Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

A Truly “Top Task”: Rulemaking And Its Accessibility On Agency Websites, Cary Coglianese Aug 2014

A Truly “Top Task”: Rulemaking And Its Accessibility On Agency Websites, Cary Coglianese

All Faculty Scholarship

Government websites provide an important location for public access and participation in the governmental process. However, despite a growing body of research on agency websites, researchers have so far ignored agency websites as a method of public contact over rulemaking. In this article, I report results from two systematic surveys conducted on regulatory agencies’ websites which reveal how much more agencies could do to improve public access to rulemaking. Agencies commonly succumb to pressures to organize their websites around their “top tasks”—but, regrettably, they too often define these key tasks in terms of the volume of user demand for information …


Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp Jun 2014

Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp

All Faculty Scholarship

When we speak about information and competition policy we are usually thinking about oral or written communications that have an anticompetitive potential, and mainly in the context of collusion of exclusionary threats. These are important topics. Indeed, among the most difficult problems that competition policy has had to confront over the years is understanding communications that can be construed as either threats to exclude or as offers to collude or facilitators of collusion.

My topic here, however, is the relationship between information technologies and competition policy. Technological change can both induce and undermine the use of information to facilitate anticompetitive …


Commons At The Intersection Of Peer Production, Citizen Science, And Big Data: Galaxy Zoo, Michael J. Madison Jan 2014

Commons At The Intersection Of Peer Production, Citizen Science, And Big Data: Galaxy Zoo, Michael J. Madison

Book Chapters

The knowledge commons research framework is applied to a case of commons governance grounded in research in modern astronomy. The case, Galaxy Zoo, is a leading example of at least three different contemporary phenomena. In the first place Galaxy Zoo is a global citizen science project, in which volunteer non-scientists have been recruited to participate in large-scale data analysis via the Internet. In the second place Galaxy Zoo is a highly successful example of peer production, sometimes known colloquially as crowdsourcing, by which data are gathered, supplied, and/or analyzed by very large numbers of anonymous and pseudonymous contributors to an …


Governing Knowledge Commons -- Introduction & Chapter 1, Brett M. Frischmann, Michael J. Madison, Katherine J. Strandburg Jan 2014

Governing Knowledge Commons -- Introduction & Chapter 1, Brett M. Frischmann, Michael J. Madison, Katherine J. Strandburg

Book Chapters

“Knowledge commons” describes the institutionalized community governance of the sharing and, in some cases, creation, of information, science, knowledge, data, and other types of intellectual and cultural resources. It is the subject of enormous recent interest and enthusiasm with respect to policymaking about innovation, creative production, and intellectual property. Taking that enthusiasm as its starting point, Governing Knowledge Commons argues that policymaking should be based on evidence and a deeper understanding of what makes commons institutions work. It offers a systematic way to study knowledge commons, borrowing and building on Elinor Ostrom’s Nobel Prize-winning research on natural resource commons. It …


I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone Jan 2014

I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone

Australian Security and Intelligence Conference

Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …


The Efficacy Of Cybersecurity Regulation, David Thaw Jan 2014

The Efficacy Of Cybersecurity Regulation, David Thaw

Articles

Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do – and should – deliberately encode regulatory capture into the rulemaking process. This relatively uncommon approach to administrative law, which I describe as Management-Based Regulatory Delegation, involves the combination of two legislative approaches to engaging private entities' expertise. This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted by the state legislatures. My analysis suggests that a blend of these …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


The (Data Privacy) Law Hasn't Even Checked In When Technology Takes Off, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2014

The (Data Privacy) Law Hasn't Even Checked In When Technology Takes Off, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Taking Stock After Four Years, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2014

Taking Stock After Four Years, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2014

Systematic Government Access To Private-Sector Data Redux, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.