Pittsburgh Journal of Technology Law and Policy最新文献

筛选
英文 中文
Understanding the Promises and Pitfalls of Outer Space Mining and the Need for an International Regulatory Body to Govern the Extraction of Space-Based Resources 了解外层空间采矿的前景和陷阱以及建立一个管理天基资源开采的国际监管机构的必要性
Pittsburgh Journal of Technology Law and Policy Pub Date : 2019-05-24 DOI: 10.5195/TLP.2019.229
M. Powell
{"title":"Understanding the Promises and Pitfalls of Outer Space Mining and the Need for an International Regulatory Body to Govern the Extraction of Space-Based Resources","authors":"M. Powell","doi":"10.5195/TLP.2019.229","DOIUrl":"https://doi.org/10.5195/TLP.2019.229","url":null,"abstract":"Space exploration is about to undergo a monumental change and the global legal and regulatory infrastructure is massively unprepared. When the bulk of international space law was written, the Cold War was raging, and man had not even landed on the Moon yet. Now, thanks to advances in technology, a seismic shift has occurred which will see private industry leading the future of space exploration with national space agencies as partners, rather than the other way around as has been the status quo for decades. One of the most lucrative possibilities luring private firms to space is the opportunity to extract resources from a celestial body such as an asteroid, another planet, or the Moon. It is estimated that trillions of dollars’ worth of precious metals, liquids, and gasses exist on these bodies. A galactic resource race will soon be underway, and space-faring nations must take the lead to ensure that legal, economic, and environmental issues posed by such space exploration is hammered out before it is too late. I assert that if left to their own devices, firms will fail to follow the same standard of their fore-father government space agencies. As a result, we need an international agreement or body for the twenty-first century to govern and regulate the extraction of resources from outer space led by the great space hegemons.","PeriodicalId":170628,"journal":{"name":"Pittsburgh Journal of Technology Law and Policy","volume":"18 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116727760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Missing Links: The First Amendment's Place in an Ever-Changing Web 缺失的环节:第一修正案在不断变化的网络中的地位
Pittsburgh Journal of Technology Law and Policy Pub Date : 2019-04-24 DOI: 10.5195/TLP.2019.228
E. Holliday
{"title":"Missing Links: The First Amendment's Place in an Ever-Changing Web","authors":"E. Holliday","doi":"10.5195/TLP.2019.228","DOIUrl":"https://doi.org/10.5195/TLP.2019.228","url":null,"abstract":"Legal questions remain surrounding hateful rhetoric online, including when the government should or can legally step in and do something to prevent acts of terror or hate crimes. This Article explores the current legal landscape surrounding access to publishing online, and its benefits and costs for everyday users and private companies. Through a First Amendment lens, as well as other relevant case law, legislation, and regulation, this Article seeks to provide an understanding of the civil liberty implications of how a change in the law or policy would affect the rights of private companies and publishers and users, both readers and writers of content. This analysis focuses specifically on legal ramifications, protections, and liabilities of major social media outlets and news sites, as well as easily accessible online forums and public-facing websites of hate groups.","PeriodicalId":170628,"journal":{"name":"Pittsburgh Journal of Technology Law and Policy","volume":"437 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving the Transparency of the Pharmaceutical Supply Chain through the Adoption of Quick Response (QR) Code, Internet of Things (IoT), and Blockchain Technology: One Result: Ending the Opioid Crisis 通过采用快速反应(QR)码、物联网(IoT)和区块链技术提高药品供应链的透明度:一个结果:结束阿片类药物危机
Pittsburgh Journal of Technology Law and Policy Pub Date : 2019-03-07 DOI: 10.5195/TLP.2019.227
Justin Evans
{"title":"Improving the Transparency of the Pharmaceutical Supply Chain through the Adoption of Quick Response (QR) Code, Internet of Things (IoT), and Blockchain Technology: One Result: Ending the Opioid Crisis","authors":"Justin Evans","doi":"10.5195/TLP.2019.227","DOIUrl":"https://doi.org/10.5195/TLP.2019.227","url":null,"abstract":"Over the past two years, Americans in nearly every state have suffered adverse effects from counterfeit medications, many of whom have died. The main culprit is Fentanyl-tainted counterfeit opiates which often lead to fatal overdoses. The increasing epidemic of counterfeit prescription medications extends beyond social classes, gender, race, and age. For instance, pop star Prince recently overdosed on counterfeit Hydrocodone containing synthetic Fentanyl. Shockingly, one in ten medications sold in developing countries are counterfeit; either containing incorrect doses of active ingredients or containing toxic contaminants retained from the production process. The popularity of counterfeit medications stems from cheaper costs, but also because of the ease with which these counterfeit products can be purchased. While the blockchain has gained its fame from Bitcoin, its potential implications are far reaching. In this paper, I propose the use of QR code and the IoT (Internet of Things) sensor devices leveraging the blockchain for increased transparency of the pharmaceutical supply chain and manufacturing process. The data collected from the devices would then be transferred to the blockchain, enabling consumers to use an app to verify the provenance of their medication.","PeriodicalId":170628,"journal":{"name":"Pittsburgh Journal of Technology Law and Policy","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123355549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Break on Through: An Analysis of Computer Damage Cases 突破突破:计算机损害案例分析
Pittsburgh Journal of Technology Law and Policy Pub Date : 2014-05-23 DOI: 10.5195/TLP.2014.139
Ioana Vasiu, Lucian Vasiu
{"title":"Break on Through: An Analysis of Computer Damage Cases","authors":"Ioana Vasiu, Lucian Vasiu","doi":"10.5195/TLP.2014.139","DOIUrl":"https://doi.org/10.5195/TLP.2014.139","url":null,"abstract":"14 Pittsburgh Journal of Technology Law & Policy 158 (2014). This article is an extensive inquiry into computer damage cases based on the comprehensive study of over three hundred cases brought to courts in violation of 18 U.S.C. § 1030(a)(5). Based on an empirical categorization of the essential aspects of computer damage cases, the article analyzes the most relevant issues, interpretations, and arguments available for each computer damage category. These categories include fundamental facets, such as legal elements; motive and intent; results; profile of perpetrators; and means of perpetration, including, if applicable, the software involved.Part I concerns theoretical aspects and discusses the legal elements of computer damage offenses under the CFAA. Part II considers the practical aspects and discusses the essential features involved in the perpetration of these offenses and the profile of attackers. Finally, Part III provides a summary of findings and the implications of this study for stakeholders.This article makes two important contributions: a comprehensive analysis and a conceptual approach for this area. The findings will improve the investigation, prosecution and litigation of such cases in courts, help organizations in their process of identification and mitigation of risks, and stimulate more research in this area. Finally, although this article focused exclusively on one jurisdiction, the findings can be of interest to a wider, global context.","PeriodicalId":170628,"journal":{"name":"Pittsburgh Journal of Technology Law and Policy","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123757924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信