Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 4 of 4
Full-Text Articles in Law
Big Data Blacklisting, Margaret Hu
Big Data Blacklisting, Margaret Hu
Faculty Publications
“Big data blacklisting” is the process of categorizing individuals as administratively “guilty until proven innocent” by virtue of suspicious digital data and database screening results. Database screening and digital watchlisting systems are increasingly used to determine who can work, vote, fly, etc. In a big data world, through the deployment of these big data tools, both substantive and procedural due process protections may be threatened in new and nearly invisible ways. Substantive due process rights safeguard fundamental liberty interests. Procedural due process rights prevent arbitrary deprivations by the government of constitutionally protected interests. This Article frames the increasing digital mediation …
The History And Future Of E-Commerce Patents, Dennis D. Crouch, Mitchell L. Terry
The History And Future Of E-Commerce Patents, Dennis D. Crouch, Mitchell L. Terry
Faculty Publications
The past two decades have seen a great rise in the patenting of e-commerce inventions. Now, those same patents are taking an equally great fall. In a series of four recent cases, the U.S. Supreme Court has shifted the doctrine of patent eligibility and, in the process, raised the bar for e-commerce and software patents - making it more difficult to obtain and enforce those types of patents.
Privacy And The New Press, Lyrissa Lidsky
Privacy And The New Press, Lyrissa Lidsky
Faculty Publications
In The First Amendment Bubble, Professor Amy Gajda comprehensively examines privacy threats posed by digital media and “quasi-journalists” and demonstrates how their intrusive practices threaten existing press freedoms.
A New Taxonomy For Online Harms, Kate Klonick
A New Taxonomy For Online Harms, Kate Klonick
Faculty Publications
(Excerpt)
Bullying is generally understood among academics and educators as having to meet three criteria: (1) it must be verbal or physical aggression; (2) it must be repeated over time; and (3) it must involve a power differential. When talking about cyber bullying, the aggression is mostly verbal, using “threats, blackmail. . . gossip and rumors” and online personas or messages can be more cruel, vindictive and mean. Though cyber bullying typically describes acts between children, the same acts by adults could also be considered cyber harassment. Unlike harassment, however, bullying does not have a history of criminal liability—though all …