Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law

PDF

2015

Articles 1 - 17 of 17

Full-Text Articles in Social and Behavioral Sciences

Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler Jul 2015

Games Are Not Coffee Mugs: Games And The Right Of Publicity, 29 Santa Clara Computer & High Tech. L.J. 1 (2012), William K. Ford, Raizel Liebler

William K. Ford

Are games more like coffee mugs, posters, and T-shirts, or are they more like books, magazines, and films? For purposes of the right of publicity, the answer matters. The critical question is whether games should be treated as merchandise or as expression. Three classic judicial decisions, decided in 1967, 1970, and 1973, held that the defendants needed permission to use the plaintiffs' names in their board games. These decisions judicially confirmed that games are merchandise, not something equivalent to more traditional media of expression. As merchandise, games are not like books; instead, they are akin to celebrity-embossed coffee mugs. To …


The Spectrum Of Control: A Social Theory Of The Smart City, Jathan Sadowski, Frank A. Pasquale Jul 2015

The Spectrum Of Control: A Social Theory Of The Smart City, Jathan Sadowski, Frank A. Pasquale

Faculty Scholarship

There is a certain allure to the idea that cities allow a person to both feel at home and like a stranger in the same place. That one can know the streets and shops, avenues and alleys, while also going days without being recognized. But as elites fill cities with “smart” technologies—turning them into platforms for the “Internet of Things” (IoT): sensors and computation embedded within physical objects that then connect, communicate, and/or transmit information with or between each other through the Internet—there is little escape from a seamless web of surveillance and power. This paper will outline a social …


The "Csi Effect" And Its Potential Impact On Juror Decisions, John Alldredge May 2015

The "Csi Effect" And Its Potential Impact On Juror Decisions, John Alldredge

Themis: Research Journal of Justice Studies and Forensic Science

The “CSI Effect” was first described in the media as a phenomenon resulting from viewing forensic and crime based television shows. This effect influences jurors to have unrealistic expectations of forensic science during a criminal trial and affect jurors’ decisions in the conviction or acquittal process. Research has shown the “CSI Effect” has a possible pro-defense bias, in that jurors are less likely to convict without the presence of some sort of forensic evidence. Some studies show actors in the criminal justice system are changing their tactics, as if this effect has a significant influence, causing them to request unnecessary …


The World’S Laboratory: China’S Patent Boom, It Standards And The Implications For The Global Knowledge, Christopher Mcelwain, Dennis Fernandez Apr 2015

The World’S Laboratory: China’S Patent Boom, It Standards And The Implications For The Global Knowledge, Christopher Mcelwain, Dennis Fernandez

Christopher McElwain

Just as China’s factories disrupted the economics of IT hardware, its research labs have the potential to disrupt the economics of the technology itself. In 2014, China’s patent office received nearly 2.4 million patent applications, 93% from domestic applicants. China has also climbed to third place in terms of international applications, with over 21,000 WIPO PCT applications. Meanwhile, China has taken an assertive role in setting technology standards, both at the national and international levels. In the past, this has included developing and promoting alternatives to important IT standards as a means of challenging perceived monopolies by certain (foreign-dominated) technologies. …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


New Start From Old Beginnings?, Michaela Ruhlmann Apr 2015

New Start From Old Beginnings?, Michaela Ruhlmann

History Capstone Research Papers

This paper examines the extent of which START I and New START achieved effective balance of power between the United States and Russia. It addresses the purpose, agreements and the impact of START I and New Start on the effectiveness in accomplishing global balance of power. This paper argues that while the original START I accomplished a global balance of power by equalizing reduction of nuclear arsenals in both countries, but that New START did not accomplish a long-term global balance of power. To best demonstrate this, “New START from Old Beginnings?” covers START I’s historical context, examine its actual …


Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern Apr 2015

Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern

All Faculty Scholarship

Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …


Through The Lens Of Innovation, Mirit Eyal-Cohen Feb 2015

Through The Lens Of Innovation, Mirit Eyal-Cohen

Mirit Eyal-Cohen

The legal system constantly follows the footsteps of innovation and attempts to discourage its migration overseas. Yet, present legal rules that inform and explain entrepreneurial circumstances lack a core understanding of the concept of innovation. By its nature, law imposes order. It provides rules, remedies, and classifications that direct behavior in a consistent manner. Innovation turns on the contrary. It entails making creative judgments about the unknown. It involves adapting to disarray. It thrives on deviations as opposed to traditional causation. This Article argues that these differences matter. It demonstrates that current laws lock entrepreneurs into inefficient legal routes. Using …


Shadow Dwellers: The Underregulated World Of State And Local Dna Databases, Stephen Mercer, Jessica D. Gabel Feb 2015

Shadow Dwellers: The Underregulated World Of State And Local Dna Databases, Stephen Mercer, Jessica D. Gabel

Jessica Gabel Cino

No abstract provided.


Waste And Duplication In Nasa Programs: The Need To Enhance U.S. Space Program Efficiency, Bert Chapman Feb 2015

Waste And Duplication In Nasa Programs: The Need To Enhance U.S. Space Program Efficiency, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

The U.S. Government faces acute budgetary deficits and national debt problems in the Obama Administration. These problems have been brought about by decades of unsustainable government spending affecting all agencies including the National Aeronautics and Space Administration. (NASA). An outgrowth of this fiscal profligacy is the presence of wasteful and duplicative programs within NASA that prevent this agency from achieving its space science and human spaceflight objectives. These problems occur due to mismanagement of these programs from NASA and the creation of these programs by the U.S. Congress and congressional committees. This occurs because congressional appropriators tend to be more …


Creative Copyright: Tailoring Intellectual Property Policies And Business Strategies For Creative Content Industries In The Digital Age, Bhamati Viswanathan Jan 2015

Creative Copyright: Tailoring Intellectual Property Policies And Business Strategies For Creative Content Industries In The Digital Age, Bhamati Viswanathan

SJD Dissertations

My dissertation explores intellectual property rights in three fields: fashion, music and education. I examine the varying degrees of IP rights in those fields, and ask whether the differing levels of rights are appropriate to keep these industries creative, innovative and robust. I further examine the salient characteristics of those rights and ask whether such an understanding might help to determine optimal levels of IP protection in other creative industries.


Researching The Early History Of The Patent Policy: Getting Started, Robert Berry Jan 2015

Researching The Early History Of The Patent Policy: Getting Started, Robert Berry

Librarian Publications

There are a lot of reasons to research the early history of American patent policy. It is an inherently interesting history that provides a framework making contemporary patent policy more comprehensible and a foundation for interpreting historic patent records. For students it provides an opportunity to become familiar with some of basic primary sources that are a staple of research into American history. Also, of course, questions may arise from time to time that can only be authoritatively answered by researching this history.

The approach described below seeks to balance comprehensiveness with feasibility, and emphasizes the importance of creating a …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp Jan 2015

Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp

Articles

Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.

This article presents …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo Jan 2015

Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo

All Faculty Scholarship

Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …