Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 54

Full-Text Articles in Computer Engineering

Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt Sep 2022

Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt

Judicature International

No abstract provided.


Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina Apr 2021

Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina

Library Philosophy and Practice (e-journal)

This study aims to discuss digital government and regulation, analyzed through the bibliometric approach with the Scopus database for the last 20 years and visualized through the VOSviewer software version 1.6.16. The results indicate that the topic of e-government has become essentially prominent and has been the most discussed in the past two decades. Approximately 41.1% of digital government and regulation articles are classified under the subject area of 'Computer Science', continued by Social Sciences (18.3%), and Business, Management and Accounting (10.2%), with the majority of being 'All Open Access' (46%). The trend of publication in this field includes the …


The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo Jan 2021

The First Amendment, Common Carriers, And Public Accommodations: Net Neutrality, Digital Platforms, And Privacy, Christopher S. Yoo

All Faculty Scholarship

Recent prominent judicial opinions have assumed that common carriers have few to no First Amendment rights and that calling an actor a common carrier or public accommodation could justify limiting its right to exclude and mandating that it provide nondiscriminatory access. A review of the history reveals that the underlying law is richer than these simple statements would suggest. The principles for determining what constitutes a common carrier or a public accommodation and the level of First Amendment protection both turn on whether the actor holds itself out as serving all members of the public or whether it asserts editorial …


Administrative Law In The Automated State, Cary Coglianese Jan 2021

Administrative Law In The Automated State, Cary Coglianese

All Faculty Scholarship

In the future, administrative agencies will rely increasingly on digital automation powered by machine learning algorithms. Can U.S. administrative law accommodate such a future? Not only might a highly automated state readily meet longstanding administrative law principles, but the responsible use of machine learning algorithms might perform even better than the status quo in terms of fulfilling administrative law’s core values of expert decision-making and democratic accountability. Algorithmic governance clearly promises more accurate, data-driven decisions. Moreover, due to their mathematical properties, algorithms might well prove to be more faithful agents of democratic institutions. Yet even if an automated state were …


Network Effects In Action, Christopher S. Yoo Nov 2020

Network Effects In Action, Christopher S. Yoo

All Faculty Scholarship

This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies alternative …


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


Transparency And Algorithmic Governance, Cary Coglianese, David Lehr Jan 2019

Transparency And Algorithmic Governance, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …


Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo Dec 2018

Paul Baran, Network Theory, And The Past, Present, And Future Of Internet, Christopher S. Yoo

All Faculty Scholarship

Paul Baran’s seminal 1964 article “On Distributed Communications Networks” that first proposed packet switching also advanced an underappreciated vision of network architecture: a lattice-like, distributed network, in which each node of the Internet would be homogeneous and equal in status to all other nodes. Scholars who have subsequently embraced the concept of a lattice-like network approach have largely overlooked the extent to which it is both inconsistent with network theory (associated with the work of Duncan Watts and Albert-László Barabási), which emphasizes the importance of short cuts and hubs in enabling networks to scale, and the actual way, the Internet …


Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick Jan 2018

Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick

All Faculty Scholarship

Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.

This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert Jan 2018

Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert

All Faculty Scholarship

Automated financial product advisors – “robo advisors” – are emerging across the financial services industry, helping consumers choose investments, banking products, and insurance policies. Robo advisors have the potential to lower the cost and increase the quality and transparency of financial advice for consumers. But they also pose significant new challenges for regulators who are accustomed to assessing human intermediaries. A well-designed robo advisor will be honest and competent, and it will recommend only suitable products. Because humans design and implement robo advisors, however, honesty, competence, and suitability cannot simply be assumed. Moreover, robo advisors pose new scale risks that …


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

All Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Regulating By Robot: Administrative Decision Making In The Machine-Learning Era, Cary Coglianese, David Lehr Jun 2017

Regulating By Robot: Administrative Decision Making In The Machine-Learning Era, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are transforming large segments of the economy, underlying everything from product marketing by online retailers to personalized search engines, and from advanced medical imaging to the software in self-driving cars. As machine learning’s use has expanded across all facets of society, anxiety has emerged about the intrusion of algorithmic machines into facets of life previously dependent on human judgment. Alarm bells sounding over the diffusion of artificial intelligence throughout the private sector only portend greater anxiety about digital robots replacing humans in the governmental sphere. A few administrative agencies have already begun to adopt this technology, while others …


Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo Nov 2016

Open Source, Modular Platforms, And The Challenge Of Fragmentation, Christopher S. Yoo

All Faculty Scholarship

Open source and modular platforms represent two powerful conceptual paradigms that have fundamentally transformed the software industry. While generally regarded complementary, the freedom inherent in open source rests in uneasy tension with the strict structural requirements required by modularity theory. In particular, third party providers can produce noncompliant components, and excessive experimentation can fragment the platform in ways that reduce its economic benefits for end users and app providers and force app providers to spend resources customizing their code for each variant. The classic solutions to these problems are to rely on some form of testing to ensure that the …


Modularity Theory And Internet Regulation, Christopher S. Yoo Jan 2016

Modularity Theory And Internet Regulation, Christopher S. Yoo

All Faculty Scholarship

Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.

The literature on innovation indicates that modules should be determined by the nature of …


Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo Jan 2015

Moore’S Law, Metcalfe’S Law, And The Theory Of Optimal Interoperability, Christopher S. Yoo

All Faculty Scholarship

Many observers attribute the Internet’s success to two principles: Moore’s Law and Metcalfe’s Law. These precepts are often cited to support claims that larger networks are inevitably more valuable and that costs in a digital environment always decrease. This Article offers both a systematic description of both laws and then challenges the conventional wisdom by exploring their conceptual limitations. It also explores how alternative mechanisms, such as gateways and competition, can permit the realization benefits typically attributed to Moore’s Law and Metcalfe’s Law without requiring increases in network size.


U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo Jun 2014

U.S. Vs. European Broadband Deployment: What Do The Data Say?, Christopher S. Yoo

All Faculty Scholarship

As the Internet becomes more important to the everyday lives of people around the world, commentators have tried to identify the best policies increasing the deployment and adoption of high-speed broadband technologies. Some claim that the European model of service-based competition, induced by telephone-style regulation, has outperformed the facilities-based competition underlying the US approach to promoting broadband deployment. The mapping studies conducted by the US and the EU for 2011 and 2012 reveal that the US led the EU in many broadband metrics.

• High-Speed Access: A far greater percentage of US households had access to Next Generation Access (NGA) …


Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo Jan 2014

Possible Paradigm Shifts In Broadband Policy, Christopher S. Yoo

All Faculty Scholarship

Debates over Internet policy tend to be framed by the way the Internet existed in the mid-1990s, when the Internet first became a mass-market phenomenon. At the risk of oversimplifying, the Internet was initially used by academics and tech-savvy early adopters to send email and browse the web over a personal computer connected to a telephone line via networks interconnected through in a limited way. Since then, the Internet has become much larger and more diverse in terms of users, applications, technologies, and business relationships. More recently, Internet growth has begun to slow both in terms of the number of …


Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo Jan 2014

Toward A Closer Integration Of Law And Computer Science, Christopher S. Yoo

All Faculty Scholarship

Legal issues increasingly arise in increasingly complex technological contexts. Prominent recent examples include the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), network neutrality, the increasing availability of location information, and the NSA’s surveillance program. Other emerging issues include data privacy, online video distribution, patent policy, and spectrum policy. In short, the rapid rate of technological change has increasingly shown that law and engineering can no longer remain compartmentalized into separate spheres. The logical response would be to embed the interaction between law and policy deeper into the fabric of both fields. An essential step would …


