Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2024

Technology

Discipline
Institution
Publication
Publication Type

Articles 1 - 15 of 15

Full-Text Articles in Law

Digital Coercive Control (Dcc): The Role Of Platforms In Victims’ (In)Justice And Potential For Online Dispute Resolution, Reeve Lanigan Jun 2024

Digital Coercive Control (Dcc): The Role Of Platforms In Victims’ (In)Justice And Potential For Online Dispute Resolution, Reeve Lanigan

Pepperdine Dispute Resolution Law Journal

Domestic violence (DV) is a form of gender-based violence characterized by acts of coercion whereby a perpetrator employs power and control to isolate, surveil, harass, and abuse a current or former intimate partner. The rise of and reliance on digital technologies, especially social networking sites, have intensified gender-based violence and methods of perpetuating DV. The term Digital Coercive Control (DCC) describes mechanisms perpetrators use to stalk, harass, and abuse current or former partners in cyberspace through technological platforms and their associated social media sites. The widespread expansion and power allocated to social networking sites and technology platforms has perpetuated the …


From The Editor In Chief, Antulio J. Echevarria Ii May 2024

From The Editor In Chief, Antulio J. Echevarria Ii

The US Army War College Quarterly: Parameters

Welcome to the Summer 2024 issue of Parameters. We open this issue with a special “In Memoriam” by General Charles A. Flynn, Commander US Army Pacific, honoring the life and legacies of our director and consummate colleague, Carol V. Evans. We dedicate this issue to her. General Flynn’s memoriam is followed by an In Focus commentary on China’s Belt and Road Initiative. We then feature three forums covering the Russia-Ukraine War, the Middle East, and Professional Development. This issue also contains special essays on the role of professional writing, the US Army War College’s Civil-Military Relations Center, …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Downstreaming, Rachel Landy Apr 2024

Downstreaming, Rachel Landy

Articles

Spotify and its competitors all offer the same product at the same price. Why? Scholars have argued that relationships can be designed in a way that naturally promotes innovation. By “braiding” certain formal contracting practices with informal enforcement norms, parties develop a frame-work that supports trust and positive, long-term collaboration. This Article takes on this consensus and shows that not all braiding is good. Using the multibillion-dollar subscription music streaming business as an illustration, it demonstrates just how industry forces can, and do, overcome braiding’s positive slant. In that industry, the major record labels (Universal, Warner, and Sony) weaponize braiding …


The Use Of Virtual Technology In Federal Criminal Detention Proceedings During Covid-19, The Honorable Karen Wells Roby Apr 2024

The Use Of Virtual Technology In Federal Criminal Detention Proceedings During Covid-19, The Honorable Karen Wells Roby

Georgia Criminal Law Review

The COVID Pandemic presented unparalleled challenges to court operations and the administration of pretrial criminal proceedings. The combination of health concerns and constitutional considerations collided in a way requiring unprecedented creativity in court operations. While scholars have given guidance on how the state courts were functioning during the pandemic, researchers have not conducted an empirical analysis on how federal courts conducted pretrial detention hearings during COVID-19.

This analysis reports the results of both qualitative and empirical findings pretrial detention hearings in federal courts during COVID-19. I examined the state of operations of the district court in several the Fourth, Fifth, …


The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba Apr 2024

The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba

Northwestern University Law Review

Whistleblowers and leakers wield significant influence in technology law and policy. On topics ranging from cybersecurity to free speech, tech whistleblowers spur congressional hearings, motivate the introduction of legislation, and animate critical press coverage of tech firms. But while scholars and policymakers have long called for transparency and accountability in the tech sector, they have overlooked the significance of individual disclosures by industry insiders—workers, employees, and volunteers—who leak information that firms would prefer to keep private.

