Select current projects:
The Internet of Bodies
Building on the law review article that shares its names, this book argues that the Internet of Things is morphing into the "Internet of Bodies," where human flesh commingles with code. Traditional intellectual property and other bodies of law will increasingly clash with consumer protection and questions of bodily integrity and security as technology advances. It offers a paradigm for striking a balance between bodily integrity and other legal interests.
Using original data from interviews with computer security professionals and developmental psychology theory, this book argues that current innovation law and policy may inhibit -- rather than facilitate -- the creation of a robust technology workforce "pipeline".
Information Security/Cybersecurity Law and Policy (Casebook with Prof. Stephanie K. Pell, West Point)
Law school casebook with a 'pay what you wish' business model to ensure maximum reach and accessibility for both law students and policymakers.
This law review article critiques the fit of current antitrust policy for the technology market dynamics experienced by end-users. It proposes a set of definitional changes to metrics that currently hinder agency enforcement and other reforms.
Artifice and Intelligence
This law review article critiques the evolution of the “AI” discourse, reframing it in the context of software liability questions generally, and advocating legal transparency measures to minimize harm due to security failures of AI.
The Internet of Latour's Things
This law review essay expands on the ideas introduced in The Internet of Bodies and introduces a sliding scale of technohumanity to guide legal determinations in cases where body-attached and embedded technologies cause harms.
The Internet of Suspect Bodies
This law review article examines questions of criminal law in light of the issues raised by The Internet of Bodies.
This law review article proposing a shared federal-state approach to voting security.
Our Founding Hackers
This law review article connects the information control practices of the Founding Generation with today's information security approaches.
Fake (with Prof. Miranda Mowbray, University of Bristol)
This law review article proposes a taxonomy of 'lying' code and its corresponding harms as the first step toward crafting a holistic theory of software liability and security harms.