Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Algorithms And Human Freedom, Richard Warner, Robert Sloan Apr 2019

Algorithms And Human Freedom, Richard Warner, Robert Sloan

All Faculty Scholarship

Predictive analytics such as data mining, machine learning, and artificial intelligence drive algorithmic decision making. Its "all-encompassing scope already reaches the very heart of a functioning society". Unfortunately, the legal system and its various tools developed around human decisionmakers cannot adequately administer accountability mechanisms for computer decision making. Antiquated approaches require modernization to bridge the gap between governing human decision making and new technologies. We divide the bridge-building task into three questions. First, what features of the use of predictive analytics significantly contribute to incorrect, unjustified, or unfair outcomes? Second, how should one regulate those features to make outcomes more …


The Internet Adopts Two-Way Radio, Henry Perritt Apr 2019

The Internet Adopts Two-Way Radio, Henry Perritt

All Faculty Scholarship

The Internet, having displaced conventional correspondence with email, having displaced traditional libraries with online ones, having revolutionized shopping, having uprooted television and movies, now is absorbing police, fire, ambulance, and public utility two-radio systems.Digital radio technologies combine with Internet switching of transmitters, receivers, and networks, so that a police officer can talk to an ambulance driver or a train dispatcher across the state or across the country. Specialized cellphones are becoming indistinguishable from walkie-talkies. Cellular telephone channels replace two-way-radio air links.Integration of “private mobile radio” into the Internet is the result of specific advances in radio and networking technology that …


Keeping The Internet Invisible: Television Takes Over, Henry Perritt Jan 2017

Keeping The Internet Invisible: Television Takes Over, Henry Perritt

All Faculty Scholarship

No abstract provided.


Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski Jan 2016

Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski

All Faculty Scholarship

With millions of small drones in private hands, the FAA continues its struggle to develop an effective regulatory regime to comply with Congress’s mandate to integrate them into the national airspace system. Thousands of individuals and small businesses have obtained authorization from the FAA—"section 333 exemptions"—allowing them to fly their drones commercially. Farmers, TV stations, surveyors, construction-site supervisors, real estate agents, people selling their properties, and managers seeking cheaper and safer ways to inspect their facilities, want to hire the exemption holders, but many are holding back until the FAA clarifies the groundrules.The FAA understands that its traditional approach for …


Modularity Theory And Internet Regulation, Christopher S. Yoo Jan 2016

Modularity Theory And Internet Regulation, Christopher S. Yoo

All Faculty Scholarship

Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.

The literature on innovation indicates that modules should be determined by the nature of …


Fortuity And Forensic Familial Identification, Natalie Ram Apr 2011

Fortuity And Forensic Familial Identification, Natalie Ram

All Faculty Scholarship

On July 7, 2010, Los Angeles police announced the arrest of a suspect in the Grim Sleeper murders, so called because of a decade-long hiatus in killings. The break in the case came when California searched its state DNA database for a genetic profile similar, but not identical, to the killer’s. DNA is inherited in specific and predictable ways, so a source-excluding partial match might indicate that a close genetic relative of the matching offender was the Grim Sleeper. California’s apparent success in this case has intensified interest in policymaking for source-excluding partial matching. To date, however, little information about …


Life After Bilski, Mark A. Lemley, Michael Risch, Ted Sichelman, R. Polk Wagner Jan 2011

Life After Bilski, Mark A. Lemley, Michael Risch, Ted Sichelman, R. Polk Wagner

All Faculty Scholarship

In Bilski v. Kappos, the Supreme Court declined calls to categorically exclude business methods—or any technology—from the patent law. It also rejected as the sole test of subject matter eligibility the Federal Circuit’s deeply-flawed machine-or-transformation test, under which no process is patentable unless it is tied to a particular machine or transforms an article to another state or thing. Subsequent developments threaten to undo that holding, however. Relying on the Court’s description of the Federal Circuit test as a “useful and important clue,” the U.S. Patent and Trademark Office, patent litigants, and district courts have all continued to rely on …


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Annotating The News: Mitigating The Effects Of Media Convergence And Consolidation, Eric Easton Oct 2000

Annotating The News: Mitigating The Effects Of Media Convergence And Consolidation, Eric Easton

All Faculty Scholarship

This essay is a personal inquiry into the nature of media technology, law, and ethics in an era marked by the convergence of media that have been largely separate-print, broadcast, cable, satellite, and the Internet-and by the consolidation of ownership in all of these media. What inventions, practices, and norms must emerge to enable us to take advantage of this vast new information-based world, while preserving such important professional values as diversity, objectivity, reliability, and independence?

The right to know belongs not only to individuals, but to the public at large, it can (or, perhaps, must) be vindicated by government …