Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 3358

Full-Text Articles in Computer Law

Freedom To Hack, Ido Kilovaty Jan 2019

Freedom To Hack, Ido Kilovaty

Articles, Chapters in Books and Other Contributions to Scholarly Works

Swaths of personal and nonpersonal information collected online about internet users are increasingly being used in sophisticated ways to manipulate them based on that information. This represents a new trend in the exploitation of data, where instead of pursuing direct financial gain based on the face value of the data, actors are seeking to engage in data analytics using advanced artificial intelligence technologies that would allow them to more easily access individuals’ cognition and future behavior. Although in recent years the concept of online manipulation has received some academic and policy attention, the desirable relationship between the data-breach law and ...


The Future Of Freedom Of Expression Online, Evelen Mary Aswad Dec 2018

The Future Of Freedom Of Expression Online, Evelen Mary Aswad

Duke Law & Technology Review

Should social media companies ban Holocaust denial from their platforms? What about conspiracy theorists that spew hate? Does good corporate citizenship mean platforms should remove offensive speech or tolerate it? The content moderation rules that companies develop to govern speech on their platforms will have significant implications for the future of freedom of expression. Given that the prospects for compelling platforms to respect users’ free speech rights are bleak within the U.S. system, what can be done to protect this important right? In June 2018, the United Nations’ top expert for freedom of expression called on companies to align ...


Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman Dec 2018

Revolution In Crime: How Cryptocurrencies Have Changed The Criminal Landscape, Igor Groysman

Student Theses

This thesis will examine the ways in which various cryptocurrencies have impacted certain traditional crimes. While crime is always evolving with technology, cryptocurrencies are a game changer in that they provide anonymous and decentralized payment systems which, while they can be tracked in a reactive sense via the blockchain, are seen by criminals as having better uses for them than traditional fiat currencies, such as the ability to send money relatively fast to another party without going through an intermediary, or the ability to obscure the origin of the money for money laundering purposes. Every week there are new cryptocurrencies ...


Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire Nov 2018

Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire

Duke Law & Technology Review

The ubiquity of cell phones in today’s society has forced courts to change or dismiss established, but inapplicable analytical frameworks. Two such frameworks in the school setting are regulations of student speech and of student searches. This Article traces the constitutional jurisprudence of both First Amendment off-campus speech protection and Fourth Amendment search standards as applied to the school setting. It then analyzes how the Supreme Court’s ruling in Riley v. California complicates both areas. Finally, it proposes a pragmatic solution: by recognizing a categorical First Amendment exception for “substantial threats” against the school community, courts could accommodate ...


Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish Nov 2018

Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish

Austen Parrish (2014-)

A recent Bureau of Labor Statistics report estimated a near 30 percent growth in coming years for information security professionals, far outpacing most other job types. While Indiana University has long recognized the importance of data security and privacy, multiple new initiatives are ensuring that the next generation of chief information security officers, systems analysts, privacy professionals and others will come from our law school.

One of the ways the law school is leading the way is through the university’s new master of science in cybersecurity risk management. That degree program combines the resources of three of IU’s ...


Enhancement Of Media Splicing Detection: A General Framework, Songpon Teerakanok, Tetsutaro Uehara Oct 2018

Enhancement Of Media Splicing Detection: A General Framework, Songpon Teerakanok, Tetsutaro Uehara

Journal of Digital Forensics, Security and Law

Digital media (i.e., image, audio) has played an influential role in today information system. The increasing of popularity in digital media has brought forth many technological advancements. The advancements, however, also gives birth to a number of forgeries and attacks against this type of information. With the availability of easy-to-use media manipulating tools available online, the authenticity of today digital media cannot be guaranteed. In this paper, a new general framework for enhancing today media splicing detection has been proposed. By combining results from two traditional approaches, the enhanced detection results show improvement in term of clarity in which ...


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are ...


A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy Oct 2018

A Bit Like Cash: Understanding Cash-For-Bitcoin Transactions Through Individual Vendors, Stephanie J. Robberson, Mark R. Mccoy

Journal of Digital Forensics, Security and Law

As technology improves and economies become more globalized, the concept of currency has evolved. Bitcoin, a cryptographic digital currency, has been embraced as a secure and convenient type of money. Due to its security and privacy for the user, Bitcoin is a good tool for conducting criminal trades. The Financial Crimes Enforcement Network (FinCEN) has regulations in place to make identification information of Bitcoin purchasers accessible to law enforcement, but enforcing these rules with cash-for-Bitcoin traders is difficult. This study surveyed cash-for-Bitcoin vendors in Oklahoma, Texas, Arkansas, Missouri, Kansas, Colorado, and New Mexico to determine personal demographic information, knowledge of ...


Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo Sep 2018

Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo

San Diego International Law Journal

This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.


Fool Me Once: Regulating "Fake News" And Other Online Advertising, Abby Wood, Ann M. Ravel Sep 2018

Fool Me Once: Regulating "Fake News" And Other Online Advertising, Abby Wood, Ann M. Ravel

University of Southern California Legal Studies Working Paper Series

A lack of transparency for online political advertising has long been a problem in American political campaigns. Disinformation attacks that American voters have experienced since the 2016 campaign have made the need for regulatory action more pressing.

Platforms desire self-regulation and have only recently come around to supporting transparency regulations. While government must not regulate the content of political speech, it can, and should, force transparency into the process. We propose several interventions aimed at transparency. Most importantly, campaign finance regulators should require platforms to store and make available ads run on their platforms, as well as the audience at ...


Introduction, Annette Clark Sep 2018

Introduction, Annette Clark

Seattle University Law Review

Introductory remarks given by Dean Annette Clark at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law.”


Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover Sep 2018

Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover

Seattle University Law Review

Transcript of the panel discussion at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law.” The panel is moderated by Seattle University School of Law Professor Gregory Silverman, and discusses the forthcoming book Robotica, by David M. Skover and Ronald K. L. Collins. The panelists are Bruce E. H. Johnson, Helen Norton, and David M. Skover.


Panel 2: Accountability For The Actions Of Robots, Ryan Calo, Howard Jay Chizeck, Elizabeth Joh, Blake Hannaford Sep 2018

Panel 2: Accountability For The Actions Of Robots, Ryan Calo, Howard Jay Chizeck, Elizabeth Joh, Blake Hannaford

Seattle University Law Review

Transcript of the panel discussion at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law” discussing human control and Artificial Intellegence learning. The panel participants are Ryan Calo, Howard Jay Chizeck, Elizabeth Joh, and Blake Hannaford.


Keynote Address, Ryan Calo Sep 2018

Keynote Address, Ryan Calo

Seattle University Law Review

Transcript of the keynote address at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law.” The keynote address is presented by Ryan Calo and discusses the current status of artificial intelligence learning, and how this current status is moving toward robotic singularity.


Artificial Intellegence And Policing: First Questions, Elizabeth E. Joh Sep 2018

Artificial Intellegence And Policing: First Questions, Elizabeth E. Joh

Seattle University Law Review

Artificial intelligence is playing an increasingly larger role in all sectors of society, including policing. Many police departments are already using artificial intelligence (AI) to help predict and identify suspicious persons and places.1 Increased computational power and oceans of data have given rise to inferences about violence and threats.2 AI will change policing just as it will healthcare, insurance, commerce, and transportation. But what questions should we ask about AI and policing?


Robotic Speakers And Human Listeners, Helen Norton Sep 2018

Robotic Speakers And Human Listeners, Helen Norton

Seattle University Law Review

This article discusses protected First Amendment speech and how this protection should be applied to robotic speech. Robotic speech is that created by automated means, currently “bots” but the producers of automated speech are evolving. The article further differentiates between rights of the producers of this speech and listeners or consumers of the speech, and the impact of First Amendment protections on each group.


Virtual Ethics And The Creeper Act, Justin Tiehen Sep 2018

Virtual Ethics And The Creeper Act, Justin Tiehen

Seattle University Law Review

A legal and moral discussion of the development of child sex bots (CSB), childlike sex dolls, comparing society-at-large’s general squeamishness of the area, and attempts to regulate (for example, the CREEPER Act) with the prophylactic therapeutic benefits of these robots.


Ethical Machines?, Ariela Tubert Sep 2018

Ethical Machines?, Ariela Tubert

Seattle University Law Review

This Article explores the possibility of having ethical artificial intelligence. It argues that we face a dilemma in trying to develop artificial intelligence that is ethical: either we have to be able to codify ethics as a set of rules or we have to value a machine’s ability to make ethical mistakes so that it can learn ethics like children do. Neither path seems very promising, though perhaps by thinking about the difficulties with each we may come to a better understanding of artificial intelligence and ourselves.


Nova Law Review Sep 2018

Nova Law Review

Nova Law Review

No abstract provided.


Back Matter Aug 2018

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover Aug 2018

Cover

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Aug 2018

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Aug 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Publication Information Aug 2018

Publication Information

Journal of Digital Forensics, Security and Law

No abstract provided.


Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels Aug 2018

Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels

SMU Data Science Review

In this paper, we present an analysis of features influencing Yelp's proprietary review filtering algorithm. Classifying or misclassifying reviews as recommended or non-recommended affects average ratings, consumer decisions, and ultimately, business revenue. Our analysis involves systematically sampling and scraping Yelp restaurant reviews. Features are extracted from review metadata and engineered from metrics and scores generated using text classifiers and sentiment analysis. The coefficients of a multivariate logistic regression model were interpreted as quantifications of the relative importance of features in classifying reviews as recommended or non-recommended. The model classified review recommendations with an accuracy of 78%. We found that ...


The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow Aug 2018

The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow

Faculty Scholarship at Penn Law

In this report, Shakow explains how a decentralized autonomous organization functions and interacts with the U.S. tax system and presents the many tax issues that these structures raise. The possibility of using smart contracts to allow an entity to operate totally autonomously on a blockchain platform seems attractive. However, little thought has been given to how such an entity can comply with the requirements of a tax system. The DAO, the first major attempt to create such an organization, failed because of a programming error. If successful examples proliferate in the future, tax authorities will face significant problems in ...


The First Amendment Case For Public Access To Secret Algorithms Used In Criminal Trials, Vera Eidelman Aug 2018

The First Amendment Case For Public Access To Secret Algorithms Used In Criminal Trials, Vera Eidelman

Georgia State University Law Review

As this Article sets forth, once a computerized algorithm is used by the government, constitutional rights may attach. And, at the very least, those rights require that algorithms used by the government as evidence in criminal trials be made available—both to litigants and the public. Scholars have discussed how the government’s refusal to disclose such algorithms runs afoul of defendants’ constitutional rights, but few have considered the public’s interest in these algorithms—or the widespread impact that public disclosure and auditing could have on ensuring their quality.

This Article aims to add to that discussion by setting ...


Deploying The Secret Police: The Use Of Algorithms In The Criminal Justice System, Jessica Gabel Cino Aug 2018

Deploying The Secret Police: The Use Of Algorithms In The Criminal Justice System, Jessica Gabel Cino

Georgia State University Law Review

Algorithms saturate our lives today; from curated song lists to recommending “friends” and news feeds, they factor into some of the most human aspects of decision-making, tapping into preferences based on an ever-growing amount of data. Regardless of whether the algorithm pertains to routing you around traffic jams or finding your next dinner, there is little regulation and even less transparency regarding just how these algorithms work. Paralleling this societal adoption, the criminal justice system now employs algorithms in some of the most important aspects of investigation and decision-making.

The lack of oversight is abundantly apparent in the criminal justice ...


Behavioral Finance, Decumulation And The Regulatory Strategy For Robo-Advice, Tom Baker, Benedict Dellaert Jul 2018

Behavioral Finance, Decumulation And The Regulatory Strategy For Robo-Advice, Tom Baker, Benedict Dellaert

Faculty Scholarship at Penn Law

This working paper surveys the decumulation services offered by investment robo-advisors as a case study with which to examine regulatory and market structure issues raised by automated financial advice. We provide a short introduction to decumulation, describing some of the uncertainties involved in identifying optimal decumulation strategies and sketching a few of the ‘rules of thumb’ that financial advisors have developed in this area in the face of this uncertainty. Next we describe behavioral effects that could inhibit consumers from following an optimal decumulation strategy, concluding that, left to their own devices, consumers are likely to make sub-optimal decumulation decisions ...


A Slap On The Wrist: Combatting Russia’S Cyber Attack On The 2016 U.S. Presidential Election, Christina Lam Jul 2018

A Slap On The Wrist: Combatting Russia’S Cyber Attack On The 2016 U.S. Presidential Election, Christina Lam

Boston College Law Review

On June 14, 2016, suspicions emerged that Russia launched a cyber attack on the U.S. Democratic National Committee in the midst of an extremely contentious presidential election season. The damage was extensive, occurring over a series of months and resulting in numerous leaks of highly sensitive information regarding Democratic Presidential Candidate Hillary Clinton. After it was verified that Russia was behind the cyber attack, President Barack Obama relied on general and anachronistic principles of international law to issue a grossly ineffective response. Russia’s cyber attack and the U.S. response thus highlighted the ways in which international law ...