Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

Series

2022

Institution
Keyword
Publication

Articles 1 - 30 of 38

Full-Text Articles in Law

Algorithmic Management And Collective Bargaining, Valerio De Stefano, Simon Taes Dec 2022

Algorithmic Management And Collective Bargaining, Valerio De Stefano, Simon Taes

Articles & Book Chapters

This article addresses the challenges raised by the introduction of algorithmic management and artificial intelligence in the world of work, focusing on the risks that new managerial technologies present for fundamental rights and principles, such as non-discrimination, freedom of association and the right to privacy. The article argues that collective bargaining is the most suitable regulatory instrument for responding to these challenges, and that current EU legislative initiatives do not adequately recognise the role of collective bargaining in this area. It also maps current initiatives undertaken by national trade union movements in Europe to govern algorithmic management.


Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars Nov 2022

Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars

Faculty Scholarship

Many pressing societal questions can be answered only by bringing experts from different disciplines together. Questions around misinformation and disinformation, platform power, surveillance capitalism, information privacy, and algorithmic bias, among many others, reside at the intersection of computer science and law. We need to develop institutions that bring together computer scientists and legal scholars to work together on issues like these, and to train new innovators, thought leaders, counselors, and policymakers with hybrid training in both disciplines. In Universities, the disciplines of Computer Science (CS) and Law are separated by many wide chasms. Differences in standards, language, methods, and culture …


Using Artificial Intelligence In The Law Review Submissions Process, Brenda M. Simon Nov 2022

Using Artificial Intelligence In The Law Review Submissions Process, Brenda M. Simon

Faculty Scholarship

The use of artificial intelligence to help editors examine law review submissions may provide a way to improve an overburdened system. This Article is the first to explore the promise and pitfalls of using artificial intelligence in the law review submissions process. Technology-assisted review of submissions offers many possible benefits. It can simplify preemption checks, prevent plagiarism, detect failure to comply with formatting requirements, and identify missing citations. These efficiencies may allow editors to address serious flaws in the current selection process, including the use of heuristics that may result in discriminatory outcomes and dependence on lower-ranked journals to conduct …


Algorithmic Governance From The Bottom Up, Hannah Bloch-Wehba Nov 2022

Algorithmic Governance From The Bottom Up, Hannah Bloch-Wehba

Faculty Scholarship

Artificial intelligence and machine learning are both a blessing and a curse for governance. In theory, algorithmic governance makes government more efficient, more accurate, and more fair. But the emergence of automation in governance also rests on public-private collaborations that expand both public and private power, aggravate transparency and accountability gaps, and create significant obstacles for those seeking algorithmic justice. In response, a nascent body of law proposes technocratic policy changes to foster algorithmic accountability, ethics, and transparency.

This Article examines an alternative vision of algorithmic governance, one advanced primarily by social and labor movements instead of technocrats and firms. …


Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius Oct 2022

Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius

Homeland Security Publications

No abstract provided.


Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer Oct 2022

Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer

Elisabeth Haub School of Law Faculty Publications

This article finds fault with the judiciaries' failure to create a set of common law norms for social media wrongs. In cases concerning social media harms, the Supreme Court and lower courts have consistently adhered to traditional pre-social media principles, failing to use the power of the common law to create a kind of Internet Justice.

Part I of this article reviews social media history and explores how judicial decisions created a fertile bed for social media harm to blossom. Part II illustrates social media harms across several doctrinal disciplines and highlights judicial reluctance to embrace the realities of social …


Content Moderation As Surveillance, Hannah Bloch-Wehba Oct 2022

Content Moderation As Surveillance, Hannah Bloch-Wehba

Faculty Scholarship

Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …


Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt Sep 2022

Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt

Judicature International

No abstract provided.


Automating Defeasible Reasoning In Law With Answer Set Programming, How Khang Lim, Avishkar Mahajar, Martin Strecker, Meng Weng Wong Aug 2022

Automating Defeasible Reasoning In Law With Answer Set Programming, How Khang Lim, Avishkar Mahajar, Martin Strecker, Meng Weng Wong

Centre for Computational Law

The paper studies defeasible reasoning in rule-based systems, in particular about legal norms and contracts. We identify rule modifiers that specify how rules interact and how they can be overridden. We then define rule transformations that eliminate these modifiers, leading in the end to a translation of rules to formulas. For reasoning with and about rules, we contrast two approaches, one in a classical logic with SMT solvers, which is only briefly sketched, and one using non-monotonic logic with Answer Set Programming solvers, described in more detail.


Data Vu: Why Breaches Involve The Same Stories Again And Again, Woodrow Hartzog, Daniel Solove Jul 2022

Data Vu: Why Breaches Involve The Same Stories Again And Again, Woodrow Hartzog, Daniel Solove

Shorter Faculty Works

In the classic comedy Groundhog Day, protagonist Phil, played by Bill Murray, asks “What would you do if you were stuck in one place and every day was exactly the same, and nothing that you did mattered?” In this movie, Phil is stuck reliving the same day over and over, where the events repeat in a continual loop, and nothing he does can stop them. Phil’s predicament sounds a lot like our cruel cycle with data breaches.

Every year, organizations suffer more data spills and attacks, with personal information being exposed and abused at alarming rates. While Phil …


Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg Jul 2022

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg

Articles

The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …


The Relational Robot: A Normative Lens For Ai Legal Neutrality — Commentary On Ryan Abbott, The Reasonable Robot, Carys Craig Jun 2022

The Relational Robot: A Normative Lens For Ai Legal Neutrality — Commentary On Ryan Abbott, The Reasonable Robot, Carys Craig

Articles & Book Chapters

Artificial Intelligence (AI), we are told, is poised to disrupt almost every facet of our lives and society. From industrial labor markets to daily commutes, and from policing tactics to personal assistants, AI brings with it the usual promise and perils of change. How that change will unfold, however, and whether it will ultimately bestow upon us more benefits than harms, remains to be determined. A significant factor in setting the course for AI’s inevitable integration into society will be the legal framework within which it is developed and operationalized. Who will AI displace? What will it replace? What improvements …


How Technology Is Changing Justice In China, Shitong Qiao, Zhiyu Li, Benjamin Chen Jun 2022

How Technology Is Changing Justice In China, Shitong Qiao, Zhiyu Li, Benjamin Chen

Judicature International

No abstract provided.


A Guide To Federal Broadband Funding Programs - Overview Of Bead (Updated) - June 2022, New York Law School Jun 2022

A Guide To Federal Broadband Funding Programs - Overview Of Bead (Updated) - June 2022, New York Law School

Reports and Resources

No abstract provided.


Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss Jun 2022

Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss

Articles

Studies of blockchain governance can be divided into analyses of the governance of blockchains (such as rules and power dynamics within a given network) and governance by blockchains (such as how blockchains can be implemented to improve self-governance of community-based peer production networks). Less emphasis has been placed on applications of distributed ledgers to public sector governance. Our review clarifies that the decentralization and distributive features that enable blockchains to link up loosely connected private organizations and public agencies to improve efficiency and transparency of government transactions. However, most blockchain applications lack clear advantages over the conventional digital recording of …


Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane S. Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence Apr 2022

Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane S. Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence

Articles & Book Chapters

This special issue of the Canadian Journal of Law and Technology focuses on the growing problem of technology-facilitated gender-based violence (TFGBV): an expansive, dynamic, and rapidly evolving phenomenon that Jane Bailey and Carissima Mathen have defined as “a spectrum of behaviours carried out at least in some part through digital communications technologies, including actions that cause physical or psychological harm.” The collection of articles in this issue offers multi-disciplinary insights on TFGBV by bringing together the work of emerging scholars in information and media studies, communications, and law. This approach reflects our firm belief that in order to be meaningful …


Understanding Chilling Effects, Jonathon W. Penney Apr 2022

Understanding Chilling Effects, Jonathon W. Penney

Articles & Book Chapters

With digital surveillance and censorship on the rise, the amount of data available unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence and facial recognition technology for surveillance and data analytics, concerns about “chilling effects,” that is, the capacity for these activities to “chill” or deter people from exercising their rights and freedoms, have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work points. This has left significant gaps in understanding. This Article has attempted to fill that void, synthesizing theoretical and empirical insights from law, privacy, …


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier Mar 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier

Articles & Book Chapters

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Ai And Digital Tools In Workplace Management And Evaluation: An Assessment Of The Eu's Legal Framework, Valerio De Stefano, Mathias Wouters Mar 2022

Ai And Digital Tools In Workplace Management And Evaluation: An Assessment Of The Eu's Legal Framework, Valerio De Stefano, Mathias Wouters

Commissioned Reports, Studies and Public Policy Documents

This study focuses on options for regulating the use of AI enabled and algorithmic management systems in the world of work under EU law. The first part describes how these technologies are already being deployed, particularly in recruitment, staff appraisal, task distribution and disciplinary procedures. It discusses some near-term potential development prospects and presents an impact assessment, highlighting some of these technologies' most significant implications.

The second part addresses the regulatory field. It examines the different EU regulations and directives that are already relevant to regulating the use of AI in employment. Subsequently, it analyses the potential labour and employment …


Nft: The Next Big Thing?, Golden Gate University School Of Law Feb 2022

Nft: The Next Big Thing?, Golden Gate University School Of Law

GGU Law Review Blog

In 2021, Non-Fungible Tokens (“NFTs”) have taken the world of digital art to new heights. Artists are beginning to “tokenize” their art and sell them in NFT marketplaces for highly lucrative prices where bids can be made only with cryptocurrency. The “hype” surrounding NFTs grows by the day, thousands of new NFTs are being “minted” everyday. Even celebrities are getting involved in this digital movement. It seems however, that we have seen only the infancy of the blockchain based technology and that it may soon venture off beyond the world of digital art. For those in the legal profession, it …


Ai Derivatives: The Application To The Derivative Work Right To Literary And Artistic Productions Of Ai Machines, Daniel J. Gervais Feb 2022

Ai Derivatives: The Application To The Derivative Work Right To Literary And Artistic Productions Of Ai Machines, Daniel J. Gervais

Vanderbilt Law School Faculty Publications

This Article predicts that there will be attempts to use courts to try to broaden the derivative work right in litigation either to prevent the use of, or claim protection for, literary and artistic productions made by Artificial Intelligence (AI) machines. This Article considers the normative valence of, and the (significant) doctrinal pitfalls associated with, such attempts. It also considers a possible legislative alternative, namely attempts to introduce a new sui generis right in AI productions. Finally, this Article explains how, whether such attempts succeed or not, the debate on rights (if any) in productions made by AI machines is …


Bilski And The Information Age A Decade Later, Michael J. Meurer Jan 2022

Bilski And The Information Age A Decade Later, Michael J. Meurer

Faculty Scholarship

In the years from State Street in 1999 to Alice in 2014, legal scholars vigorously debated whether patents should be used to incentivize the invention of business methods. That attention has waned just as economists have produced important new research on the topic, and just as artificial intelligence and cloud computing are changing the nature of business method innovation. This chapter rejoins the debate and concludes that the case for patent protection of business methods is weaker now than it was a decade ago.


Facebook, Welfare, And Natural Monopoly: A Quantitative Analysis Of Antitrust Remedies, Felix B. Chang, Seth Benzell Jan 2022

Facebook, Welfare, And Natural Monopoly: A Quantitative Analysis Of Antitrust Remedies, Felix B. Chang, Seth Benzell

Faculty Articles and Other Publications

This Article advances a novel theoretical model for assessing policy interventions against Facebook. As prosecutors barrel forward against digital platforms, soon it will fall upon courts and, eventually, regulators to devise remedies. We argue that any sensible solution must include quantification of the welfare effects on the platform’s various constituents. Our model prioritizes the effects upon total societal welfare—or, in economists’ terms, social welfare. Applied to Facebook, the model calculates social welfare as the sum of four components: (i) consumer welfare; (ii) advertising profits; (iii) tax revenues; and (iv) the value of a large user base.

Drawing on surveys of …


An Initial Examination Of Computer Programs As Creative Works, Trina C. Kershaw, Ralph D. Clifford, Firas Khatib, Adnan El-Nasan Jan 2022

An Initial Examination Of Computer Programs As Creative Works, Trina C. Kershaw, Ralph D. Clifford, Firas Khatib, Adnan El-Nasan

Faculty Publications

Products from many domains (art, music, engineering design, literature, etc.) are considered to be creative works, but there is a misconception that computer programs are limited by set expressions and thus have no room for creativity. To determine whether computer programs are creative works, we collected programs from 23 advanced graduate students that were written to solve simple and complex bioinformatics problems. These programs were assessed for their variability of expression using a new measurement that we designed. They were also evaluated on several elements of their creativity using a version of Cropley and Kaufman’s (2012) Creative Solution Diagnosis Scale …


Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai Jan 2022

Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai

Scholarly Articles

Much of the confusion about the proper regulation of smart contracts stems from the fact that both code and law are expressed in language. Natural (human) and formal (computer) languages are profoundly different, however. Natural language in the form of a true legal contract expresses human meaning and expectation. Code simply acts, and when code acts contrary to the understanding of the parties to a contract, courts must have a theoretical and legal basis in order to intervene--which this Article provides.

Present scholarship on the governance of smart contracts centers on logistical problems relating to the effects of automation on …


Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield Jan 2022

Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield

Scholarly Articles

Markets for unique digital property--digital equivalents of rare artworks, collectible trading cards, and other assets that gain value from scarcity--have exploded in the past few years. At root is the next iteration of blockchain technology, unique digital assets called non-fungible tokens. Unlike bitcoin, where one coin is the same as another, NFTs are unique, each with different attributes. An NFT that represented ownership of Boardwalk would be quite different from one that represented Baltic Avenue.

NFTs have grown from a few early breakout successes to a rapidly developing market for unique digital treasures. The attraction to buyers is that, unlike …


Revolt Against The U.S. Hegemony: Judicial Divergence In Cyberspace, Dongsheng Zang Jan 2022

Revolt Against The U.S. Hegemony: Judicial Divergence In Cyberspace, Dongsheng Zang

Articles

This Article contributes to our understanding of the current state of cyber law. The global perspective demonstrates an almost uniform response to the U.S. law in cyberspace from all of America's major trading partners. In the past, comparative studies tended to focus on a single jurisdiction-typically, the European Union-and compared it with the United States. This approach, informative as it was, significantly understated the gravity of the differences between that jurisdiction and the United States. Fundamentally, it was based on an American-centric outlook with primary interests in building convergence models. In cyberspace, however, this is simply not helpful. In recent …


A Compulsory Solution To The Machine Problem, Cole G. Merritt Jan 2022

A Compulsory Solution To The Machine Problem, Cole G. Merritt

Vanderbilt Law School Faculty Publications

Artificial Intelligence (AI) is already disrupting and will likely continue to disrupt many industries. Despite the role AI already plays, AI systems are becoming increasingly powerful. Ultimately, these systems may become a powerful tool that can lead to the discovery of important inventions or significantly reduce the time required to discover these inventions. Even now, AI systems are independently inventing. However, the resulting AI-generated inventions are unable to receive patent protection under current US patent law. This unpatentability may lead to inefficient results and ineffectively serves the goals of patent law.

To embrace the development and power of AI, Congress …


The New Bailments, Danielle D'Onfro Jan 2022

The New Bailments, Danielle D'Onfro

Scholarship@WashULaw

The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier Jan 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier

Articles, Book Chapters, & Popular Press

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …