535 research outputs found

    Don\u27t Bring a CAD File to a Gun Fight: A Technological Solution to the Legal and Practical Challenges of Enforcing ITAR on the Internet

    Get PDF
    This Essay begins by outlining Cody Wilson’s motivation to found his organization, Defense Distributed, and the organization’s progress toward its goals. Then, Part II provides a brief overview of the protracted legal battle between Wilson and the State Department over the right to publish Computer-Aided Design (CAD) files on the internet that enable the 3D printing of guns and lower receivers. Part III.A takes a brief look at whether these CAD files are rightly considered speech at all and, if so, what level of protection they might receive. Part III.B then addresses the problem of even asking whether the files are speech subject to regulation. Part III.B also highlights the similarities between regulating internet speech and regulating public-order crimes, focusing on the impact that enforcement problems in both areas can have on government credibility. It ultimately questions whether these legal battles provide any utility to society. In Part IV, this Essay argues that the State Department is utilizing old and incongruent regulations to enforce practically unenforceable laws to little or no effect, ultimately hurting the credibility of the State and martyring people like Wilson. This Essay advocates for a solution that focuses on 3D printer manufacturers as a control point for gun manufacturing. This solution avoids First Amendment issues and makes import and export control a physical reality, rather than an unbounded problem relegated to an open internet. This Essay looks beyond a judicial solution to practical solutions that stem the growth of in-house manufacturing of weapons

    Wild Westworld: Section 230 of the CDA and Social Networks’ Use of Machine-Learning Algorithms

    Get PDF
    This Note argues that Facebook’s services—specifically the personalization of content through machine-learning algorithms—constitute the “development” of content and as such do not qualify for § 230 immunity. This Note analyzes the evolution of § 230 jurisprudence to help inform the development of a revised framework. This framework is guided by congressional and public policy goals and creates brighter lines for technological immunity. It tailors immunity to account for user data mined by ISPs and the pervasive effect that the use of that data has on users—two issues that courts have yet to confront. This Note concludes that under the revised framework, machine-learning algorithms’ content organization— made effective through the collection of individualized data—make ISPs codevelopers of content and thus bar them from immunity

    Don\u27t Bring a CAD File to a Gun Fight: A Technological Solution to the Legal and Practical Challenges of Enforcing ITAR on the Internet

    Get PDF
    This Essay begins by outlining Cody Wilson’s motivation to found his organization, Defense Distributed, and the organization’s progress toward its goals. Then, Part II provides a brief overview of the protracted legal battle between Wilson and the State Department over the right to publish Computer-Aided Design (CAD) files on the internet that enable the 3D printing of guns and lower receivers. Part III.A takes a brief look at whether these CAD files are rightly considered speech at all and, if so, what level of protection they might receive. Part III.B then addresses the problem of even asking whether the files are speech subject to regulation. Part III.B also highlights the similarities between regulating internet speech and regulating public-order crimes, focusing on the impact that enforcement problems in both areas can have on government credibility. It ultimately questions whether these legal battles provide any utility to society. In Part IV, this Essay argues that the State Department is utilizing old and incongruent regulations to enforce practically unenforceable laws to little or no effect, ultimately hurting the credibility of the State and martyring people like Wilson. This Essay advocates for a solution that focuses on 3D printer manufacturers as a control point for gun manufacturing. This solution avoids First Amendment issues and makes import and export control a physical reality, rather than an unbounded problem relegated to an open internet. This Essay looks beyond a judicial solution to practical solutions that stem the growth of in-house manufacturing of weapons

    Spoken Self: Recognizing, Renaming, and Reclaiming

    Get PDF
    In the era of standardization, how can educators explore ways to hear the beating hearts of the students they encounter? How can educators recognize the multitudinous sounds of the students when each marches to the beat of a different drum? With these questions in mind, how then can educators affect change in the classroom to cultivate critical thinkers when the curriculum is not designed to feed each students own educational diet? There is not one magical quick fix, and I have come to realize that there has been and continued to be a cacophony of voices debating what should be the primary goal of education, what should be taught, how teaching should be done, and who should decide. From these debates evolved distinct versions of curricular philosophies or orientations. During my studies, I have found that to move beyond the complacency in the classroom, teaching curriculum must be an understanding, a conversation. This extraordinarily complicated conversation (Pinar et. al., 2002, p. 848) between teachers and students across texts allows us to study historically and theoretically as we examine issues of race, class, gender, and politics through multiple lenses. Attempting to create meaning in the lives of students, this type of education, of understanding, empowers students through their own voices about their lived experiences. One way to create meaning and encourage investigation is to promote a curriculum that engages students, one that uses their own language, their own culture. This study then explores how African-American womens literature can be used to encourage culturally richer classrooms as students, especially African-American girls, discover who they are. I look through the lens of Black Feminist theory because it affords me the opportunity to amplify issues of race, gender, and class, particularly as these aspects relate to African-American girls and other minority groups in mainstream schooling. Through this lens, I use a literary analysis to explore general and specific issues or themes of identity and subjectivity in the novels and works about and by Black female writers. This study helps us in understanding self and otherness. Instead of ridiculing others who are different, people can move to feeling comfortable about differences and sharing power with others. INDEX WORDS: Literature, African-American Women, Black Feminist Theor

    Preventing the Selection of "Deaf Embryos" Under the Human Fertilisation and Embryology Act 2008:Problematizing Disability?

    Get PDF
    Section 14(4) of the Human Fertilisation and Embryology Act 2008 imposes – within the general licensing conditions listed in the Human Fertilisation and Embryology Act 1990 – a prohibition to prevent the selection and implantation of embryos for the purpose of creating a child who will be born with a “serious disability.” This article offers a perspective that demonstrates the problematic nature of the consultation, review, and legislative reform process surrounding s 14(4). The term “serious disability” is not defined within the legislation, but we highlight the fact that s 14(4) was passed with the case of selecting deaf children in mind. We consider some of the literature on the topic of disability and deafness, which, we think, casts some doubt on the view that deafness is a “serious disability.” The main position we advance is that the lack of serious engagement with alternative viewpoints during the legislative process was unsatisfactory. We argue that the contested nature of deafness necessitates a more robust consultation process and a clearer explanation and defence of the normative position that underpins s 14(4)

    Experiences of Counselors Counseling Clients Who Have Been Sexually Assaulted

    Get PDF
    Approximately one in four women will be sexually assaulted, many of whom will seek counseling as a result. However, the literature regarding the experiences of counselors who counsel clients who have been sexually assaulted is limited. This qualitative, phenomenological study explored the experiences of nine counselors who have counseled clients who have been sexually assaulted. The analysis of participant data revealed several themes, which included (a) self-care; (b) utilizing effective counseling skills; (c) lack of counselor training impacts work; (d) seeking supervision and consultation; (e) societal myths about sexual assault; and (f) legal issues regarding sexual assault. The findings may guide counselors, counselor educators, and supervisors in providing more effective counseling services to clients who have been sexually assaulted

    Launching a University Tele-mental Health Counseling Training Clinic: A Case Study

    Get PDF
    With this article the authors hope to establish a precedent of publishing case studies in technology related implementation in counselor education and supervision with a focus on factors that drive as well as hinder such implementation. This case study described the design, proposal and implementation of a telemental health training clinic at the University of San Diego in San Diego, CA. Additionally, the authors highlight lessons learned and recommendations for other counselor educators seeking to implement similar training clinics at their universities

    The CHD1-KDM Axis in Prostate Cancer

    Get PDF
    https://openworks.mdanderson.org/sumexp21/1189/thumbnail.jp
    corecore