Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

2024

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 122

Full-Text Articles in Law

Scla 521 Ai In Society, Bert Chapman Aug 2024

Scla 521 Ai In Society, Bert Chapman

Libraries Faculty and Staff Presentations

Provides access to information resources on societal impacts of artificial intelligence from multiple libraries databases covering multiple disciplines including government information resources.


Enhancing Accountability In Cyberspace Through A Three-Tiered International Governance Regime, Dan Efrony Aug 2024

Enhancing Accountability In Cyberspace Through A Three-Tiered International Governance Regime, Dan Efrony

International Law Studies

The Great Power Competition perpetuates the inability to reach a universal consensus on how to resolve normative ambiguity on the application of international law to cyberspace. Adhering to a strategy of ambiguity, the United States and its closest allies have been holding their rival States accountable for “irresponsible State behavior” in cyberspace, based on flawed legitimacy, as reflected in a weakened normative layer, and the national U.S. attribution process. Embracing collective attribution has not cured the flaws. The upshot is a poor framework for holding States accountable and an enduring vicious cycle. This article calls on the United States and …


Rising Internet Shutdowns In India: A Legal Analysis, Shrutanjaya Bhardwaj, Nakul Nayak, Raja Venkata Krishna Dandamudi, Sarvjeet Singh, Veda Handa Jul 2024

Rising Internet Shutdowns In India: A Legal Analysis, Shrutanjaya Bhardwaj, Nakul Nayak, Raja Venkata Krishna Dandamudi, Sarvjeet Singh, Veda Handa

Indian Journal of Law and Technology

The central theme of this paper is to critically study the interplay of internet shutdowns with the right to freedom of speech and expression. A study of this nature is necessitated by India’s abysmal record with inter- net shutdowns. We must hence begin examining Internet shutdowns seriously within the Indian constitutional framework. In the recent judgment of Anuradha Bhasin, the Supreme Court has accepted that Article 19(1)(a) protects the right to disseminate and receive information through the internet. Therefore, the constitutional validity of every internet shutdown would have to be tested (at least) against the three standards ordinarily applied …


Sharing Of Children’S Health Data By Health Professionals And Parents – A Consideration Of Legal Duties, Dr. Carolyn Johnston Jul 2024

Sharing Of Children’S Health Data By Health Professionals And Parents – A Consideration Of Legal Duties, Dr. Carolyn Johnston

Indian Journal of Law and Technology

Children’s health data such as blood pressure, X-rays and written notes of medical examinations are produced in a clinical setting through health professionals’ interaction with their minor patients. Health care practitioners owe legal and professional obligations not to disclose such information without consent or other legally recognised authorisation. With the increasing advent of data generated by patients themselves from wearable devices such as continuous glucose monitors and health apps, the patient, or parents, have initial control of the data and decide who to share it with. Where wearable devices have been provided to parents by the child’s health care provider …


Conceptualizing An International Framework For Active Private Cyber Defence, Arindrajit Basu, Elonnai Hickok Jul 2024

Conceptualizing An International Framework For Active Private Cyber Defence, Arindrajit Basu, Elonnai Hickok

Indian Journal of Law and Technology

Private sector cyber defence mechanisms are emerging despite existing legislation outlawing use of active defence by individuals and non-state entities. Thus, a key window exists for policy-makers in the possibility of establishing a framework for existing APCD practices that would enable optimal utilisation of private sector capabilities for securing cyber-space at an organizational and national level. This must happen in consonance with circumscribing their operations within the boundaries of the rule of law, both in terms of domestic legislation and international law. This paper seeks to unpack the complexities that underscore each of these challenges and identify avenues towards resolving …


Facing Up To The Risks Of Automated Facial-Recognition Technologies In Indian Law Enforcement, Ameen Jauhar Jul 2024

Facing Up To The Risks Of Automated Facial-Recognition Technologies In Indian Law Enforcement, Ameen Jauhar

Indian Journal of Law and Technology

Within the larger discourse of risk mitigation of emerging technologies, the ever-expanding deployment of automated facial recognition technology (‘AFRT’) has garnered much skepticism. In India too, there has been a reported rise of states and law enforcement officials enthusiastically resorting to the use of AFRT.


The author will first delve into some of the controversial risks associated with AFRT, analysing them through the lens of Article 21 and the principle of due process under the Indian Constitution. The paper will then identify some of the regulatory solutions that are currently part of the discourse on minimising risks of AFRT and …


Ks Pop Celebrating Three Years Of Tech-Driven Justice For All, Ayyoub Ajmi Jul 2024

Ks Pop Celebrating Three Years Of Tech-Driven Justice For All, Ayyoub Ajmi

Faculty Works

This article explores the development and impact of the Kansas Protection Order Portal (KS POP), highlighting the vital role of law librarians in the portal's design and implementation. The article showcases how KS POP has streamlined the legal process for domestic violence, sexual assault, and human trafficking victims in Kansas, marking a significant advancement in accessible legal support and serving as a model for future innovations in the justice system.


"The Law Doesn't Work Like A Computer": Exploring Software Licensing Issues Faced By Legal Practitioners, Nathan Wintersgill, Trevor Stalnaker, Laura A. Heymann, Oscar Chaparro, Denys Poshyvanyk Jul 2024

"The Law Doesn't Work Like A Computer": Exploring Software Licensing Issues Faced By Legal Practitioners, Nathan Wintersgill, Trevor Stalnaker, Laura A. Heymann, Oscar Chaparro, Denys Poshyvanyk

Faculty Publications

Most modern software products incorporate open source components, which requires compliance with each component’s licenses. As noncompliance can lead to significant repercussions, organizations often seek advice from legal practitioners to maintain license compliance, address licensing issues, and manage the risks of noncompliance. While legal practitioners play a critical role in the process, little is known in the software engineering community about their experiences within the open source license compliance ecosystem. To fill this knowledge gap, a joint team of software engineering and legal researchers designed and conducted a survey with 30 legal practitioners and related occupations and then held 16 …


Mitigating Algorithmic Bias: Strategies For Addressing Discrimination In Data, Sonia Gipson Rankin Jul 2024

Mitigating Algorithmic Bias: Strategies For Addressing Discrimination In Data, Sonia Gipson Rankin

Faculty Scholarship

This article examines the pervasive issue of algorithmic bias, particularly within large language models (LLMs) and the legal system. It argues that unlike simple programming bugs, these biases are deeply ingrained in the design and training data of artificial intelligence (AI) systems. By understanding the historical roots of bias and its realworld consequence across various sectors, we can develop effective strategies to mitigate its impact and ensure AI serves as a tool for progress. Weaving together historical insights, case studies, and forward-looking recommendations, the article aims to equip legal professionals with the knowledge and tools necessary to lead the charge …


Assessing Smart Nation Singapore As An International Model For Ai Responsibility, Philip L. Frana Jun 2024

Assessing Smart Nation Singapore As An International Model For Ai Responsibility, Philip L. Frana

International Journal on Responsibility

While AI and other smart technologies greatly contribute to material aspects of well-being, there are concerns that they threaten quality of life in Singapore. Smart technologies and digital governance have freed up labor for activities where human empathy and understanding are unique and indispensable, but also threaten to undermine human dignity and accountability. This paper undertakes a comprehensive assessment of Singapore as an international model for AI responsibility from the perspective of the history and philosophy of technological governance. It examines the evolution of regulatory frameworks, ethical considerations, and key legal documents and social initiatives shaping the nation’s approach to …


The Need For An International Ai Research Initiative: How To Create And Sustain A Virtuous Research-Regulation Cycle To Govern Ai, Kevin Frazier Jun 2024

The Need For An International Ai Research Initiative: How To Create And Sustain A Virtuous Research-Regulation Cycle To Govern Ai, Kevin Frazier

Washington Journal of Law, Technology & Arts

This paper explains the need for an international AI research initiative. The current focus of lawmakers at the subnational, national, and international level on regulation over research has created an imbalance, neglecting the critical role of continuous, informed research in developing laws that keep pace with rapid technological advancements in AI.

The proposed international AI research initiative would serve as a central hub for comprehensive AI risk analysis, modeled on successful precedents like CERN and the IPCC. CERN exemplifies a collaborative research environment with pooled resources from member states, leading to significant advancements in particle physics. Similarly, the IPCC has …


When Ai Remembers Too Much: Reinventing The Right To Be Forgotten For The Generative Age, Cheng-Chi Chang Jun 2024

When Ai Remembers Too Much: Reinventing The Right To Be Forgotten For The Generative Age, Cheng-Chi Chang

Washington Journal of Law, Technology & Arts

The emergence of generative artificial intelligence (AI) systems poses novel challenges for the right to be forgotten. While this right gained prominence following the 2014 Google Spain v. Gonzalez case, generative AI’s limitless memory and ability to reproduce identifiable data from fragments threaten traditional conceptions of forgetting. This Article traces the evolution of the right to be forgotten from its privacy law origins towards an independent entitlement grounded in self-determination for personal information. However, it contends the inherent limitations of using current anonymization, deletion, and geographical blocking mechanisms to prevent AI models from retaining personal data render forgetting infeasible. Moreover, …


Google Searching For The Truth: Examining The Admissibility Of Internet Search History, Chisup Kim Jun 2024

Google Searching For The Truth: Examining The Admissibility Of Internet Search History, Chisup Kim

Washington Journal of Law, Technology & Arts

The internet has become more ubiquitously available than ever before, with search engines serving as the portals to an unparalleled amount of information. As a byproduct of this phenomenon, a vast amount of internet search history has also begun to enter legal proceedings as evidence. The most intimate questions that defendants have asked their search engines have begun to be examined under the scope of the Federal Rules of Evidence or a state equivalent. This Comment examines the admissibility of internet search history and provides a general legal framework based on the Federal Rules of Evidence. Drawing upon six cases, …


Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper Jun 2024

Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper

Washington Journal of Law, Technology & Arts

Some 130 central banks around the world are experimenting with various levels of a central bank digital currency (“CBDC”), a digitized form of a sovereign-backed, national currency that is a liability of that country’s central bank. Unlike fiat currency, CBDCs are trackable and potentially subject to interference and even freezing by government authorities. CBDCs will affect citizens’ control over commerce, payments, and savings, and impact their privacy rights. The Chinese government has piloted, refined, and rolled out its own CBDC called the Digital Currency/Electronic Payment initiative (“DC/EP”), also known as the digital yuan or e-CNY. The Chinese government is far …


Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber Jun 2024

Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber

DePaul Business & Commercial Law Journal

No abstract provided.


Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton Jun 2024

Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton

DePaul Business & Commercial Law Journal

No abstract provided.


Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu Jun 2024

Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu

DePaul Business & Commercial Law Journal

No abstract provided.


Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani Jun 2024

Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani

DePaul Business & Commercial Law Journal

No abstract provided.


The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin Jun 2024

The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin

DePaul Business & Commercial Law Journal

No abstract provided.


Front Matter Jun 2024

Front Matter

DePaul Business & Commercial Law Journal

No abstract provided.


Governing The Metaverse, Jesse Valente May 2024

Governing The Metaverse, Jesse Valente

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley May 2024

Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley

University of Cincinnati Law Review

Law enforcement officers performing drug interdiction on interstate highways have to decide nearly every day whether there is reasonable suspicion to detain motorists until a trained dog can sniff for the presence of drugs. The officers’ assessments are often wrong, however, and lead to unnecessary detentions of innocent persons and the suppression of drugs found on guilty ones. We propose a computational method of evaluating suspicion in these encounters and offer experimental results from early efforts demonstrating its feasibility. With the assistance of large language and predictive machine learning models, it appears that judges, advocates, and even police officers could …


The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson May 2024

The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson

University of Cincinnati Law Review

This Article sheds light on a unique but centrally important “twenty-first century” issue involving electronic discovery in federal civil litigation that is just beginning to percolate in federal district courts. Historically, courts have held that a document attached to or enclosed with another document must be produced together when produced in response to a discovery request, as that is how the document was “kept in the usual course of business” and how it is “ordinarily maintained or in a reasonably usable form,” as the Federal Rules of Civil Procedure have required for decades. Today, parties are pushing back on whether …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Promoting Due Diligence: The Role Of The Gramm-Leach-Bliley Act, And Information Security Standards On Financial Institutions Protecting Consumers' Non-Public Personal Information (Npi), Thomas G. Caballero May 2024

Promoting Due Diligence: The Role Of The Gramm-Leach-Bliley Act, And Information Security Standards On Financial Institutions Protecting Consumers' Non-Public Personal Information (Npi), Thomas G. Caballero

2024 Spring Honors Capstone Projects

The Graham-Leach-Bliley Act (GLBA) protects consumer financial privacy and limits what information can be disclosed by a financial institution to non-affiliated third parties. In accordance with the GLBA, the FTC is required to enforce the Privacy of Consumer Financial Information Rule. This thesis uses information from scholarly peer-reviewed articles and reports on compliance standards in storing consumer non-public data and data breaches to depict the current impact of information security compliance in the financial sector. Supported by statistics and quantitative analysis in the areas of cybersecurity laws and industry standards that promote the due diligence of compliance efforts in protecting …


Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter Apr 2024

Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.