Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 61

Full-Text Articles in Law

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg Jul 2022

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg

Articles

The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …


Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss Jun 2022

Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss

Articles

Studies of blockchain governance can be divided into analyses of the governance of blockchains (such as rules and power dynamics within a given network) and governance by blockchains (such as how blockchains can be implemented to improve self-governance of community-based peer production networks). Less emphasis has been placed on applications of distributed ledgers to public sector governance. Our review clarifies that the decentralization and distributive features that enable blockchains to link up loosely connected private organizations and public agencies to improve efficiency and transparency of government transactions. However, most blockchain applications lack clear advantages over the conventional digital recording of …


Blockchain Networks As Knowledge Commons, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Martin B. H. Weiss, Michael J. Madison Jan 2022

Blockchain Networks As Knowledge Commons, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Martin B. H. Weiss, Michael J. Madison

Articles

Researchers interested in blockchains are increasingly attuned to questions of governance, including how blockchains relate to government, the ways blockchains are governed, and ways blockchains can improve prospects for successful self-governance. Our paper joins this research by exploring the implications of the Governing Knowledge Commons (GKC) framework to analyze governance of blockchains. Our novel contributions are making the case that blockchain networks represent knowledge commons governance, in the sense that they rely on collectively-managed technologies to pool and manage distributed information, illustrating the usefulness and novelty of the GCK methodology with an empirical case study of the evolution of Bitcoin, …


Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison Jan 2021

Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison

Articles

The soccer referee stands in for a judge. Soccer’s Video Assistant Referee (“VAR”) system stands in for algorithms that augment human deciders. Fair play stands in for justice. They are combined and set in a polycentric system of governance, with implications for designing, administering, and assessing human-machine combinations.


Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran Nov 2020

Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran

Articles

This article presents an in-depth analysis of the latent methodological issues that are as much a cause of U.S. federal court avoidance of foreign law as are judicial difficulties in obtaining foreign legal materials and difficulties in understanding foreign legal orders and languages. It explores Rule 44.1’s inadvertent introduction of a civil-law method into a common-law framework, and the results that have ensued, including an incomplete transition of foreign law from being an issue of fact to becoming an issue of law. It addresses the ways in which courts obtain information about foreign law today, suggesting among others the methodological …


Tools For Data Governance, Michael J. Madison Jan 2020

Tools For Data Governance, Michael J. Madison

Articles

This article describes the challenges of data governance in terms of the broader framework of knowledge commons governance, an institutional approach to governing shared knowledge, information, and data resources. Knowledge commons governance highlights the potential for effective community- and collective-based governance of knowledge resources. The article focuses on key concepts within the knowledge commons framework rather than on specific law and public policy questions, directing the attention of researchers and policymakers to critical inquiry regarding relevant social groups and relevant data “things.” Both concepts are key tools for effective data governance.


Ostrom Amongst The Machines: Blockchain As A Knowledge Commons, Herminio Bodon, Pedro Bustamante, Marcela Gomez, Prashabnt Krishnamurthy, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Martin B. H. Weiss Jan 2019

Ostrom Amongst The Machines: Blockchain As A Knowledge Commons, Herminio Bodon, Pedro Bustamante, Marcela Gomez, Prashabnt Krishnamurthy, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Martin B. H. Weiss

Articles

Blockchains are distributed ledger technologies that allow the recording of any data structure, including money, property titles, and contracts. In this paper, we suggest that Hayekian political economy is especially well suited to explain how blockchain emerged, but that Elinor Ostrom’s approach to commons governance is particularly useful to understand why blockchain anarchy is successful. Our central conclusions are that the blockchain can be thought of as a spontaneous order, as Hayek anticipated, as well as a knowledge commons, as Ostrom’s studies of self-governance anticipated.


Is Blockchain The Next Step In The Evolution Chain Of [Market] Intermediaries?, Marcela Gomez, Pedro Bustamante, Martin B. H. Weiss, Ilia Murtazashvili, Michael J. Madison, Wilson Law, Tymofiy Mylovanov, Herminio Bodon, Prashabnt Krishnamurthy Jan 2019

Is Blockchain The Next Step In The Evolution Chain Of [Market] Intermediaries?, Marcela Gomez, Pedro Bustamante, Martin B. H. Weiss, Ilia Murtazashvili, Michael J. Madison, Wilson Law, Tymofiy Mylovanov, Herminio Bodon, Prashabnt Krishnamurthy

Articles

The blockchain is a decentralized solution for handling transactions where we are concerned (among other aspects) with the accuracy and verification of transactions. One of its main promises is to eliminate the need for centralized entities or intermediaries and legal enforcement. Rather than trusting self-interested human intermediaries, the blockchain provides an alternative that relies on transparent computational protocols (Werbach 2018).

In this paper, we delve into this broker-less claim and analyze whether the blockchain needs an intermediary to allow for widespread access to its functionality and whether the blockchain itself is an intermediary. The latter would turn the blockchain into …


Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton Jan 2019

Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton

Articles

In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …


Administrative Truth: Comments On Cortez’S Information Mischief, David Thaw Jan 2019

Administrative Truth: Comments On Cortez’S Information Mischief, David Thaw

Articles

This short essay responds to Professor Nathan Cortez’s argument describing an emerging “information policy” reflecting on the practices of President Donald J. Trump’s executive administration (the “Trump Administration”) regarding the development, release, and management of official information. Professor Cortez argues that viewed holistically, this information policy suggests a shift toward the use of information practices by administrative agencies for purposes other than “neutral principles” and rather focusing on a “more cynical [use] of government information.”

This argument may be well-founded, and the Trump Administration certainly has been criticized widely for the relationship between its public statements and widespread media interpretation …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Ip Things As Boundary Objects: The Case Of The Copyright Work, Michael J. Madison Jan 2017

Ip Things As Boundary Objects: The Case Of The Copyright Work, Michael J. Madison

Articles

My goal is to explore the meanings and functions of the objects of intellectual property: the work of authorship (or copyright work) in copyright, the invention in patent, and the mark and the sign in trademark. This paper takes up the example of the copyright work.

It is usually argued that the central challenge in understanding the work is to develop a sensible method for appreciating its boundaries. Those boundaries, conventionally understood as the metaphorical "metes and bounds" of the work, might be established by deferring to the intention of the author, or by searching for authorship (creativity or originality) …


U.S. Discovery In A Transnational And Digital Age And The Increasing Need For Comparative Analysis, Vivian Grosswald Curran Jan 2017

U.S. Discovery In A Transnational And Digital Age And The Increasing Need For Comparative Analysis, Vivian Grosswald Curran

Articles

U.S. Courts generally prefer applying the Federal Rules of Civil Procedure over The Hague Evidence Convention for the taking of documentary evidence located abroad. With respect to the French blocking statute with which the Supreme Court was dealing in the seminal case of Aérospatiale, and under the powerful influence of stare decisis, a line of cases developed dismissing the French blocking statute for having been intended by its legislature principally to thwart the sovereignty of the U.S. trial court, and never having been intended to be enforced. Criteria for the general assessment of blocking statutes have emerged from the courts’ …


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Authority And Authors And Codes, Michael J. Madison Jan 2016

Authority And Authors And Codes, Michael J. Madison

Articles

Contests over the meaning and application of the federal Computer Fraud and Abuse Act (“CFAA”) expose long-standing, complex questions about the sources and impacts of the concept of authority in law and culture. Accessing a computer network “without authorization” and by “exceeding authorized access” is forbidden by the CFAA. Courts are divided in their interpretation of this language in the statute. This Article first proposes to address the issue with an insight from social science research. Neither criminal nor civil liability under the CFAA should attach unless the alleged violator has transgressed some border or boundary that is rendered visible …


Charitable Organization Oversight: Rules V. Standards, Philip Hackney Jan 2015

Charitable Organization Oversight: Rules V. Standards, Philip Hackney

Articles

Congress has traditionally utilized standards as a means of communicating charitable tax law in the Code. In the past fifteen years, however, Congress has increasingly turned to rules to stop fraud and abuse in the charitable sector. I review the rules versus standards debate to evaluate this trend. Are Congressional rules the best method for regulating the charitable sector? While the complex changing nature of charitable purpose would suggest standards are better, the inadequacy of IRS enforcement and the large number of unsophisticated charitable organizations both augur strongly in favor of rules. Congress, however, is not the ideal institution to …


Data Breach (Regulatory) Effects, David Thaw Jan 2015

Data Breach (Regulatory) Effects, David Thaw

Articles

No abstract provided.


Lost Classics Of Intellectual Property Law, Michael J. Madison Jan 2014

Lost Classics Of Intellectual Property Law, Michael J. Madison

Articles

Santayana wrote, “Those who cannot remember the past are condemned to repeat it.” American legal scholarship often suffers from a related sin of omission: failing to acknowledge its intellectual debts. This short piece attempts to cure one possible source of the problem, in one discipline: inadequate information about what’s worth reading among older writing. I list “lost classics” of American scholarship in intellectual property law. These are not truly “lost,” and what counts as “classic” is often in the eye of the beholder (or reader). But these works may usefully be found again, and intellectual property law scholarship would be …


