Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (902)
- Embry-Riddle Aeronautical University (711)
- Schulich School of Law, Dalhousie University (267)
- Selected Works (244)
- SelectedWorks (176)
-
- Seattle University School of Law (175)
- Santa Clara Law (138)
- Universitas Indonesia (128)
- University of Washington School of Law (120)
- University of Richmond (119)
- DePaul University (96)
- Maurer School of Law: Indiana University (88)
- Southern Methodist University (87)
- University of Michigan Law School (84)
- BLR (58)
- Vanderbilt University Law School (58)
- University of Pennsylvania Carey Law School (53)
- Duke Law (50)
- Washington and Lee University School of Law (50)
- University of Georgia School of Law (45)
- American University Washington College of Law (39)
- Villanova University Charles Widger School of Law (39)
- Chicago-Kent College of Law (37)
- Brooklyn Law School (36)
- Boston University School of Law (32)
- University of Colorado Law School (32)
- University of Maryland Francis King Carey School of Law (32)
- Fordham Law School (29)
- The Catholic University of America, Columbus School of Law (27)
- University of Baltimore Law (27)
- Keyword
-
- Privacy (213)
- Internet (182)
- Computer Law (176)
- Copyright (138)
- Law and Technology (138)
-
- Technology (128)
- Google (127)
- Intellectual Property Law (94)
- Science and Technology (94)
- Software (87)
- Adwords (83)
- Artificial intelligence (75)
- Cybersecurity (67)
- Intellectual property (64)
- Trademark (64)
- AI (63)
- Communications Law (60)
- Law (54)
- First Amendment (53)
- Regulation (53)
- Social media (52)
- Cyberspace (51)
- Rosetta Stone (51)
- Digital forensics (46)
- Data (45)
- Computers (44)
- Intellectual Property (43)
- Antitrust (41)
- International Law (41)
- Surveillance (40)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (794)
- Journal of Digital Forensics, Security and Law (526)
- Canadian Journal of Law and Technology (246)
- Annual ADFSL Conference on Digital Forensics, Security and Law (182)
- Seattle University Law Review (157)
-
- Rosetta Stone v. Google (Joint Appendix) (136)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (122)
- Richmond Journal of Law & Technology (105)
- Faculty Scholarship (90)
- All Faculty Scholarship (88)
- SMU Science and Technology Law Review (84)
- Articles (75)
- DePaul Journal of Art, Technology & Intellectual Property Law (72)
- UIC Law Review (62)
- Washington Journal of Law, Technology & Arts (58)
- ExpressO (57)
- Duke Law & Technology Review (48)
- Articles by Maurer Faculty (43)
- Villanova Law Review (34)
- Publications (32)
- Matthew Rimmer (31)
- Vanderbilt Journal of Entertainment & Technology Law (31)
- UIC Review of Intellectual Property Law (30)
- Washington and Lee Law Review (29)
- Fordham Law Review (25)
- Professor Katina Michael (25)
- Chicago-Kent Law Review (23)
- DePaul Business & Commercial Law Journal (22)
- Michigan Law Review (22)
- Catholic University Journal of Law and Technology (21)
- Publication Type
Articles 1 - 30 of 4675
Full-Text Articles in Entire DC Network
Scla 521 Ai In Society, Bert Chapman
Scla 521 Ai In Society, Bert Chapman
Libraries Faculty and Staff Presentations
Provides access to information resources on societal impacts of artificial intelligence from multiple libraries databases covering multiple disciplines including government information resources.
Enhancing Accountability In Cyberspace Through A Three-Tiered International Governance Regime, Dan Efrony
Enhancing Accountability In Cyberspace Through A Three-Tiered International Governance Regime, Dan Efrony
International Law Studies
The Great Power Competition perpetuates the inability to reach a universal consensus on how to resolve normative ambiguity on the application of international law to cyberspace. Adhering to a strategy of ambiguity, the United States and its closest allies have been holding their rival States accountable for “irresponsible State behavior” in cyberspace, based on flawed legitimacy, as reflected in a weakened normative layer, and the national U.S. attribution process. Embracing collective attribution has not cured the flaws. The upshot is a poor framework for holding States accountable and an enduring vicious cycle. This article calls on the United States and …
Rising Internet Shutdowns In India: A Legal Analysis, Shrutanjaya Bhardwaj, Nakul Nayak, Raja Venkata Krishna Dandamudi, Sarvjeet Singh, Veda Handa
Rising Internet Shutdowns In India: A Legal Analysis, Shrutanjaya Bhardwaj, Nakul Nayak, Raja Venkata Krishna Dandamudi, Sarvjeet Singh, Veda Handa
Indian Journal of Law and Technology
The central theme of this paper is to critically study the interplay of internet shutdowns with the right to freedom of speech and expression. A study of this nature is necessitated by India’s abysmal record with inter- net shutdowns. We must hence begin examining Internet shutdowns seriously within the Indian constitutional framework. In the recent judgment of Anuradha Bhasin, the Supreme Court has accepted that Article 19(1)(a) protects the right to disseminate and receive information through the internet. Therefore, the constitutional validity of every internet shutdown would have to be tested (at least) against the three standards ordinarily applied …
Sharing Of Children’S Health Data By Health Professionals And Parents – A Consideration Of Legal Duties, Dr. Carolyn Johnston
Sharing Of Children’S Health Data By Health Professionals And Parents – A Consideration Of Legal Duties, Dr. Carolyn Johnston
Indian Journal of Law and Technology
Children’s health data such as blood pressure, X-rays and written notes of medical examinations are produced in a clinical setting through health professionals’ interaction with their minor patients. Health care practitioners owe legal and professional obligations not to disclose such information without consent or other legally recognised authorisation. With the increasing advent of data generated by patients themselves from wearable devices such as continuous glucose monitors and health apps, the patient, or parents, have initial control of the data and decide who to share it with. Where wearable devices have been provided to parents by the child’s health care provider …
Conceptualizing An International Framework For Active Private Cyber Defence, Arindrajit Basu, Elonnai Hickok
Conceptualizing An International Framework For Active Private Cyber Defence, Arindrajit Basu, Elonnai Hickok
Indian Journal of Law and Technology
Private sector cyber defence mechanisms are emerging despite existing legislation outlawing use of active defence by individuals and non-state entities. Thus, a key window exists for policy-makers in the possibility of establishing a framework for existing APCD practices that would enable optimal utilisation of private sector capabilities for securing cyber-space at an organizational and national level. This must happen in consonance with circumscribing their operations within the boundaries of the rule of law, both in terms of domestic legislation and international law. This paper seeks to unpack the complexities that underscore each of these challenges and identify avenues towards resolving …
Facing Up To The Risks Of Automated Facial-Recognition Technologies In Indian Law Enforcement, Ameen Jauhar
Facing Up To The Risks Of Automated Facial-Recognition Technologies In Indian Law Enforcement, Ameen Jauhar
Indian Journal of Law and Technology
Within the larger discourse of risk mitigation of emerging technologies, the ever-expanding deployment of automated facial recognition technology (‘AFRT’) has garnered much skepticism. In India too, there has been a reported rise of states and law enforcement officials enthusiastically resorting to the use of AFRT.
The author will first delve into some of the controversial risks associated with AFRT, analysing them through the lens of Article 21 and the principle of due process under the Indian Constitution. The paper will then identify some of the regulatory solutions that are currently part of the discourse on minimising risks of AFRT and …
Ks Pop Celebrating Three Years Of Tech-Driven Justice For All, Ayyoub Ajmi
Ks Pop Celebrating Three Years Of Tech-Driven Justice For All, Ayyoub Ajmi
Faculty Works
This article explores the development and impact of the Kansas Protection Order Portal (KS POP), highlighting the vital role of law librarians in the portal's design and implementation. The article showcases how KS POP has streamlined the legal process for domestic violence, sexual assault, and human trafficking victims in Kansas, marking a significant advancement in accessible legal support and serving as a model for future innovations in the justice system.
"The Law Doesn't Work Like A Computer": Exploring Software Licensing Issues Faced By Legal Practitioners, Nathan Wintersgill, Trevor Stalnaker, Laura A. Heymann, Oscar Chaparro, Denys Poshyvanyk
"The Law Doesn't Work Like A Computer": Exploring Software Licensing Issues Faced By Legal Practitioners, Nathan Wintersgill, Trevor Stalnaker, Laura A. Heymann, Oscar Chaparro, Denys Poshyvanyk
Faculty Publications
Most modern software products incorporate open source components, which requires compliance with each component’s licenses. As noncompliance can lead to significant repercussions, organizations often seek advice from legal practitioners to maintain license compliance, address licensing issues, and manage the risks of noncompliance. While legal practitioners play a critical role in the process, little is known in the software engineering community about their experiences within the open source license compliance ecosystem. To fill this knowledge gap, a joint team of software engineering and legal researchers designed and conducted a survey with 30 legal practitioners and related occupations and then held 16 …
Mitigating Algorithmic Bias: Strategies For Addressing Discrimination In Data, Sonia Gipson Rankin
Mitigating Algorithmic Bias: Strategies For Addressing Discrimination In Data, Sonia Gipson Rankin
Faculty Scholarship
This article examines the pervasive issue of algorithmic bias, particularly within large language models (LLMs) and the legal system. It argues that unlike simple programming bugs, these biases are deeply ingrained in the design and training data of artificial intelligence (AI) systems. By understanding the historical roots of bias and its realworld consequence across various sectors, we can develop effective strategies to mitigate its impact and ensure AI serves as a tool for progress. Weaving together historical insights, case studies, and forward-looking recommendations, the article aims to equip legal professionals with the knowledge and tools necessary to lead the charge …
Assessing Smart Nation Singapore As An International Model For Ai Responsibility, Philip L. Frana
Assessing Smart Nation Singapore As An International Model For Ai Responsibility, Philip L. Frana
International Journal on Responsibility
While AI and other smart technologies greatly contribute to material aspects of well-being, there are concerns that they threaten quality of life in Singapore. Smart technologies and digital governance have freed up labor for activities where human empathy and understanding are unique and indispensable, but also threaten to undermine human dignity and accountability. This paper undertakes a comprehensive assessment of Singapore as an international model for AI responsibility from the perspective of the history and philosophy of technological governance. It examines the evolution of regulatory frameworks, ethical considerations, and key legal documents and social initiatives shaping the nation’s approach to …
The Need For An International Ai Research Initiative: How To Create And Sustain A Virtuous Research-Regulation Cycle To Govern Ai, Kevin Frazier
The Need For An International Ai Research Initiative: How To Create And Sustain A Virtuous Research-Regulation Cycle To Govern Ai, Kevin Frazier
Washington Journal of Law, Technology & Arts
This paper explains the need for an international AI research initiative. The current focus of lawmakers at the subnational, national, and international level on regulation over research has created an imbalance, neglecting the critical role of continuous, informed research in developing laws that keep pace with rapid technological advancements in AI.
