Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (108)
- Science and Technology Law (75)
- Intellectual Property Law (53)
- Computer Law (50)
- Law and Society (39)
-
- Communications Law (37)
- Constitutional Law (22)
- International Law (18)
- Contracts (17)
- Social and Behavioral Sciences (17)
- Entertainment, Arts, and Sports Law (16)
- First Amendment (16)
- Health Law and Policy (16)
- Administrative Law (15)
- Criminal Law (14)
- Civil Law (12)
- Commercial Law (12)
- Legislation (11)
- Civil Rights and Discrimination (10)
- Family Law (10)
- Labor and Employment Law (10)
- Law and Economics (10)
- Law and Gender (10)
- Legal History (10)
- Privacy Law (10)
- Business (9)
- Consumer Protection Law (9)
- Human Rights Law (9)
- Sexuality and the Law (9)
- Institution
- Publication Year
- Publication
-
- Rob Frieden (29)
- Hezi Margalit (11)
- Jacqueline D Lipton (10)
- Robert Sprague (10)
- James Gibson (9)
-
- Lawrence J. Trautman Sr. (9)
- Richard Warner (9)
- William A. Herbert (9)
- Dr Rebecca Wong (8)
- Henry H. Perritt, Jr. (8)
- Joshua A.T. Fairfield (8)
- Ronald W Staudt (8)
- Professor Andrew D Murray (7)
- Michael D. Mann (6)
- Peter Lee (6)
- Deth Sao (5)
- H. Brian Holland (5)
- Michael J. Malinowski (5)
- Olufunmilayo B. Arewa (5)
- Richard Li-dar Wang (5)
- Susan Brenner (5)
- Thomas F. Cotter (5)
- Tom W. Bell (5)
- Adam Lamparello (4)
- Corey A Ciocchetti (4)
- Giancarlo Francesco Frosio (4)
- Rifat Azam Dr. (4)
- Scott Shackelford (4)
- Wayne Barnes (4)
- Andrew B. Serwin (3)
Articles 1 - 30 of 690
Full-Text Articles in Law
הורות משפטית מן הדין ומן הצדק - Legal Parenthood - Law And Justice, Yehezkel Margalit
הורות משפטית מן הדין ומן הצדק - Legal Parenthood - Law And Justice, Yehezkel Margalit
Hezi Margalit
The Rise And Fall Of Private Sector Unionism: What Next For The Nlra?, Jeffrey M. Hirsch, Barry T. Hirsch
The Rise And Fall Of Private Sector Unionism: What Next For The Nlra?, Jeffrey M. Hirsch, Barry T. Hirsch
Jeffrey M. Hirsch
No abstract provided.
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Thomas E. Baker
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee
New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee
Larissa Lee
Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another, using a peer-to-peer …
Machine Learning, Automated Suspicion Algorithms, And The Fourth Amendment, Michael L. Rich
Machine Learning, Automated Suspicion Algorithms, And The Fourth Amendment, Michael L. Rich
Michael L Rich
At the conceptual intersection of machine learning and government data collection lie Automated Suspicion Algorithms, or ASAs, algorithms created through the application of machine learning methods to collections of government data with the purpose of identifying individuals likely to be engaged in criminal activity. The novel promise of ASAs is that they can identify data-supported correlations between innocent conduct and criminal activity and help police prevent crime. ASAs present a novel doctrinal challenge, as well, as they intrude on a step of the Fourth Amendment’s individualized suspicion analysis previously the sole province of human actors: the determination of when reasonable …
Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit
Bridging The Gap Between Intent And Status: A New Framework For Modern Parentage, Yehezkel Margalit
Hezi Margalit
The last few decades have witnessed dramatic changes in the conceptualization and methodologies of determining legal parentage in the U.S. and other countries in the western world. Through various sociological shifts, growing social openness and bio-medical innovations, the traditional definitions of family and parenthood have been dramatically transformed. This transformation has led to an acute and urgent need for legal and social frameworks to regulate the process of determining legal parentage. Moreover, instead of progressing in a piecemeal, ad-hoc manner, the framework for determining legal parentage should be comprehensive. Only a comprehensive solution will address the differing needs of today’s …
From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit
From Baby M To Baby M(Anji): Regulating International Surrogacy Agreements, Yehezkel Margalit
Hezi Margalit
In 1985, when Kim Cotton became Britain’s first commercial surrogate mother, Europe was exposed to the issue of surrogacy for the first time on a large scale. Three years later, in 1988, the famous case of Baby M drew the attention of the American public to surrogacy as well. These two cases implicated fundamental ethical and legal issues regarding domestic surrogacy and triggered a fierce debate about motherhood, child-bearing, and the relationship between procreation, science and commerce. These two cases exemplified the debate regarding domestic surrogacy - a debate that has now been raging for decades. Contrary to the well-known …
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Employee Electronic Communications In A Boundaryless World, Robert Sprague
Robert Sprague
Just Cause Discipline For Social Networking In The New Gilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally
Just Cause Discipline For Social Networking In The New Gilded Age: Will The Law Look The Other Way?, William A. Herbert, Alicia Mcnally
William A. Herbert
Can Dna Be Speech?, Jorge R. Roig
Can Dna Be Speech?, Jorge R. Roig
Jorge R Roig
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start? (With Albert J. Plawinski", Henry H. Perritt Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start? (With Albert J. Plawinski", Henry H. Perritt Jr.
Henry H. Perritt, Jr.
Some Key Things Entrepreneurs Need To Know About The Law And Lawyers, Lawrence J. Trautman, Anthony Luppino, Malika S. Simmons
Some Key Things Entrepreneurs Need To Know About The Law And Lawyers, Lawrence J. Trautman, Anthony Luppino, Malika S. Simmons
Lawrence J. Trautman Sr.
New business formation is a powerful economic engine that creates jobs. Diverse legal issues are encountered as a start-up entity approaches formation, initial capitalization and fundraising, arrangements with employees and independent contractors, and relationships with other third parties. The endeavors of a typical start-up in the United States will likely implicate many of the following areas of law: intellectual property; business organizations; tax laws; employment and labor laws; securities regulation; contracts and licensing agreements; commercial sales; debtor-creditor relations; real estate law; health and safety laws/codes; permits and licenses; environmental protection; industry specific regulatory laws and approval processes; tort/personal injury, products …
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Users' Patronage: The Return Of The Gift In The "Crowd Society", Giancarlo F. Frosio
Giancarlo Francesco Frosio
In this work, I discuss the tension between gift and market economy throughout the history of creativity. For millennia, the production of creative artifacts has lain at the intersection between gift and market economy. From the time of Pindar and Simonides – and until the Romanticism will commence a process leading to the complete commodification of creative artifacts – market exchange models run parallel to gift exchange. From Roman amicitia to the medieval and Renaissance belief that “scientia donum dei est, unde vendi non potest,” creativity has been repeatedly construed as a gift. Again, at the time of the British …
Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman
Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman
Lawrence J. Trautman Sr.
Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …
Mindful Justice: The Search For Gandhi’S Sympathetic State After Bhopal, Nehal A. Patel
Mindful Justice: The Search For Gandhi’S Sympathetic State After Bhopal, Nehal A. Patel
Nehal A. Patel
One of the most startling examples of unmitigated disaster occurred in Bhopal, India, in 1984, when a Union Carbide pesticide plant exploded tons of methyl isocyanate into the air, killing 3800 people overnight. 30 years later, the plant site has not been remediated, and the estimated death toll from the explosion now has reached over 20,000. Disaster victims repeatedly have sought relief directly from the government. Yet, the Indian and US governments and Union Carbide have refused to provide the necessary resources for proper remediation. In this Article, I examine the state’s response to the Bhopal disaster using the thought …
Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest
Infringement As Unfair Competition: A Blueprint For Global Governance?, Sean Pager, Eric Priest
Sean Pager
INFRINGEMENT AS UNFAIR COMPETITION: A BLUEPRINT FOR GLOBAL GOVERNANCE?
Sean A. Pager Michigan State University College of Law
Eric Priest University of Oregon School of Law
ABSTRACT
This Article examines a new approach to address persistent regulatory failures in global supply chains. In a series of recent cases, unfair competition actions have been brought in U.S. court against foreign manufacturers who infringe software overseas under the theory that the cost savings from infringement confers an unfair advantage in U.S. markets. While this theory has been advanced in the intellectual property context, the same approach could work to target abuses in …
E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials …
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Gender Biases In Cyberspace: A Two-Stage Model For A Feminist Way Forward, Shlomit Yanisky-Ravid, Amy Mittelman
Shlomit Yanisky-Ravid Professor of Law
Increasingly, there has been a focus on creating democratic standards and procedures in order to best facilitate open exchange of information and communication online—a goal that fits neatly within the feminist aim to democratize content creation and community. Collaborative websites, such as blogs, social networks, and, as focused on in this Article, Wikipedia, represent both a Cyberspace community entirely outside the strictures of the traditional (intellectual) proprietary paradigm and one that professes to truly embody the philosophy of a completely open, free, and democratic resource for all. In theory, collaborative websites are the solution that social activists, Intellectual Property opponents …
Using Occam’S Razor To Solve International Attorney-Client Privilege Choice Of Law Issues: An Old Solution To A New Problem, Nathan M. Crystal, Francesca Giannoni-Crystal
Using Occam’S Razor To Solve International Attorney-Client Privilege Choice Of Law Issues: An Old Solution To A New Problem, Nathan M. Crystal, Francesca Giannoni-Crystal
Nathan M. Crystal
The practice of law is increasingly becoming “delocalized.” Globalization and the use of technology are two important factors in this fundamental change in practice. Delocalization is affecting almost all areas of practice, including issues involving attorney-client privilege (ACP). To some extent the choice-of-law rules governing ACP are also – like other fields of the law - being “delocalized,” but in our view only partially. This paper discusses six approaches to choice of law issues governing ACP that are being used by the courts. Aside from the traditional lex loci approach (which simply applies the law of the forum to the …
Toward A New Language Of Legal Drafting, Matthew Roach
Toward A New Language Of Legal Drafting, Matthew Roach
Matthew Roach
Lawyers should write in document markup language just like web developers, digital publishers, scientists, and almost everyone else.
Overestimating Wireless Demand: Policy And Investment Implications Of Upward Bias In Mobile Data Forecasts, J. Armand Musey Cfa, Aalok Mehta
Overestimating Wireless Demand: Policy And Investment Implications Of Upward Bias In Mobile Data Forecasts, J. Armand Musey Cfa, Aalok Mehta
J. Armand Musey, CFA
In this paper, we present evidence of persistent errors in projections of wireless demand and examine the implications for wireless policy and investment. Mobile demand projections are relied upon in academic and government research and used for critically important telecommunications policy decisions, both domestically and internationally. The Federal Communications Commission, for example, used such projections to estimate a 275 MHz spectrum shortage by 2014 and featured such estimates in the U.S. National Broadband Plan as evidence for allocating additional spectrum for cellular services. The International Telecommunications Union Radiocommunication Sector endorsed in 2006 an estimate of a 1,280- to 1,720-MHz spectrum …
Scarce Medical Resources – Parenthood At Every Age, In Every Case And Subsidized By The State?, Yehezkel Margalit
Scarce Medical Resources – Parenthood At Every Age, In Every Case And Subsidized By The State?, Yehezkel Margalit
Hezi Margalit
The dilemma of scarce medical resources is deeply rooted in the ancient mankind history, but it has been accelerated in the modern era with the appearance of the bio-medical innovations. This acute dilemma is relevant to all the western developed states, include Israel. Nevertheless, in one field there is the notion that Israel has unlimited medical resources – the fulfillment of its citizen's procreation and parenthood rights. Thus, for sociological, demographical, religious and security reasons the State of Israel invests a vast amount of money to develop and use the various fertility treatments. Israel, today, has the highest per capita …
One Hundred Twenty Years Of U.S. Privacy Law Scholarship: A Latent Semantic Analysis, Robert Sprague, Kevin Grauberger, Nicole Barberis
One Hundred Twenty Years Of U.S. Privacy Law Scholarship: A Latent Semantic Analysis, Robert Sprague, Kevin Grauberger, Nicole Barberis
Robert Sprague