The Efficacy Of Cybersecurity Regulation, David Thaw Jan 2014

The Efficacy Of Cybersecurity Regulation, David Thaw

Articles

Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do – and should – deliberately encode regulatory capture into the rulemaking process. This relatively uncommon approach to administrative law, which I describe as Management-Based Regulatory Delegation, involves the combination of two legislative approaches to engaging private entities' expertise. This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted by the state legislatures. My analysis suggests that a blend of these …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


Book Review -- William Patry, How To Fix Copyright, Michael J. Madison Jan 2013

Book Review -- William Patry, How To Fix Copyright, Michael J. Madison

Articles

I review William Patry’s book How to Fix Copyright. The book is noteworthy for its ambitious yet measured effort to diagnose where copyright law has gone astray in recent years. It is less successful with respect to proposing possible changes to the law. Most interesting are parallels between How to Fix Copyright and an earlier comprehensive look at copyright law in the digital era: Paul Goldstein’s Copyright’s Highway: From Gutenberg to the Celestial Jukebox. William Patry and Paul Goldstein each have a lot of faith in the power of consumer choice in the cultural marketplace. That faith leads …


Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw Jan 2013

Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw

Articles

Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.

At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …


Madisonian Fair Use, Michael J. Madison Jan 2012

Madisonian Fair Use, Michael J. Madison

Articles

This short essay reflects on developments in the law, scholarship, and practice of fair use since the publication in 2004 of an earlier article on patterns in fair use practice and adjudication. It synthesizes many of those developments in the idea of “Madisonian” fair use, borrowing the separation of powers metaphor from James Madison’s work on the US Constitution and applying it, lightly and in a preliminary way, to copyright.


The End Of The Work As We Know It, Michael J. Madison Jan 2012

The End Of The Work As We Know It, Michael J. Madison

Articles

This paper takes a new look at the concept of the work of authorship in copyright, known in other systems as the copyright work. It complements inquiries into authorship and originality, extending earlier scholarship on the origins of legal “things” or objects and on the multi-dimensional character of their borders and boundaries.


Knowledge Curation, Michael J. Madison Jan 2011

Knowledge Curation, Michael J. Madison

Articles

This Article addresses conservation, preservation, and stewardship of knowledge, and laws and institutions in the cultural environment that support those things. Legal and policy questions concerning creativity and innovation usually focus on producing new knowledge and offering access to it. Equivalent attention rarely is paid to questions of old knowledge. To what extent should the law, and particularly intellectual property law, focus on the durability of information and knowledge? To what extent does the law do so already, and to what effect? This article begins to explore those questions. Along the way, the article takes up distinctions among different types …


Beyond Invention: Patent As Knowledge Law, Michael J. Madison Jan 2011

Beyond Invention: Patent As Knowledge Law, Michael J. Madison

Articles

The decision of the Supreme Court of the United States in Bilski v. Kappos, concerning the legal standard for determining patentable subject matter under the American Patent Act, is used as a starting point for a brief review of historical, philosophical, and cultural influences on subject matter questions in both patent and copyright law. The article suggests that patent and copyright law jurisprudence was constructed initially by the Court with explicit attention to the relationship between these forms of intellectual property law and the roles of knowledge in society. Over time, explicit attention to that relationship has largely disappeared from …


Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton Jan 2010

Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton

Articles

While digital video and multi-media technologies are becoming increasingly prevalent, existing privacy laws tend to focus on text-based personal records. Individuals have little recourse when concerned about infringements of their privacy interests in audio, video, and multi-media files. Often people are simply unaware that video or audio records have been made. Even if they are aware of the existence of the records, they may be unaware of potential legal remedies, or unable to afford legal recourse. This paper concentrates on the ability of individuals to obtain legal redress for unauthorized use of audio, video and multi-media content that infringes their …


What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton Jan 2010

What Blogging Might Teach About Cybernorms, Jacqueline D. Lipton

Articles

Since the dawn of the information age, scholars have debated the viability of regulating cyberspace. Early on, Professor Lawrence Lessig suggested that “code is law” online. Lessig and others also examined the respective regulatory functions of laws, code, market forces, and social norms. In recent years, with the rise of Web 2.0 interactive technologies, norms have taken center-stage as a regulatory modality online. The advantages of norms are that they can develop quickly by the communities that seek to enforce them, and they are not bound by geography. However, to date there has been scant literature dealing in any detail …


Reply: The Complexity Of Commons, Michael J. Madison, Brett M. Frischmann, Katherine J. Strandburg Jan 2010

Reply: The Complexity Of Commons, Michael J. Madison, Brett M. Frischmann, Katherine J. Strandburg

Articles

Constructing Commons in the Cultural Environment, and responses to that article by Professors Thráinn Eggertsson, Wendy Gordon, Gregg Macey, Robert Merges, Elinor Ostrom, and Lawrence Solum. This short Reply comments briefly on each of those responses.