Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 42

Full-Text Articles in Law

Racializing Algorithms, Jessica M. Eaglin Jun 2023

Racializing Algorithms, Jessica M. Eaglin

Articles by Maurer Faculty

There is widespread recognition that algorithms in criminal law’s administration can impose negative racial and social effects. Scholars tend to offer two ways to address this concern through law—tinkering around the tools or abolishing the tools through law and policy. This Article contends that these paradigmatic interventions, though they may center racial disparities, legitimate the way race functions to structure society through the intersection of technology and law. In adopting a theoretical lens centered on racism and the law, it reveals deeply embedded social assumptions about race that propel algorithms as criminal legal reform in response to mass incarceration. It …


Introduction: Digital Transformation Of Government: Towards A Digital Leviathan?, Alfred C. Aman Jan 2023

Introduction: Digital Transformation Of Government: Towards A Digital Leviathan?, Alfred C. Aman

Indiana Journal of Global Legal Studies

A warm welcome to you all. It is a great pleasure to be able to participate in this exciting collaboration between Universidad Carlos III de Madrid (UC3M) and Indiana University—a conference that the Indiana Journal of Global Legal Studies is publishing in celebration of its thirtieth issue. This is a milestone for us, and we could not be happier to celebrate it in this way. Let me begin with a few words about the nature of this journal and its scholarly goals over the years.


The Policy Origins Of Wi-Fi, John Blevins Jan 2023

The Policy Origins Of Wi-Fi, John Blevins

Indiana Law Journal

Wi-Fi technology has become a necessary foundation of modern economic and cultural life. This Article explains its history. Specifically, it argues that Wi-Fi owes its existence and widespread adoption to federal policy choices that have been underexplored in the literature. Wi-Fi’s development is often portrayed as an unexpected and lucky accident following the FCC’s initial decision in the 1980s to allow more unlicensed and experimental uses. This view, however, obscures the more fundamental role that federal policy played. For one, the rise of modern Wi-Fi was the product of a series of policy decisions spanning decades. In addition, the FCC’s …


Layered Fiduciaries In The Information Age, Zhaoyi Li Jan 2023

Layered Fiduciaries In The Information Age, Zhaoyi Li

Indiana Law Journal

Technology companies such as Facebook have long been criticized for abusing customers’ personal information and monetizing user data in a manner contrary to customer expectations. Some commentators suggest fiduciary law could be used to restrict how these companies use their customers’ data.1 Under this framework, a new member of the fiduciary family called the “information fiduciary” was born. The concept of an information fiduciary is that a company providing network services to “collect, analyze, use, sell, and distribute personal information” owes customers and end-users a fiduciary duty to use the collected data to promote their interests, thereby assuming fiduciary liability …


Considering "Machine Testimony": The Impact Of Facial Recognition Software On Eyewitness Identifications, Valena Beety Jan 2022

Considering "Machine Testimony": The Impact Of Facial Recognition Software On Eyewitness Identifications, Valena Beety

Articles by Maurer Faculty

This Article uses a wrongful conviction lens to compare identifications by machines, notably facial recognition software, with identifications by humans. The Article advocates for greater reliability checks on both before use against a criminal defendant. The Article examines the cascading influence of facial recognition software on eyewitness identifications themselves and the related potential for greater errors. As a solution, the Article advocates the inclusion of eyewitness identification in the Organization of Scientific Area Committees' ("OSAC") review of facial recognition software for a more robust examination and consideration of software and its usage. The Article also encourages police departments to adopt …


When Standards Collide With Intellectual Property: Teaching About Standard Setting Organizations, Technology, And Microsoft V. Motorola, Cynthia L. Dahl Jul 2020

When Standards Collide With Intellectual Property: Teaching About Standard Setting Organizations, Technology, And Microsoft V. Motorola, Cynthia L. Dahl

IP Theory

No abstract provided.


Internet Architecture And Disability, Blake Reid Apr 2020

Internet Architecture And Disability, Blake Reid

Indiana Law Journal

The Internet is essential for education, employment, information, and cultural and democratic participation. For tens of millions of people with disabilities in the United States, barriers to accessing the Internet—including the visual presentation of information to people who are blind or visually impaired, the aural presentation of information to people who are deaf or hard of hearing, and the persistence of Internet technology, interfaces, and content without regard to prohibitive cognitive load for people with cognitive and intellectual disabilities—collectively pose one of the most significant civil rights issues of the information age. Yet disability law lacks a comprehensive theoretical approach …


Artificial Creativity: A Case Against Copyright For Ai-Created Visual Artwork, Megan Svedman Jan 2020

Artificial Creativity: A Case Against Copyright For Ai-Created Visual Artwork, Megan Svedman

IP Theory

Artificial intelligence is becoming increasingly complex, and provides examples of compelling, human-like performances. One such artificial intelligence technology is known as Creative Adversarial Network (“CAN”) technology, which relies on inputs of preexisting pieces of art to create pieces of original art that pass as human-made. Whether the coders responsible for CAN-technology should be granted coverage for the resultant art remains an open question in United States jurisprudence. This paper seeks to explore why, given both software’s historical legacy in copyright law and bedrock copyright justifications, extending copyright coverage to the coders responsible for CAN technology would be a grave misstep …


The Noisy "Silent Witness": The Misperception And Misuse Of Criminal Video Evidence, Aaron M. Williams Oct 2019

The Noisy "Silent Witness": The Misperception And Misuse Of Criminal Video Evidence, Aaron M. Williams

Indiana Law Journal

This Note examines recent developments in the research of situational video evidence biases. Part I examines the current and growing body of psychological research into the various situational biases that can affect the reliability of video evidence and the gaps in this research that require further attention from researchers and legal academics. Because these biases do not “operate in a vacuum,” Part I also examines some of the recent and exciting research into the interaction between situational and dispositional biases. Part II examines the development of camera and video processing technology and its limitations as a means of mitigating such …


Protecting Consumers As Sellers, Jim Hawkins Oct 2019

Protecting Consumers As Sellers, Jim Hawkins

Indiana Law Journal

When the majority of modern contract and consumer protection laws were written in the 1950s, ’60s, and ’70s, consumers almost always acted as buyers, and businesses almost always acted as sellers. As a result, these laws reflect a model of strong sellers and weak buyers. But paradigms are shifting. Advances in technology and constraints on consumers’ financial lives have pushed consumers into new roles. Consumers today often act as sellers—hawking gold to make ends meet, peddling durable goods on eBay, or offering services in the sharing economy to make a profit. Consumers and business models have changed, but the laws …


Bitcoin: Order Without Law In The Digital Age, John O. Mcginnis, Kyle Roche Oct 2019

Bitcoin: Order Without Law In The Digital Age, John O. Mcginnis, Kyle Roche

Indiana Law Journal

Modern law makes currency a creature of the state and ultimately the value of its currency depends on the public’s trust in that state. While some nations are more capable than others at instilling public trust in the stability of their monetary institutions, it is nonetheless impossible for any legal system to make the pre-commitments necessary to completely isolate the governance of its money supply from political pressure. This proposition is true not only today, where nearly all government institutions manage their money supply in the form of central banking, but also true of past private banking regimes circulating their …


Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf Jul 2019

Drone Invasion: Unmanned Aerial Vehicles And The Right To Privacy, Rebecca L. Scharf

Indiana Law Journal

Since the birth of the concept of a legally recognized right to privacy in Samuel D. Warren and Louis D. Brandeis’ influential 1890 law review article, “The Right to Privacy,” common law—with the aid of influential scholars—has massaged the concept of privacy torts into actionable claims. But now, one of the most innovative technological advancements in recent years, the unmanned aerial vehicle, or drone, has created difficult challenges for plaintiffs and courts navigating common law privacy tort claims.

