Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Journal

Institution
Keyword
Publication Year
Publication
File Type

Articles 91 - 120 of 3134

Full-Text Articles in Law

The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta Dec 2023

The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta

Indian Journal of Law and Technology

In course of this paper, the authors have soght to examine the extent to which technology based on artificial intelligence (AI) have made inroads into the banking and financial sectors of a developing economy like India. The paper begins with providing a contextual background to the adoption of such technology in the global financial arena. It then proceeds to identify and categorise the forms of AI currently being used in the Indian financial sector and also considers the different channels of operation where such technology is in vogue. The advantages of using such technology and the future goals for integrating …


The Immutable Blockchain Confronts The Unstoppable Gdpr, Bisma Shoaib Dec 2023

The Immutable Blockchain Confronts The Unstoppable Gdpr, Bisma Shoaib

Seattle Journal of Technology, Environmental & Innovation Law

The notion that privacy is dispensable and should be sacrificed in exchange for internet access is misguided. In fact, privacy laws are flourishing, highlighting the significance of safeguarding personal information in the digital age. It is crucial to recognize that privacy is not merely a luxury, but a fundamental right that should be upheld, even in the context of online activities. In the ever-evolving landscape of technology, the collision between privacy and innovation becomes increasingly apparent. This paper delves into the intriguing convergence of the General Data Protection Regulation (GDPR) and blockchain technology, unraveling pivotal issues that arise from this …


“Vr”: Virtual Reality, Or Very Risky? Injuries And Liability From Virtual Reality Headsets, Andrew Stein Dec 2023

“Vr”: Virtual Reality, Or Very Risky? Injuries And Liability From Virtual Reality Headsets, Andrew Stein

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


Assessing The Potential Involutionary Effects Of New Copyright Laws: A Techno-Legal Analysis Based On The Impact Of Web 3.0 On Copyright Protection, Alvin Hung Dec 2023

Assessing The Potential Involutionary Effects Of New Copyright Laws: A Techno-Legal Analysis Based On The Impact Of Web 3.0 On Copyright Protection, Alvin Hung

Seattle Journal of Technology, Environmental & Innovation Law

As Internet technology evolves, legal professionals and academics must stay current and adapt to these inevitable technological changes. This article investigates the extensive influence of the latest version of the World Wide Web (the Web)—Web 3.0—on copyright laws based on a techno-legal analysis that considers the opportunities and challenges of this new technology. The principal version of copyright laws, the Digital Millennium Copyright Act (DMCA), was enacted in 1998 during the Web 1.0 era, signifying an impending need for appropriate updates in the new Web 3.0 era. This article traces the historical development of U.S. copyright laws by positing it …


A New Right Is The Wrong Tactic: Bring Legal Actions Against States For Internet Shutdowns Instead Of Working Towards A Human Right To The Internet (Part 2), Jay T. Conrad Dec 2023

A New Right Is The Wrong Tactic: Bring Legal Actions Against States For Internet Shutdowns Instead Of Working Towards A Human Right To The Internet (Part 2), Jay T. Conrad

Seattle Journal of Technology, Environmental & Innovation Law

This Article is the second of a two-part series about an increasingly prevalent threat to human rights: State-sanctioned Internet shutdowns. Part 1 detailed Internet shutdown tactics and potential human rights violations that could result from a shutdown. Now, Part 2 addresses the deficiencies of advocating for Internet access to be a recognized human right as a means of combatting shutdowns. Despite the popularity of this proposed solution, the harms of Internet shutdowns are better addressed through traditional legal avenues, such as bringing claims against the sanctioning state.

Part 1 can be found in The Seattle Journal of Technology, Environmental & …


Rise Of The Machines: The Future Of Intellectual Property Rights In The Age Of Artificial Intelligence, Sofia Vescovo Dec 2023

Rise Of The Machines: The Future Of Intellectual Property Rights In The Age Of Artificial Intelligence, Sofia Vescovo

Brooklyn Law Review

Artificial intelligence (AI) is not new to generating outputs considered suitable for intellectual property (IP) protection. However, recent technological advancements have made it possible for AI to transform from a mere tool used to assist in developing IP to the mind behind novel artistic works and inventions. One particular AI, DABUS, has done just so. Yet, while technology has advanced, IP law has not. This note sets out to provide a solution to the legal concerns raised by AI in IP law, specifically in the context of AI authorship and inventorship. The DABUS test case offers a model framework for …


Taxing The New With The Old: Capturing The Value Of Data With The Corporate Income Tax In Virginia, Coleman H. Cheeley Dec 2023

Taxing The New With The Old: Capturing The Value Of Data With The Corporate Income Tax In Virginia, Coleman H. Cheeley

University of Richmond Law Review

The Commonwealth of Virginia markets itself as “The Largest Data Center Market in the World.”In 2019, the Northern Virginia market alone was the largest in the United States by inventory, with room to grow. In 2021, data centers in Northern Virginia required an estimated 1,686 megawatts of power; that number is expected to increase by 200 megawatts in the near future, reflecting data centers currently under development. For reference, in 2022, it was estimated that more than 100 homes could be powered by one megawatt of solar power in Virginia. Historically, data centers have been located in the Commonwealth due …


The Gptjudge: Justice In A Generative Ai World, Maura R. Grossman, Paul W. Grimm, Daniel G. Brown, Molly (Yiming) Xu Dec 2023

The Gptjudge: Justice In A Generative Ai World, Maura R. Grossman, Paul W. Grimm, Daniel G. Brown, Molly (Yiming) Xu

Duke Law & Technology Review

Generative AI (“GenAI”) systems such as ChatGPT recently have developed to the point where they can produce computer-generated text and images that are difficult to differentiate from human-generated text and images. Similarly, evidentiary materials such as documents, videos, and audio recordings that are AI-generated are becoming increasingly difficult to differentiate from those that are not AI-generated. These technological advancements present significant challenges to parties, their counsel, and the courts in determining whether evidence is authentic or fake. Moreover, the explosive proliferation and use of GenAI applications raises concerns about whether litigation costs will dramatically increase as parties are forced to …


Trademarks In An Algorithmic World, Christine Haight Farley Dec 2023

Trademarks In An Algorithmic World, Christine Haight Farley

Washington Law Review

According to the sole normative foundation for trademark protection—“search costs” theory—trademarks transmit useful information to consumers, enabling an efficient marketplace. The marketplace, however, is in the midst of a fundamental change. Increasingly, retail is virtual, marketing is data-driven, and purchasing decisions are automated by AI. Predictive analytics are changing how consumers shop. Search costs theory no longer accurately describes the function of trademarks in this marketplace. Consumers now have numerous digital alternatives to trademarks that more efficiently provide them with increasingly accurate product information. Just as store shelves are disappearing from consumers’ retail experience, so are trademarks disappearing from their …


Regulation Priorities For Artificial Intelligence Foundation Models, Matthew R. Gaske Nov 2023

Regulation Priorities For Artificial Intelligence Foundation Models, Matthew R. Gaske

Vanderbilt Journal of Entertainment & Technology Law

This Article responds to the call in technology law literature for high-level frameworks to guide regulation of the development and use of Artificial Intelligence (AI) technologies. Accordingly, it adapts a generalized form of the fintech Innovation Trilemma framework to argue that a regulatory scheme can prioritize only two of three aims when considering AI oversight: (1) promoting innovation, (2) mitigating systemic risk, and (3) providing clear regulatory requirements. Specifically, this Article expressly connects legal scholarship to research in other fields focusing on foundation model AI systems and explores this kind of system’s implications for regulation priorities from the geopolitical and …


Full Issue: Fall 2023 Oct 2023

Full Issue: Fall 2023

DePaul Magazine

In DePaul Magazine's fall 2023, President Robert L. Manuel unveils his Designing DePaul road map to position the university for monumental impact. We also highlight an innovative program that merges law and tech, an initiative centering humanities in collaborative, community-based interactions, and the ascendance of soprano Janai Brugger (SOM '05) on the international opera stage.


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Table Of Contents, Seattle University Law Review Oct 2023

Table Of Contents, Seattle University Law Review

Seattle University Law Review

Table of Contents


A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver Oct 2023

A Miscarriage Of Justice: How Femtech Apps And Fog Data Evade Fourth Amendment Privacy Protections, Rachel Silver

Washington and Lee Journal of Civil Rights and Social Justice

After the fall of Roe v. Wade, states across the country have enacted extreme abortion bans. Anti-abortion states, emboldened by their new, unrestricted power to regulate women’s bodies, are only broadening the scope of abortion prosecutions. And modern technology provides law enforcement with unprecedented access to women’s most intimate information, including, for example, their menstrual cycle, weight, body temperature, sexual activity, mood, medications, and pregnancy details. Fourth Amendment law fails to protect this sensitive information stored on femtech apps from government searches. In a largely unregulated private market, femtech apps sell health and location data to third parties like Fog …


The Strategic Use Of Ransomware Operations As A Method Of Warfare, Jeffrey Biller Aug 2023

The Strategic Use Of Ransomware Operations As A Method Of Warfare, Jeffrey Biller

International Law Studies

This article examines the potential use and legal limitations of ransomware to achieve strategic effects in armed conflicts. Ransomware is defined here as the temporary encryption of data until some pre-condition is met to release the encryption. The article focuses on international law as applicable to a State’s use of ransomware against another State, where both are parties to an existing international armed conflict. The author finds that international humanitarian law does not currently prohibit most uses of ransomware against non-military related targets in armed conflicts. While the encryption of data may be a legal violation when it inhibits the …


Federal Data Privacy Regulation: Do Not Expect An American Gdpr, Matt Buckley Aug 2023

Federal Data Privacy Regulation: Do Not Expect An American Gdpr, Matt Buckley

DePaul Business & Commercial Law Journal

No abstract provided.


Legal Representation And The Metaverse: The Ethics Of Practicing In Multiple Realities, Madeline Brom Aug 2023

Legal Representation And The Metaverse: The Ethics Of Practicing In Multiple Realities, Madeline Brom

DePaul Business & Commercial Law Journal

No abstract provided.


Badges Of Honor: Professional Conduct, Consumer Protection, And Accolades In Lawyer Advertising, Kiren Dosanjh Zucker, Bruce Zucker Aug 2023

Badges Of Honor: Professional Conduct, Consumer Protection, And Accolades In Lawyer Advertising, Kiren Dosanjh Zucker, Bruce Zucker

DePaul Business & Commercial Law Journal

No abstract provided.


Ethics At The Speed Of Business, James A. Doppke Jr. Aug 2023

Ethics At The Speed Of Business, James A. Doppke Jr.

DePaul Business & Commercial Law Journal

This paper discusses several ways in which the Illinois Rules of Professional Conduct, and the Illinois Supreme Court Rules, construct barriers that prevent lawyers and businesses from accomplishing reasonable commercial goals. Often, those barriers arise from outdated concepts, or terminology that does not reflect current business realities. The paper argues for the amendment of specific Rules to enhance lawyers’ and businesses’ respective abilities to conduct their affairs more efficiently, without sacrificing public protection in the process.


Welcome Address, Lauren Mckenzie Aug 2023

Welcome Address, Lauren Mckenzie

DePaul Business & Commercial Law Journal

No abstract provided.


Front Matter Aug 2023

Front Matter

DePaul Business & Commercial Law Journal

No abstract provided.


Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh Jul 2023

Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh

Journal of Police and Legal Sciences

Addressing the mechanisms of reducing cyber threats and risks Research Because cyberspace is an important arena for various international interactions, especially in recent times in light of the increase in cyber-attacks between some countries, which affects their national security. In this context, many countries are trying to make an effort to develop their capabilities to be used in any cyber-attack, or to take adequate preventive measures to protect them from any possible cyberattacks, especially in light of the impact of these attacks on vital places and institutions such as banks and ministries or on important facilities such as water and …


An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani Jul 2023

An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani

Journal of Digital Forensics, Security and Law

Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …


The Future Of Data Protection Enforcement In Canada: Lessons From The Gdpr, Guilda Rostama, Teresa Scassa Jul 2023

The Future Of Data Protection Enforcement In Canada: Lessons From The Gdpr, Guilda Rostama, Teresa Scassa

Canadian Journal of Law and Technology

Imagine a not-too-distant scenario in which a private sector organization in Canada is investigated by the Privacy Commissioner of Canada jointly with the Commissioners of Quebec, British Columbia (‘‘BC”), and Alberta in relation to complaints that it shared massive quantities of personal data with third parties contrary to its stated practices in its privacy policies. Imagine also that each of the commissioners is empowered under newly amended data protection legislation to issue substantial Administrative Monetary Penalties (‘‘AMPs”). If each of the commissioners finds that its respective laws were breached, should the organization be subject to four different AMPs, or just …


Slouching Toward Regulation: Assessing Bill 88 As A Solution For Workplace Surveillance Harms, Danielle E. Thompson, Adam Molnar Jul 2023

Slouching Toward Regulation: Assessing Bill 88 As A Solution For Workplace Surveillance Harms, Danielle E. Thompson, Adam Molnar

Canadian Journal of Law and Technology

Employee monitoring applications (‘‘EMAs”) are proliferating in Canada and provide employers with sophisticated surveillance tools for the monitoring of workers (e.g., on-device video surveillance, browser activity, and email monitoring). In response to concerns about these increasingly invasive surveillance practices, the Government of Ontario passed Bill 88, the Working for Workers Act, 2022, which requires all employers with 25 or more workers to have a written policy stating whether and how they electronically monitor their employees. Bill 88 marks a more explict attempt to regulate workplace surveillance in a modern digital context in Canada; however; however, an analysis of the Bill’s …


When Your Boss Is An Algorithm: Preserving Canadian Employment Standards In The Digital Economy, Fife Ogunde Jul 2023

When Your Boss Is An Algorithm: Preserving Canadian Employment Standards In The Digital Economy, Fife Ogunde

Canadian Journal of Law and Technology

The platform or ‘‘gig” economy is a rapidly growing economy in Canada. Between 2005 and 2016, the share of gig workers among all workers in Canada rose from 5.5% to 8.2%. These include independent contractors, select freelancers and platform workers. In 2018, 28% of Canadians aged 18 and older reported making money through online platforms. Research by Payments Canada in 2021 showed gig workers as representing more than one in 10 Canadian adults with more than one in three Canadian businesses employing gig workers. As the share of platform workers in the economy has grown, so has the discussion regarding …


The Challenge Designing Intermediary Liability Laws, Emily Laidlaw Jul 2023

The Challenge Designing Intermediary Liability Laws, Emily Laidlaw

Canadian Journal of Law and Technology

The ideal framework for intermediary liability has vexed policymakers since the internet’s commercialization. The quest has taken on a frenzied pace in recent years with intense scrutiny of who they are, what they do and what they should be responsible for. Over the years a theme has emerged from my discussions about intermediaries, and its subset platforms, and it prompts me to explore it as the focus of this article. My question is simple: why is it so difficult for law and policymakers to agree on a regulatory framework?

This article tackles two parts of the regulatory challenge that are …


The Need For Cyber Resilience Of Space Assets: Law And Policy Considerations Of Ensuring Cybersecurity In Outer Space, Daniella Febbraro Jul 2023

The Need For Cyber Resilience Of Space Assets: Law And Policy Considerations Of Ensuring Cybersecurity In Outer Space, Daniella Febbraro

Canadian Journal of Law and Technology

In 2018, NASA’s Jet Propulsion Laboratory was the subject of a data breach where over 500 megabytes of data from a major mission system was stolen by hackers. This attack affected NASA’s Deep Space Network, prompting the United States Johnson Space Center to disconnect the International Space Station from the affected gateway due to fears that mission systems could become compromised. NASA has acknowledged that its vast online presence, which includes thousands of publicly accessible datasets, offers a large potential target for cybercriminals. The 2018 incident was one of many, with NASA experiencing more than 6000 cyberattacks from 2017-2021 alone. …


How The Blockchain Undermined Digital Ownership, Aaron Perzanowski Jul 2023

How The Blockchain Undermined Digital Ownership, Aaron Perzanowski

Washington and Lee Law Review

The shift from a market built around the sale of tangible goods to one premised on the licensing of digital content and services has done significant and lasting damage to the notion of individual ownership. The emergence of blockchain technology, while certainly not necessary to reverse these trends, promised an opportunity to attract investment and demonstrate consumer demand for marketplaces that recognize meaningful digital ownership. Simultaneously, it offered an avenue for alleviating worries about hypothetical widespread reproduction and unchecked distribution of copyrighted works. Instead, many of the most visible blockchain projects in recent years—the proliferation of new cryptocurrencies and the …


The Internet, Personal Jurisdiction, And Daos, Matthew R. Mcguire Jul 2023

The Internet, Personal Jurisdiction, And Daos, Matthew R. Mcguire

Washington and Lee Law Review

Global connectivity is at an all-time high, and sovereign state law has not fully caught up with the technological innovations enabling that connectivity. TCP/IP—the communications protocol allowing computers on different networks to speak with each other—wasn’t adopted by ARPANET and the Defense Data Network until January 1983. That’s only forty years ago. And the World Wide Web wasn’t released to the general public until August 1991, less than thirty-five years ago. The first Bitcoin block was mined on January 3, 2009, less than fifteen years ago.

Legal doctrine doesn’t develop that fast, especially in legal systems heavily based around judicial …