Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

SelectedWorks

Technology

Discipline
Publication Year
Publication
File Type

Articles 1 - 30 of 50

Full-Text Articles in Law

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio Sep 2015

Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio

Giancarlo Francesco Frosio

In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …


Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman Sep 2015

Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …


The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer Nov 2014

The Internet Of Things And Wearable Technology: Addressing Privacy And Security Concerns Without Derailing Innovation, Adam D. Thierer

Adam Thierer

This paper highlights some of the opportunities presented by the rise of the so-called “Internet of Things” and wearable technology in particular, and encourages policymakers to allow these technologies to develop in a relatively unabated fashion. As with other new and highly disruptive digital technologies, however, the Internet of Things and wearable tech will challenge existing social, economic, and legal norms. In particular, these technologies raise a variety of privacy and safety concerns. Other technical barriers exist that could hold back IoT and wearable tech — including disputes over technical standards, system interoperability, and access to adequate spectrum to facilitate …


Practice Lean! Implementing Technology-Driven Lean Six Sigma In A Law Firm, Frank A. Urbanic Nov 2014

Practice Lean! Implementing Technology-Driven Lean Six Sigma In A Law Firm, Frank A. Urbanic

frank a urbanic

No abstract provided.


Litigation Technology For The Modern Practitioner, Jonathan H. Lomurro Esq. Llm, Christopher T. Campbell Esq, Matthew K. Blaine Esq, Stephanie L. Lomurro Esq, Christina V. Harvey Esq Aug 2014

Litigation Technology For The Modern Practitioner, Jonathan H. Lomurro Esq. Llm, Christopher T. Campbell Esq, Matthew K. Blaine Esq, Stephanie L. Lomurro Esq, Christina V. Harvey Esq

Jonathan H. Lomurro Esq. LLM

No abstract provided.


Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander Jun 2014

Commodification Of The Female Egg: Stem Cell Technology And The Future, Rachel Rose Ostrander

Rachel Rose Ostrander

As the science of stem cell research progresses it is difficult to tell what implications it will have on our society and for women. I will begin this discussion by examining how science has viewed women in the past, and use this as a basis to conjecture about how they will be viewed and treated in the future. Prevalent gender bias in scientific writing should be a cause for concern as the science of stem cell research and commodification of the female egg becomes more of a reality.

The process of egg donation has stirred much debate in the feminist …


Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean Feb 2014

Back To The Future: The Constitution Requires Reasonableness And Particularity—Introducing The “Seize But Don’T Search” Doctrine, Adam Lamparello, Charles E. Maclean

Adam Lamparello

Issuing one-hundred or fewer opinions per year, the United States Supreme Court cannot keep pace with opinions that match technological advancement. As a result, in Riley v. California and United States v. Wurie, the Court needs to announce a broader principle that protects privacy in the digital age. That principle, what we call “seize but don’t search,” recognizes that the constitutional touchstone for all searches is reasonableness.

When do present-day circumstances—the evolution in the Government’s surveillance capabilities, citizens’ phone habits, and the relationship between the NSA and telecom companies—become so thoroughly unlike those considered by the Supreme Court thirty-four years …


Aereo's Errors, Ira Steven Nathenson Jan 2014

Aereo's Errors, Ira Steven Nathenson

Ira Steven Nathenson

This article scrutinizes the many troubling errors made by the United States Supreme Court in its decision in American Broadcasting Companies, Inc. v. Aereo, Inc. Aereo’s streaming television service allowed subscribers to watch broadcast television on a computer, tablet, or smartphone without requiring them to be directly connected to cable, satellite, or a local antenna. Aereo’s system was designed to comply with existing copyright law by using thousands of antennas, each of which was designated for only one subscriber at a time. Aereo was sued for copyright infringement by a number of leading television broadcasters. The United States Supreme Court, …


Rebuttable Presumption Of Public Interest In Protecting The Public Health—The Necessity For Denying Injunctive Relief In Medically Related Patent Infringement Cases After Ebay V. Mercexchange, Lance E. Wyatt Jr. Jan 2014

Rebuttable Presumption Of Public Interest In Protecting The Public Health—The Necessity For Denying Injunctive Relief In Medically Related Patent Infringement Cases After Ebay V. Mercexchange, Lance E. Wyatt Jr.

Lance E Wyatt Jr.

The public’s interest in medicine and good health is substantial. However, this interest is harmed when important medical devices or pharmaceuticals, although infringing on valid patents, are suddenly taken off the market after a court grants a permanent injunction. While permanent injunctions were automatically granted by the Federal Circuit before the Supreme Court’s holding in eBay v. MercExchange, courts now have more discretion to deny injunctive relief. Now that courts have this newfound discretion after eBay, the public should no longer expect to be harmed by the sudden removal of medical supplies. Unfortunately, this has not been the course that …


Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner Sep 2013

Lawyering In The Shadow Of Data, Dru Stevenson, Nicholas J. Wagoner

Dru Stevenson

Attorney bargaining has traditionally taken place in the shadow of trial, as litigants alter their pretrial behavior—including their willingness to negotiate a settlement – based on perceptions of likely outcomes at trial and anticipated litigation costs. Lawyers practicing in the shadow of trial have, in turn, traditionally formed their perception of the likely outcome at trial based on their knowledge of case precedents, intuition, and previous interactions with the presiding judge and opposing counsel in similar cases. Today, however, technology for leveraging legal data is moving the practice of law into the shadow of the trends and patterns observable in …


Welcome To The Amazon: Leading Online Retail From Local Tax Avoidance Into Your Backyard, Sherry Tehrani Aug 2013

Welcome To The Amazon: Leading Online Retail From Local Tax Avoidance Into Your Backyard, Sherry Tehrani

Sherry Tehrani

Online sales in the United States have increased by over 250 percent in the last ten years, reaching over 250 billion dollars in 2012.[1] Spearheaded by Amazon.com, Inc. (“Amazon”), online retailers have fed off their competitive advantage of avoiding local sales tax, and have grown to capture roughly 7 percent of the retail market.[2] The juxtaposition of this upsurge of untaxed online sales and our nationwide recession has prompted state governments with crushing deficits to take on the tax loophole.

Local governments across the U.S. have passed legislation to enforce online sales tax collection, referred to as “Amazon …


Contextual Expectations Of Privacy, Andrew Selbst Feb 2013

Contextual Expectations Of Privacy, Andrew Selbst

Andrew Selbst

Fourth Amendment search jurisprudence is nominally based on a “reasonable expectation of privacy,” but actual doctrine is detached from society’s conception of privacy. Courts rely on various binary distinctions: Is a piece of information secret or not? Was the observed conduct inside or outside? While often convenient, none of these binary distinctions can adequately capture the complicated range of ideas encompassed by “privacy.” Privacy theorists have begun to understand that a consideration of social context is essential to a full understanding of privacy. Helen Nissenbaum’s theory of contextual integrity, which characterizes a right to privacy as the preservation of expected …


Sue My Car Not Me: Products Liability And Accidents Involving Autonomous Vehicles, Jeffrey K. Gurney Jan 2013

Sue My Car Not Me: Products Liability And Accidents Involving Autonomous Vehicles, Jeffrey K. Gurney

Jeffrey K Gurney

Autonomous vehicles will revolutionize society within the decade. These cars will cause accidents. Tort liability, however, is not ready for the introduction of autonomous vehicles, and, thus, liability will not be assessed to the party that is responsible for the accident. This Article addresses the liability of autonomous vehicle by examining products liability through the use of four scenarios: the Distracted Driver; the Diminished Capabilities Driver; the Disabled Driver; and the Attentive Driver.Based on those scenarios, this Article argues that the autonomous technology manufacturer should be liable for accidents while the vehicle is in autonomous mode. This Article suggests that …


Watch The World "Burn": Copyright, Micropatent And The Emergence Of 3d Printing, Matthew A. Susson Jan 2013

Watch The World "Burn": Copyright, Micropatent And The Emergence Of 3d Printing, Matthew A. Susson

Matthew A Susson

Where the Industrial Revolution introduced the notion of mass production of goods — and thereby upended previous economic models — 3D printing now “makes it as cheap to create single items as it is to produce thousands,” which “may have as profound an impact on the world as the coming of the factory did.” In short, a new fabrication revolution is coming.

3D printing is, put simply, a technology that allows one to transform a digital file into a physical product — in other words, we can now print actual objects. Technology that allows users to manufacture complex objects at …


Law Practice Technology: A Law School Course?, Charles H. Oates Oct 2012

Law Practice Technology: A Law School Course?, Charles H. Oates

Charles H Oates

Technology is transforming the practice of law, but law schools are being left behind. Until relatively recently and only to a very limited extent, law school curricula have not reflected the revolutionary changes in the ways that technology is altering the practice of law. Today’s law students, unlike their predecessors, are comfortable with technology, but anxious about entering a severely competitive profession. For most lawyers, economic survival will depend upon their ability to utilize technology to maximize efficiencies and comply with court-mandated applications of technology. With the pervasiveness of technology in all areas of law practice today, a course in …


The Court Misses The Point Again In United States V. Jones: An Opt-In Model For Privacy Protection In A Post Google-Earth World, Mary G. Leary Mar 2012

The Court Misses The Point Again In United States V. Jones: An Opt-In Model For Privacy Protection In A Post Google-Earth World, Mary G. Leary

Mary G Leary

“Nothing is private anymore.” This is an oft repeated sentiment by many Americans, not to mention the focus of judicial confusion and legislative blustering. In the wake of publicly available technologies such as Google Earth, internet tracking, cell phone triangulation, to name just a few, many people feel unable to prevent the government or anyone from obtaining private information. While this may seem simply a function of a modern world, this reality creates a fundamental problem for Fourth Amendment jurisprudence which has heretofore gone unrecognized. The Fourth Amendment protects citizens from unreasonable searches and seizures. Therefore, in order for the …


“Technopanics, Threat Inflation, And The Danger Of An Information Technology Precautionary Principle”, Adam Thierer Mar 2012

“Technopanics, Threat Inflation, And The Danger Of An Information Technology Precautionary Principle”, Adam Thierer

Adam Thierer

Fear is an extremely powerful motivational force. In public policy debates, appeals to fear are often used in an attempt to sway opinion or bolster the case for action. Such appeals are used to convince citizens that threats to individual or social wellbeing may be avoided only if specific steps are taken. Often these steps take the form of anticipatory regulation based on the precautionary principle.

Such “fear appeal arguments” are frequently on display in the Internet policy arena and often take the form of a full-blown “moral panic” or “technopanic.” These panics are intense public, political, and academic responses …


Illuminating Innovation, Lea B. Shaver Mar 2012

Illuminating Innovation, Lea B. Shaver

Lea Shaver

The central justification offered for patent protection is the need to incentivize technological innovation. Yet to date there is little empirical evidence that this aim is achieved. This Article argues that historical case studies, exploring the impact of patent law on particular fields of technological innovation, can be especially helpful in providing an empirical foundation for patent scholarship. The Article then proceeds to offer one such case study, focused on one of the most important technological revolutions of the past two centuries: electrification. Although Thomas Edison and “the incandescent lamp” have been extensively studied, so far no one has asked …


Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil Jan 2012

Understanding 'The Loop': Regulating The Next Generation Of War Machines, William Marra, Sonia Mcneil

William Marra

The United States is in the midst of a national debate about the role drone aircraft should play in warfare abroad and law enforcement at home. Armed drones hunt enemies abroad 24 hours a day, seven days a week. Drones have begun to patrol our domestic skies too, on the lookout for suspicious activity. But contemporary drones are merely the “Model T” of robot technology. Today, humans are still very much “in the loop”: humans decide when to launch a drone, where it should fly, and whether it should take action against a suspect. But as drones develop greater autonomy, …


Freedom Of Contract In An Augmented Reality: The Case Of Consumer Contracts, Scott Peppet Aug 2011

Freedom Of Contract In An Augmented Reality: The Case Of Consumer Contracts, Scott Peppet

Scott Peppet

This Article argues that freedom of contract will take on different meaning in a world in which ubiquitous information about places, goods, people, firms and contract terms is available to contracting parties anywhere, any time. In particular, our increasingly “augmented reality” calls into question leading justifications for distrusting consumer contracts—and thereby strengthens traditional understandings of freedom of contract as enforcing contracts as written. This is largely a descriptive and predictive argument: the Article aims to introduce contract law to these technologies and consider their most likely effects. It certainly has normative implications, however. Given that the vast majority of consumer …


The Economics Of Horizontal Government Cooperation (Working Paper), Matthew R. Dalsanto Ph.D. Apr 2011

The Economics Of Horizontal Government Cooperation (Working Paper), Matthew R. Dalsanto Ph.D.

Matthew R. DalSanto, Ph.D.

This paper analyzes the ability of intrastate and interstate cooperative agreements to either minimize or capitalize on interjurisdictional externalities. These agreements are commonly referred to as compacts or joint powers agreements (intrastate compacts). The compact mechanism allows regional governments to enter into contractual agreements with one another to coordinate policy choices and to engage in cooperative endeavors. Given the inter-jurisdictional nature of the issues that affect horizontally situated governments, this mechanism is a powerful tool to achieve welfare-enhancing outcomes for citizens.

A review of the legal case law surrounding compacts is conducted to analyze the legal properties from an economic …


Information Overload, Multi-Tasking, And The Socially Networked Jury: Why Prosecutors Should Approach The Media Gingerly, Andrew Taslitz Feb 2011

Information Overload, Multi-Tasking, And The Socially Networked Jury: Why Prosecutors Should Approach The Media Gingerly, Andrew Taslitz

Andrew E. Taslitz

Abstract The rise of computer technology, the internet, rapid news dissemination, multi-tasking, and social networking have wrought changes in human psychology that alter how we process news media. More specifically, news coverage of high-profile trials necessarily focuses on emotionally-overwrought, attention-grabbing information disseminated to a public having little ability to process that information critically. The public’s capacity for empathy is likewise reduced, making it harder for trial processes to overcome the unfair prejudice created by the high-profile trial. Market forces magnify these changes. Free speech concerns limit the ability of the law to alter media coverage directly, and the tools available …


The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti Jan 2011

The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti

Corey A Ciocchetti

In the midst of massive government involvement in the financial, real estate and automotive sectors, other important problems linger without sufficient governmental attention. This article focuses on one area where federal intervention has been particularly absent - the realm of individual privacy in the Information Age. The problem is that monitoring in the United States is increasingly powerful and takes many forms. Online, prominent Web sites collect, store and disseminate a great deal of personally identifying information (PII) without clearly and simply informing users. This is the case even though such notice is cheap and can be effective. Offline, technology …


Water, Climate, And Energy Security, Prof. Elizabeth Burleson Jan 2011

Water, Climate, And Energy Security, Prof. Elizabeth Burleson

Prof. Elizabeth Burleson

Civil society participation can facilitate sound energy, climate, and water governance. This article analyzes the dynamics of transnational decision-making. Part II discusses sound energy strategy in light of a shrinking water-resources base due to climate change. Part III considers how public participation in international decision-making can sustain trust in governments and strengthen the legitimacy of legal decisions. Part IV concludes that process and outcome are both integral to addressing water, climate, and energy challenges.


Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew J. King-Ries Aug 2010

Teens, Technology, And Cyberstalking: The Domestic Violence Wave Of The Future?, Andrew J. King-Ries

Andrew J King-Ries

While the legal system has made progress in combating domestic violence in the last 30 years, this progress is threatened by the intersection of two recent developments: teenagers normalizing unhealthy relationship patterns through pervasive use of technology and law enforcement’s inability to adequately respond to cyberstalking. The combination of these trends suggests America is producing a new generation of domestic violence batterers.