Technological Determinism And Its Discontents, Christopher S. Yoo Jan 2014

Technological Determinism And Its Discontents, Christopher S. Yoo

All Faculty Scholarship

This book review takes a critical review of the claim advanced by Susan Crawford in Captive Audience that the merger between Comcast and NBC Universal would harm consumers and that policymakers should instead promote common carriage regulation and subsidize municipal symmetrical gigabit fiber-to-the-home (FTTH). First it evaluates the extent to which next-generation digital subscriber lines (DSL) and wireless broadband technologies can serve as effective substitutes for cable modem service, identifying FCC data showing that the market has become increasingly competitive and likely to continue to do so. Furthermore, the market is not structured in a way that would permit the …


The Taxation Of Cloud Computing And Digital Content, David Shakow Jul 2013

The Taxation Of Cloud Computing And Digital Content, David Shakow

All Faculty Scholarship

“Cloud computing” raises important and difficult questions in state tax law, and for Federal taxes, particularly in the foreign tax area. As cloud computing solutions are adopted by businesses, items we view as tangible are transformed into digital products. In this article, I will describe the problems cloud computing poses for tax systems. I will show how current law is applied to cloud computing and will identify the difficulties current approaches face as they are applied to this developing technology.

My primary interest is how Federal tax law applies to cloud computing, particularly as the new technology affects international transactions. …


Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp Jan 2013

Competition In Information Technologies: Standards-Essential Patents, Non-Practicing Entities And Frand Bidding, Herbert J. Hovenkamp

All Faculty Scholarship

Standard Setting is omnipresent in networked information technologies. Virtually every cellular phone, computer, digital camera or similar device contains technologies governed by a collaboratively developed standard. If these technologies are to perform competitively, the processes by which standards are developed and implemented must be competitive. In this case attaining competitive results requires a mixture of antitrust and non-antitrust legal tools.

FRAND refers to a firm’s ex ante commitment to make its technology available at a “fair, reasonable and nondiscriminatory royalty.” The FRAND commitment results from bidding to have one’s own technology selected as a standard. Typically the FRAND commitment is …


When Antitrust Met Facebook, Christopher S. Yoo Jul 2012

When Antitrust Met Facebook, Christopher S. Yoo

All Faculty Scholarship

Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …


New Technologies And Constitutional Law, Thomas Fetzer, Christopher S. Yoo Jun 2012

New Technologies And Constitutional Law, Thomas Fetzer, Christopher S. Yoo

All Faculty Scholarship

No abstract provided.


Beyond Coase: Emerging Technologies And Property Theory, Christopher S. Yoo Jun 2012

Beyond Coase: Emerging Technologies And Property Theory, Christopher S. Yoo

All Faculty Scholarship

In addition to prompting the development of the Coase Theorem, Ronald Coase’s landmark 1959 article on the Federal Communications Commission touched off a revolution in spectrum policy. Although one of Coase’s proposed reforms (that spectrum should be allocated through markets) has now become the conventional wisdom, his other principal recommendation (that governments stop dedicating portions of the spectrum to particular uses) has yet to be fully embraced. Drawing on spectrum as well as Internet traffic and electric power as examples, this Article argues that emerging technologies often reflect qualities that make defining property rights particularly difficult. These include the cumulative …


Network Neutrality And The Need For A Technological Turn In Internet Scholarship, Christopher S. Yoo May 2012

Network Neutrality And The Need For A Technological Turn In Internet Scholarship, Christopher S. Yoo

All Faculty Scholarship

To most social scientists, the technical details of how the Internet actually works remain arcane and inaccessible. At the same time, convergence is forcing scholars to grapple with how to apply regulatory regimes developed for traditional media to a world in which all services are provided via an Internet-based platform. This chapter explores the problems caused by the lack of familiarity with the underlying technology, using as its focus the network neutrality debate that has dominated Internet policy for the past several years. The analysis underscores a surprising lack of sophistication in the current debate. Unfamiliarity with the Internet’s architecture …


Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo Mar 2011

Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo

All Faculty Scholarship

This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.