Search Results

1 - 10 of 52 items :

  • "technology" x
  • History, Philosophy and Sociology of Law x
Clear All
Decentralised Technology and Technology Neutrality in Legal Rules: An Analysis of De Voogd and Hedqvist

: the example of in vitro fertilization.” Minnesota Journal of Law, Science and Technology Volume 6, Issue 2 (2005) // . 5. Butenko, Anna, and Pierre Larouche. “Regulation for innovativeness or regulation of innovation?” Law, Innovation and Technology 7:1 (2015): 52–82 // DOI: 10.1080/17579961.2015.1052643. 6. Chang, Sue. “Here’s all the money in the world, in one chart.” (28 November 2017) // https

Open access
Baltic Journal of Law & Politics
A Journal of Vytautas Magnus University
Open access
Faculty Intellectual Property Rights in Canadian Universities

References 1. Apple, Kirsten S. “Evaluating university technology transfer offices”: 139-157. In: Zoltan J. Acs and Roger Stough, eds. Public policy in an entrepreneurial economy . New York: Springer, 2008. 2. Bouchie, Aaron. “Survey reveals US university licensing up, startup formation down.” Bioentrepreneur (2005) // (accessed October 1, 2012). 3. Canada Statistics. “Patent or perish? Universities are more inventive than ever

Open access
Legal Impediments in the EU to New Technologies in the Example of E-Residency

BIBLIOGRAPHY 1. Al-Khouri, Ali Mohamed. “Digital identity: Transforming GCC economies.” Innovation: Management, Policy & Practice 16 (2) (2014): 184–194. 2. De Andrade, Norberto Norberto Nuno Gomes. “Electronic Identity for Europe: Moving from Problems to Solutions.” Journal of International Commercial Law and Technology 8 (2) (2013): 104–109. 3. De Hert, Paul. “Identity management of e-ID, privacy and security in Europe. A human rights view.” Information Security Technical Report (13) (2008): 71–75. 4. Drechsler, Wolgang, and

Open access
A Template For Enhancing The Impact of The National Academy of Sciences’ Reporting on Forensic Science

Introduction DNA technology – when applied properly – provides the criminal justice system with a highly reliable identification method, which can be used to both convict and exonerate individuals. At the same time, however, this capacity of DNA technology undermines various forensic science identification techniques, including tool-mark, fingerprint, and bite-mark analysis, which the criminal justice system has routinely admitted as evidence for decades. See, in general , Paul C. Giannelli, Forensic Science: Under the Microscope 34 Ohio N. U. L. Rev

Open access
Regulation of Unmanned Aerial Systems and Related Privacy Issues in Lithuania

BIBLIOGRAPHY 1. AUVSI. “Economic Impact of Unmanned Aircraft Systems Integration in the United States.” Economic report by Darryl Jenkins & Bijan Vasigh (March 2013) // . 2. Braun, Sven, Friedewald, Michael, and Valkenburg, Govert. “Civilizing Drones: Military Discourses Going Civil?” Science & Technology Studies 28(2) (2015): 73–87. 3. Butler, Des. “The Dawn of the Age of the Drones: an Australian

Open access
Cyber Attacks, Information Attacks, and Postmodern Warfare

. “Za hranice postmodernismu” (Beyond the Frontiers of Postmodernism): 223–286. In: Roman Kanda, et al ., Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days) . Praha: Filosofia, 2016. 14. Hiller, Janine S. “Civil Cyberconflict: Microsoft, Cybercrime, and Botnets.” Santa Clara High Technology Law Journal 31 (2015): 163–214. 15. Kanda, Roman, et al . Podzim postmodernismu: Teoretické výzvy současnosti (The Fall of Postmodernism – the Theoretical Challenges of Present Days). Praha

Open access
Information Warfare on Social Media: A Brand Management Perspective

by Algorithmic Selection on the Internet.” Media, Culture & Society 39(2) (2017): 238–258. 38. Kaneva, Nadia. “Nation Branding: Toward an Agenda for Critical Research.” International Journal of Communication 5 (2011): 117–141. 39. Kaplan, Andreas M., and Michael Haenlein. “Users of the World, Unite! The Challenges and Opportunities of Social Media.” Business Horizons 53(1) (2010): 59–68. 40. Karlsrud, John. “Peacekeeping 4.0: Harnessing the Potential of Big Data, Social Media, and Cyber Technologies”: 141–160. In: Jan Frederik Kremer and

Open access
European Dilemmas of the Biological versus Social Father: The Case of Estonia

Disestablishment.” Ohio Northern University Law Review (2011): 145-167. 21. Jacobs, Melanie B. “Intentional Parenthood Influence: Rethinking Procreative Autonomy and Federal Paternity Establishment Policy.” Journal of Gender, Social Policy & The Law 20:3 (2012): 489-508. 22. Joslin, Courtney G. “Protecting Children: Marriage, Gender, and Assisted Reproductive Technology.” The Dukeminier Awards – Best Sexual Orientation and Sexual Identity Law Review Vol 10 (1) (2011): 43–96. 23. Kamei, Shelly Ann. “Partitioning Paternity: The German Approach to

Open access
Employers as Nightmare Readers: An Analysis of Ethical and Legal Concerns Regarding Employer-Employee Practices on SNS

irresponsible practice.” Journal of Business Ethics Vol. 95, No. 4 (February 2010): 507–525 // DOI: 10.1007/s10551-010-0436-y. 15. Davison, H. Kristl, Catherine C. Maraist, R. H. Hamilton, and Mark N. Bing. “To screen or not to screen? Using the internet for selection decisions.” Employee Responsibility Rights Journal Vol. 24, No. 1 (2012): 1–21 // DOI: 10.1007/s10672-011-9178-y. 16. El Ouirdi, Asma, Mariam El Ouirdi, Jesse Segers, and Erik Henderickx. “Employees’ use of social media technologies: a methodological and thematic review.” Behaviour & Information

Open access