Recent studies document extensive use of technology—email, texts, social networking—by teenagers in their intimate relationships. Teenagers’ use of technology in their dating relationships often mimics relationship patterns present in violent adult relationships. Teenagers appear to be normalizing unhealthy …


Barricading The Digital Frontier: Copyright, Technology And The War On Music Piracy, Benjamin Gibert Aug 2010

Barricading The Digital Frontier: Copyright, Technology And The War On Music Piracy, Benjamin Gibert

Benjamin Gibert

The Internet is changing the way vast numbers of people experience culture today. Providing tools to interact with, manipulate and freely redistribute content, technology is dissolving conventional divisions between creators and consumers of cultural artefacts. As new technological and legislative mechanisms are deployed to stop digital piracy, there is a need to reflect on the meaning of copyright, piracy and culture in the context of digital technologies. This paper discusses the relationship between copyright and cultural participation. It refers to the music industry in order to depict the changing patterns of consumption behavior precipitated by the rise of digital networks …


Fighting Homogenization: The Global Infiltration Of Technology And The Struggle To Preserve Cultural Distinctiveness., Saptarishi Bandopadhyay Apr 2010

Fighting Homogenization: The Global Infiltration Of Technology And The Struggle To Preserve Cultural Distinctiveness., Saptarishi Bandopadhyay

Saptarishi Bandopadhyay

While technology and globalization continue to pervade every aspect of the world, the scope for the sustenance of national or regional culture is rapidly disappearing. This paper will seek to use the lessons and experiences obtained through the controversies in the use of Direct Broadcasting Satellites in its more initial years and apply the same to the Internet to assess its effect on the culture of developing States. The eventual thesis proposed here argues that the freedom of information upheld through technology, and the human right to culture need not be seen as perpendicular interests, but that the latter may …


Constructing Commons In The Cultural Environment, Katherine J. Strandburg, Michael J. Madison, Brett M. Frischmann Jan 2010

Constructing Commons In The Cultural Environment, Katherine J. Strandburg, Michael J. Madison, Brett M. Frischmann

Katherine J. Strandburg

This Article sets out a framework for investigating sharing and resource pooling arrangements for information and knowledge-based works. We argue that the approach to commons arrangements in the natural environment pioneered by Elinor Ostrom and collaborators provides a template for examining the construction of commons in the cultural environment. The approach promises to lead to a better understanding of how participants in commons and pooling arrangements structure their interactions in relation to the environments in which they are embedded, in relation to information and knowledge resources that they produce and use, and in relation to one another.

An improved understanding …


Protect The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technological World, Francis S. Monterosso Nov 2009

Protect The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technological World, Francis S. Monterosso

Francis S Monterosso

This Note untangles courts’ problems with the prosecution of child pornography defendants and aims to redirect attention to the social impact associated with these crimes. First, Part I provides an introduction to the Note and discusses the background of the Child Pornography Prevention Act. Secondly, Part II sets forth the evolution of the CPPA and its goals and shortcomings. Next, Part III further explains the development of child pornography prosecutions in the United States through two cases that illustrate the government’s desire to prosecute child pornography defendants.

Moreover, Part IV explains the difficulties courts have encountered in the prosecution of …


Examining The "Csi-Effect" In The Cases Of Circumstantial Evidence And Eyewitness Testimony: Multivariate And Path Analyses, Hon. Donald E. Shelton, Young S. Kim, Gregg Barak Sep 2009

Examining The "Csi-Effect" In The Cases Of Circumstantial Evidence And Eyewitness Testimony: Multivariate And Path Analyses, Hon. Donald E. Shelton, Young S. Kim, Gregg Barak

Hon. Donald E. Shelton

As part of a larger investigation of the changing nature of juror behavior in the context of technology development, this study examined important questions unanswered by previous studies on the “CSI-effect.” In answering such questions, the present study applied multivariate and path analyses for the first time. The results showed that (a) watching CSI dramas had no independent effect on jurors' verdicts, (b) the exposure to CSI dramas did not interact with individual characteristics, (c) different individual characteristics were significantly associated with different types of evidence, and (d) CSI watching had no direct effect on jurors' decisions, and it had …