desired national culture. A brief overview of the technological means of Internet censorship reveals a hidden truth: If Singapore truly wishes to become the technological giant of the East, the government will have to sacrifice its desire to control Internet content.