Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Law

Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle Oct 2016

Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle

Michigan Journal of Race and Law

This Article examines how military automated surveillance and intelligence systems and techniques, when used by civilian police departments to enhance predictive policing programs, have reinforced racial bias in policing. I will focus on two facets of this problem. First, I investigate the role played by advanced military technologies and methods within civilian police departments. These approaches have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools and automates de facto penalization and containment based on race. Second, I will explore these …


How Computer Automation Affects Occupations: Technology, Jobs, And Skills, James Bessen Oct 2016

How Computer Automation Affects Occupations: Technology, Jobs, And Skills, James Bessen

Faculty Scholarship

This paper investigates basic relationships between technology and occupations. Building a general occupational model, I look at detailed occupations since 1980 to explore whether computers are related to job losses or other sources of wage inequality. Occupations that use computers grow faster, not slower. This is true even for highly routine and mid-wage occupations. Estimates reject computers as a source of significant net technological unemployment or job polarization. But computerized occupations substitute for other occupations, shifting employment and requiring new skills. Because new skills are costly to learn, computer use is associated with substantially greater within-occupation wage inequality.


Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton Oct 2016

Siri-Ously? Free Speech Rights And Artificial Intelligence, Toni M. Massaro, Helen Norton

Northwestern University Law Review

Computers with communicative artificial intelligence (AI) are pushing First Amendment theory and doctrine in profound and novel ways. They are becoming increasingly self-directed and corporal in ways that may one day make it difficult to call the communication ours versus theirs. This, in turn, invites questions about whether the First Amendment ever will (or ever should) cover AI speech or speakers even absent a locatable and accountable human creator. In this Article, we explain why current free speech theory and doctrine pose surprisingly few barriers to this counterintuitive result; their elasticity suggests that speaker humanness no longer may be …


Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder Sep 2016

Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder

The University of Cincinnati Intellectual Property and Computer Law Journal

Under the guise of consumer protection, lawyers and bar associations have used disparate litigious mechanisms to thwart, inadvertently or not, the use of self-help legal technology. This paper will demonstrate that such adversity is not logical after a consideration of the technical functions that the software performs and unduly restricts underserved populations’ access to the law because of the misapplication of policy to vaguely worded laws. This paper will provide a thorough analysis of legal action taken against the high-profile company LegalZoom under the theory of unauthorized practice of law provides direct support of this claim. Summary and critique of …


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman Aug 2016

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler Aug 2016

That ‘70s Show: Why The 11th Circuit Was Wrong To Rely On Cases From The 1970s To Decide A Cell-Phone Tracking Case, David Oscar Markus, Nathan Freed Wessler

University of Miami Law Review

In light of society's increasing reliance on technology, this article explores a critical question – that of the Fourth Amendment’s protection over privacy in the digital age. Specifically, this article addresses how the law currently fails to protect the privacy of one’s cell phone records and its ramifications. By highlighting the antiquated precedent leading up to the Eleventh Circuit’s ruling in United States v. Davis, this article calls on the judiciary to find a more appropriate balance for protecting the right to privacy in a modern society.


Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico Aug 2016

Cellphones, Stingrays, And Searches! An Inquiry Into The Legality Of Cellular Location Information, Jeremy H. D'Amico

University of Miami Law Review

Can the Fourth Amendment protect an individual’s right privacy by preventing the disclosure of her location through cell site location information? Does it currently? Should it? Many court opinions answer these questions in both the affirmative and the negative. The rationale underlying each conclusion is disparate. Some rely on statutory regimes, others rely on the United States Supreme Court’s interpretation of reasonableness. However, Cell Site Location Information is a technology that requires uniformity in its interpretation. This note investigates the different interpretations of the Fourth Amendment as it relates to Cell Site Location Information. It explains the technology behind Cell …


A Comparative Approach To Economic Espionage: Is Any Nation Effectively Dealing With This Global Threat?, Melanie Reid May 2016

A Comparative Approach To Economic Espionage: Is Any Nation Effectively Dealing With This Global Threat?, Melanie Reid

University of Miami Law Review

In 1996, Congress passed the Economic Espionage Act (EEA), 18 U.S.C. Sections 1831 and 1832, to help thwart attempts by foreign entities intent on stealing U.S. proprietary information and trade secrets. Despite the passage of the EEA almost twenty years ago, if recent statistics are to be believed, there is so much trade secret thievery going around that the United States finds itself in the midst of an epidemic of economic espionage. Currently, any and all U.S. technology that is vulnerable and profitable is being targeted. Unfortunately, existing remedies and enforcement have barely blunted the onslaught against the U.S. which …


Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo Jan 2016

Another Bite At The Apple For Trade Secret Protection: Why Stronger Federal Laws Are Needed To Protect A Corporation's Most Valuable Property, Alissa Cardillo

Brooklyn Journal of Corporate, Financial & Commercial Law

Trade secrets are one of a corporation’s most valuable assets. However, they lack adequate protection under federal law, leaving them vulnerable to theft and misappropriation. As technology advances, it becomes easier and less time consuming for individuals and entities to access and steal trade secrets to a corporation’s detriment. Most often these thefts involve stealing trade secrets in an intangible form. Current legislation fails to adequately protect intangible trade secrets, leaving them vulnerable to theft. An amendment to the National Stolen Property Act that encompasses intangible trade secrets would close a loophole that currently exists relating to intangible assets, allowing …


Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris Jan 2016

Riley V. California And The Beginning Of The End For The Third-Party Search Doctrine, David A. Harris

Articles

In Riley v. California, the Supreme Court decided that when police officers seize a smart phone, they may not search through its contents -- the data found by looking into the call records, calendars, pictures and so forth in the phone -- without a warrant. In the course of the decision, the Court said that the rule applied not just to data that was physically stored on the device, but also to data stored "in the cloud" -- in remote sites -- but accessed through the device. This piece of the decision may, at last, allow a re-examination of …


Optimizing Government For An Optimizing Economy, Cary Coglianese Jan 2016

Optimizing Government For An Optimizing Economy, Cary Coglianese

All Faculty Scholarship

Much entrepreneurial growth in the United States today emanates from technological advances that optimize through contextualization. Innovations as varied as Airbnb and Uber, fintech firms and precision medicine, are transforming major sectors in the economy by customizing goods and services as well as refining matches between available resources and interested buyers. The technological advances that make up the optimizing economy create new challenges for government oversight of the economy. Traditionally, government has overseen economic activity through general regulations that aim to treat all individuals equally; however, in the optimizing economy, business is moving in the direction of greater individualization, not …


Disclosure 2.0: Can Technology Solve Overload, Complexity, And Other Information Failures?, Erik F. Gerding Jan 2016

Disclosure 2.0: Can Technology Solve Overload, Complexity, And Other Information Failures?, Erik F. Gerding

Publications

In recent years, securities law scholars have either renewed an old attack on mandatory issuer disclosure or questioned the effectiveness of securities disclosure in the context of modern financial instruments. Some scholars argue that mandatory disclosure rules prove ineffective because investors suffer from “information overload.” Others claim that securities disclosure cannot describe adequately the complexity of modern firms and finance. These academic criticisms of mandatory securities disclosure provide some of the intellectual underpinnings for recent efforts to roll back some mandatory securities disclosure rules, such as the SEC’s Disclosure Effectiveness initiative.

This Article questions these critiques of securities disclosure, including …


The Forgotten Core Of The Telecommunications Act Of 1996, Philip J. Weiser Jan 2016

The Forgotten Core Of The Telecommunications Act Of 1996, Philip J. Weiser

Publications

No abstract provided.


The Big Data Jury, Andrew Ferguson Jan 2016

The Big Data Jury, Andrew Ferguson

Articles in Law Reviews & Other Academic Journals

This article addresses the disruptive impact of big data technologies on jury selection.Jury selection requires personal information about potential jurors. Current selection practices, however, collect very little information about citizens, and litigants picking jury panels know even less. This data gap results in a jury selection system that: (1) fails to create a representative cross-section of the community; (2) encourages the discriminatory use of peremptory challenges; (3) results in an unacceptably high juror “no show” rate; and (4) disproportionately advantages those litigants who can afford to hire expensive jury consultants.Big data has the potential to remedy these existing limitations and …


Regulating Software When Everything Has Software, Paul Ohm, Blake Reid Jan 2016

Regulating Software When Everything Has Software, Paul Ohm, Blake Reid

Publications

This Article identifies a profound, ongoing shift in the modern administrative state: from the regulation of things to the regulation of code. This shift has and will continue to place previously isolated agencies in an increasing state of overlap, raising the likelihood of inconsistent regulations and putting seemingly disparate policy goals, like privacy, safety, environmental protection, and copyright enforcement, in tension. This Article explores this problem through a series of case studies and articulates a taxonomy of code regulations to help place hardware-turned-code rules in context. The Article considers the likely turf wars, regulatory thickets, and related dynamics that are …


Pursuit Of Profit Poisons Collaboration, Jacob S. Sherkow Jan 2016

Pursuit Of Profit Poisons Collaboration, Jacob S. Sherkow

Other Publications

The CRISPR–Cas9 patent battle demonstrates how overzealous efforts to commercialize technology can damage science.


Pursuit Of Profit Poisons Collaboration, Jacob S. Sherkow Jan 2016

Pursuit Of Profit Poisons Collaboration, Jacob S. Sherkow

Other Publications

The CRISPR–Cas9 patent battle demonstrates how overzealous efforts to commercialize technology can damage science.


Can Dna Be Speech?, Jorge R. Roig Dec 2015

Can Dna Be Speech?, Jorge R. Roig

Jorge R Roig

DNA is generally regarded as the basic building block of life itself. In the most fundamental sense, DNA is nothing more than a chemical compound, albeit a very complex and peculiar one. DNA is an information-carrying molecule. The specific sequence of base pairs contained in a DNA molecule carries with it genetic information, and encodes for the creation of particular proteins. When taken as a whole, the DNA contained in a single human cell is a complete blueprint and instruction manual for the creation of that human being.
In this article we discuss myriad current and developing ways in which …