Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Law

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 96

Full-Text Articles in Computer Engineering

Ethical Implications Of Ai-Based Algorithms In Recruiting Processes: A Study Of Civil Rights Violations Under Title Vii And The Americans With Disabilities Act, Vanessa Rodriguez Dec 2023

Ethical Implications Of Ai-Based Algorithms In Recruiting Processes: A Study Of Civil Rights Violations Under Title Vii And The Americans With Disabilities Act, Vanessa Rodriguez

Cyber Operations and Resilience Program Graduate Projects

This research paper analyzes the ethical implications of utilizing artificial intelligence, specifically AI-based algorithms in business selection and recruiting processes, with a focus on potential violations under Title VII of the Civil Rights Act of 1964 and Title 1 of the Americans with Disabilities Act (ADA). Amazon’s attempt at launching AI recruiting tools is examined. This paper will assess the fairness of AI recruiting practices, considering data collection, potential biases, and accuracy concerns in its implementation process. Additionally, the paper will provide an overview of federal civil rights statutes enforced by the U.S. Equal Employment Opportunity Commission (EEOC) and recent …


Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden Oct 2023

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden

Copyright, Fair Use, Scholarly Communication, etc.

Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.

My Administration places the highest urgency …


Ai Is Here. Here’S How New Mexicans Can Prepare, Sonia Gipson Rankin, Melanie E. Moses Sep 2023

Ai Is Here. Here’S How New Mexicans Can Prepare, Sonia Gipson Rankin, Melanie E. Moses

Faculty Scholarship

Last December we asked the AI chatbot ChatGPT to solve a programming assignment given to computer science students at UNM. It wrote some Python code, but it generated an error. We gave the chatbot the error message and were astounded by how good its response was.


Antitrust Interoperability Remedies, Herbert J. Hovenkamp Jan 2023

Antitrust Interoperability Remedies, Herbert J. Hovenkamp

All Faculty Scholarship

Compelled interoperability can be a useful remedy for dominant firms, including large digital platforms, who violate the antitrust laws. They can address competition concerns without interfering unnecessarily with the structures that make digital platforms attractive and that have contributed so much to economic growth.

Given the wide variety of structures and business models for big tech, “interoperability” must be defined broadly. It can realistically include everything from “dynamic” interoperability that requires real time sharing of data and operations, to “static” interoperability which requires portability but not necessarily real time interactions. Also included are the compelled sharing of intellectual property or …


Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price Dec 2022

Certification Basis For A Fully Autonomous Uncrewed Passenger Carrying Urban Air Mobility Aircraft, Steve Price

Student Works

The Urban Air Mobility campaign has set a goal to efficiently transport passengers and cargo in urban areas of operation with autonomous aircraft. This concept of operations will require aircraft to utilize technology that currently does not have clear regulatory requirements. This report contains a comprehensive analysis and creation of a certification basis for a fully autonomous uncrewed passenger carrying rotorcraft for use in Urban Air Mobility certified under Title 14 Code of Federal Regulations Part 27. Part 27 was first analyzed to determine the applicability of current regulations. The fully electric propulsion system and fully autonomous flight control system …


Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt Sep 2022

Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt

Judicature International

No abstract provided.


Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur Jun 2022

Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur

Publications and Research

What if people had the ability to assert their own legally binding permissions for data collection, use, sharing, and retention by the technologies they use? The IEEE P7012 has been working on an interoperability specification for machine-readable personal privacy terms to support this ability since 2018. The premise behind the work of IEEE P7012 is that people need technology that works on their behalf—i.e. software agents that assert the individual’s permissions and preferences in a machine-readable format.

Thanks to a grant from the IEEE Technical Activities Board Committee on Standards (TAB CoS), we were able to explore the attitudes of …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel Feb 2022

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen Feb 2022

Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen

All Faculty Scholarship

African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …


What Is The Relationship Between Language And Thought?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo Sep 2021

What Is The Relationship Between Language And Thought?: Linguistic Relativity And Its Implications For Copyright, Christopher S. Yoo

All Faculty Scholarship

To date, copyright scholarship has almost completely overlooked the linguistics and cognitive psychology literature exploring the connection between language and thought. An exploration of the two major strains of this literature, known as universal grammar (associated with Noam Chomsky) and linguistic relativity (centered around the Sapir-Whorf hypothesis), offers insights into the copyrightability of constructed languages and of the type of software packages at issue in Google v. Oracle recently decided by the Supreme Court. It turns to modularity theory as the key idea unifying the analysis of both languages and software in ways that suggest that the information filtering associated …


Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina Apr 2021

Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina

Library Philosophy and Practice (e-journal)

This study aims to discuss digital government and regulation, analyzed through the bibliometric approach with the Scopus database for the last 20 years and visualized through the VOSviewer software version 1.6.16. The results indicate that the topic of e-government has become essentially prominent and has been the most discussed in the past two decades. Approximately 41.1% of digital government and regulation articles are classified under the subject area of 'Computer Science', continued by Social Sciences (18.3%), and Business, Management and Accounting (10.2%), with the majority of being 'All Open Access' (46%). The trend of publication in this field includes the …


The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo Jan 2021

The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo

All Faculty Scholarship

Recent prominent judicial opinions have assumed that common carriers have few to no First Amendment rights and that calling an actor a common carrier or public accommodation could justify limiting its right to exclude and mandating that it provide nondiscriminatory access. A review of the history reveals that the underlying law is richer than these simple statements would suggest. The principles for determining what constitutes a common carrier or a public accommodation and the level of First Amendment protection both turn on whether the actor holds itself out as serving all members of the public or whether it asserts editorial …


Administrative Law In The Automated State, Cary Coglianese Jan 2021

Administrative Law In The Automated State, Cary Coglianese

All Faculty Scholarship

In the future, administrative agencies will rely increasingly on digital automation powered by machine learning algorithms. Can U.S. administrative law accommodate such a future? Not only might a highly automated state readily meet longstanding administrative law principles, but the responsible use of machine learning algorithms might perform even better than the status quo in terms of fulfilling administrative law’s core values of expert decision-making and democratic accountability. Algorithmic governance clearly promises more accurate, data-driven decisions. Moreover, due to their mathematical properties, algorithms might well prove to be more faithful agents of democratic institutions. Yet even if an automated state were …


Pedagogy Of The Pandemic: A Case Study Of Emergency Remote Education In A Private Higher Education Institution In Egypt, Rania M Rafik Khalil, Shadia Fahim, Wadouda Badran, Hadia Fakhreldin, Maguid Hassan, Hani Ghali, Attia Attia, Sarah Khalil, Hassan Abdelhamid, Yasmine Abdel Moneim, Omar H. Karam Nov 2020

Pedagogy Of The Pandemic: A Case Study Of Emergency Remote Education In A Private Higher Education Institution In Egypt, Rania M Rafik Khalil, Shadia Fahim, Wadouda Badran, Hadia Fakhreldin, Maguid Hassan, Hani Ghali, Attia Attia, Sarah Khalil, Hassan Abdelhamid, Yasmine Abdel Moneim, Omar H. Karam

English Language and Literature

COVID19 caught almost every higher education institution off guard. The pandemic interrupted the teaching and learning process and required immediate implementation of emergency remote learning strategies. Teaching pedagogy turned to new ways of thinking about learning. Consequently, both academic staff and students had to adapt without warning to the challenges of teaching with advanced technology from home which was taking the world by storm. Overcoming this challenge in Egypt has been much easier for private universities in comparison to state universities because of the availability of facilities, funding, smaller cohorts and validation by partner western universities. This paper shares reflections …


Network Effects In Action, Christopher S. Yoo Nov 2020

Network Effects In Action, Christopher S. Yoo

All Faculty Scholarship

This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies alternative …


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley Jul 2020

Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley

Articles, Chapters and Online Publications

With our IT department preparing to upgrade the University of Georgia’s Alexander Campbell King Law Library (UGA Law Library) website from Drupal 7 to 8 this fall, a web developer, an archivist, and a librarian teamed up a year ago to make plans for preserving thousands of born-digital images. We wanted to harvest photographs housed only in web-based photo galleries on the law school website and import them into our repository’s collection. The problem? There were five types of online photo galleries, and our current repository did not include appropriate categories for all of the photographs. The solution? Expand our …


The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D Jun 2020

The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

In the society of ours, is it true really that computers and information technology have contributed immensely to the way we learn? After observing and reading various educational paraphernalia and scanning the environment research has shown that the educational systems have greatly been impacted by computers and information technology. With the growth of technology, the ways we learn have been improved tremendously. Innovative technologies have contributed to the innovation of learning in the education arena and outside. The traditional ways of conveying instructions to learners have been augmented with the use of computers information technologies. The educational system of our …


Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood Apr 2020

Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood

Independent Study Project (ISP) Collection

The digital domain is the emerging environment for which the internet and data connectivity exists. This new domain is challenging the traditional place for geopolitics to exist, and creating new challenges to international relations. The use of cyberweapons through direct cyberattacks, such as the possibility of an attack on the U.S. power grid, or misinformation campaigns, such as the one launched by Russia against the 2016 U.S. Presidential election, can expand the international threat landscape. While these new threats increase, states are widely not prepared to address the new challenges in the digital domain. This paper will use three primary …


Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam Jan 2020

Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam

Faculty Publications

In the sustainability IoT, the cybersecurity risks to things, sensors, and monitoring systems are distinct from the conventional networking systems in many aspects. The interaction of sustainability IoT with the physical world phenomena (e.g., weather, climate, water, and oceans) is mostly not found in the modern information technology systems. Accordingly, actuation, the ability of these devices to make changes in real world based on sensing and monitoring, requires special consideration in terms of privacy and security. Moreover, the energy efficiency, safety, power, performance requirements of these device distinguish them from conventional computers systems. In this chapter, the cybersecurity approaches towards …


Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez Oct 2019

Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez

Independent Study Project (ISP) Collection

Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …


Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove Jun 2019

Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove

Presentations

ABA Standards require students to complete six credit hours of experiential learning. Hours must be tracked, and field placements in particular require students to keep logs of their activities to document compliance. Various web-based solutions are used, including “high-end suites like CORE ELMS, the Symplicity experiential learning module, and the basic and free Dropbox and Google Suite” as well as Canvas, and a time-tracking program called Tick. Here at the University of Georgia School of Law, we decided to add simple timesheet functionality to our Drupal-based student portal, allowing students to securely log their hours and activities, and faculty to …


Toward The Personalization Of Copyright Law, Adi Libson, Gideon Parchomovsky Jan 2019

Toward The Personalization Of Copyright Law, Adi Libson, Gideon Parchomovsky

All Faculty Scholarship

In this Article, we provide a blueprint for personalizing copyright law in order to reduce the deadweight loss that stems from its universal application to all users, including those who would not have paid for it. We demonstrate how big data can help identify inframarginal users, who would not pay for copyrighted content, and we explain how copyright liability and remedies should be modified in such cases.


Transparency And Algorithmic Governance, Cary Coglianese, David Lehr Jan 2019

Transparency And Algorithmic Governance, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …


The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard Jan 2019

The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.

1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …


Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo Dec 2018

Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo

All Faculty Scholarship

Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the Internet …


The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow Aug 2018

The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow

All Faculty Scholarship

In this report, Shakow explains how a decentralized autonomous organization functions and interacts with the U.S. tax system and presents the many tax issues that these structures raise. The possibility of using smart contracts to allow an entity to operate totally autonomously on a blockchain platform seems attractive. However, little thought has been given to how such an entity can comply with the requirements of a tax system. The DAO, the first major attempt to create such an organization, failed because of a programming error. If successful examples proliferate in the future, tax authorities will face significant problems in getting …


Energy Demand Response For High-Performance Computing Systems, Kishwar Ahmed Mar 2018

Energy Demand Response For High-Performance Computing Systems, Kishwar Ahmed

FIU Electronic Theses and Dissertations

The growing computational demand of scientific applications has greatly motivated the development of large-scale high-performance computing (HPC) systems in the past decade. To accommodate the increasing demand of applications, HPC systems have been going through dramatic architectural changes (e.g., introduction of many-core and multi-core systems, rapid growth of complex interconnection network for efficient communication between thousands of nodes), as well as significant increase in size (e.g., modern supercomputers consist of hundreds of thousands of nodes). With such changes in architecture and size, the energy consumption by these systems has increased significantly. With the advent of exascale supercomputers in the next …


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …