Open Access. Powered by Scholars. Published by Universities.®

Technology and Innovation Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 93

Full-Text Articles in Technology and Innovation

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham Jan 2023

Regulatory Sandboxes Enable Pragmatic Blockchain Regulation, Joshua Durham

Washington Journal of Law, Technology & Arts

Since blockchain technology supports digitally-native money, the centralized chokepoints that governments have traditionally targeted to regulate commerce no longer apply to our (digital) property. However, competent regulation furthers basic public policy goals and should enable responsible innovation of this promising technology. This Article discusses pragmatic policies that enable responsible innovation by cultivating regulatory expertise required to write enforceable rules. Responsible innovation is necessary because unlike the early internet, where programmers could manipulate simple colors and text on webpages, these same individuals can now create financial services applications that manipulate actual money—we are faced with an inescapable reality that more is …


Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman Jan 2023

Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman

Catholic University Journal of Law and Technology

The Model Rules of Professional Conduct seek to police the conduct of attorneys. Each jurisdiction adopts its own rules of professional conduct to apply to the attorneys licensed within it. Notably, the model rules prohibit any sexual relationship between the attorney and client unless that relationship precedes the attorney-client relationship. Traditionally, defining a "sexual relationship" was simple, particularly if the attorney and client engaged in sexual intercourse. The introduction of dating apps, however, has blurred the line.

This article outlines the inherent risks of attorneys using dating apps at a time when most newly-licensed attorneys make up the majority of …


Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo Jan 2023

Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo

Book Chapters

Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …


New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya Jan 2023

New Frontiers In Technology: Can Traditional Intellectual Property Rights Laws Be Adapted And Applied To Nfts?, Mariyah S. Wakhariya

Catholic University Journal of Law and Technology

A decade ago, ‘NFTs’ were rarely heard of or known to anyone, unless they worked in or kept up with the tech world. However, they are not new - they have been around for almost two decades. Their popularity has grown over the past few years. ‘NFT’ stands for ‘non-fungible token’. An NFT is a digital file with a unique identity that is verified on a blockchain and is therefore not interchangeable - i.e., a kind of crypto asset, like an authentication certificate for digital artifacts. In theory, NFTs can represent almost any real or intangible property. These days, it …


Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg Jul 2022

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg

Articles

The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …


Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss Jun 2022

Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss

Articles

Studies of blockchain governance can be divided into analyses of the governance of blockchains (such as rules and power dynamics within a given network) and governance by blockchains (such as how blockchains can be implemented to improve self-governance of community-based peer production networks). Less emphasis has been placed on applications of distributed ledgers to public sector governance. Our review clarifies that the decentralization and distributive features that enable blockchains to link up loosely connected private organizations and public agencies to improve efficiency and transparency of government transactions. However, most blockchain applications lack clear advantages over the conventional digital recording of …


The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao Jan 2022

The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao

Catholic University Journal of Law and Technology

The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.

This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …


Blockchain Networks As Knowledge Commons, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Martin B. H. Weiss, Michael J. Madison Jan 2022

Blockchain Networks As Knowledge Commons, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Martin B. H. Weiss, Michael J. Madison

Articles

Researchers interested in blockchains are increasingly attuned to questions of governance, including how blockchains relate to government, the ways blockchains are governed, and ways blockchains can improve prospects for successful self-governance. Our paper joins this research by exploring the implications of the Governing Knowledge Commons (GKC) framework to analyze governance of blockchains. Our novel contributions are making the case that blockchain networks represent knowledge commons governance, in the sense that they rely on collectively-managed technologies to pool and manage distributed information, illustrating the usefulness and novelty of the GCK methodology with an empirical case study of the evolution of Bitcoin, …


A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr Oct 2020

A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr

Dickinson Law Review (2017-Present)

Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.

To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …


Fixing Social Media: Toward A Democratic Digital Commons, Michael Kwet Sep 2020

Fixing Social Media: Toward A Democratic Digital Commons, Michael Kwet

Markets, Globalization & Development Review

In the past few years, big Social Media networks like Facebook, Twitter, and YouTube have received intense scrutiny from the intellectual classes. This article critiques the dominant strain of criticism, the neo-Brandeisian School of antitrust, for its narrow focus on “regulated competition” as an appropriate means to “fix social media”. This essay calls for a socialist alternative: a democratic social media commons based on free and open source technology, decentralization, and democratic socialist legal solutions. It reviews how existing solutions like the Fediverse and LibreSocial work, and how they may provide answers for a better way forward.


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield Dec 2019

Implementing Ethics Into Artificial Intelligence: A Contribution, From A Legal Perspective, To The Development Of An Ai Governance Regime, Axel Walz, Kay Firth-Butterfield

Duke Law & Technology Review

The increasing use of AI and autonomous systems will have revolutionary impacts on society. Despite many benefits, AI and autonomous systems involve considerable risks that need to be managed. Minimizing these risks will emphasize the respective benefits while at the same time protecting the ethical values defined by fundamental rights and basic constitutional principles, thereby preserving a human centric society. This Article advocates for the need to conduct in-depth risk-benefit-assessments with regard to the use of AI and autonomous systems. This Article points out major concerns in relation to AI and autonomous systems such as likely job losses, causation of …


Next Generation Of Evidence Collecting: The Need For Digital Forensics In Criminal Justice Education, Scott H. Belshaw Jun 2019

Next Generation Of Evidence Collecting: The Need For Digital Forensics In Criminal Justice Education, Scott H. Belshaw

Journal of Cybersecurity Education, Research and Practice

Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes. Law enforcement is increasingly identifying the need to be able to process their evidence internally warranting the exploration of the need for digital forensics training as part of a broader study of criminal justice for future law enforcement practitioners. This paper uses telephone surveys of …


Cybersecurity Oversight Liability, Benjamin P. Edwards Apr 2019

Cybersecurity Oversight Liability, Benjamin P. Edwards

Georgia State University Law Review

A changing cybersecurity environment now poses a significant corporate-governance challenge. Although some cybersecurity data breaches may be inevitable, courts now increasingly consider when a corporation’s officers and directors may be held liable on theories that they acted in bad faith and failed to adequately oversee the corporation’s affairs. This short essay reviews recent derivative decisions and encourages corporate boards to recognize that in an environment filled with increasing threats, a reasonable response will require devoting real resources and attention to cybersecurity issues.


Can Accessibility Liberate The "Lost Ark" Of Scholarly Work?: University Library Institutional Repositories Are "Places Of Public Accommodation”, 52 Uic J. Marshall L. Rev. 327 (2019), Raizel Liebler, Gregory Cunningham Jan 2019

Can Accessibility Liberate The "Lost Ark" Of Scholarly Work?: University Library Institutional Repositories Are "Places Of Public Accommodation”, 52 Uic J. Marshall L. Rev. 327 (2019), Raizel Liebler, Gregory Cunningham

UIC Law Review

For any body of knowledge – an ark of power or a corpus of scholarship – to be studied and used by people, it needs to be accessible to those seeking information. Universities, through their libraries, now aim to make more of the scholarship produced available for free to all through institutional repositories. However, the goal of being truly open for an institutional repository is more than the traditional definition of open access. It also means openness in a more general sense. Creating a scholarship-based online space also needs to take into consideration potential barriers for people with disabilities. This …


Back To The Future Of Cyber Insurance, Tom Baker Jan 2019

Back To The Future Of Cyber Insurance, Tom Baker

All Faculty Scholarship

Written for an insurance trade publication, this brief essay identifies five ways that insurers manage uncertainty in selling cyber insurance: (1) providing valuable services beyond risk transfer; (2) contract design, (3) rapid iteration of pricing and forms, (4) limits management and reinsurance, and (5) claims disputing. Cyber insurers provide easy-to-price loss prevention and mitigation services so that the value proposition includes more than the (difficult to price) risk transfer. Cyber insurers design their contracts to include narrowly defined categories of coverage, typically with separate limits and with claims-made coverage for liability risks, and traditional insurers design their contracts to limit …


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels Aug 2018

Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels

SMU Data Science Review

In this paper, we present an analysis of features influencing Yelp's proprietary review filtering algorithm. Classifying or misclassifying reviews as recommended or non-recommended affects average ratings, consumer decisions, and ultimately, business revenue. Our analysis involves systematically sampling and scraping Yelp restaurant reviews. Features are extracted from review metadata and engineered from metrics and scores generated using text classifiers and sentiment analysis. The coefficients of a multivariate logistic regression model were interpreted as quantifications of the relative importance of features in classifying reviews as recommended or non-recommended. The model classified review recommendations with an accuracy of 78%. We found that reviews …


Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert Jan 2018

Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert

All Faculty Scholarship

Automated financial product advisors – “robo advisors” – are emerging across the financial services industry, helping consumers choose investments, banking products, and insurance policies. Robo advisors have the potential to lower the cost and increase the quality and transparency of financial advice for consumers. But they also pose significant new challenges for regulators who are accustomed to assessing human intermediaries. A well-designed robo advisor will be honest and competent, and it will recommend only suitable products. Because humans design and implement robo advisors, however, honesty, competence, and suitability cannot simply be assumed. Moreover, robo advisors pose new scale risks that …


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

All Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


The Digital Dionysus: Nietzsche & The Network-Centric Condition Dec 2015

The Digital Dionysus: Nietzsche & The Network-Centric Condition

Dan Mellamphy

No abstract provided.


Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas Jul 2014

Systematic Ict Surveillance By Employers: Are Your Personal Activities Private?, Arlene J. Nicholas

Faculty and Staff - Articles & Papers

This paper reviews the various methods of information and communications technology (ICT) that is used by employers to peer into the work lives and, in some cases, private lives of employees. Some of the most common methods – such as computer and Internet monitoring, video surveillance, and global positioning systems (GPS) – have resulted in employee disciplines that have been challenged in courts. This paper provides background information on United States (U.S.) laws and court cases which, in this age of easily accessible information, mostly support the employer. Assessments regarding regulations and policies, which will need to be continually updated …


Speculative Tech: The Bitcoin Legal Quagmire & The Need For Legal Innovation, Paul H. Farmer Jr. Jan 2014

Speculative Tech: The Bitcoin Legal Quagmire & The Need For Legal Innovation, Paul H. Farmer Jr.

Journal of Business & Technology Law

No abstract provided.


Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte Jan 2014

Fouling The First Amendment: Why Colleges Can't, And Shouldn't, Control Student Athletes' Speech On Social Media, Frank D. Lomonte

Journal of Business & Technology Law

No abstract provided.


Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley Jan 2014

Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley

Journal of Business & Technology Law

No abstract provided.


Wickard For The Internet? Network Neutrality After Verizon V. Fcc, Christopher S. Yoo Jan 2014

Wickard For The Internet? Network Neutrality After Verizon V. Fcc, Christopher S. Yoo

All Faculty Scholarship

The D.C. Circuit’s January 2014 decision in Verizon v. FCC represented a major milestone in the debate over network neutrality that has dominated communications policy for the past decade. This article analyzes the implications of the D.C. Circuit’s ruling, beginning with a critique of the court’s ruling that section 706 of the Telecommunications Act of 1996 gave the Federal Communications Commission (FCC) the authority to mandate some form of network neutrality. Examination of the statute’s text, application of canons of construction such as ejusdem generis and noscitur a sociis, and a perusal of the statute’s legislative history all raise questions …


Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo Jan 2014

Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo

All Faculty Scholarship

Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …