Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 37

Full-Text Articles in Law

Locating Liability For Medical Ai, W. Nicholson Price Ii, I. Glenn Cohen Jan 2024

Locating Liability For Medical Ai, W. Nicholson Price Ii, I. Glenn Cohen

Articles

When medical AI systems fail, who should be responsible, and how? We argue that various features of medical AI complicate the application of existing tort doctrines and render them ineffective at creating incentives for the safe and effective use of medical AI. In addition to complexity and opacity, the problem of contextual bias, where medical AI systems vary substantially in performance from place to place, hampers traditional doctrines. We suggest instead the application of enterprise liability to hospitals—making them broadly liable for negligent injuries occurring within the hospital system—with an important caveat: hospitals must have access to the information needed …


The Unreasonable Effectiveness Of Large Language Models In Zero-Shot Semantic Annotation Of Legal Texts, Jaromir Savelka, Kevin D. Ashley Nov 2023

The Unreasonable Effectiveness Of Large Language Models In Zero-Shot Semantic Annotation Of Legal Texts, Jaromir Savelka, Kevin D. Ashley

Articles

The emergence of ChatGPT has sensitized the general public, including the legal profession, to large language models' (LLMs) potential uses (e.g., document drafting, question answering, and summarization). Although recent studies have shown how well the technology performs in diverse semantic annotation tasks focused on legal texts, an influx of newer, more capable (GPT-4) or cost-effective (GPT-3.5-turbo) models requires another analysis. This paper addresses recent developments in the ability of LLMs to semantically annotate legal texts in zero-shot learning settings. Given the transition to mature generative AI systems, we examine the performance of GPT-4 and GPT-3.5-turbo(-16k), comparing it to the previous …


A Mathematical Model Of Juvenile Delinquency In The New York State, Oluwasegun Micheal Ibrahim Jan 2023

A Mathematical Model Of Juvenile Delinquency In The New York State, Oluwasegun Micheal Ibrahim

Articles

This report presents a mathematical model of juvenile delinquency in the New York State. In particular, we develop a juvenile delinquency system of non-linear differential equations using the mathematical epidemiology framework. In constructing this model, we assume that juvenile delinquency can be studied as a socially infectious disease. The stability of the juvenile delinquency-free equilibrium of the model is examined using the standard non-linear dynamical systems theory technique. We carried out a data fitting based on real-life data from the New York State Criminal Justice Services. The research result reveals that the formulated model conforms with the available data and …


Layered Fiduciaries In The Information Age, Zhaoyi Li Jan 2023

Layered Fiduciaries In The Information Age, Zhaoyi Li

Articles

Technology companies such as Facebook have long been criticized for abusing customers’ personal information and monetizing user data in a manner contrary to customer expectations. Some commentators suggest fiduciary law could be used to restrict how these companies use their customers’ data. Under this framework, a new member of the fiduciary family called the “information fiduciary” was born. The concept of an information fiduciary is that a company providing network services to “collect, analyze, use, sell, and distribute personal information” owes customers and end-users a fiduciary duty to use the collected data to promote their interests, thereby assuming fiduciary liability …


Urgenda Vs. Juliana: Lessons For Future Climate Change Litigation Cases, Paolo Davide Farah, Imad Antoine Ibrahim Jan 2023

Urgenda Vs. Juliana: Lessons For Future Climate Change Litigation Cases, Paolo Davide Farah, Imad Antoine Ibrahim

Articles

No abstract provided.


Climate Justice In The Anthropocene And Its Relationship With Science And Technology: The Importance Of Ethics Of Responsibility, Paolo Davide Farah, Alessio Lo Giudice Jan 2023

Climate Justice In The Anthropocene And Its Relationship With Science And Technology: The Importance Of Ethics Of Responsibility, Paolo Davide Farah, Alessio Lo Giudice

Articles

Climate change is a global phenomenon. Therefore, globalization is the necessary hermeneutical horizon to develop an analysis of the metamorphosis climate change could cause at a political, social, and economic level. Within this horizon, this Article shows how the relationship between the concept of the Anthropocene epoch and the request for justice allows for framing a climate-justice and intergenerational equity–focused political interpretation of the effects of climate change. In order to avoid reducing such an interpretation to merely an ideological critique of capitalism, the conception of climate justice needs to be grounded in a rational, ethical model. This Article proposes …


Public Ownership And The Wto In A Post Covid-19 Era: From Trade Disputes To A 'Social' Function, Paolo Davide Farah, Davide Zoppolato Jan 2023

Public Ownership And The Wto In A Post Covid-19 Era: From Trade Disputes To A 'Social' Function, Paolo Davide Farah, Davide Zoppolato

Articles

Public ownership is closely bound to the need of the government to protect and guarantee the well-being of its citizens. Where the market cannot, or does not want to, provide goods and services, the State uses different tools to intervene, influence, and control some aspects of the private sphere of expression of its citizens in the name and interest of the collectivity. Although, in the past century, this behavior was accepted as one of the expressions of the public authority and part of the social contract, this perception has shifted partially in accordance with the wave of privatization programs initiated …


Humans In The Loop, Nicholson Price Ii, Rebecca Crootof, Margot Kaminski Jan 2023

Humans In The Loop, Nicholson Price Ii, Rebecca Crootof, Margot Kaminski

Articles

From lethal drones to cancer diagnostics, humans are increasingly working with complex and artificially intelligent algorithms to make decisions which affect human lives, raising questions about how best to regulate these “human in the loop” systems. We make four contributions to the discourse.

First, contrary to the popular narrative, law is already profoundly and often problematically involved in governing human-in-the-loop systems: it regularly affects whether humans are retained in or removed from the loop. Second, we identify “the MABA-MABA trap,” which occurs when policymakers attempt to address concerns about algorithmic incapacities by inserting a human into decision making process. Regardless …


Open-Source Clinical Machine Learning Models: Critical Appraisal Of Feasibility, Advantages, And Challenges, Keerthi B. Harish, W. Nicholson Price Ii, Yindalon Aphinyanaphongs Nov 2022

Open-Source Clinical Machine Learning Models: Critical Appraisal Of Feasibility, Advantages, And Challenges, Keerthi B. Harish, W. Nicholson Price Ii, Yindalon Aphinyanaphongs

Articles

Machine learning applications promise to augment clinical capabilities and at least 64 models have already been approved by the US Food and Drug Administration. These tools are developed, shared, and used in an environment in which regulations and market forces remain immature. An important consideration when evaluating this environment is the introduction of open-source solutions in which innovations are freely shared; such solutions have long been a facet of digital culture. We discuss the feasibility and implications of open-source machine learning in a health care infrastructure built upon proprietary information. The decreased cost of development as compared to drugs and …


Ai Insurance: How Liability Insurance Can Drive The Responsible Adoption Of Artificial Intelligence In Health Care, Ariel Dora Stern, Avi Goldfarb, Timo Minssen, W. Nicholson Price Ii Apr 2022

Ai Insurance: How Liability Insurance Can Drive The Responsible Adoption Of Artificial Intelligence In Health Care, Ariel Dora Stern, Avi Goldfarb, Timo Minssen, W. Nicholson Price Ii

Articles

Despite enthusiasm about the potential to apply artificial intelligence (AI) to medicine and health care delivery, adoption remains tepid, even for the most compelling technologies. In this article, the authors focus on one set of challenges to AI adoption: those related to liability. Well-designed AI liability insurance can mitigate predictable liability risks and uncertainties in a way that is aligned with the interests of health care’s main stakeholders, including patients, physicians, and health care organization leadership. A market for AI insurance will encourage the use of high-quality AI, because insurers will be most keen to underwrite those products that are …


Exclusion Cycles: Reinforcing Disparities In Medicine, Ana Bracic, Shawneequa L. Callier, Nicholson Price Jan 2022

Exclusion Cycles: Reinforcing Disparities In Medicine, Ana Bracic, Shawneequa L. Callier, Nicholson Price

Articles

Minoritized populations face exclusion across contexts from politics to welfare to medicine. In medicine, exclusion manifests in substantial disparities in practice and in outcome. While these disparities arise from many sources, the interaction between institutions, dominant-group behaviors, and minoritized responses shape the overall pattern and are key to improving it. We apply the theory of exclusion cycles to medical practice, the collection of medical big data, and the development of artificial intelligence in medicine. These cycles are both self-reinforcing and other-reinforcing, leading to dismayingly persistent exclusion. The interactions between such cycles offer lessons and prescriptions for effective policy.


Regulating For Energy Justice, Alexandra B. Klass, Gabriel Chan Jan 2022

Regulating For Energy Justice, Alexandra B. Klass, Gabriel Chan

Articles

In this Article, we explore and critique the foundational norms that shape federal and state energy regulation and suggest pathways for reform that can incorporate principles of “energy justice.” These energy justice principles—developed in academic scholarship and social movements—include the equitable distribution of costs and benefits of the energy system, equitable participation and representation in energy decision making, and restorative justice for structurally marginalized groups.

While new legislation, particularly at the state level, is critical to the effort to advance energy justice, our focus here is on regulators’ ability to implement reforms now using their existing authority to advance the …


The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen Sep 2021

The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen

Articles

In response to widespread skepticism about the recent rise of “tech ethics”, many critics have called for legal reform instead. In contrast with the “ethics response”, critics consider the “lawfulness response” more capable of disciplining the excesses of the technology industry. In fact, both are simultaneously vulnerable to industry capture and capable of advancing a more democratic egalitarian agenda for the information economy. Both ethics and law offer a terrain of contestation, rather than a predetermined set of commitments by which to achieve more democratic and egalitarian technological production. In advancing this argument, the essay focuses on two misunderstandings common …


Technology And The (Re)Construction Of Law, Christian Sundquist Jan 2021

Technology And The (Re)Construction Of Law, Christian Sundquist

Articles

Innovative advancements in technology and artificial intelligence have created a unique opportunity to re-envision both legal education and the practice of law. The COVID-19 pandemic has accelerated the technological disruption of both legal education and practice, as remote work, “Zoom” client meetings, virtual teaching, and online dispute resolution have become increasingly normalized. This essay explores how technological innovations in the coronavirus era are facilitating radical changes to our traditional adversarial system, the practice of law, and the very meaning of “legal knowledge.” It concludes with suggestions on how to reform legal education to better prepare our students for the emerging …


How Much Can Potential Jurors Tell Us About Liability For Medical Artificial Intelligence?, W. Nicholson Price Ii, Sara Gerke, I. Glenn Cohen Jan 2021

How Much Can Potential Jurors Tell Us About Liability For Medical Artificial Intelligence?, W. Nicholson Price Ii, Sara Gerke, I. Glenn Cohen

Articles

Artificial intelligence (AI) is rapidly entering medical practice, whether for risk prediction, diagnosis, or treatment recommendation. But a persistent question keeps arising: What happens when things go wrong? When patients are injured, and AI was involved, who will be liable and how? Liability is likely to influence the behavior of physicians who decide whether to follow AI advice, hospitals that implement AI tools for physician use, and developers who create those tools in the first place. If physicians are shielded from liability (typically medical malpractice liability) when they use AI tools, even if patient injury results, they are more likely …


An Agent-Based Model Of Financial Benchmark Manipulation, Gabriel Virgil Rauterberg, Megan Shearer, Michael Wellman Jun 2019

An Agent-Based Model Of Financial Benchmark Manipulation, Gabriel Virgil Rauterberg, Megan Shearer, Michael Wellman

Articles

Financial benchmarks estimate market values or reference rates used in a wide variety of contexts, but are often calculated from data generated by parties who have incentives to manipulate these benchmarks. Since the the London Interbank Offered Rate (LIBOR) scandal in 2011, market participants, scholars, and regulators have scrutinized financial benchmarks and the ability of traders to manipulate them. We study the impact on market quality and microstructure of manipulating transaction-based benchmarks in a simulated market environment. Our market consists of a single benchmark manipulator with external holdings dependent on the benchmark, and numerous background traders unaffected by the benchmark. …


Automatically Extracting Meaning From Legal Texts: Opportunities And Challenges, Kevin D. Ashley Jan 2019

Automatically Extracting Meaning From Legal Texts: Opportunities And Challenges, Kevin D. Ashley

Articles

This paper examines impressive new applications of legal text analytics in automated contract review, litigation support, conceptual legal information retrieval, and legal question answering against the backdrop of some pressing technological constraints. First, artificial intelligence (Al) programs cannot read legal texts like lawyers can. Using statistical methods, Al can only extract some semantic information from legal texts. For example, it can use the extracted meanings to improve retrieval and ranking, but it cannot yet extract legal rules in logical form from statutory texts. Second, machine learning (ML) may yield answers, but it cannot explain its answers to legal questions or …


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp Jan 2015

Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp

Articles

Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.

This article presents …


Data Breach (Regulatory) Effects, David Thaw Jan 2015

Data Breach (Regulatory) Effects, David Thaw

Articles

No abstract provided.


Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo Jan 2015

Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo

Articles

In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …


Robotics And The Lessons Of Cyberlaw, Ryan Calo Jan 2015

Robotics And The Lessons Of Cyberlaw, Ryan Calo

Articles

Two decades of analysis have produced a rich set of insights as to how the law should apply to the Internet’s peculiar characteristics. But, in the meantime, technology has not stood still. The same public and private institutions that developed the Internet, from the armed forces to search engines, have initiated a significant shift toward developing robotics and artificial intelligence.

This Article is the first to examine what the introduction of a new, equally transformative technology means for cyberlaw and policy. Robotics has a different set of essential qualities than the Internet and accordingly will raise distinct legal issues. Robotics …


Surveillance At The Source, David Thaw Jan 2014

Surveillance At The Source, David Thaw

Articles

Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.

Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …


The Efficacy Of Cybersecurity Regulation, David Thaw Jan 2014

The Efficacy Of Cybersecurity Regulation, David Thaw

Articles

Cybersecurity regulation presents an interesting quandary where, because private entities possess the best information about threats and defenses, legislatures do – and should – deliberately encode regulatory capture into the rulemaking process. This relatively uncommon approach to administrative law, which I describe as Management-Based Regulatory Delegation, involves the combination of two legislative approaches to engaging private entities' expertise. This Article explores the wisdom of those choices by comparing the efficacy of such private sector engaged regulation with that of a more traditional, directive mode of regulating cybersecurity adopted by the state legislatures. My analysis suggests that a blend of these …


Enlightened Regulatory Capture, David Thaw Jan 2014

Enlightened Regulatory Capture, David Thaw

Articles

Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …


Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw Jan 2013

Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw

Articles

Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.

At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …


Teaching Law And Digital Age Legal Practice With An Ai And Law Seminar: Justice, Lawyering And Legal Education In The Digital Age, Kevin D. Ashley Jan 2013

Teaching Law And Digital Age Legal Practice With An Ai And Law Seminar: Justice, Lawyering And Legal Education In The Digital Age, Kevin D. Ashley

Articles

A seminar on Artificial Intelligence ("Al") and Law can teach law students lessons about legal reasoning and legal practice in the digital age. Al and Law is a subfield of Al/computer science research that focuses on designing computer programs—computational models—that perform legal reasoning. These computational models are used in building tools to assist in legal practice and pedagogy and in studying legal reasoning in order to contribute to cognitive science and jurisprudence. Today, subject to a number of qualifications, computer programs can reason with legal rules, apply legal precedents, and even argue like a legal advocate.

This article provides a …


Computer-Supported Peer Review In A Law School Context, Kevin D. Ashley, Ilya Goldin Jan 2012

Computer-Supported Peer Review In A Law School Context, Kevin D. Ashley, Ilya Goldin

Articles

Legal instructors have been urged to incorporate peer reviewing into law school courses as a way to provide students much needed feedback. Peer review can benefit legal education, but only if law school instructors adopt peer review on a large scale, and for that, computer-supported peer review systems are crucial. These web-based systems orchestrate the mechanics of students submitting written assignments on-line and distributing them to other students for anonymous review, making it considerably easier for instructors to manage.

Beyond the problem of orchestrating mechanics, however, a deeper obstacle to widespread acceptance of peer review in legal education is the …


When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong Jan 2011

When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong

Articles

Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …