The Internet of Heirlooms and Disposable Things
Abstract: The Internet of Things (“IoT”) is here, and we seem to be going all in. We are trying to put a microchip in nearly every object that is not nailed do…
Abstract: The Internet of Things (“IoT”) is here, and we seem to be going all in. We are trying to put a microchip in nearly every object that is not nailed do…
Online tracking: A 1-million-site measurement and analysis is the largest and most detailed measurement of online tracking to date. We measure stateful (cookie-…
For some crimes the entire law enforcement process can now be automated. No humans are needed to detect the crime, identify the perpetrator, or impose punishmen…
Abstract: Rarely does a day seem to go by without another front page story about a firm being breached by cyber attackers. Even experts in the field are far fr…
In the last two decades, the industry has deployed endlessly the rhetoric of the “digital threat” in order to demand harsher measures against digital piracy. Re…
Abstract: The commission of mass atrocities — genocide, crimes against humanity, and war crimes — inevitably generates clarion calls for accountability from a…
This paper maps the range of war crimes being committed in Syria with reference to the applicable treaty and customary international law and prospects for prose…
Trademark Use Doctrine in the European Union and Japan Martin Husovec Tilburg University - Tilburg Institute for Law, Technology, and Society (TILT); Tilburg…
Abstract: This article closely examines a half century of case law involving robots—just in time for the technology itself to enter the mainstream. Most of the…
Abstract: Although it might puzzle or even infuriate data scientists, suspicion about big data is understandable. The concept doesn’t seem promising to most pe…
Scott Shackelford Indiana University - Kelley School of Business - Department of Business Law; Stanford Law School; Hoover Institution, Stanford University; Ce…
Although much work has been done on applying the law of warfare to cyber attacks, far less attention has been paid to defining a law of cyber peace applicable b…