Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 47 of 47

Full-Text Articles in Law

Law’S Box: Law, Jurisprudence And The Information Ecosphere, Paul D. Callister Apr 2005

Law’S Box: Law, Jurisprudence And The Information Ecosphere, Paul D. Callister

ExpressO

For so long as it has been important to know “what the law is,” the practice of law has been an information profession. Nonetheless, just how the information ecosphere affects legal discourse and thinking has never been systematically studied. Legal scholars study how law attempts to regulate information flow, but they say little about how information limits, shapes, and provides a medium for law to operate.

Part I of the paper introduces a holistic approach to “medium theory”—the idea that methods of communication influence social development and ideology—and applies the theory to the development of legal thinking and institutions. Part …


Block Me Not: Are Patented Genes 'Essential Facilities'?, Shamnad Basheer Apr 2005

Block Me Not: Are Patented Genes 'Essential Facilities'?, Shamnad Basheer

ExpressO

The biopharmaceutical industry is characterized by the ‘cumulative innovation’ paradigm, wherein the discovery of a gene sequence is only the first step. In order to convert such sequence information into viable products, tests and cures for genetic conditions and diseases, vast amounts of additional time, effort and money have to be spent. It is feared that patents over upstream gene sequences may ‘block’ further downstream research and consequently adversely impact drug discovery, as many diseases today are known to have genetic origins.

This ‘blocking’ or ‘restricted access’ issue has been the subject of several important papers and a wide array …


Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler Mar 2005

Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler

ExpressO

The last decade has seen remarkable process in understanding ongoing psychological processes at the neurobiological level, progress that has been driven technologically by the spread of functional neuroimaging devices, especially magnetic resonance imaging, that have become the research tools of a theoretically sophisticated cognitive neuroscience. As this research turns to specification of the mental processes involved in interpersonal deception, the potential evidentiary use of material produced by devices for detecting deception, long stymied by the conceptual and legal limitations of the polygraph, must be re-examined. Although studies in this area are preliminary, and I conclude they have not yet satisfied …


Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn Mar 2005

Material Vulnerabilities: Data Privacy, Corporate Information Security And Securities Regulation, Andrea M. Matwyshyn

ExpressO

This article undertakes a normative and empirical legal inquiry into the manner information security vulnerabilities are being addressed through law and in the marketplace. Specifically, this article questions the current legislative paradigm for information security regulation by presenting a critique grounded in information security and cryptography theory. Consequently, this article advocates shifting our regulatory approach to a process-based security paradigm that focuses on improving security of our system as a whole. Finally, this article argues that in order to accomplish this shift with least disruption to current legal and economic processes, expanding an existing set of well-functioning legal structures is …


Why "Bad" Patents Survive In The Market And How Should We Change?--The Private And Social Costs Of Patents, Jay P. Kesan Mar 2005

Why "Bad" Patents Survive In The Market And How Should We Change?--The Private And Social Costs Of Patents, Jay P. Kesan

ExpressO

In this paper, we formally demonstrate that incorrectly issued patents can survive in the market without judicial review, even when the invention is neither novel nor non-obvious. We support this contention by presenting a game theoretic model that studies the interaction between the patentee and an alleged infringer/challenger. Using this model, we demonstrate the impact of the transaction costs in the patent system at the administrative stage in the Patent Office and at the enforcement stage in the courts, and highlight the inability in our current system to mount effective challenges to improperly granted patents in the current system. We …


Communication Breakdown?: The Future Of Global Connectivity After The Privatization Of Intelsat, Kenneth D. Katkin Mar 2005

Communication Breakdown?: The Future Of Global Connectivity After The Privatization Of Intelsat, Kenneth D. Katkin

ExpressO

In 1971, 85 nations (including the United States) formed the International Telecommunications Satellite Organization “INTELSAT,” a public intergovernmental treaty organization. INTELSAT was charged with operating the world’s first global telecommunications satellite system, in order to guarantee the interconnectedness of the world’s communications systems and the availability of international telecommunications service to every nation on earth. By the late 1980s, however, INTELSAT’s operations began to experience substantial competition from the private sector. In 2000, the proliferation of privately-owned telecommunications satellites and transoceanic fiber optic cables led the U.S. Congress to mandate the privatization of INTELSAT. That privatization process began in 2001, …


Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner Mar 2005

Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner

All Faculty Scholarship

No abstract provided.


Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner Feb 2005

Surveillance And The Self: Privacy, Identity, And Technology, Richard Warner

Richard Warner

No abstract provided.


The Nlra In A Technological Society: A Law Not Busy Being Born, Is Busy Dying, William A. Herbert Feb 2005

The Nlra In A Technological Society: A Law Not Busy Being Born, Is Busy Dying, William A. Herbert

William A. Herbert

No abstract provided.


Keeping Score: The Struggle For Music Copyright, Michael W. Carroll Feb 2005

Keeping Score: The Struggle For Music Copyright, Michael W. Carroll

ExpressO

Inspired by the passionate contemporary debates about music copyright, this Article investigates how, when, and why music first came within copyright's domain. Although music publishers and recording companies are among the most aggressive advocates for strong copyright protection today, when copyright law was first invented in eighteenth-century England, music publishers resisted its extension to music. This Article sheds light on a series of early legal disputes concerning printed music that yield important insights into original understandings of copyright law and music's role in society. By focusing attention on this understudied episode, this Article demonstrates that the concept of copyright was …


Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler Feb 2005

Cross-Examining The Brain: A Legal Analysis Of Neural Imaging For Credibility Impeachment, Charles N. W. Keckler

George Mason University School of Law Working Papers Series

The last decade has seen remarkable process in understanding ongoing psychological processes at the neurobiological level, progress that has been driven technologically by the spread of functional neuroimaging devices, especially magnetic resonance imaging, that have become the research tools of a theoretically sophisticated cognitive neuroscience. As this research turns to specification of the mental processes involved in interpersonal deception, the potential evidentiary use of material produced by devices for detecting deception, long stymied by the conceptual and legal limitations of the polygraph, must be re-examined. Although studies in this area are preliminary, and I conclude they have not yet satisfied …


Disrobe Dot Com For The Aclu: Ashcroft V. Aclu, A Strict Scrutiny Review For The Child Online Protection Act, Roger W. Stepp Jan 2005

Disrobe Dot Com For The Aclu: Ashcroft V. Aclu, A Strict Scrutiny Review For The Child Online Protection Act, Roger W. Stepp

ExpressO

No abstract provided.


Installed Base Opportunism And The Scope Of Intellectual Property Rights In Software Products, Andrew Chin Jan 2005

Installed Base Opportunism And The Scope Of Intellectual Property Rights In Software Products, Andrew Chin

Faculty Publications

No abstract provided.


The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland Jan 2005

The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland

H. Brian Holland

No abstract provided.


Treason, Technology, And Freedom Of Expression, Tom W. Bell Dec 2004

Treason, Technology, And Freedom Of Expression, Tom W. Bell

Tom W. Bell

The power to punish treason against the U.S. conflicts with the First Amendment freedoms of speech and of the press. Far from a question of mere theory, that conflict threatens to chill public dissent to the War on Terrorism. The government has already demonstrated its willingness to punish treasonous expression. After World War II, the United States won several prosecutions against citizens who had engaged in propaganda on behalf of the Axis powers. Today, critics of the War on Terrorism likewise face accusations of treason. Under the law of treasonous expression developed following World War II, those accusations could credibly …


The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland Dec 2004

The Failure Of The Rule Of Law In Cyberspace? Reorienting The Normative Debate On Borders And Territorial Sovereignty, H. Brian Holland

H. Brian Holland

No abstract provided.


Inherently Dangerous: The Potential For An Internet-Specific Standard Restricting Speech That Performs A Teaching Function, H. Brian Holland Dec 2004

Inherently Dangerous: The Potential For An Internet-Specific Standard Restricting Speech That Performs A Teaching Function, H. Brian Holland

H. Brian Holland

No abstract provided.