This Article explores the challenges of prosecution of the specific privacy tort of intrusion upon seclusion involving nongovernmental use of drone technology. …


Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim Feb 2019

Younger Generations Are Infected By Continuous Socialization To Accept Diminished Privacy: A Global Analysis Of How The United States' Constitutional Doctrine Is A Main Contributor To Eroded Privacy, Tiffany Kim

Indiana Journal of Global Legal Studies

Since the nineteenth century, privacy concerns have increased with the growth of technology. The invention of instantaneous photography, coupled with the enlarged presence of press, was met with concerns of degraded privacy. Society has formed expectations of privacy, but as time passes, those expectations continue to diminish. Younger generations have been socialized to accept lessened levels of privacy in this digitalized world of mass data and connectivity.

Individual privacy expectations vary globally. The construction of China's government and culture produces a lesser expectation of individual privacy than that of the United States. As outlined in the U.S. Constitution, U.S. citizens …


The New Writs Of Assistance, Ian Samuel Jan 2018

The New Writs Of Assistance, Ian Samuel

Articles by Maurer Faculty

The providers of network services (and the makers of network devices) know an enormous amount about our lives. Because they do, these network intermediaries are being asked with increasing frequency to assist the government in solving crimes or gathering intelligence. Given how much they know about us, if the government can secure the assistance of these intermediaries, it will enjoy a huge increase in its theoretical capacity for surveillance—the ability to learn, in principle, almost anything about anyone. That has the potential to create serious social harm, even assuming that the government continues to adhere to ordinary democratic norms and …


The Death Of Opec? The Displacement Of Saudi Arabia As The World's Swing Producer And The Futility Of An Output Freeze, Christopher Hanewald Feb 2017

The Death Of Opec? The Displacement Of Saudi Arabia As The World's Swing Producer And The Futility Of An Output Freeze, Christopher Hanewald

Indiana Journal of Global Legal Studies

On November 27, 2014, the Organization of Petroleum Exporting Countries met in Vienna and adopted a bold stance against increasing supply from beyond the reach of the cartel. Rather than reduce their own production, the cartel decided to allow market forces to dictate the price of a barrel of oil. By doing this, Saudi Arabia-the de-facto leader of the cartel-made a bet that the burgeoning shale gas industry within the United States would be unable to cope with a sharp fall in the price of oil. Over the course of the following two years, the U.S. energy sector-aided by further …


Frand's Forever: Standards, Patent Transfers, And Licensing Commitments, Jay P. Kesan, Carol M. Hayes Jan 2014

Frand's Forever: Standards, Patent Transfers, And Licensing Commitments, Jay P. Kesan, Carol M. Hayes

Indiana Law Journal

No abstract provided.


Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn Mar 2011

Resilience: Building Better Users And Fair Trade Practices In Information, Andrea M. Matwyshyn

Federal Communications Law Journal

Symposium: Rough Consensus and Running Code: Integrating Engineering Principles into Internet Policy Debates, held at the University of Pennsylvania's Center for Technology Innovation and Competition on May 6-7, 2010.

In the discourse on communications and new media policy, the average consumer-the user-is frequently eliminated from the equation. This Article presents an argument rooted in developmental psychology theory regarding the ways that users interact with technology and the resulting implications for data privacy law. Arguing in favor of a user-centric construction of policy and law, the Author introduces the concept of resilience. The concept of resilience has long been discussed in …


The Future Of Digital Communications Research And Policy, Scott Wallsten Dec 2010

The Future Of Digital Communications Research And Policy, Scott Wallsten

Federal Communications Law Journal

Symposium: Essays from Time Warner Cable's Research Program on Digital Communications.


Examining The Fcc's Indecency Regulations In Light Of Today's Technology, Elizabeth H. Steele Dec 2010

Examining The Fcc's Indecency Regulations In Light Of Today's Technology, Elizabeth H. Steele

Federal Communications Law Journal

Indecency regulations promulgated by the FCC used to be effective, but today's technological advances call those regulations into question. With the prevalence of digital video recorders and the availability of television shows on the Internet, children have unprecedented access to material broadcast at all times of day. As a result, the "safe harbor" rationale restricting the broadcast of indecent material no longer makes sense. A move toward deregulation is the most logical step to take, as it would prevent any First Amendment violations and would allow the networks freedom to broadcast material that the public may be interested in without …


Communicating During Emergencies: Toward Interoperability And Effective Information Management, Philip J. Weiser Jun 2007

Communicating During Emergencies: Toward Interoperability And Effective Information Management, Philip J. Weiser

Federal Communications Law Journal

Symposium: The Crisis in Public Safety Communications. Held at the Mercatus Center at George Mason University, December 8, 2006.

To change the culture and realities of public safety communications, this Article calls on policymakers to develop a new architecture for the use of information and communications technologies and provide a framework for leadership to transition to a next generation system for public safety communications. Such a culture change would include not only an embrace of new technologies, but a new framework for technology leadership--at the state or regional level-that spurs decision making in a coordinated fashion (and not through ad …


No Sight Like Hindsight: The 1996 Act And The View Ten Years Later, Donna N. Lampert Jun 2006

No Sight Like Hindsight: The 1996 Act And The View Ten Years Later, Donna N. Lampert

Federal Communications Law Journal

No abstract provided.


Looking Backwards And Looking Forwards In Contemplating The Next Rewrite Of The Communications Act, Johannes M. Bauer, Steven S. Wildman Jun 2006

Looking Backwards And Looking Forwards In Contemplating The Next Rewrite Of The Communications Act, Johannes M. Bauer, Steven S. Wildman

Federal Communications Law Journal

No abstract provided.


Swallows, Sausages, And The 1996 Act, Daniel B. Phythyon Jun 2006

Swallows, Sausages, And The 1996 Act, Daniel B. Phythyon

Federal Communications Law Journal

No abstract provided.


Politics And Telecommunications, Larry Pressler Jun 2006

Politics And Telecommunications, Larry Pressler

Federal Communications Law Journal

No abstract provided.


Securing The Freedom Of The Communications Revolution, Michael K. Powell May 2005

Securing The Freedom Of The Communications Revolution, Michael K. Powell

Federal Communications Law Journal

No abstract provided.


Four More Years... Of The Status Quo? How Simple Principles Can Lead Us Out Of The Regulatory Wilderness, Adam Thierer Mar 2005

Four More Years... Of The Status Quo? How Simple Principles Can Lead Us Out Of The Regulatory Wilderness, Adam Thierer

Federal Communications Law Journal

No abstract provided.


Employment In The New Age Of Trade And Technology: Implications For Labor And Employment Law, Kenneth G. Dau-Schmidt Jan 2001

Employment In The New Age Of Trade And Technology: Implications For Labor And Employment Law, Kenneth G. Dau-Schmidt

Indiana Law Journal

Symposium: New Rules for a New Game: Regulating Employment Relationships in the 21st Century, held at the Indiana University School of Law-Bloomington.


Equality In The Information Age, William E. Kennard May 1999

Equality In The Information Age, William E. Kennard

Federal Communications Law Journal

Forum: New Approaches to Minority Media Ownership, Columbia Institute for Tele-Information, Columbia University.


Judicial Intervention In A Twenty-First Century Republic: Shuffling Deck Chairs On The Titanic?, Kristofor J. Hammond Apr 1999

Judicial Intervention In A Twenty-First Century Republic: Shuffling Deck Chairs On The Titanic?, Kristofor J. Hammond

Indiana Law Journal

No abstract provided.


To Net Or Not To Net: Singapore’S Regulation Of The Internet, Sarah B. Hogan Mar 1999

To Net Or Not To Net: Singapore’S Regulation Of The Internet, Sarah B. Hogan

Federal Communications Law Journal

Internet access has become almost commonplace, as has the unfettered exchange of ideas through cyberspace. Several nations, Singapore among them, have attempted to control their citizens’ Internet access in order to preserve and protect a desired national culture. A brief overview of the technological means of Internet censorship reveals a hidden truth: If Singapore truly wishes to become the technological giant of the East, the government will have to sacrifice its desire to control Internet content.