Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (39)
- Internet Law (20)
- Social and Behavioral Sciences (14)
- Computer Law (13)
- Intellectual Property Law (11)
-
- Law and Economics (9)
- Law and Society (9)
- Arts and Humanities (8)
- Administrative Law (7)
- Communication (7)
- Communications Law (7)
- Business (6)
- Jurisprudence (6)
- Philosophy (6)
- Privacy Law (6)
- Communication Technology and New Media (5)
- Contracts (5)
- Public Affairs, Public Policy and Public Administration (5)
- Torts (5)
- Common Law (4)
- Environmental Law (4)
- Legal Education (4)
- Public Law and Legal Theory (4)
- Air and Space Law (3)
- Antitrust and Trade Regulation (3)
- Banking and Finance Law (3)
- Business Law, Public Responsibility, and Ethics (3)
- Constitutional Law (3)
- Criminal Law (3)
- Institution
-
- Chicago-Kent College of Law (22)
- The University of Akron (14)
- University of Pennsylvania Carey Law School (14)
- Louisiana State University Law Center (4)
- University of North Carolina School of Law (4)
-
- American University Washington College of Law (3)
- Singapore Management University (3)
- Villanova University Charles Widger School of Law (3)
- BLR (2)
- Howard University (2)
- Maurer School of Law: Indiana University (2)
- Nova Southeastern University (2)
- University of Tennessee College of Law (2)
- Cornell University Law School (1)
- Florida International University College of Law (1)
- Southern Methodist University (1)
- Syracuse University (1)
- The Peter A. Allard School of Law (1)
- University at Buffalo School of Law (1)
- University of Colorado Law School (1)
- University of Georgia School of Law (1)
- University of Missouri-Kansas City School of Law (1)
- Publication Year
- Publication
-
- All Faculty Scholarship (36)
- Akron Law Faculty Publications (14)
- Faculty Publications (5)
- Journal Articles (5)
- Articles in Law Reviews & Other Academic Journals (3)
-
- Working Paper Series (3)
- Articles by Maurer Faculty (2)
- Faculty Scholarship (2)
- Research Collection Yong Pung How School Of Law (2)
- Scholarly Works (2)
- School of Law Faculty Publications (2)
- All Faculty Publications (1)
- Centre for AI & Data Governance (1)
- College of Law - Faculty Scholarship (1)
- College of Law Faculty Scholarship (1)
- Cornell Law Faculty Working Papers (1)
- Faculty Journal Articles and Book Chapters (1)
- Faculty Works (1)
- George Mason University School of Law Working Papers Series (1)
- Publications (1)
- The Ohio State University Moritz College of Law Working Paper Series (1)
Articles 1 - 30 of 86
Full-Text Articles in Law
Content Moderation On End-To-End Encrypted Systems: A Legal Analysis, Charles Duan, James Grimmelmann
Content Moderation On End-To-End Encrypted Systems: A Legal Analysis, Charles Duan, James Grimmelmann
Articles in Law Reviews & Other Academic Journals
Online messaging platforms like Signal and Google’s Messages increasingly use end-to-end encryption (E2EE), in which messages are encrypted on the sender’s device and decrypted on the recipient’s, so that no one else—not even the platform itself—can read them. Although E2EE protects privacy and advances human rights, the law enforcement community and others have criticized its growing use. In their view, E2EE prevents platforms and government authorities from responding to abuses and criminal activity, including child exploitation, malware, scams, and disinformation. At times, they have argued that E2EE is inherently incompatible with effective content moderation.
Computer science researchers have responded to …
Digital Rummaging, Andrew Guthrie Ferguson
Digital Rummaging, Andrew Guthrie Ferguson
Articles in Law Reviews & Other Academic Journals
The digital world encodes our lives with incriminating clues. How you travel, live, love, and shop are tracked through growing surveillance technologies. Police have recognized this reality and are actively exploiting new surveillance tools for investigative purposes.
The Fourth Amendment—the constitutional protection meant to limit police search powers—has not kept up with the privacy and security threats of these new digital technologies. Current doctrine has remained stymied by legal tests asking all the wrong questions about “reasonable expectations of privacy” and “trespass” searches. While the Supreme Court has acknowledged that “digital is different,” it has not yet provided a coherent …
Trademarks In An Algorithmic World, Christine Haight Farley
Trademarks In An Algorithmic World, Christine Haight Farley
Articles in Law Reviews & Other Academic Journals
According to the sole normative foundation for trademark protection—“search costs” theory—trademarks transmit useful information to consumers, enabling an efficient marketplace. The marketplace, however, is in the midst of a fundamental change. Increasingly, retail is virtual, marketing is data-driven, and purchasing decisions are automated by AI. Predictive analytics are changing how consumers shop. Search costs theory no longer accurately describes the function of trademarks in this marketplace. Consumers now have numerous digital alternatives to trademarks that more efficiently provide them with increasingly accurate product information. Just as store shelves are disappearing from consumers’ retail experience, so are trademarks disappearing from their …
The Law And Politics Of Ransomware, Asaf Lubin
The Law And Politics Of Ransomware, Asaf Lubin
Articles by Maurer Faculty
What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between 20,000 and 30,000 per day in the United States alone. That is a ransomware attack every eleven seconds, each of which cost victims …
Insuring Evolving Technology, Asaf Lubin
Insuring Evolving Technology, Asaf Lubin
Articles by Maurer Faculty
The study of the interaction between law and technology is more critical today than ever before. Advancements in artificial intelligence, information communications, biological and chemical engineering, and space-faring technologies, to name but a few examples, are forcing us to reexamine our traditional understanding of basic concepts in torts and insurance law.
Yet, few insurance professionals and scholars will identify themselves as working in the field of “law-and-technology.” For many of them, technology is “just a fact about the world like any other,” as Ryan Calo once put it, not one that always merits “special care.”
This short paper is an …
A Regulatory Roadmap For Financial Innovation, Cristie Ford
A Regulatory Roadmap For Financial Innovation, Cristie Ford
All Faculty Publications
Private sector innovation – whether it is fintech, biotechnology, the platformisation of the economy, or other developments – is the single most profound challenge that regulators confront today. Financial innovations, which are intangible and fast-moving, are especially challenging. Financial regulators are at the operational front line of making sense of the promise and the risks associated with fintech, and helping to ensure it operates for public benefit.
Faced with such a changeable and fast-moving problem, how can regulators “future proof” themselves?
This chapter outlines a roadmap for financial regulators who confront fast-moving and profound change in their sectors. It argues …
Technological 'Disruption' Of The Law's Imagined Scene: Some Lessons From Lex Informatica, Margot Kaminski
Technological 'Disruption' Of The Law's Imagined Scene: Some Lessons From Lex Informatica, Margot Kaminski
Publications
Joel Reidenberg in his 1998 Article Lex Informatica observed that technology can be a distinct regulatory force in its own right and claimed that law would arise in response to human needs. Today, law and technology scholarship continues to ask: does technology ever disrupt the law? This Article articulates one particular kind of “legal disruption”: how technology (or really, the social use of technology) can alter the imagined setting around which policy conversations take place—what Jack Balkin and Reva Siegal call the “imagined regulatory scene.” Sociotechnical change can alter the imagined regulatory scene’s architecture, upsetting a policy balance and undermining …
Contracts Formed By Software: When Things Go Wrong, Vincent Ooi
Contracts Formed By Software: When Things Go Wrong, Vincent Ooi
Research Collection Yong Pung How School Of Law
The use of software in contract formation is likely to become increasingly pervasive in light of the digital economy. Consequently, software can also be expected to exhibit greater autonomy and take on increasingly complex transactions and contract negotiations. It is important that a legally coherent, fair, certain and economically justified approach be taken to regulate such contracts.A ‘contracting problem’ arises when software is used to autonomously enter into contracts without human input. The formation of a valid contract requires, inter alia, an agreement between two or more parties, where each party exhibits an objective intention to be legally bound (the …
Cryptocurrencies And Code Before The Courts, Vincent Ooi, Kian Peng Soh
Cryptocurrencies And Code Before The Courts, Vincent Ooi, Kian Peng Soh
Research Collection Yong Pung How School Of Law
In the rapidly developing cyber sphere dominated by cryptocurrencies and code, it is perhaps not uncommon for firms to focus on cutting-edge technological developments leaving the law behind as an afterthought. B2C2 Ltd v Quoine Pte Ltd (‘B2C2’)1 may serve as a timely reminder of the importance of the legal principles supporting e-commerce and Fintech. In the first case of its kind, B2C2 raised several key questions before the Singapore International Commercial Court (‘SICC’), seeking clarification on how the established legal concepts of breach of trust, mistake and unjust enrichment might apply in the context where an automated contract-forming software …
Contracts Formed By Software: An Approach From The Law Of Mistake, Vincent Ooi
Contracts Formed By Software: An Approach From The Law Of Mistake, Vincent Ooi
Centre for AI & Data Governance
A ‘Contracting Problem’ arises when software is used to autonomously enter into contracts without human input. Questions arise as to how and whether there can be an expression of an objective intention to be legally bound. This article considers three leading solutions to the Contracting Problem. The ‘Mere Tools Theory’, which views software as ‘mere tools’ of communication, is too harsh as it binds users to any software malfunction. The Agency Approach, which treats software as Electronic Agents, capable of contracting on behalf of their users, is untenable as it ascribes unrealistic characteristics to software. The article submits that the …
2016-2017 Oxford Business Law Blog Round-Up: Most Read Opinion Pieces, Maurice Stucke
2016-2017 Oxford Business Law Blog Round-Up: Most Read Opinion Pieces, Maurice Stucke
Scholarly Works
On 14 March 2017, the Oxford Business Law Blog (OBLB) marked its first anniversary. One year ago, we set out to create a leading and truly international forum for the exchange of ideas and reporting of new developments in business law. Since then, we have published over 530 posts from academics and practitioners from across the world and have reached readers from over 150 countries.
The OBLB is now a firmly entrenched part of the Oxford Law Faculty’s Business Law Hub. The purpose of this collection is to celebrate submissions created especially for publication on the OBLB. As such, this …
Modularity Theory And Internet Regulation, Christopher S. Yoo
Modularity Theory And Internet Regulation, Christopher S. Yoo
All Faculty Scholarship
Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.
The literature on innovation indicates that modules should be determined by the nature of …
Moving Beyond Bitcoin To An Endogenous Theory Of Decentralized Ledger Technology Regulation: An Initial Proposal, Carla L. Reyes
Moving Beyond Bitcoin To An Endogenous Theory Of Decentralized Ledger Technology Regulation: An Initial Proposal, Carla L. Reyes
Faculty Journal Articles and Book Chapters
Current regulation of decentralized ledger technology leaves industry actors in confusion, facing high risk, and confronting significant disincentives to innovate. This Article argues that an endogenous regulatory approach offers an avenue for alleviating these obstacles while still providing sufficient tools for government oversight. In particular, this Article proposes regulation that is endogenous at two levels: first, in that it is created through an iterative, cooperative process involving both regulators and industry actors, and second, that it is implemented as regulation-through-code, that is, regulation written into the code itself. In so doing, this Article also investigates whether successful implementation of such …
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
One Centimeter Over My Back Yard: Where Does Federal Preemption Of State Drone Regulation Start?, Henry H. Perritt Jr.
All Faculty Scholarship
The proliferation of cheap civilian drones and their obvious utility for precision agriculture, motion picture and television production, aerial surveying, newsgathering, utility infrastructure inspection, and disaster relief has accelerated the FAA’s sluggish effort to develop a proposal for generally applicable rules and caused it to grant more than 600 “section 333 exemptions” permitting commercial drone flight before its rules are finalized.
Federal preemption in the field of aviation safety regulation is generally assumed, but political pressure on states and municipalities to regulate drones and the ability of this revolutionary aviation technology to open up space close to the ground for …
Information Overload, Multi-Tasking, And The Socially Networked Jury: Why Prosecutors Should Approach The Media Gingerly, Andrew E. Taslitz
Information Overload, Multi-Tasking, And The Socially Networked Jury: Why Prosecutors Should Approach The Media Gingerly, Andrew E. Taslitz
School of Law Faculty Publications
The rise of computer technology, the internet, rapid news dissemination, multi-tasking, and social networking have wrought changes in human psychology that alter how we process news media. More specifically, news coverage of high-profile trials necessarily focuses on emotionally-overwrought, attention-grabbing information disseminated to a public having little ability to process that information critically. The public’s capacity for empathy is likewise reduced, making it harder for trial processes to overcome the unfair prejudice created by the high-profile trial. Market forces magnify these changes. Free speech concerns limit the ability of the law to alter media coverage directly, and the tools available to …
Once More Unto The Breach: An Analysis Of Legal, Technological And Policy Issues Involving Data Breach Notification Statutes, Dana J. Lesemann
Once More Unto The Breach: An Analysis Of Legal, Technological And Policy Issues Involving Data Breach Notification Statutes, Dana J. Lesemann
School of Law Faculty Publications
Once More Unto the Breach: An Analysis of Legal, Technological, and Policy Issues Involving Data Breach Notification Statutes
Dana J. Lesemann
Companies facing the loss of a laptop or a compromised server have long waged battles on several fronts: investigating the source of the breach, identifying potentially criminal behavior, retrieving or replicating lost or manipulated data, and putting better security in place, to name a few generalized steps. As recently as seven years ago, the broader consequences of a data breach were largely deflected from the party on whose resource the data resided and instead rested essentially on those whose …
Mortgaging The Meme: Financing And Managing Disruptive Innovation, Jon M. Garon
Mortgaging The Meme: Financing And Managing Disruptive Innovation, Jon M. Garon
Faculty Scholarship
Traditional financing of innovative companies emphasizes the use of patents and associated intellectual property rights to secure debt and provide assets for valuation. Although the model suffices for incremental innovation, it does not account for investments in disruptive innovation, those that undermine traditional business models, supply chains or industry relationships.
