Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Ai Output: A Human Condition That Should Not Be Protected Now, Or Maybe Ever, Xiao Wang Jul 2021

Ai Output: A Human Condition That Should Not Be Protected Now, Or Maybe Ever, Xiao Wang

Chicago-Kent Journal of Intellectual Property

AI is usually considered to be a form of automatic and autonomous work, but when applied to the creation of literary and artistic works, challenges arise in deciding whether the AI is the de facto author of its output and whether AI outputs or AI-generated products should be protected under the copyright system. This article argues that these outputs should be human creations because the working principles of AI determine that AI functions merely as a mathematical tool applied by humans to not only conceive of but also to execute the creation of AI outputs. The creativity reflected in these …


Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond Jan 2018

Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond

All Faculty Scholarship

No abstract provided.


How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan Jan 2018

How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan

All Faculty Scholarship

A cost/benefit approach to privacy confronts two tradeoff issues. One is making appropriate tradeoffs between privacy and many goals served by the collection, distribution, and use of information. The other is making tradeoffs between investments in preventing unauthorized access to information and the variety of other goals that also make money, time, and effort demands. Much has been written about the first tradeoff. We focus on the second. The issue is critical. Data breaches occur at the rate of over three a day, and the aggregate social cost is extremely high. The puzzle is that security experts have long explained …


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews May 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

All Faculty Scholarship

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.


Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito Mar 2017

Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito

All Faculty Scholarship

No abstract provided.