Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (39)
- Intellectual Property Law (22)
- Science and Technology Law (20)
- Computer Law (12)
- Law and Society (10)
-
- Law and Economics (9)
- Communications Law (8)
- Economics (8)
- Social and Behavioral Sciences (8)
- Comparative and Foreign Law (6)
- Constitutional Law (5)
- Entertainment, Arts, and Sports Law (5)
- International Law (5)
- International Trade Law (5)
- Legal History (5)
- Civil Rights and Discrimination (4)
- Consumer Protection Law (4)
- Energy and Utilities Law (4)
- Natural Resources Law (4)
- Property Law and Real Estate (4)
- Administrative Law (3)
- Banking and Finance Law (3)
- Business Organizations Law (3)
- Criminal Law (3)
- Criminal Procedure (3)
- Environmental Law (3)
- Evidence (3)
- Law and Politics (3)
- Law and Psychology (3)
- Institution
- Publication
- Publication Type
Articles 31 - 47 of 47
Full-Text Articles in Law
Law’S Box: Law, Jurisprudence And The Information Ecosphere, Paul D. Callister
Law’S Box: Law, Jurisprudence And The Information Ecosphere, Paul D. Callister
ExpressO
For so long as it has been important to know “what the law is,” the practice of law has been an information profession. Nonetheless, just how the information ecosphere affects legal discourse and thinking has never been systematically studied. Legal scholars study how law attempts to regulate information flow, but they say little about how information limits, shapes, and provides a medium for law to operate.
Part I of the paper introduces a holistic approach to “medium theory”—the idea that methods of communication influence social development and ideology—and applies the theory to the development of legal thinking and institutions. Part …
Block Me Not: Are Patented Genes 'Essential Facilities'?, Shamnad Basheer
Block Me Not: Are Patented Genes 'Essential Facilities'?, Shamnad Basheer
ExpressO
The biopharmaceutical industry is characterized by the ‘cumulative innovation’ paradigm, wherein the discovery of a gene sequence is only the first step. In order to convert such sequence information into viable products, tests and cures for genetic conditions and diseases, vast amounts of additional time, effort and money have to be spent. It is feared that patents over upstream gene sequences may ‘block’ further downstream research and consequently adversely impact drug discovery, as many diseases today are known to have genetic origins.
This ‘blocking’ or ‘restricted access’ issue has been the subject of several important papers and a wide array …
Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler
Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler
ExpressO
The last decade has seen remarkable process in understanding ongoing psychological processes at the neurobiological level, progress that has been driven technologically by the spread of functional neuroimaging devices, especially magnetic resonance imaging, that have become the research tools of a theoretically sophisticated cognitive neuroscience. As this research turns to specification of the mental processes involved in interpersonal deception, the potential evidentiary use of material produced by devices for detecting deception, long stymied by the conceptual and legal limitations of the polygraph, must be re-examined. Although studies in this area are preliminary, and I conclude they have not yet satisfied …
Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn
Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn
ExpressO
This article undertakes a normative and empirical legal inquiry into the manner information security vulnerabilities are being addressed through law and in the marketplace. Specifically, this article questions the current legislative paradigm for information security regulation by presenting a critique grounded in information security and cryptography theory. Consequently, this article advocates shifting our regulatory approach to a process-based security paradigm that focuses on improving security of our system as a whole. Finally, this article argues that in order to accomplish this shift with least disruption to current legal and economic processes, expanding an existing set of well-functioning legal structures is …
Why "Bad" Patents Survive In The Market And How Should We Change?--The Private And Social Costs Of Patents, Jay P. Kesan
Why "Bad" Patents Survive In The Market And How Should We Change?--The Private And Social Costs Of Patents, Jay P. Kesan
ExpressO
In this paper, we formally demonstrate that incorrectly issued patents can survive in the market without judicial review, even when the invention is neither novel nor non-obvious. We support this contention by presenting a game theoretic model that studies the interaction between the patentee and an alleged infringer/challenger. Using this model, we demonstrate the impact of the transaction costs in the patent system at the administrative stage in the Patent Office and at the enforcement stage in the courts, and highlight the inability in our current system to mount effective challenges to improperly granted patents in the current system. We …
Communication Breakdown?: The Future Of Global Connectivity After The Privatization Of Intelsat, Kenneth D. Katkin
Communication Breakdown?: The Future Of Global Connectivity After The Privatization Of Intelsat, Kenneth D. Katkin
ExpressO
In 1971, 85 nations (including the United States) formed the International Telecommunications Satellite Organization “INTELSAT,” a public intergovernmental treaty organization. INTELSAT was charged with operating the world’s first global telecommunications satellite system, in order to guarantee the interconnectedness of the world’s communications systems and the availability of international telecommunications service to every nation on earth. By the late 1980s, however, INTELSAT’s operations began to experience substantial competition from the private sector. In 2000, the proliferation of privately-owned telecommunications satellites and transoceanic fiber optic cables led the U.S. Congress to mandate the privatization of INTELSAT. That privatization process began in 2001, …
Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner
Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner
All Faculty Scholarship
No abstract provided.
Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner
Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner
Richard Warner
No abstract provided.
The Nlra In A Technological Society: A Law Not Busy Being Born, Is Busy Dying, William A. Herbert
The Nlra In A Technological Society: A Law Not Busy Being Born, Is Busy Dying, William A. Herbert
William A. Herbert
No abstract provided.
Keeping Score: The Struggle For Music Copyright, Michael W. Carroll
Keeping Score: The Struggle For Music Copyright, Michael W. Carroll
ExpressO
Inspired by the passionate contemporary debates about music copyright, this Article investigates how, when, and why music first came within copyright's domain. Although music publishers and recording companies are among the most aggressive advocates for strong copyright protection today, when copyright law was first invented in eighteenth-century England, music publishers resisted its extension to music. This Article sheds light on a series of early legal disputes concerning printed music that yield important insights into original understandings of copyright law and music's role in society. By focusing attention on this understudied episode, this Article demonstrates that the concept of copyright was …
Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler
Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler
George Mason University School of Law Working Papers Series
The last decade has seen remarkable process in understanding ongoing psychological processes at the neurobiological level, progress that has been driven technologically by the spread of functional neuroimaging devices, especially magnetic resonance imaging, that have become the research tools of a theoretically sophisticated cognitive neuroscience. As this research turns to specification of the mental processes involved in interpersonal deception, the potential evidentiary use of material produced by devices for detecting deception, long stymied by the conceptual and legal limitations of the polygraph, must be re-examined. Although studies in this area are preliminary, and I conclude they have not yet satisfied …
Disrobe Dot Com For The Aclu: Ashcroft V. Aclu, A Strict Scrutiny Review For The Child Online Protection Act, Roger W. Stepp
Disrobe Dot Com For The Aclu: Ashcroft V. Aclu, A Strict Scrutiny Review For The Child Online Protection Act, Roger W. Stepp
ExpressO
No abstract provided.
Installed Base Opportunism And The Scope Of Intellectual Property Rights In Software Products, Andrew Chin
Installed Base Opportunism And The Scope Of Intellectual Property Rights In Software Products, Andrew Chin
Faculty Publications
No abstract provided.
The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland
The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland
H. Brian Holland
No abstract provided.
Treason, Technology, And Freedom Of Expression, Tom W. Bell
Treason, Technology, And Freedom Of Expression, Tom W. Bell
Tom W. Bell
The power to punish treason against the U.S. conflicts with the First Amendment freedoms of speech and of the press. Far from a question of mere theory, that conflict threatens to chill public dissent to the War on Terrorism. The government has already demonstrated its willingness to punish treasonous expression. After World War II, the United States won several prosecutions against citizens who had engaged in propaganda on behalf of the Axis powers. Today, critics of the War on Terrorism likewise face accusations of treason. Under the law of treasonous expression developed following World War II, those accusations could credibly …
The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland
The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland
H. Brian Holland
No abstract provided.
Inherently Dangerous: The Potential For An Internet-Specific Standard Restricting Speech That Performs A Teaching Function, H. Brian Holland
Inherently Dangerous: The Potential For An Internet-Specific Standard Restricting Speech That Performs A Teaching Function, H. Brian Holland
H. Brian Holland
No abstract provided.