Subjects -> PATENTS, TRADEMARKS AND COPYRIGHTS (Total: 26 journals)
Showing 1 - 9 of 9 Journals sorted alphabetically
Berkeley Technology Law Journal     Free   (Followers: 14)
Expert Opinion on Therapeutic Patents     Hybrid Journal   (Followers: 12)
Fordham Intellectual Property, Media and Entertainment Law Journal     Open Access   (Followers: 20)
IIC - International Review of Intellectual Property and Competition Law     Hybrid Journal   (Followers: 28)
International Data Privacy Law     Hybrid Journal   (Followers: 22)
International Journal of Intellectual Property Management     Hybrid Journal   (Followers: 30)
IP Theory     Open Access   (Followers: 12)
JIPITEC Journal of Intellectual Property, Information Technology and E-Commerce Law     Open Access   (Followers: 24)
John Marshall Journal of Information Technology & Privacy Law     Full-text available via subscription   (Followers: 7)
John Marshall Review of Intellectual Property Law     Free   (Followers: 10)
Journal of Copyright in Education & Librarianship     Open Access   (Followers: 33)
Journal of Data Protection & Privacy     Full-text available via subscription   (Followers: 6)
Journal of Intellectual Property Law & Practice     Hybrid Journal   (Followers: 30)
Journal of Intellectual Property Rights (JIPR)     Open Access   (Followers: 23)
Law, State and Telecommunications Review     Open Access   (Followers: 1)
Marquette Intellectual Property Law Review     Open Access   (Followers: 14)
Northwestern Journal of Technology and Intellectual Property     Open Access   (Followers: 8)
Propiedad Intelectual     Open Access   (Followers: 1)
Recent Patents on Anti-Cancer Drug Discovery     Hybrid Journal   (Followers: 2)
Recent Patents on Anti-Infective Drug Discovery     Hybrid Journal   (Followers: 1)
Reports of Patent, Design and Trade Mark Cases     Hybrid Journal   (Followers: 5)
Revista La Propiedad Inmaterial     Open Access  
The Journal of World Intellectual Property     Hybrid Journal   (Followers: 26)
Ticaret ve Fikri Mülkiyet Hukuku Dergisi     Open Access  
Web Journal of Current Legal Issues     Open Access   (Followers: 6)
World Patent Information     Hybrid Journal   (Followers: 17)
Similar Journals
Journal Cover
John Marshall Journal of Information Technology & Privacy Law
Number of Followers: 7  
 
  Full-text available via subscription Subscription journal
ISSN (Print) 1078-4128
Published by John Marshall Law School Homepage  [5 journals]
  • Nothing Personal, It’s Just Business: How Google’s Course of Business
           Operates at the Expense of Consumer Privacy, 33 J. Marshall J. Info. Tech.
           & Privacy L. 187 (2018)
    • Authors: Kayla McKinnon
      PubDate: Wed, 06 Jun 2018 13:11:34 PDT
       
  • Are “Evan’s Law” and the Textalyzer Immediate Solutions to Today’s
           Rapid Changes in Technology or Encroachments on Drivers’ Privacy
           Rights', 33 J. Marshall J. Info. Tech. & Privacy L. 143 (2018)
    • Authors: Aggie Baumert
      PubDate: Wed, 06 Jun 2018 13:11:27 PDT
       
  • Oversharenting: Is It Really Your Story to Tell', 33 J. Marshall J.
           Info. Tech. & Privacy L. 121 (2018)
    • Authors: Holly Kathleen Hall
      Abstract: Social media is about sharing information. If you are a parent, often the tendency is to relate every aspect of your children’s lives. Most of the time, children do not consent to postings about them and will have a permanent digital shadow created by their parents that follows them the rest of their lives. The purpose of this article is to analyze the current status and potential future of children’s online privacy from a comparative legal approach, highlighting recent case law in the United Kingdom, which is trending toward carving out special privacy rights for children. This contrasts with the United States approach, where once a photo or similar content is posted online, a right to privacy is essentially lost. Based on recent United States Supreme Court case opinions, and the state law movement to regulate in this area, as exemplified by the so-called “Eraser Law” in California. the time may be ripe to reexamine the “reasonable expectation of privacy” for children online and develop methods and a cause of action that allow children to take control of their own online story.
      PubDate: Wed, 06 Jun 2018 13:11:20 PDT
       
  • Protecting Colleges & Universities Against Real Losses in a Virtual World,
           33 J. Marshall J. Info. Tech. & Privacy L. 101 (2017)
    • Authors: Gregory Demers et al.
      Abstract: Colleges and universities are prime targets for cyberattacks.
      Authors Gregory L. Demers, Seth C. Harrington, Mark A. Cianci, and Nicholas R. Green explore emerging data security risks and litigation trends on college campuses, and offer ways to manage these risks through a comprehensive insurance plan. Given the increasing variety and complexity of plans available, it is incumbent upon universities to regularly reassess the coverage afforded by their existing policies.
      PubDate: Mon, 05 Mar 2018 10:37:45 PST
       
  • Exposure to Police Brutality Allows for Transparency and Accountability of
           Law Enforcement, 33 J. Marshall J. Info. Tech. & Privacy L. 75 (2017)
    • Authors: Kendal Harden
      Abstract: Thanks to the advancements in technology and valor of citizens, the public is finally able to understand the true severity of police brutality within the United States. The following considerations aim to address the lack of accountability and transparency of police brutality in the United States today. Part III will show how advancements in technology brings police brutality to the forefront of our nation’s issues by creating an informed society. Part IV will describe how individual states control the use of private cameras and cell phones of citizens to capture occurrences of police brutality. States do this by employing anti-wiretapping statutes to citizens’ recordings of on-duty police officers. Part V will demonstrate how citizens’ recordings of police brutality are vital for accountability. Finally, Part VI will conclude by encouraging community policing as a solution to police brutality.
      PubDate: Mon, 05 Mar 2018 10:37:42 PST
       
  • Ignorance of Technology a Pass for Violating Child Pornography Laws'
           – What’s the Cache', 33 J. Marshall J. Info. Tech. & Privacy L. 47
           (2017)
    • Authors: Angela Lewosz
      Abstract: This comment explains how the cache works, discusses computer forensic examinations, and provides a history of child pornography laws. It next explores how the courts have interpreted the changing pornography laws with advances in technology. It then specifically assesses the different approaches the courts take when reconciling the mens rea (the mental element) of knowledge in accordance with possession. Finally, this comment analyzes the strengths and flaws in the courts’ arguments and suggests a proposal for how the courts should deal with the cache in relation to the criminalization of possession within the federal child pornography laws.
      PubDate: Mon, 05 Mar 2018 10:37:39 PST
       
  • RFID Implementation: Testing in Prisons and Parolees for the Greater Good,
           33 J. Marshall J. Info. Tech. & Privacy L. 22 (2016)
    • Authors: Mirko Akrap
      PubDate: Wed, 15 Mar 2017 09:11:22 PDT
       
  • Drone Integration: A Pilot's Solution To A Serious Entertainment
           Problem, 33 J. Marshall J. Info. Tech. & Privacy L. 1 (2016)
    • Authors: Daniel Shoffet
      Abstract: This paper will explain the current state regarding the integration of commercial and recreational drones into the United States’ airspace with general aviation, as well as identify whether drones and general aviation incidents are common or are likely to occur. This paper will also analyze proposed regulations by the Federal Aviation Administration and any drawbacks that come along with them, as well as other proposed solutions to the current problem with integration of drones. Additionally, this paper will propose a solution which incorporates the use of current aviation technologies to solve the drone integration problem: mandating commercial drone operators to file pinpoint flight plans and regulating the construction of all drones to include ADS-B receivers is the most efficient and effective way to safely integrate UAVs into the National Airspace System.
      PubDate: Wed, 15 Mar 2017 09:11:17 PDT
       
  • How Can The Government Sustain People's Privacy Interests as the Real
           Estate Industry Adopts and Applies a Fully Electronic System' 32 J.
           Marshall J. Info. Tech. & Privacy L. 321 (2016)
    • Authors: Drago Putica
      PubDate: Tue, 25 Oct 2016 14:05:41 PDT
       
  • The Presumption of Injury: Giving Data Breach Victims "A Leg To Stand On,"
           32 J. Marshall J. Info. Tech. & Privacy L. 301 (2016)
    • Authors: Corey Varma
      PubDate: Tue, 25 Oct 2016 14:05:36 PDT
       
  • Smart Washers May Clean Your Clothes, But Hacks Can Clean Out Your
           Privacy, and Underdeveloped Regulations Could Leave You Hanging on a Line,
           32 J. Marshall J. Info. Tech. & Privacy L. 259 (2016)
    • Authors: Nikole Davenport
      Abstract: A house is equipped with a smart clothes washer, an intelligent HVAC system and a video enabled home security system, all running through the home network - it reduces the noise by doing laundry when no one is at home, saves energy costs by automatically changing the temperature depending who is in a room, lets the owner remotely see the kids walk in the door after school, and keeps the house safe - the owner is maximizing the use of the Internet of Things (“IoT”) devices (i.e. a network of everyday objects connected to the Internet and to each other). However, the home owner has also created at least four points for data vulnerabilities, giving a hacker four opportunities to enter the home. A single hack can allow a wrongdoer to determine when no one is home and access an empty house, spy on the children and collect PIN numbers and any sensitive data recorded by any or all of the IoT service providers, like credit card numbers. When such a data breach happens, what legal protections does a consumer have' What regulatory infrastructure is in place to prevent this type of intrusion, what data is considered protectable personal identifying information (PII), what obligations do the manufacturers have to prevent hacks, and what remedies are available to those whose privacy has been corrupted' This paper attempts to address the growing infiltration of the IoT into everyday life and to answer some of these questions by looking at the current US legal framework addressing privacy.
      PubDate: Tue, 25 Oct 2016 14:05:31 PDT
       
  • Rise of the Mosaic Theory: Implications for Cell Site Location Tracking By
           Law Enforcement, 32 J. Marshall J. Info. Tech. & Privacy L. 236 (2016)
    • Authors: Lance Selva et al.
      Abstract: The authors examine the unique legal and privacy implications that cell site location information tracking by law enforcement poses for current Fourth Amendment jurisprudence. Following a brief explanation of how cell phone tracking works, their discussion is directed to the concept of privacy under the Fourth Amendment both prior to and following the seminal Supreme Court decision of Katz v. United States (1967), including a review of the Supreme Court’s historical treatment of tracking devices post-Katz. Consideration is then directed to the United States. v. Maynard (2010) decision, where the court employed the “mosaic” theory in a Fourth Amendment search framework and how its adoption of the mosaic has created a novel approach for broadening privacy protections. The authors maintain that the two concurring opinions endorsing a mosaic approach in the United States v. Jones (2012) GPS tracking decision suggest that the theory will have continuing vitality in shaping the debate between personal privacy and effective law enforcement as technology evolves.
      PubDate: Tue, 25 Oct 2016 14:05:26 PDT
       
  • How an Acoustic Sensor Can Catch a Gunman, 32 J. Marshall J. Info. Tech.
           & Privacy L. 211 (2016)
    • Authors: Amanda Busljeta
      Abstract: Conversations said in public do not have an expectation of privacy, and therefore, the ShotSpotter does not violate the right to privacy. This comment will address the following: a) ShotSpotter technology is a necessity in all neighborhoods; b) ShotSpotter does not violate an individual’s expectation of privacy; c) the need for ShotSpotter outweighs the cost of the device; and e) regulations and economic solutions will allow cities to use ShotSpotter while still protecting the individual’s privacy rights.
      PubDate: Mon, 06 Jun 2016 13:57:02 PDT
       
  • Following in The European Union’s Footsteps: Why The United States
           Should Adopt its Own “Right To Be Forgotten” Law for Crime Victims, 32
           J. Marshall J. Info. Tech. & Privacy L. 185 (2016)
    • Authors: Erin Cooper
      Abstract: This comment aims to look at this intersection between Google search results, their lack of removal options in the United States, and the potential harm this can cause crime victims. The comment will begin by assessing Google’s method for delivering search results, and its general removal process for most non-European nations. Then, this comment will continue by looking at the European Union and its “right to be forgotten” ruling that allows people in certain circumstances to remove their personal information from the Internet, and what the United States can learn from its implementation. Moreover, we will then contrast the European Union with the United States. Here, the fo-cus will be on the First Amendment’s Freedom of Speech and protec-tions of privacy. Lastly, this comment will suggest a method for Google to solve this serious issue that would protect victims’ privacy and en-sure that the first item to come up in Google search results would not connect them to the crime committed against them.
      PubDate: Mon, 06 Jun 2016 13:56:55 PDT
       
  • The Protection of Pioneer Innovations – Lessons Learnt from the
           Semiconductor Chip Industry and its IP Law Framework, 32 J. Marshall J.
           Info. Tech. & Privacy L. 151 (2016)
    • Authors: Thomas Hoeren
      Abstract: In the second half of the 20th century, semiconductor technology as integrated circuits (IC), commonly known as microchips, became more and more dominating in our lives. Microchips are the control center of simple things like toasters as well as of complex high-tech machines for medical use. Of course, they also define the hearts of each computer. With the invention of semiconductor technology, a whole new economic sector began its rise and soon played a major role in the economies of the large industrial countries like the U.S., Japan and the EC. Especially, it stands out for its innovational power and its readiness to in-vest. Microchips are a symbol for the modern industrial society.In the following considerations, I will try to show how and why semiconductors became a major technical innovation (Part 1). Then, I will discuss some of the important features of the global “ecosystem” of the chip industry (Part 2). All these observations will lead to the main chapter discussing the existing sui generis protection for the layout of semiconductors (Part 3) and the economic and legal reasons for its collapse (Part 4), along with the continuing high value of the “classical” IP rights such as patents and copyright.
      PubDate: Mon, 06 Jun 2016 13:56:46 PDT
       
  • Health Information and Data Security Safeguards, 32 J. Marshall J. Info.
           Tech. & Privacy L. 133 (2016)
    • Authors: Jane Kim et al.
      Abstract: The healthcare industry possesses information coveted by cyber criminals. Unfortunately, healthcare providers are also among the most vulnerable and unprepared to deal with cyber attacks. The Introduction sets the background of this paper with cyber security statistics of the healthcare sector. Part A of this paper will discuss how new Russian law impacts global data security. Part B takes a broad look at data security safeguards. Part C focuses on U.S. attempts at safeguarding data through NIST and its Presidential Policy Directive. In Part D, the paper explores in greater detail causes that precipitate security breaches and specific security defenses that may be implemented. Lastly, Part E ex-amines compliance programs that are essential in detecting, preventing or, at least, minimizing security threats and hacks, further obviating individual responsibility of corporate officers for breaches.
      PubDate: Mon, 06 Jun 2016 13:56:39 PDT
       
  • Digital Love: Where Does the Marital Communications Privilege Fit in the
           World of Social Media Communications, 32 J. Marshall J. Info. Tech. &
           Privacy L. 105 (2016)
    • Authors: Nicole Scott
      Abstract: This comment explores the impact of recent developments in communication on the applicability of the marital communications privilege. Particularly, this article explores the role social media communication plays, focusing on whether a change is necessary for the privilege to adhere to the recent changes in marriage and communication. Part II of this article discusses the history of the marital privilege, the evolution of marriage, and the history of social media. Part III proposes the need to extend the marital privilege to include private communications on social media. I will advocate for this by comparing the Privilege to other communication privileges, analyzing the Privilege’s current status relating to electronic communications (including text messages and emailing), and evaluating the current state of marriage in relation to the Privilege.
      PubDate: Wed, 16 Mar 2016 13:44:53 PDT
       
  • Enhancing Justice Administration in Nigeria through Information and
           Communications Technology, 32 J. Marshall J. Info. Tech. & Privacy L. 89
           (2016)
    • Authors: Halima Doma
      Abstract: The end of the twentieth century brought about the system of In-formation Communication Technologies (“ICT”) which represents the start of a new era. Communication is faster and more efficient than ever before. As a result, the world is brought closer together. Our means of communication and social interactions have changed dramatically. Due to the technological communication advances, we are no longer tied to our desks to make phone calls or have to travel thousands of miles for meetings. ICT enables us to contact friends, family and business colleagues at the touch of a button whatever the time, wherever the place. There are billions of daily internet users and every two days, “[w]e create as much information as we did from the dawn of civilization up until 2003.” ICT and the Internet are not momentary obsessions; on the contrary, courtesy of cloud computing, information and processing power are increasingly being made available as a utility, in the manner of water and electricity. There has been much coverage on the effects that ICT has had on our lives generally but it is particularly interesting to investigate how this technology is transforming the judicial sector. This article looks into the effect that ICT has had on judicial administration generally, after which the case study of Nigeria is analyzed. The way in which this technology can enhance the justice system in a country where illiteracy, insecurity, corruption, lack of training and lack of access to justice are all severe problems, will be considered before concluding that ICT stands to be vital in helping a country such as Nigeria develop not only its legal system but its economy.
      PubDate: Wed, 16 Mar 2016 13:44:47 PDT
       
  • Autonomy of Military Robots: Assessing the Technical and Legal (“Jus In
           Bello”) Thresholds, 32 J. Marshall J. Info. Tech. & Privacy L. 57 (2016)
           
    • Authors: Remus Titiriga
      Abstract: While robots are still absent from our homes, they have started to spread over battlefields. However, the military robots of today are mostly remotely controlled platforms, with no real autonomy. This paper will disclose the obstacles in implementing autonomy for such systems by answering a technical question: What level of autonomy is needed in military robots and how and when might it be achieved, followed by a techno-legal one: How to implement the rules of humanitarian law within autonomous fighting robots, in order to allow their legal deployment' The first chapter scrutinizes the significance of autonomy in robots and the metrics used to quantify it, which were developed by the US Department of Defense. The second chapter focuses on the autonomy of "state-of-the-art” robots (e.g.; Google’s self-driving car, DARPA’s projects, etc.) for navigation, ISR or lethal missions. Based on public information, we will get a hint of the architectures, the functioning, the thresholds and technical limitations of such systems. The bottleneck to a higher autonomy of robots seems to be their poor “perceptive intelligence.” The last chapter looks to the requirements of humanitarian law (rules of “jus in bello”/rules of engagement) to the legal deployment of autonomous lethal robots on the battlefields. The legal and moral reasoning of human soldiers, complying with humanitarian law, is a complex cognitive process which must be emulated by autonomous robots that could make lethal decisions. However, autonomous completion of such “moral” tasks by artificial agents is much more challenging than the autonomous implementation of other tasks, such as navigation, ISR or kinetic attacks. Given the limits of current Artificial Intelligence, it is highly unlikely that robots will acquire such moral capabilities anytime soon. Therefore, for the time being, the autonomous weapon systems might be legally deployed, but only in very particular circumstances, where the requirements of humanitarian law happen to be irrelevant.
      PubDate: Wed, 16 Mar 2016 13:44:42 PDT
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 34.204.191.145
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-