Vol. 11 (2015)
Click link to view PDF
Rustin Brent Khavari, Stonewalling the Oklahoman Clean Energy Movement: Oklahoma Gas and Electric’s 2014 Integrated Resource Plan Update, 10 OKLA. J.L. & TECH. 75 (2015)
"In hopes of attaining a sustainable, energy efficient earth, the United States federal and state governments have imposed environmental regulations, like the Clean Air Act, in order to attain this goal. The purpose of these environmental regulations is to protect public health and public welfare and to regulate emissions of hazardous pollutants. Historically, many utilities relied on portfolios that were less concerned about environmental concerns, but more about efficiency and the bottom line dollar. However, with the advancement of technology, America’s dedication to environmental sustainability has strengthened, ushering a change by many utilities in shifting their portfolios to comply with these various regulations. Under traditional utility regulation, the standard protocol of utilities has been to submit load forecast proposals to state utility regulating authorities for purposes of meeting the needs of gas or electric users during that forecasted period. Generally, these proposals were geared towards supply-side requirements (i.e., options to supply more power). However, as states begin trending towards sustainability and clean energy development, state utility regulators have begun urging utilities to incorporate demand-side requirements (i.e., options to reduce electricity demand)."
Aaron L. Jackson, The Sky Is Not Falling: An Analysis of the National Strategy for Trusted Identities in Cyberspace and the Proposed Identity Ecosystem, 10 OKLA. J.L. & TECH. 74 (2015)
"Cyber experts have long envisioned a day when the multiple password-based systems used for identification and authorization of individuals on the internet would be replaced with a singular, online identity. That day may be coming soon. In 2011, the National Institute of Standards and Technology (NIST), the federal technology agency entrusted with development of industry standards, finalized the National Strategy for Trusted Identities in Cyberspace (NSTIC). Dubbed a 'driver’s license' for the internet, this policy envisions the creation of an Identity Ecosystem where individuals may forego their multiple password-based online identities for one secure identity used 'for convenient, secure, and privacy-enhancing [internet] transactions anywhere, anytime.' Far beyond conceptual, two states and one federal agency have now begun the process of turning the NSTIC’s Identity Ecosystem into a reality."
Alex Campbell, The Legal Implications of Sony's Cyberhack, 11 OKLA. J.L. & TECH. 73 (2015)
"This note will address two issues in regards to North Korea’s alleged response to Sony’s portrayal of Kim Jong-un in The Interview. First, did Jong-un have legal cause to sue the filmmakers for infringing on his right to publicity? Second, did North Korea violate international law for an illegal use of force (assuming North Korea was the perpetrator)?"