This Article offers an account of the rise and influence of tech whistleblowing. Radical information asymmetries pervade tech law and policy. Firms exercise near-complete …


The Future Of The International Financial System: The Emerging Cbdc Network And Its Impact On Regulation, Heng Wang, Simin Gao Apr 2024

The Future Of The International Financial System: The Emerging Cbdc Network And Its Impact On Regulation, Heng Wang, Simin Gao

Research Collection Yong Pung How School Of Law

Central bank digital currency (CBDC) is a digital form of fiat currency. CBDC has the potential to be a game challenger in the international financial system, bringing increased complexities arising from technology and regulatory considerations, as well as generating greater currency competition. As more states begin exploring CBDC, the interactions between actors may lead to the emergence of a new CBDC network. What shape would the emerging CBDC network take? What would its network effects be? What would be the impact of the CBDC network on the international financial system, or the global financial network? This article explores these questions …


The Consumer Bundle, Shelly Kreiczer-Levy Mar 2024

The Consumer Bundle, Shelly Kreiczer-Levy

Washington Law Review

Can property law have a consumer protection purpose? One of the most important consumer law concerns today is the limited control consumers have over the digital assets and software-embedded products they purchase. Current proposals for reform focus on classifying the transaction as either license or sale and rely mostly on contract law and consumer protection regulation with a few calls for restoring ownership rights. This Article argues that property law can protect consumers by establishing a minimum bundle of rights for consumers: the “consumer’s bundle.” Working with property theory and an analysis of property values, this Article explains the importance …


Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin Mar 2024

Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin

Washington Law Review

Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.

Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …


New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd Jan 2024

New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd

Fellow, Adjunct, Lecturer, and Research Scholar Works

This Article explores how fintech has disrupted the traditional rent-to-own (RTO) industry, giving rise to new, virtual RTO agreements (VirTOs). These VirTOs have enabled the RTO industry to expand into the service industry and to markets for products not traditionally associated with rentals, such as vehicle repairs, pet ownership, and medical devices. This Article analyzes this development.

RTO agreements purport to rent products to a consumer until the conclusion of a set number of renewable rental payments, at which point ownership transfers. The fundamental characteristic of these agreements – and why they are not regulated as loans – are that …


Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real Jan 2024

Breaking Algorithmic Immunity: Why Section 230 Immunity May Not Extend To Recommendation Algorithms, Max Del Real

Washington Law Review Online

In the mid-1990s, internet experiences were underwhelming by today’s standards, despite the breakthrough technologies at their core. When a person logged on to the internet, they were met with a static experience. No matter who you were, where you were, or how you accessed a particular website, it rendered a consistent page. Today, internet experiences are personalized, dynamic, and vast—a far cry from the digital landscape of just a few decades ago. While today’s internet is unrecognizable compared with its early predecessors, many of its governing laws remain materially unaltered. In particular, section 230 of the Communications Act, which passed …


Contract-Wrapped Property, Danielle D'Onfro Jan 2024

Contract-Wrapped Property, Danielle D'Onfro

Scholarship@WashULaw

For nearly two centuries, the law has allowed servitudes that “run with” real property while consistently refusing to permit servitudes attached to personal property. That is, owners of land can establish new, specific requirements for the property that bind all future owners—but owners of chattels cannot. In recent decades, however, firms have increasingly begun relying on contract provisions that purport to bind future owners of chattels. These developments began in the context of software licensing, but they have started to migrate to chattels not encumbered by software. Courts encountering these provisions have mostly missed their significance, focusing instead on questions …


How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein Jan 2024

How Can Law Enforcement Use Technology To Protect Citizens Justly?, Zach Kantenwein

Emerging Writers

This paper explores the danger of emerging artificial intelligence technology perpetuating racial injustice in law enforcement and how police can ensure the protection of citizens amid this information age. We dissect a real-world case in which AI predictive policing technology resulted in alarming racial discrimination against American minority citizens. We discuss the possible explanations for this result and explore the limitations of artificial intelligence technology. Furthermore, we brainstorm methods for ensuring American citizens' just and constitutional protection as new technology is developed and tested. We propose implementing transparency laws that make the details about any policing technology and surveillance available …


Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan Jan 2024

Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan

Faculty Scholarship

Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.

Privacy nicks come from the …


Open Source Perfume, Amanda Levendowski Jan 2024

Open Source Perfume, Amanda Levendowski

Georgetown Law Faculty Publications and Other Works

ABRIDGED ABSTRACT: Perfume is a powerful art and technology, but its secrets are closely held by a privileged few - by some counts, there are more astronauts than there are perfumers. As critics have noted increasingly since 2020, those select few perfumers often share similar backgrounds. As interviews with American, British, and French perfumemakers reveal, intellectual property (IP) also plays a gatekeeping role in perfumery. Drawing on work by perfumer and educator Saskia Wilson-Brown, this Article suggests that perfumery is overdue for a transformation. One is emerging: open source perfume. For those seeking ways to share scents and signal commitment …