Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Smart Contracts And The Limits Of Computerized Commerce, Eric D. Chason Jan 2020

Smart Contracts And The Limits Of Computerized Commerce, Eric D. Chason

Faculty Publications

Smart contracts and cryptocurrencies have sparked considerable interest among legal scholars in recent years, and a growing body of scholarship focuses on whether smart contracts and cryptocurrencies can sidestep law and regulation altogether. Bitcoin is famously decentralized, without any central actor controlling the system. Its users remain largely anonymous, using alphanumeric addresses instead of legal names. Ethereum shares these traits and also supports smart contracts that can automate the transfer of the Ethereum cryptocurrency (known as ether). Ethereum also supports specialized "tokens" that can be tied to the ownership of assets, goods, and services that exist completely outside of the …


Taxonomy Of The Snowden Disclosures, Margaret Hu Oct 2015

Taxonomy Of The Snowden Disclosures, Margaret Hu

Faculty Publications

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Apr 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Faculty Publications

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that "collect-it-all" tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


W(H)Ither Warranty: The B(L)Oom Of Products Liability Theory In Cases Of Deficient Software Design, Peter A. Alces Jan 1999

W(H)Ither Warranty: The B(L)Oom Of Products Liability Theory In Cases Of Deficient Software Design, Peter A. Alces

Faculty Publications

No abstract provided.


When Y2k Causes "Economic Loss" To "Other Property", Peter A. Alces, Aaron S. Book Jan 1999

When Y2k Causes "Economic Loss" To "Other Property", Peter A. Alces, Aaron S. Book

Faculty Publications

No abstract provided.