首页 > 最新文献

Duke law and technology review最新文献

英文 中文
A Political Economy of Utopia 乌托邦的政治经济学
Pub Date : 2019-01-01 DOI: 10.4324/9780203469682.ch7
Y. Benkler
John Perry Barlow’s two essays capture a yearning to escape the oppressive clutches of the two most important institutional forms in modernity: the state and market society. A Declaration of the Independence of Cyberspace is explicitly against the modern state. One might say, “All right, but apart from the sanitation, the medicine, education, wine, public order, irrigation, roads, a fresh water system, and public health, what have the Romans ever done for us?”1 The Declaration reflected not only a libertarian utopia that assumed that if only the state were to back off markets will take care of it all, but also a left-anchored critique of the state as a critical site of protecting the power and privilege of elites, insistence that individual self-actualization demanded a state contained within narrow boundaries, and a deep skepticism of all forms of authority, as Fred Turner showed in From Counterculture to Cyberculture.2 Selling Wine Without Bottles is not against markets or payment as such, but rather a resistance to the totalizing vision of commodity exchange as all there is. In this, for me a telling passage was:
约翰·佩里·巴洛(John Perry Barlow)的两篇文章捕捉到了一种渴望,即摆脱现代性中两种最重要的制度形式——国家和市场社会——的压迫。《网络空间独立宣言》明确反对现代国家。有人可能会说:“好吧,但除了卫生、医药、教育、葡萄酒、公共秩序、灌溉、道路、淡水系统和公共卫生之外,罗马人为我们做过什么?”“1《宣言》不仅反映了一种自由主义乌托邦,认为只要国家退出市场就能解决一切问题,而且还反映了一种左派对国家的批判,认为国家是保护精英权力和特权的关键场所,坚持个人自我实现需要一个被限制在狭窄边界内的国家,以及对所有形式的权威的深刻怀疑。正如弗雷德·特纳在《从反主流文化到网络文化》一书中所表明的那样。2无瓶卖酒并不反对市场或支付,而是反对商品交换的整体愿景。对我来说,其中有一段话很能说明问题:
{"title":"A Political Economy of Utopia","authors":"Y. Benkler","doi":"10.4324/9780203469682.ch7","DOIUrl":"https://doi.org/10.4324/9780203469682.ch7","url":null,"abstract":"John Perry Barlow’s two essays capture a yearning to escape the oppressive clutches of the two most important institutional forms in modernity: the state and market society. A Declaration of the Independence of Cyberspace is explicitly against the modern state. One might say, “All right, but apart from the sanitation, the medicine, education, wine, public order, irrigation, roads, a fresh water system, and public health, what have the Romans ever done for us?”1 The Declaration reflected not only a libertarian utopia that assumed that if only the state were to back off markets will take care of it all, but also a left-anchored critique of the state as a critical site of protecting the power and privilege of elites, insistence that individual self-actualization demanded a state contained within narrow boundaries, and a deep skepticism of all forms of authority, as Fred Turner showed in From Counterculture to Cyberculture.2 Selling Wine Without Bottles is not against markets or payment as such, but rather a resistance to the totalizing vision of commodity exchange as all there is. In this, for me a telling passage was:","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"1 1","pages":"78-84"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77373033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hacking the Internet of Things: Vulnerabilities, Dangers, and Legal Responses 黑客入侵物联网:漏洞、危险和法律应对
Pub Date : 2018-02-15 DOI: 10.5771/9783845289304-21
Sara Sun Beale, Peter G. Berris
The Internet of Things (IoT) is here and growing rapidly as consumers eagerly adopt internet-enabled devices for their utility, features, and convenience. But this dramatic expansion also exacerbates two underlying dangers in the IoT. First, hackers in the IoT may attempt to gain control of internet-enabled devices, causing negative consequences in the physical world. Given that objects with internet connectivity range from household appliances and automobiles to major infrastructure components, this danger is potentially severe. Indeed, in the last few years, hackers have gained control of cars, trains, and dams, and some experts think that even commercial airplanes could be at risk. Second, IoT devices pose an enormous risk to the stability of the internet itself, as they are vulnerable to being hacked and recruited into botnets used for attacks on the digital world. Recent attacks on major websites including Netflix and Twitter exemplify this danger. This article surveys these dangers, summarizes some of their main causes, and then analyzes the extent to which current laws like the Computer Fraud and Abuse Act punish hacking in the IoT. The article finds that although hacking in the IoT is likely illegal, the current legal regime punishes hacking after the fact and therefore lacks the prospective force needed to fully temper the risks posed by the IoT. Therefore, other solutions are needed to address the perilousness of the IoT in its current form. After a discussion of the practical and legal barriers to investigating and prosecuting hacking, we turn to the merits and pitfalls of hacking back from legal, practical, and ethical perspectives. We then discuss the advantages and disadvantages of two possible solutions — regulation and the standards approach.