The proposed international AI research initiative would serve as a central hub for comprehensive AI risk analysis, modeled on successful precedents like CERN and the IPCC. CERN exemplifies a collaborative research environment with pooled resources from member states, leading to significant advancements in particle physics. Similarly, the IPCC has …
When Ai Remembers Too Much: Reinventing The Right To Be Forgotten For The Generative Age, Cheng-Chi Chang
When Ai Remembers Too Much: Reinventing The Right To Be Forgotten For The Generative Age, Cheng-Chi Chang
Washington Journal of Law, Technology & Arts
The emergence of generative artificial intelligence (AI) systems poses novel challenges for the right to be forgotten. While this right gained prominence following the 2014 Google Spain v. Gonzalez case, generative AI’s limitless memory and ability to reproduce identifiable data from fragments threaten traditional conceptions of forgetting. This Article traces the evolution of the right to be forgotten from its privacy law origins towards an independent entitlement grounded in self-determination for personal information. However, it contends the inherent limitations of using current anonymization, deletion, and geographical blocking mechanisms to prevent AI models from retaining personal data render forgetting infeasible. Moreover, …
Google Searching For The Truth: Examining The Admissibility Of Internet Search History, Chisup Kim
Google Searching For The Truth: Examining The Admissibility Of Internet Search History, Chisup Kim
Washington Journal of Law, Technology & Arts
The internet has become more ubiquitously available than ever before, with search engines serving as the portals to an unparalleled amount of information. As a byproduct of this phenomenon, a vast amount of internet search history has also begun to enter legal proceedings as evidence. The most intimate questions that defendants have asked their search engines have begun to be examined under the scope of the Federal Rules of Evidence or a state equivalent. This Comment examines the admissibility of internet search history and provides a general legal framework based on the Federal Rules of Evidence. Drawing upon six cases, …
Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper
Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper
Washington Journal of Law, Technology & Arts
Some 130 central banks around the world are experimenting with various levels of a central bank digital currency (“CBDC”), a digitized form of a sovereign-backed, national currency that is a liability of that country’s central bank. Unlike fiat currency, CBDCs are trackable and potentially subject to interference and even freezing by government authorities. CBDCs will affect citizens’ control over commerce, payments, and savings, and impact their privacy rights. The Chinese government has piloted, refined, and rolled out its own CBDC called the Digital Currency/Electronic Payment initiative (“DC/EP”), also known as the digital yuan or e-CNY. The Chinese government is far …
Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber
Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber
DePaul Business & Commercial Law Journal
No abstract provided.
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
DePaul Business & Commercial Law Journal
No abstract provided.
Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu
Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu
DePaul Business & Commercial Law Journal
No abstract provided.
Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani
Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani
DePaul Business & Commercial Law Journal
No abstract provided.
The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin
The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin
DePaul Business & Commercial Law Journal
No abstract provided.
Governing The Metaverse, Jesse Valente
Governing The Metaverse, Jesse Valente
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley
Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley
University of Cincinnati Law Review
Law enforcement officers performing drug interdiction on interstate highways have to decide nearly every day whether there is reasonable suspicion to detain motorists until a trained dog can sniff for the presence of drugs. The officers’ assessments are often wrong, however, and lead to unnecessary detentions of innocent persons and the suppression of drugs found on guilty ones. We propose a computational method of evaluating suspicion in these encounters and offer experimental results from early efforts demonstrating its feasibility. With the assistance of large language and predictive machine learning models, it appears that judges, advocates, and even police officers could …
The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson
The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson
University of Cincinnati Law Review
This Article sheds light on a unique but centrally important “twenty-first century” issue involving electronic discovery in federal civil litigation that is just beginning to percolate in federal district courts. Historically, courts have held that a document attached to or enclosed with another document must be produced together when produced in response to a discovery request, as that is how the document was “kept in the usual course of business” and how it is “ordinarily maintained or in a reasonably usable form,” as the Federal Rules of Civil Procedure have required for decades. Today, parties are pushing back on whether …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Promoting Due Diligence: The Role Of The Gramm-Leach-Bliley Act, And Information Security Standards On Financial Institutions Protecting Consumers' Non-Public Personal Information (Npi), Thomas G. Caballero
Promoting Due Diligence: The Role Of The Gramm-Leach-Bliley Act, And Information Security Standards On Financial Institutions Protecting Consumers' Non-Public Personal Information (Npi), Thomas G. Caballero
2024 Spring Honors Capstone Projects
The Graham-Leach-Bliley Act (GLBA) protects consumer financial privacy and limits what information can be disclosed by a financial institution to non-affiliated third parties. In accordance with the GLBA, the FTC is required to enforce the Privacy of Consumer Financial Information Rule. This thesis uses information from scholarly peer-reviewed articles and reports on compliance standards in storing consumer non-public data and data breaches to depict the current impact of information security compliance in the financial sector. Supported by statistics and quantitative analysis in the areas of cybersecurity laws and industry standards that promote the due diligence of compliance efforts in protecting …
Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter
Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.