Disruptive innovation can be described as the introduction of a new conceptual idea or meme into an existing system that causes the system to be fundamentally altered. Assembly lines, air conditioning, digital film, and personal computers represent such innovations, all of which led to fundamental paradigm shifts.
The convergence of …
Legal Education In Disruption: The Headwinds And Tailwinds Of Technology, Jon M. Garon
Legal Education In Disruption: The Headwinds And Tailwinds Of Technology, Jon M. Garon
Faculty Scholarship
By harnessing improvements on communications and computational systems, law firms are producing a revolution in the practice of law. Self-help legal manuals have transformed into sophisticated interactive software; predictive coding can empower clients to receive sophisticated legal advice from a machine; socially mediated portals select among potential lawyers and assess the quality of the advice given; and virtual law firms threaten to distintermediate the grand edifices of twentieth century Big Law. These changes may profoundly restructure the legal practice, undermining the business model for many solo and small firm practices.
This paper focuses on the implications of these profound disruptive …
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
All Faculty Scholarship
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
Self, Privacy, And Power: Is It All Over?, Richard Warner, Robert H. Sloan
All Faculty Scholarship
The realization of a multifaceted self is an ideal one strives to realize. One realizes such a self in large part through interaction with others in various social roles. Such realization requires a significant degree of informational privacy. Informational privacy is the ability to determine for yourself when others may collect and how they may use your information. The realization of multifaceted selves requires informational privacy in public. There is no contradiction here: informational privacy is a matter of control, and you can have such control in public. Current information processing practices greatly reduce privacy in public thereby threatening the …
E-Elections: Time For Japan To Embrace Online Campaigning, Matthew J. Wilson
E-Elections: Time For Japan To Embrace Online Campaigning, Matthew J. Wilson
Akron Law Faculty Publications
Asia has embraced the Internet and social media. Japan and South Korea rank among the world’s leaders in technological innovation and Internet penetration. China boasts over 420 million Internet users, and other Asian countries have experienced the widespread acceptance of online technologies. With the rapid ascendency of the Internet and social media, however, Asian countries have sometimes struggled with striking the proper balance between individual rights and the legal regulation of online activities. One prime example of such struggle involves the clash between Japan’s election laws and individual political freedoms.
Although Japan generally subscribes to democratic traditions and the principle …
"Smile, You're On Cellphone Camera!": Regulating Online Video Privacy In The Myspace Generation, Jacqueline D. Lipton
"Smile, You're On Cellphone Camera!": Regulating Online Video Privacy In The Myspace Generation, Jacqueline D. Lipton
Akron Law Faculty Publications
In the latest Batman movie, Bruce Wayne’s corporate right hand man, Lucius Fox, copes stoically with the death and destruction dogging his boss. Interestingly, the last straw for him is Bruce’s request that he use digital video surveillance created through the city’s cellphone network to spy on the people of Gotham City in order to locate the Joker. Does this tell us something about the increasing social importance of privacy, particularly in an age where digital video technology is ubiquitous and largely unregulated?
While much digital privacy law and commentary has focused on text files containing personal data, little attention …
Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton
Who Owns "Hillary.Com"? Political Speech And The First Amendment In Cyberspace, Jacqueline D. Lipton
Akron Law Faculty Publications
In the lead-up to the next presidential election, it will be important for candidates both to maintain an online presence and to exercise control over bad faith uses of domain names and web content related to their campaigns. What are the legal implications for the domain name system? Although, for example, Senator Hillary Clinton now owns ‘hillaryclinton.com’, the more generic ‘hillary.com’ is registered to a software firm, Hillary Software, Inc. What about ‘hillary2008.com’? It is registered to someone outside the Clinton campaign and is not currently in active use. This article examines the large gaps and inconsistencies in current domain …
“We, The Paparazzi”: Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton
“We, The Paparazzi”: Developing A Privacy Paradigm For Digital Video, Jacqueline D. Lipton
Akron Law Faculty Publications
In January 2009, the Camera Phone Predator Alert bill was introduced into Congress. It raised serious concerns about privacy rights in the face of digital video technology. In so doing, it brought to light a worrying gap in current privacy regulation – the lack of rules relating to digital video privacy. To date, digital privacy regulation has focused on text records that contain personal data. Little attention has been paid to privacy in video files that may portray individuals in inappropriate contexts, or in an unflattering or embarrassing light. As digital video technology, including inexpensive cellphone cameras, is now becoming …
To © Or Not To ©? Copyright And Innovation In The Digital Typeface Industry, Jacqueline D. Lipton
To © Or Not To ©? Copyright And Innovation In The Digital Typeface Industry, Jacqueline D. Lipton
Akron Law Faculty Publications
Intellectual property rights are often justified by utilitarian theory. However, recent scholarship suggests that creativity thrives in some industries in the absence of intellectual property protection. These industries might be called IP’s negative spaces. One such industry that has received little scholarly attention is the typeface industry. This industry has recently digitized. Its adoption of digital processes has altered its market structure in ways that necessitate reconsideration of its IP negative status, with particular emphasis on copyright. This article considers the historical denial of copyright protection for typefaces in the United States, and examines arguments both for and against extending …
Repairing Online Reputation: A New Multi-Modal Regulatory Approach, Jacqueline D. Lipton
Repairing Online Reputation: A New Multi-Modal Regulatory Approach, Jacqueline D. Lipton
Akron Law Faculty Publications
In today’s interconnected digital society, high profile examples of online abuses abound. Cyberbullies launch attacks on the less powerful, often significantly damaging victims’ reputations. Outside of reputational damage, online harassment, bullying and stalking has led to severe emotional distress, loss of employment, physical assault and even death. Recent scholarship has identified this phenomenon but has done little more than note that current laws are ineffective in combating abusive online behaviors. This article moves the debate forward both by suggesting specific reforms to criminal and tort laws and, more importantly, by situating those reforms within a new multi-modal framework for combating …
Law Of The Intermediated Information Exchange, Jacqueline D. Lipton
Law Of The Intermediated Information Exchange, Jacqueline D. Lipton
Akron Law Faculty Publications
When Wikipedia, Google and other online service providers staged a ‘blackout protest’ against the Stop Online Piracy Act in January 2012, their actions inadvertently emphasized a fundamental truth that is often missed about the nature of cyberlaw. In attempts to address what is unique about the field, commentators have failed to appreciate that the field could – and should – be reconceputalized as a law of the global intermediated information exchange. Such a conception would provide a set of organizing principles that are lacking in existing scholarship. Nothing happens online that does not involve one or more intermediaries – the …
Cyberlaw 2.0, Jacqueline D. Lipton
Cyberlaw 2.0, Jacqueline D. Lipton
Akron Law Faculty Publications
In the early days of the Internet, Judge Frank Easterbrook famously dismissed the idea of an emerging field of cyberspace law as akin to a “law of the horse”— a pastiche of unrelated legal principles tied together only by virtue of applying to the Internet, having no unifying principles that would teach us anything meaningful. This article revisits Easterbrook’s assertions with the benefit of hindsight. It suggests that subsequent case law and legislative developments in fact do support a distinct cyberlaw field. It introduces the novel argument that cyberlaw is a global “law of the intermediated information exchange.” In other …
Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Copyrighting "Twilight": Digital Copyright Lessons From The Vampire Blogosphere, Jacqueline D. Lipton
Akron Law Faculty Publications
In January of 2010 a United States District Court granted an injunction against a Twilight fan magazine for unauthorized use of copyrighted publicity stills . No surprise there. Intellectual property laws deal effectively – some would argue too effectively – with such cases. Nevertheless, recent Web 2.0 technologies, characterized by user-generated content, raise new challenges for copyright law. Online interactions involving reproductions of copyrighted works in blogs, online fan fiction, and online social networks do not comfortably fit existing copyright paradigms. It is unclear whether participants in Web 2.0 forums are creating derivative works, making legitimate fair uses of copyright …
Combating Cyber-Victimization, Jacqueline D. Lipton
Combating Cyber-Victimization, Jacqueline D. Lipton
Akron Law Faculty Publications
In today’s interconnected society, high profile examples of online victimization abound. Cyber-bullies, stalkers and harassers launch attacks on the less powerful, causing a variety of harms. Recent scholarship has identified some of the more salient damage, including reputational harms, severe emotional distress, loss of employment, and physical assault. Extreme cases of online abuse have resulted in death through suicide or as a result of targeted attacks. This article makes two major contributions to the cyber-victimization literature. It proposes specific reforms to criminal and tort laws to address this conduct more effectively. Further, it situates those reforms within a new multi-modal …