物联网(IoT)已经出现,并且随着消费者因其实用性、特性和便利性而急切地采用支持互联网的设备,物联网(IoT)正在迅速发展。但这种戏剧性的扩张也加剧了物联网的两个潜在危险。首先,物联网中的黑客可能会试图控制支持互联网的设备,从而在物理世界中造成负面后果。考虑到从家用电器和汽车到主要基础设施组件的互联网连接对象,这种危险可能是严重的。事实上,在过去的几年里,黑客已经控制了汽车、火车和水坝,一些专家认为甚至商用飞机也可能处于危险之中。其次,物联网设备对互联网本身的稳定性构成巨大风险,因为它们很容易被黑客入侵,并被招募到用于攻击数字世界的僵尸网络中。最近对Netflix和Twitter等主要网站的攻击就是这种危险的例证。本文调查了这些危险,总结了它们的一些主要原因,然后分析了现行法律(如计算机欺诈和滥用法案)在物联网中惩罚黑客的程度。文章发现,尽管物联网中的黑客行为可能是非法的,但目前的法律制度在事后惩罚黑客行为,因此缺乏充分缓和物联网带来的风险所需的前瞻性力量。因此,需要其他解决方案来解决当前形式的物联网的危险性。在讨论了调查和起诉黑客行为的实际和法律障碍之后,我们从法律、实际和道德的角度转向黑客行为的优点和缺陷。然后,我们讨论了两种可能的解决方案的优缺点-监管和标准方法。
{"title":"Hacking the Internet of Things: Vulnerabilities, Dangers, and Legal Responses","authors":"Sara Sun Beale, Peter G. Berris","doi":"10.5771/9783845289304-21","DOIUrl":"https://doi.org/10.5771/9783845289304-21","url":null,"abstract":"The Internet of Things (IoT) is here and growing rapidly as consumers eagerly adopt internet-enabled devices for their utility, features, and convenience. But this dramatic expansion also exacerbates two underlying dangers in the IoT. First, hackers in the IoT may attempt to gain control of internet-enabled devices, causing negative consequences in the physical world. Given that objects with internet connectivity range from household appliances and automobiles to major infrastructure components, this danger is potentially severe. Indeed, in the last few years, hackers have gained control of cars, trains, and dams, and some experts think that even commercial airplanes could be at risk. Second, IoT devices pose an enormous risk to the stability of the internet itself, as they are vulnerable to being hacked and recruited into botnets used for attacks on the digital world. Recent attacks on major websites including Netflix and Twitter exemplify this danger. This article surveys these dangers, summarizes some of their main causes, and then analyzes the extent to which current laws like the Computer Fraud and Abuse Act punish hacking in the IoT. The article finds that although hacking in the IoT is likely illegal, the current legal regime punishes hacking after the fact and therefore lacks the prospective force needed to fully temper the risks posed by the IoT. Therefore, other solutions are needed to address the perilousness of the IoT in its current form. After a discussion of the practical and legal barriers to investigating and prosecuting hacking, we turn to the merits and pitfalls of hacking back from legal, practical, and ethical perspectives. We then discuss the advantages and disadvantages of two possible solutions — regulation and the standards approach.","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"6 1","pages":"161-204"},"PeriodicalIF":0.0,"publicationDate":"2018-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78846662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Slave to the Algorithm? Why a 'Right to an Explanation' Is Probably Not the Remedy You Are Looking For 算法的奴隶?为什么“获得解释的权利”可能不是你想要的补救措施
Pub Date : 2017-05-23 DOI: 10.2139/SSRN.2972855
L. Edwards, Michael Veale
Algorithms, particularly of the machine learning (ML) variety, are increasingly important to individuals' lives, but have caused a range of concerns evolving mainly around unfairness, discrimination and opacity. Transparency in the form of a "right to an explanation" has emerged as a compellingly attractive remedy since it intuitively presents as a means to "open the black box", hence allowing individual challenge and redress, as well as potential to instil accountability to the public in ML systems. In the general furore over algorithmic bias and other issues laid out in section 2, any remedy in a storm has looked attractive. However, we argue that a right to an explanation in the GDPR is unlikely to be a complete remedy to algorithmic harms, particularly in some of the core "algorithmic war stories" that have shaped recent attitudes in this domain. We present several reasons for this conclusion. First (section 3), the law is restrictive on when any explanation-related right can be triggered, and in many places is unclear, or even seems paradoxical. Second (section 4), even were some of these restrictions to be navigated, the way that explanations are conceived of legally — as "meaningful information about the logic of processing" — is unlikely to be provided by the kind of ML "explanations" computer scientists have been developing. ML explanations are restricted both by the type of explanation sought, the multi-dimensionality of the domain and the type of user seeking an explanation. However “subject-centric" explanations (SCEs), which restrict explanations to particular regions of a model around a query, show promise for interactive exploration, as do pedagogical rather than decompositional explanations in dodging developers' worries of IP or trade secrets disclosure. As an interim conclusion then, while convinced that recent research in ML explanations shows promise, we fear that the search for a "right to an explanation" in the GDPR may be at best distracting, and at worst nurture a new kind of "transparency fallacy". However, in our final sections, we argue that other parts of the GDPR related (i) to other individual rights including the right to erasure ("right to be forgotten") and the right to data portability and (ii) to privacy by design, Data Protection Impact Assessments and certification and privacy seals, may have the seeds we can use to build a more responsible, explicable and user-friendly algorithmic society.
算法,尤其是机器学习(ML)的算法,对个人的生活越来越重要,但也引起了一系列的担忧,主要是围绕不公平、歧视和不透明。“解释权”形式的透明度已经成为一种极具吸引力的补救措施,因为它直观地呈现为“打开黑箱”的手段,因此允许个人挑战和补救,以及在ML系统中向公众灌输问责制的潜力。在对算法偏差和第2节中列出的其他问题的普遍愤怒中,风暴中的任何补救措施看起来都很有吸引力。然而,我们认为,GDPR中的解释权不太可能是对算法危害的完全补救,特别是在一些核心的“算法战争故事”中,这些故事塑造了该领域最近的态度。我们为这一结论提出了几个理由。首先(第3条),法律对何时可以触发任何与解释有关的权利进行了限制,并且在许多地方不明确,甚至似乎自相矛盾。其次(第4节),即使这些限制能够被克服,解释被合法理解的方式——作为“关于处理逻辑的有意义的信息”——也不太可能由计算机科学家一直在开发的机器学习“解释”提供。ML解释受到所寻求的解释类型、领域的多维度和寻求解释的用户类型的限制。然而,“以主题为中心”的解释(sce),将解释限制在一个查询周围模型的特定区域,显示出交互式探索的希望,就像教学解释而不是分解解释一样,可以避免开发者对IP或商业秘密泄露的担忧。因此,作为一个临时结论,尽管我们相信最近在机器学习解释方面的研究显示出了希望,但我们担心,在GDPR中寻找“解释权”,往好了说可能会分散注意力,往坏了说可能会滋生一种新的“透明度谬论”。然而,在我们的最后部分中,我们认为GDPR的其他部分与(i)其他个人权利相关,包括删除权(“被遗忘权”)和数据可移植性权利,以及(ii)通过设计、数据保护影响评估和认证以及隐私印章来保护隐私,我们可以使用这些部分来建立一个更负责任、可解释和用户友好的算法社会。
{"title":"Slave to the Algorithm? Why a 'Right to an Explanation' Is Probably Not the Remedy You Are Looking For","authors":"L. Edwards, Michael Veale","doi":"10.2139/SSRN.2972855","DOIUrl":"https://doi.org/10.2139/SSRN.2972855","url":null,"abstract":"Algorithms, particularly of the machine learning (ML) variety, are increasingly important to individuals' lives, but have caused a range of concerns evolving mainly around unfairness, discrimination and opacity. Transparency in the form of a \"right to an explanation\" has emerged as a compellingly attractive remedy since it intuitively presents as a means to \"open the black box\", hence allowing individual challenge and redress, as well as potential to instil accountability to the public in ML systems. In the general furore over algorithmic bias and other issues laid out in section 2, any remedy in a storm has looked attractive. However, we argue that a right to an explanation in the GDPR is unlikely to be a complete remedy to algorithmic harms, particularly in some of the core \"algorithmic war stories\" that have shaped recent attitudes in this domain. We present several reasons for this conclusion. First (section 3), the law is restrictive on when any explanation-related right can be triggered, and in many places is unclear, or even seems paradoxical. Second (section 4), even were some of these restrictions to be navigated, the way that explanations are conceived of legally — as \"meaningful information about the logic of processing\" — is unlikely to be provided by the kind of ML \"explanations\" computer scientists have been developing. ML explanations are restricted both by the type of explanation sought, the multi-dimensionality of the domain and the type of user seeking an explanation. However “subject-centric\" explanations (SCEs), which restrict explanations to particular regions of a model around a query, show promise for interactive exploration, as do pedagogical rather than decompositional explanations in dodging developers' worries of IP or trade secrets disclosure. As an interim conclusion then, while convinced that recent research in ML explanations shows promise, we fear that the search for a \"right to an explanation\" in the GDPR may be at best distracting, and at worst nurture a new kind of \"transparency fallacy\". However, in our final sections, we argue that other parts of the GDPR related (i) to other individual rights including the right to erasure (\"right to be forgotten\") and the right to data portability and (ii) to privacy by design, Data Protection Impact Assessments and certification and privacy seals, may have the seeds we can use to build a more responsible, explicable and user-friendly algorithmic society.","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"59 1","pages":"18-84"},"PeriodicalIF":0.0,"publicationDate":"2017-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89052420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Legal Nature of Emails: A Comparative Perspective 电子邮件的法律性质:比较视角
Pub Date : 2016-02-21 DOI: 10.2139/SSRN.2742231
Edina Harbinja
There is currently a conflict between laws and the market in their treatment of email. Laws mandate that emails are not protected as property unless copyrightable or protected by another legal mechanism. But the market suggests that emails are user-owned property without further qualification. Moreover, the nature of email is treated slightly differently between the U.S. and U.K. legal regimes. While the current legal regimes applicable to email in the U.K. and U.S. are reasonable, legal harmonization within these systems, and with the service provider market, should be achieved.
目前,法律和市场在对待电子邮件方面存在冲突。法律规定,除非具有版权或受到其他法律机制的保护,否则电子邮件不受财产保护。但市场表明,电子邮件是用户拥有的财产,无需进一步限定。此外,美国和英国的法律制度对电子邮件性质的处理略有不同。虽然目前适用于英国和美国电子邮件的法律制度是合理的,但这些制度内部的法律协调以及与服务提供商市场的法律协调应该实现。
{"title":"Legal Nature of Emails: A Comparative Perspective","authors":"Edina Harbinja","doi":"10.2139/SSRN.2742231","DOIUrl":"https://doi.org/10.2139/SSRN.2742231","url":null,"abstract":"There is currently a conflict between laws and the market in their treatment of email. Laws mandate that emails are not protected as property unless copyrightable or protected by another legal mechanism. But the market suggests that emails are user-owned property without further qualification. Moreover, the nature of email is treated slightly differently between the U.S. and U.K. legal regimes. While the current legal regimes applicable to email in the U.K. and U.S. are reasonable, legal harmonization within these systems, and with the service provider market, should be achieved.","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"2015 1","pages":"227-255"},"PeriodicalIF":0.0,"publicationDate":"2016-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87843905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reasonable Expectations of Privacy Settings: Social Media and the Stored Communications Act 隐私设置的合理期望:社交媒体和存储通信法案
Pub Date : 2015-01-08 DOI: 10.2139/SSRN.2306839
Christopher J. Borchert, Fernando M. Pinguelo, D. Thaw
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private content sent using different technologies. This Article argues that Congress should revisit the SCA and adopt a single, technology-neutral standard of protection for private communications content held by third-party service providers. Furthermore, it suggests that Congress specifically intended to limit the scope of the Third-Party Records Doctrine by creating greater protections via the SCA, and thus courts interpreting existing law should afford protection to new technologies such as social media communications consistent with that intent based on individuals’ expressed privacy preferences.
1986年,国会通过了《存储通信法案》(SCA),为第三方电子存储的个人私人通信内容提供了额外的保护。出于对第三方记录原则的直接关注——这是一种司法创造的原则,通常会消除第四修正案对委托给第三方的信息的保护——国会试图调整SCA,使其适用于通过第三方发送和存储的电子通信。然而,由于国会用特定于1986年技术的语言制定了SCA,因此今天的法院一直在努力将SCA一致地应用于使用不同技术发送的类似私人内容。本文认为,国会应该重新审视SCA,并对第三方服务提供商持有的私人通信内容采用单一的、技术中立的保护标准。此外,它还表明,国会特别打算通过《隐私法》创造更大的保护来限制《第三方记录原则》的范围,因此,法院在解释现有法律时,应根据个人表达的隐私偏好,为符合这一意图的新技术(如社交媒体通信)提供保护。
{"title":"Reasonable Expectations of Privacy Settings: Social Media and the Stored Communications Act","authors":"Christopher J. Borchert, Fernando M. Pinguelo, D. Thaw","doi":"10.2139/SSRN.2306839","DOIUrl":"https://doi.org/10.2139/SSRN.2306839","url":null,"abstract":"In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private content sent using different technologies. This Article argues that Congress should revisit the SCA and adopt a single, technology-neutral standard of protection for private communications content held by third-party service providers. Furthermore, it suggests that Congress specifically intended to limit the scope of the Third-Party Records Doctrine by creating greater protections via the SCA, and thus courts interpreting existing law should afford protection to new technologies such as social media communications consistent with that intent based on individuals’ expressed privacy preferences.","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"44 1","pages":"36-65"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83237239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
After Prometheus, Are Human Genes Patentable Subject Matter? 继普罗米修斯之后,人类基因是否可以申请专利?
Pub Date : 2012-12-19 DOI: 10.2139/SSRN.2191523
Douglas L. Rogers
On November 30, 2012, the U.S. Supreme Court granted certiorari in Association for Molecular Pathology v. Myriad Genetics, Inc. on the question, “Are human genes patentable?” For over 150 years Supreme Court decisions have excluded from the federal patent power laws of nature and physical phenomena. The words "invention," "new" and "useful" in §101 are consistent with these exclusions from the federal patent power, so they are not the result of a judicially active court limiting the will of Congress. The conclusions of Judges Lourie and Moore in Myriad Genetics that the isolated DNA segments of claim 1 constitute patentable subject matter disregard the Supreme Court's decisions in Chakrabarty and Funk Brothers on products derived from nature. “Isolation” is not an inventive step to change an unpatentable physical phenomenon into patentable subject matter. Turning to claim 2, even if the isolated cDNA segments do not under Chakrabarty and Funk Brother constitute a patentable product, under Prometheus the isolated cDNA segments capture an unpatentable law of nature - the genetic code. Since no inventive step has been added to the genetic code in claim 2, the cDNA of claim 2 constitutes unpatentable subject matter under Prometheus. The Federal Circuit’s disregard in Myriad Genetics of the laws of nature threatens to eviscerate the public domain of basic scientific knowledge.
2012年11月30日,美国最高法院就“人类基因是否可获得专利?”的问题签发了分子病理学协会诉Myriad Genetics, Inc.的调卷令。150多年来,最高法院的判决将自然法则和物理现象排除在联邦专利权之外。第101条中的“发明”、“新的”和“有用的”等词与联邦专利权的排除是一致的,因此它们不是司法活跃的法院限制国会意志的结果。法官Lourie和Moore在Myriad Genetics案中得出的关于权利要求1中分离的DNA片段构成可专利客体的结论,无视了最高法院在Chakrabarty和Funk Brothers案中关于自然产品的判决。“隔离”不是将不可专利的物理现象变为可专利的客体的创造性步骤。转到权利要求2,即使在Chakrabarty和Funk兄弟案中分离的cDNA片段不构成可申请专利的产品,在普罗米修斯案中,分离的cDNA片段捕获了不可申请专利的自然法则——遗传密码。由于权利要求2中的遗传密码没有添加创造性步骤,因此权利要求2的cDNA构成普罗米修斯项下不可专利的客体。联邦巡回法院在Myriad Genetics一案中对自然法则的漠视,可能会破坏公共领域的基础科学知识。
{"title":"After Prometheus, Are Human Genes Patentable Subject Matter?","authors":"Douglas L. Rogers","doi":"10.2139/SSRN.2191523","DOIUrl":"https://doi.org/10.2139/SSRN.2191523","url":null,"abstract":"On November 30, 2012, the U.S. Supreme Court granted certiorari in Association for Molecular Pathology v. Myriad Genetics, Inc. on the question, “Are human genes patentable?” For over 150 years Supreme Court decisions have excluded from the federal patent power laws of nature and physical phenomena. The words \"invention,\" \"new\" and \"useful\" in §101 are consistent with these exclusions from the federal patent power, so they are not the result of a judicially active court limiting the will of Congress. The conclusions of Judges Lourie and Moore in Myriad Genetics that the isolated DNA segments of claim 1 constitute patentable subject matter disregard the Supreme Court's decisions in Chakrabarty and Funk Brothers on products derived from nature. “Isolation” is not an inventive step to change an unpatentable physical phenomenon into patentable subject matter. Turning to claim 2, even if the isolated cDNA segments do not under Chakrabarty and Funk Brother constitute a patentable product, under Prometheus the isolated cDNA segments capture an unpatentable law of nature - the genetic code. Since no inventive step has been added to the genetic code in claim 2, the cDNA of claim 2 constitutes unpatentable subject matter under Prometheus. The Federal Circuit’s disregard in Myriad Genetics of the laws of nature threatens to eviscerate the public domain of basic scientific knowledge.","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"40 1","pages":"434-508"},"PeriodicalIF":0.0,"publicationDate":"2012-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73252384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Open Source Innovation, Patent Injunctions, and the Public Interest 开源创新、专利禁令和公共利益
Pub Date : 2012-01-01 DOI: 10.2139/SSRN.3084088
J. Boyle
{"title":"Open Source Innovation, Patent Injunctions, and the Public Interest","authors":"J. Boyle","doi":"10.2139/SSRN.3084088","DOIUrl":"https://doi.org/10.2139/SSRN.3084088","url":null,"abstract":"","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"51 1","pages":"30-64"},"PeriodicalIF":0.0,"publicationDate":"2012-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90533288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reviving informed consent: using risk perception in clinical trials. 恢复知情同意:在临床试验中使用风险感知。
Pub Date : 2003-06-09
Dana Ziker

The current doctrine of informed consent falls far short of its potential to serve as a valuable safeguard for human research subjects. Instead of providing a channel of communication between physician and subject, informed consent is a lifeless entity responsible for a large portion of the misunderstanding existing between these parties. Acknowledging risk perception principles may help transform the informed consent process into an effective communication of health risks.

目前的知情同意原则远远没有发挥其作为人类研究对象的宝贵保障的潜力。知情同意并没有提供医生和受试者之间的沟通渠道,而是一个死气沉沉的实体,造成了双方之间存在的很大一部分误解。承认风险认知原则可能有助于将知情同意过程转变为健康风险的有效沟通。
{"title":"Reviving informed consent: using risk perception in clinical trials.","authors":"Dana Ziker","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The current doctrine of informed consent falls far short of its potential to serve as a valuable safeguard for human research subjects. Instead of providing a channel of communication between physician and subject, informed consent is a lifeless entity responsible for a large portion of the misunderstanding existing between these parties. Acknowledging risk perception principles may help transform the informed consent process into an effective communication of health risks.</p>","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":" ","pages":"E1"},"PeriodicalIF":0.0,"publicationDate":"2003-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"24955623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The case for national DNA identification cards. 国家DNA识别卡的案例。
Pub Date : 2003-01-01
Ben Quarmby

Foes of the United States have demonstrated their ability to strike at the heart of this country. Fear of renewed attacks and a desire for greater national security have now prompted many to call for improvements in the national personal identification system. In particular, the possibility of a national identification card containing the carrier's DNA information is being seriously considered. However, this raises difficult questions. Would such a card system, and the extraction of individuals' DNA it entails, violate the 4th Amendment of the Constitution? This article will shows that such a card system could in fact be found to be constitutional under the law of privacy as it stands today.

美国的敌人已经证明了他们有能力打击这个国家的心脏。由于担心再次发生袭击,以及希望加强国家安全,许多人呼吁改进国家个人身份识别系统。特别是,正在认真考虑制作包含携带者DNA信息的国民身份证的可能性。然而,这引发了一些难题。这样一个卡片系统,以及它所需要的个人DNA提取,会违反宪法第四修正案吗?这篇文章将表明,这样一个卡片系统实际上可以被发现是符合宪法的隐私法,因为它是今天。
{"title":"The case for national DNA identification cards.","authors":"Ben Quarmby","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Foes of the United States have demonstrated their ability to strike at the heart of this country. Fear of renewed attacks and a desire for greater national security have now prompted many to call for improvements in the national personal identification system. In particular, the possibility of a national identification card containing the carrier's DNA information is being seriously considered. However, this raises difficult questions. Would such a card system, and the extraction of individuals' DNA it entails, violate the 4th Amendment of the Constitution? This article will shows that such a card system could in fact be found to be constitutional under the law of privacy as it stands today.</p>","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":" ","pages":"E1"},"PeriodicalIF":0.0,"publicationDate":"2003-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"24955619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defining a new ethical standard for human in vitro embryos in the context of stem cell research. 在干细胞研究的背景下定义人类体外胚胎的新伦理标准。
Pub Date : 2002-12-10
Sina A Muscati

This iBrief discusses some of the social, ethical and legal considerations surrounding the use of unimplanted, in vitro embryos in stem cell research. It proposes that a new ethical standard be elucidated for these embryos. The iBrief gives an overview of two proposals for such a standard at opposite ends of the spectrum: treating the in vitro embryo as a legal person versus treating it as mere property. It argues against both approaches. The former can have undesirable social implications including undue interference with female reproductive autonomy, while the latter would objectify potential human life and reproductive potential. The iBrief proposes an intermediate approach that treats the embryo as a special entity. It warns against a model whereby the respect accorded to embryos is made dependent on the attainment of various qualitative or developmental criteria. The complexities surrounding human life, it argues, are too uncertain. What is certain is the embryo's unique potential for human life, at any developmental stage. This, the iBrief proposes, should be the sole criterion for an embryo's special status, a status that should be confined within constitutional limits.

本文讨论了围绕在干细胞研究中使用未植入的体外胚胎的一些社会、伦理和法律考虑。提出了一种新的胚胎伦理标准。摘要概述了这一标准在光谱两端的两种建议:将体外胚胎视为法人与将其视为纯粹财产。它反对这两种方法。前者可能产生不良的社会影响,包括对女性生殖自主的不当干涉,而后者则将潜在的人类生命和生殖潜力物化。摘要提出了一种中间方法,将胚胎视为一个特殊的实体。它警告不要采用一种模式,即对胚胎的尊重取决于是否达到各种质量或发育标准。它认为,人类生活的复杂性太不确定了。可以肯定的是,在任何发育阶段,胚胎对人类生命都具有独特的潜力。摘要建议,这应该是胚胎特殊地位的唯一标准,这种地位应该被限制在宪法的范围内。
{"title":"Defining a new ethical standard for human in vitro embryos in the context of stem cell research.","authors":"Sina A Muscati","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>This iBrief discusses some of the social, ethical and legal considerations surrounding the use of unimplanted, in vitro embryos in stem cell research. It proposes that a new ethical standard be elucidated for these embryos. The iBrief gives an overview of two proposals for such a standard at opposite ends of the spectrum: treating the in vitro embryo as a legal person versus treating it as mere property. It argues against both approaches. The former can have undesirable social implications including undue interference with female reproductive autonomy, while the latter would objectify potential human life and reproductive potential. The iBrief proposes an intermediate approach that treats the embryo as a special entity. It warns against a model whereby the respect accorded to embryos is made dependent on the attainment of various qualitative or developmental criteria. The complexities surrounding human life, it argues, are too uncertain. What is certain is the embryo's unique potential for human life, at any developmental stage. This, the iBrief proposes, should be the sole criterion for an embryo's special status, a status that should be confined within constitutional limits.</p>","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":" ","pages":"E1"},"PeriodicalIF":0.0,"publicationDate":"2002-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"24955618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Duke law and technology review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1