This paper reports results from a research project aimed at identifying fundamental privacy law principles derived from the writings of legal scholars and commentators using probabilistic topic modeling, which is comprised of a suite of algorithms that attempt to discover hidden thematic structures in large archives of documents. Topic modeling algorithms are statistical methods that analyze the words of texts to discover topics (themes) contained within, how those topics are connected to each other, and how they change over time. A latent Dirichlet allocation process, which identifies sets of terms that more tightly co-occur, is incorporated into the topic modeling …
New Technology, New Information Privacy: Social-Value-Oriented Information Privacy Theory, Chen-Hung Chang
New Technology, New Information Privacy: Social-Value-Oriented Information Privacy Theory, Chen-Hung Chang
Chen-Hung Chang
Today’s innovative technologies offer remarkable advantages in our daily lives, but they also give rise to concerns that these technological advancements will adversely impact individuals’ privacy. The traditional notions of information privacy were based on personal control over data about oneself, an antiqued notion in a time where pervasive surveillance has rendered it nearly impossible for individuals to protect information privacy on their own. Key privacy concerns arise because it is nearly impossible to be left out of the intertwined digital and Internet world. Those who choose not to use the Internet, smartphones, tablet computers, electronic mail and online social …
Right-Sizing Spectrum Auction Licenses: The Case For Smaller Geographic License Areas In The Tv Broadcast Incentive Auction, William H. Lehr Phd, J. Armand Musey Cfa
Right-Sizing Spectrum Auction Licenses: The Case For Smaller Geographic License Areas In The Tv Broadcast Incentive Auction, William H. Lehr Phd, J. Armand Musey Cfa
J. Armand Musey, CFA
The wireless sector is a key contributor to economic activity and growth. Over the next several years, wireless service providers are expected to invest $25 to $53 billion upgrading and expanding their networks to deploy 4G mobile broadband across the nation. All told, wireless broadband investment and the services and innovation supported by such investment are expected to add between $259 and $355 billion to US GDP each year through 2017. The Federal Communications Commission ("Commission" or "FCC") is currently designing the largest ever auction of terrestrial wireless spectrum, currently planned for late 2014 (the "Incentive Auction"). The purpose is …
Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone
Law Schools And Technology: Where We Are And Where We Are Heading, Michele R. Pistone
Michele R. Pistone
1. For many years, the question of how to use technology to teach the law has been a minor concern of the legal academy. That era of general indifference to developments in learning technologies is now coming to an end. There are many reasons for the change. Law schools are facing such a host of difficulties— declining enrollments, declining job prospects for graduates, reduced public funding, and understandable concerns about cost and debt—that sometimes it seems the only debate is over whether the situation is best described as a “tsunami” or “a perfect storm.” Against this backdrop, technology offers the …
Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter
Nsfw: An Empirical Study Of Scandalous Trademarks, Megan M. Carpenter
Megan M Carpenter
This project is an empirical analysis of trademarks that have received rejections based on the judgment that they are “scandalous." It is the first of its kind. The Lanham Act bars registration for trademarks that are “scandalous” and “immoral.” While much has been written on the morality provisions in the Lanham Act generally, this piece is the first scholarly project that engages an empirical analysis of 2(a) rejections based on scandalousness; it contains a look behind the scenes at how the morality provisions are applied throughout the trademark registration process. We study which marks are being rejected, what evidence is …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
Richard Warner
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
The Law And Ethics Of High-Frequency Trading, Steven R. Mcnamara
The Law And Ethics Of High-Frequency Trading, Steven R. Mcnamara
Steven R. McNamara
Michael Lewis’s recent book Flash Boys has resurrected the controversy concerning “high-frequency trading” (HFT) in the stock markets. While HFT has been important in the stock markets for about a decade, and may have already peaked in terms of its economic significance, it touched a nerve with a public suspicious of financial institutions in the wake of the financial crisis of 2008-2009. In reality, HFT is not one thing, but a wide array of practices conducted by technologically adept electronic traders. Some of these practices are benign, and some even bring benefits such as liquidity and improved price discovery to …
Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman
Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman
Lawrence J. Trautman Sr.
During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more easily understandable …