Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Schulich School of Law, Dalhousie University (245)
- UIC School of Law (188)
- DePaul University (93)
- Seattle University School of Law (87)
- Southern Methodist University (71)
-
- University of Washington School of Law (40)
- University of Richmond (36)
- University of Michigan Law School (20)
- University of Cincinnati College of Law (15)
- Maurer School of Law: Indiana University (13)
- Brooklyn Law School (11)
- The Catholic University of America, Columbus School of Law (10)
- University of South Florida (9)
- Duke Law (8)
- University of Georgia School of Law (8)
- Washington and Lee University School of Law (8)
- Pepperdine University (7)
- Fordham Law School (6)
- Vanderbilt University Law School (6)
- Cleveland State University (5)
- Georgia State University College of Law (5)
- Mitchell Hamline School of Law (5)
- Brigham Young University Law School (4)
- Chicago-Kent College of Law (4)
- Florida International University College of Law (4)
- Pace University (4)
- American University Washington College of Law (3)
- Northwestern Pritzker School of Law (3)
- Touro University Jacob D. Fuchsberg Law Center (3)
- University at Buffalo School of Law (3)
- Keyword
-
- Copyright (45)
- Intellectual property (28)
- Software (28)
- Technology (18)
- Copyright law (17)
-
- Internet (17)
- Patent law (15)
- PIPEDA (14)
- Privacy (14)
- Artificial intelligence (12)
- Intellectual Property (12)
- Law (12)
- AI (11)
- Book reviews (10)
- E-commerce (10)
- Cybersecurity (9)
- Case comment (8)
- Copyright protection (8)
- DMCA (8)
- Patents (8)
- Social media (8)
- Trademark (8)
- Computer programs (7)
- Copyright Act (7)
- Copyright infringement (7)
- Cyberspace (7)
- Fair use (7)
- Infringement (7)
- Patent (7)
- Affirmative Action (6)
- Publication Year
- Publication
-
- Canadian Journal of Law and Technology (245)
- UIC John Marshall Journal of Information Technology & Privacy Law (138)
- Seattle University Law Review (83)
- DePaul Journal of Art, Technology & Intellectual Property Law (72)
- SMU Science and Technology Law Review (71)
-
- Richmond Journal of Law & Technology (35)
- Washington Journal of Law, Technology & Arts (33)
- UIC Review of Intellectual Property Law (30)
- DePaul Business & Commercial Law Journal (21)
- UIC Law Review (20)
- The University of Cincinnati Intellectual Property and Computer Law Journal (15)
- Michigan Telecommunications & Technology Law Review (11)
- Catholic University Journal of Law and Technology (9)
- Military Cyber Affairs (9)
- Duke Law & Technology Review (8)
- Journal of Intellectual Property Law (7)
- IP Theory (6)
- Washington Law Review (6)
- Washington and Lee Law Review (6)
- Cleveland State Law Review (5)
- Cybaris® (5)
- Fordham Law Review (5)
- Georgia State University Law Review (5)
- Pepperdine Law Review (5)
- Brooklyn Journal of International Law (4)
- Chicago-Kent Law Review (4)
- FIU Law Review (4)
- Indiana Law Journal (4)
- Michigan Journal of International Law (4)
- Seattle Journal of Technology, Environmental & Innovation Law (4)
Articles 1 - 30 of 951
Full-Text Articles in Computer Law
Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber
Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber
DePaul Business & Commercial Law Journal
No abstract provided.
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
DePaul Business & Commercial Law Journal
No abstract provided.
Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu
Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu
DePaul Business & Commercial Law Journal
No abstract provided.
Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani
Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani
DePaul Business & Commercial Law Journal
No abstract provided.
The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin
The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin
DePaul Business & Commercial Law Journal
No abstract provided.
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter
Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
A Timeless Principle: Copyright Before The Statute Of Anne, Victoria Lieberman
A Timeless Principle: Copyright Before The Statute Of Anne, Victoria Lieberman
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Innovation At A Crossroads: The Supreme Court's Influence On Pharmaceuticals, Trade Policies, And Public Health, Beau Reeves
Innovation At A Crossroads: The Supreme Court's Influence On Pharmaceuticals, Trade Policies, And Public Health, Beau Reeves
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Beautifying The Human Experience: The Road To Knocking Out The Knockoff Industry Through Adaptions To Copyright & Design Patent Protections For Clothing, Moira Mccabe
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
All Eyez On Rap & Hip-Hop: Analyzing How Black Expression Is Criminalized And The Language Of The Rap Act Of 2022, Maia Young
Washington Journal of Law, Technology & Arts
The Black existence, in the United States of America, has always been regarded as a conditional right. Conventionally, Blackness must always be nonviolent and non-disruptive to safely exist. Because of this, Blackness cannot be confined to restraints and disrupts these conventions with acts of joy and creative expression. Black creativity is both unconventional and sacred. Black creative expression documents, preserves, and unifies cultural lived experiences, from a first-hand lens of those oppressed. Creative and artistic expression celebrates the myriad of stories that are a part of the collective Black experience. Yet, Black creative expression is now being weaponized by prosecutors …
Constitutional Rights Of Artificial Intelligence, Mizuki Hashiguchi
Constitutional Rights Of Artificial Intelligence, Mizuki Hashiguchi
Washington Journal of Law, Technology & Arts
On February 8, 2022, the Italian Parliament approved constitutional amendments to protect the environment. A member of Parliament stated that the environment is an element of Italy, and that safeguarding the environment means safeguarding humans. The need to protect the environment seems to have become a critical component of public conscience. Likewise, if society perceives that artificial intelligence is vitally important for humanity, does constitutional law allow constitutional rights for artificial intelligence to be created?
Extending constitutional rights to artificial intelligence may be consistent with the jurisprudential history of rights. Constitutional rights have undergone metamorphosis over time to protect new …
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Washington Journal of Law, Technology & Arts
This article discusses contemporary problems related to Artificial Intelligence (AI), law and the visual arts. It suggests that the fallacies of copyright law are already visible in legal conundrums raised by AI in the creative sector. These include, for instance, the lack of uniformity in relation to creations’ copyrightability, the massive scale of copyright infringement affecting visual artists and the creative industry, and the difficulties in implementing media regulation and cyber-regulation. The deeply cherished ‘human authorship’ criterion that was sustained recently by a US Federal Appeals Court in Thaler, in particular, is a short-term solution to the legal challenges …
Foreword, Deborah W. Denno, Erica Valencia-Graham
Foreword, Deborah W. Denno, Erica Valencia-Graham
Fordham Law Review
This Foreword overviews an unprecedented Symposium on these wide ranging topics titled The New AI: The Legal and Ethical Implications of ChatGPT and Other Emerging Technologies. Hosted by the Fordham Law Review and cosponsored by Fordham University School of Law’s Neuroscience and Law Center on November 3, 2023, the Symposium brought together attorneys, judges, professors, and scientists to explore the opportunities and risks presented by AI, especially GenAI like ChatGPT. The discussion raised complex questions concerning AI sentience and personal privacy, as well as the future of legal ethics, education, and employment. Although the AI industry uniformly predicts ever more …
Robots As Pirates, Henry H. Perritt Jr.
Robots As Pirates, Henry H. Perritt Jr.
Catholic University Law Review
Generative AI has created much excitement over its potential to create new works of authorship in the literary and graphical realms. Its underling machine-learning technology works by analyzing the relations among elements of preexisting material in enormous databases assembled from publicly available and licensed sources. Its algorithms “learn” to predict “what comes next” in different types of expression. A complete system thus can become glib in creating new factual summaries, essays, fictional stories and images.
A number of authors of the raw material used by Generative AI engines claim that the machine learning process infringes their copyrights. Careful evaluation of …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
Privacy’S Next Act, Erik Lampmann-Shaver
Privacy’S Next Act, Erik Lampmann-Shaver
Washington Journal of Law, Technology & Arts
This Article identifies and describes three data privacy policy developments from recent legislative sessions that may seem unrelated, but which I contend together offer clues about privacy law’s future over the short-to-medium term.
The first is the proliferation, worldwide and in U.S. states, of legislative proposals and statutes referred to as “age-appropriate design codes.” Originating in the United Kingdom, age-appropriate design codes typically apply to online services “directed to children” and subject such services to transparency, default settings, and other requirements. Chief among them is an implied obligation to conduct ongoing assessments of whether a service could be deemed “directed …
Limits Of Algorithmic Fair Use, Jacob Alhadeff, Cooper Cuene, Max Del Real
Limits Of Algorithmic Fair Use, Jacob Alhadeff, Cooper Cuene, Max Del Real
Washington Journal of Law, Technology & Arts
In this article, we apply historical copyright principles to the evolving state of text-to-image generation and explore the implications of emerging technological constructs for copyright’s fair use doctrine. Artificial intelligence (“AI”) is frequently trained on copyrighted works, which usually involves extensive copying without owners’ authorization. Such copying could constitute prima facie copyright infringement, but existing guidance suggests fair use should apply to most machine learning contexts. Mark Lemley and Bryan Casey argue that training machine learning (“ML”) models on copyrighted material should generally be permitted under fair use when the model’s outputs transcends the purpose of its inputs. Their arguments …
Coded Social Control: China’S Normalization Of Biometric Surveillance In The Post Covid-19 Era, Michelle Miao
Coded Social Control: China’S Normalization Of Biometric Surveillance In The Post Covid-19 Era, Michelle Miao
Washington Journal of Law, Technology & Arts
This article investigates the longevity of health QR codes, a digital instrument of pandemic surveillance, in post-COVID China. From 2020 to 2022, China widely used this tri-color tool to combat the COVID-19 pandemic. A commonly held assumption is that health QR codes have become obsolete in post-pandemic China. This study challenges such an assumption. It reveals their persistence and integration - through mobile apps and online platforms - beyond the COVID-19 public health emergency. A prolonged, expanded and normalized use of tools which were originally intended for contact tracing and pandemic surveillance raises critical legal and ethical concerns. Moreover, their …
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Washington Journal of Law, Technology & Arts
If digital platforms are found liable on hybrid antitrust-data protection violations, by how much should individual users be compensated? While traditional antitrust literature offers some estimation techniques, these methods were developed mostly around the idea that anti-competitive conduct manifests in supra-competitive prices, lost profits, or lost customers, all of which are easily quantifiable using commercially available evidence.
In digital markets, where antitrust violations are often intertwined with data protection issues, several complications arise. First, unlike transactions covered by traditional treble damage estimation techniques, “data-for-services” dealings are not evidenced by receipts. Second, personal data valuation is highly contextual and prone to …
Stakeholder Capitalism’S Greatest Challenge: Reshaping A Public Consensus To Govern A Global Economy, Leo E. Strine Jr., Michael Klain
Stakeholder Capitalism’S Greatest Challenge: Reshaping A Public Consensus To Govern A Global Economy, Leo E. Strine Jr., Michael Klain
Seattle University Law Review
The Berle XIV: Developing a 21st Century Corporate Governance Model Conference asks whether there is a viable 21st Century Stakeholder Governance model. In our conference keynote article, we argue that to answer that question yes requires restoring—to use Berle’s term—a “public consensus” throughout the global economy in favor of the balanced model of New Deal capitalism, within which corporations could operate in a way good for all their stakeholders and society, that Berle himself supported.
The world now faces problems caused in large part by the enormous international power of corporations and the institutional investors who dominate their governance. These …
Public Primacy In Corporate Law, Dorothy S. Lund
Public Primacy In Corporate Law, Dorothy S. Lund
Seattle University Law Review
This Article explores the malleability of agency theory by showing that it could be used to justify a “public primacy” standard for corporate law that would direct fiduciaries to promote the value of the corporation for the benefit of the public. Employing agency theory to describe the relationship between corporate management and the broader public sheds light on aspects of firm behavior, as well as the nature of state contracting with corporations. It also provides a lodestar for a possible future evolution of corporate law and governance: minimize the agency costs created by the divergence of interests between management and …
Shareholder Primacy Versus Shareholder Accountability, William W. Bratton
Shareholder Primacy Versus Shareholder Accountability, William W. Bratton
Seattle University Law Review
When corporations inflict injuries in the course of business, shareholders wielding environmental, social, and governance (“ESG”) principles can, and now sometimes do, intervene to correct the matter. In the emerging fact pattern, corporate social accountability expands out of its historic collectivized frame to become an internal subject matter—a corporate governance topic. As a result, shareholder accountability surfaces as a policy question for the first time. The Big Three index fund managers, BlackRock, Vanguard, and State Street, responded to the accountability question with ESG activism. In so doing, they defected against corporate legal theory’s central tenet, shareholder primacy. Shareholder primacy builds …
How To Interpret The Securities Laws?, Zachary J. Gubler
How To Interpret The Securities Laws?, Zachary J. Gubler
Seattle University Law Review
In discussions of the federal securities laws, the SEC usually gets most of the attention. This makes some sense. After all, it is the agency charged with administrating the securities laws and regulating the industry as a whole. It makes the majority of the laws; it engages in enforcement actions; it reacts to crises; and it, or sometimes even its individual commissioners, intervene publicly in policy debates. Often overlooked in such discussion, however, is the role of the Supreme Court in shaping securities law, and a new book by Adam Pritchard and Robert Thompson demonstrates why this is an oversight. …
The Pioneers, Waves, And Random Walks Of Securities Law In The Supreme Court, Elizabeth Pollman
The Pioneers, Waves, And Random Walks Of Securities Law In The Supreme Court, Elizabeth Pollman
Seattle University Law Review
After the pioneers, waves, and random walks that have animated the history of securities laws in the U.S. Supreme Court, we might now be on the precipice of a new chapter. Pritchard and Thompson’s superb book, A History of Securities Law in the Supreme Court, illuminates with rich archival detail how the Court’s view of the securities laws and the SEC have changed over time and how individuals have influenced this history. The book provides an invaluable resource for understanding nearly a century’s worth of Supreme Court jurisprudence in the area of securities law and much needed context for …