Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Law (3)
- Privacy (2)
- AALL Publications (1)
- AALL Spectrum (1)
- Body of Knowledge (1)
-
- Complex Adaptive Systems (1)
- Cybersecurity (1)
- Data Aggregation (1)
- Data breach (1)
- Data protection (1)
- Information Management (1)
- Information security (1)
- Legal data (1)
- Liability for security (1)
- Network security (1)
- Online security (1)
- Privacy law (1)
- Risk management (1)
- Security (1)
- Social sciences (1)
- Tactful inattention paradigm (1)
- Technology (1)
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Law
Ai Output: A Human Condition That Should Not Be Protected Now, Or Maybe Ever, Xiao Wang
Ai Output: A Human Condition That Should Not Be Protected Now, Or Maybe Ever, Xiao Wang
Chicago-Kent Journal of Intellectual Property
AI is usually considered to be a form of automatic and autonomous work, but when applied to the creation of literary and artistic works, challenges arise in deciding whether the AI is the de facto author of its output and whether AI outputs or AI-generated products should be protected under the copyright system. This article argues that these outputs should be human creations because the working principles of AI determine that AI functions merely as a mathematical tool applied by humans to not only conceive of but also to execute the creation of AI outputs. The creativity reflected in these …
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
All Faculty Scholarship
No abstract provided.
How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan
How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan
All Faculty Scholarship
A cost/benefit approach to privacy confronts two tradeoff issues. One is making appropriate tradeoffs between privacy and many goals served by the collection, distribution, and use of information. The other is making tradeoffs between investments in preventing unauthorized access to information and the variety of other goals that also make money, time, and effort demands. Much has been written about the first tradeoff. We focus on the second. The issue is critical. Data breaches occur at the rate of over three a day, and the aggregate social cost is extremely high. The puzzle is that security experts have long explained …
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
All Faculty Scholarship
What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
All Faculty Scholarship
No abstract provided.