Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Seattle University School of Law (8)
- University of Minnesota Law School (8)
- Schulich School of Law, Dalhousie University (6)
- Duke Law (3)
- Southern Methodist University (3)
-
- UIC School of Law (3)
- Nova Southeastern University (2)
- Vanderbilt University Law School (2)
- West Virginia University (2)
- Brooklyn Law School (1)
- Cornell University Law School (1)
- Georgia State University College of Law (1)
- New York Law School (1)
- University of Cincinnati College of Law (1)
- University of Massachusetts School of Law (1)
- University of San Diego (1)
- Keyword
-
- Intellegence (7)
- Artificial (4)
- Singularity (4)
- Ai (3)
- Artifical (3)
-
- Blockchain (3)
- Control (3)
- Discussion (3)
- Symposium (3)
- AI (2)
- Bots (2)
- Digital privacy (2)
- Human (2)
- Internet (2)
- Learning ai (2)
- Media & Communications (2)
- Panel (2)
- Privacy (2)
- Robotic (2)
- 3D (1)
- Acoustic (1)
- Agreement on Technical Barriers to Trade (1)
- Amendment (1)
- Artificial Intelligence laws (1)
- Automated (1)
- Bay (1)
- Bitcoin (1)
- Bot Legal Code (1)
- Boundary management (1)
- Canadian consumer protection (1)
- Publication
-
- Minnesota Journal of Law, Science & Technology (8)
- Seattle University Law Review (8)
- Canadian Journal of Law and Technology (6)
- Duke Law & Technology Review (3)
- SMU Science and Technology Law Review (3)
-
- UIC John Marshall Journal of Information Technology & Privacy Law (3)
- Nova Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- West Virginia Law Review (2)
- Brooklyn Journal of Corporate, Financial & Commercial Law (1)
- Cornell International Law Journal (1)
- Georgia State University Law Review (1)
- NYLS Law Review (1)
- San Diego International Law Journal (1)
- The University of Cincinnati Intellectual Property and Computer Law Journal (1)
- University of Massachusetts Law Review (1)
Articles 1 - 30 of 44
Full-Text Articles in Computer Law
Privacy Spaces, Bert-Jaap Koops
Privacy Spaces, Bert-Jaap Koops
West Virginia Law Review
Privacy literature contains conceptualizations of privacy in relation to role-playing and identity construction, and in relation to access control and boundary-management. In this paper, I combine both strands to introduce the concept of privacy spaces: spaces in which you can play, in your own way, the relevant role(s) you have in social life. Drawing from privacy conceptions in legal scholarship, philosophy, sociology, anthropology, human geography, and psychology, a systematic overview of traditional privacy spaces is offered, including mental bubbles, the body, personal space, personal writings, the home, private conversation space, cars, stalls, intimacy bubbles, professional black boxes, coffee house spaces, …
Better Late Than Never: Bringing The Data Security Regulatory Environment Into The Modern Era, Jacob Holden
Better Late Than Never: Bringing The Data Security Regulatory Environment Into The Modern Era, Jacob Holden
West Virginia Law Review
No abstract provided.
Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire
Dialing It Back: Why Courts Should Rethink Students’ Privacy And Speech Rights As Cell Phone Communications Erode The ‘Schoolhouse Gate’, Nicholas J. Mcguire
Duke Law & Technology Review
The ubiquity of cell phones in today’s society has forced courts to change or dismiss established, but inapplicable analytical frameworks. Two such frameworks in the school setting are regulations of student speech and of student searches. This Article traces the constitutional jurisprudence of both First Amendment off-campus speech protection and Fourth Amendment search standards as applied to the school setting. It then analyzes how the Supreme Court’s ruling in Riley v. California complicates both areas. Finally, it proposes a pragmatic solution: by recognizing a categorical First Amendment exception for “substantial threats” against the school community, courts could accommodate students’ constitutional …
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
Bazaar Transnational Drafting: An Analysis Of The Gnu Public License Version 3 Revision Process, Christopher M. Dileo
San Diego International Law Journal
This Article will step through the drafting process and compare bazaar and cathedral modes of drafting to determine if a bazaar mode can efficiently produce a legal instrument that crosses legal regimes. As the title suggests, the bazaar process analysis case will be the GNU General Public License version 3 (the GPLv3) Revision Process. A comparison of the advantages and disadvantages of the bazaar mode of drafting to the cathedral mode of drafting will hopefully demonstrate the overall value of a transnational bazaar process like the GPLv3 Revision Process.
Artificial Intellegence And Policing: First Questions, Elizabeth E. Joh
Artificial Intellegence And Policing: First Questions, Elizabeth E. Joh
Seattle University Law Review
Artificial intelligence is playing an increasingly larger role in all sectors of society, including policing. Many police departments are already using artificial intelligence (AI) to help predict and identify suspicious persons and places.1 Increased computational power and oceans of data have given rise to inferences about violence and threats.2 AI will change policing just as it will healthcare, insurance, commerce, and transportation. But what questions should we ask about AI and policing?
Keynote Address, Ryan Calo
Keynote Address, Ryan Calo
Seattle University Law Review
Transcript of the keynote address at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law.” The keynote address is presented by Ryan Calo and discusses the current status of artificial intelligence learning, and how this current status is moving toward robotic singularity.
Panel 2: Accountability For The Actions Of Robots, Ryan Calo, Howard Jay Chizeck, Elizabeth Joh, Blake Hannaford
Panel 2: Accountability For The Actions Of Robots, Ryan Calo, Howard Jay Chizeck, Elizabeth Joh, Blake Hannaford
Seattle University Law Review
Transcript of the panel discussion at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law” discussing human control and Artificial Intellegence learning. The panel participants are Ryan Calo, Howard Jay Chizeck, Elizabeth Joh, and Blake Hannaford.
Introduction, Annette Clark
Introduction, Annette Clark
Seattle University Law Review
Introductory remarks given by Dean Annette Clark at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law.”
Virtual Ethics And The Creeper Act, Justin Tiehen
Virtual Ethics And The Creeper Act, Justin Tiehen
Seattle University Law Review
A legal and moral discussion of the development of child sex bots (CSB), childlike sex dolls, comparing society-at-large’s general squeamishness of the area, and attempts to regulate (for example, the CREEPER Act) with the prophylactic therapeutic benefits of these robots.
Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover
Panel 1: Robotic Speech And The First Amendment, Bruce E. H. Johnson, Helen Norton, David Skover
Seattle University Law Review
Transcript of the panel discussion at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law.” The panel is moderated by Seattle University School of Law Professor Gregory Silverman, and discusses the forthcoming book Robotica, by David M. Skover and Ronald K. L. Collins. The panelists are Bruce E. H. Johnson, Helen Norton, and David M. Skover.
Robotic Speakers And Human Listeners, Helen Norton
Robotic Speakers And Human Listeners, Helen Norton
Seattle University Law Review
This article discusses protected First Amendment speech and how this protection should be applied to robotic speech. Robotic speech is that created by automated means, currently “bots” but the producers of automated speech are evolving. The article further differentiates between rights of the producers of this speech and listeners or consumers of the speech, and the impact of First Amendment protections on each group.
Ethical Machines?, Ariela Tubert
Ethical Machines?, Ariela Tubert
Seattle University Law Review
This Article explores the possibility of having ethical artificial intelligence. It argues that we face a dilemma in trying to develop artificial intelligence that is ethical: either we have to be able to codify ethics as a set of rules or we have to value a machine’s ability to make ethical mistakes so that it can learn ethics like children do. Neither path seems very promising, though perhaps by thinking about the difficulties with each we may come to a better understanding of artificial intelligence and ourselves.
Nova Law Review Full Issue Volume 42, Issue 3
Control On Blockchain Network, Aleksei Gudkov
Emerging Technologies Challenging Current Legal Paradigms, W. Keith Robinson
Emerging Technologies Challenging Current Legal Paradigms, W. Keith Robinson
Minnesota Journal of Law, Science & Technology
No abstract provided.
Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman
Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman
Brooklyn Journal of Corporate, Financial & Commercial Law
The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact, including the …
Securing The Internet Of Healthcare, Scott J. Shackelford, Michael Mattioli, Steve Myers, Austin Brady
Securing The Internet Of Healthcare, Scott J. Shackelford, Michael Mattioli, Steve Myers, Austin Brady
Minnesota Journal of Law, Science & Technology
No abstract provided.
Governing Behind The Cloud: Is Transparency Too "Burdensome" In The Digital Age?, Sam Louwagie
Governing Behind The Cloud: Is Transparency Too "Burdensome" In The Digital Age?, Sam Louwagie
Minnesota Journal of Law, Science & Technology
No abstract provided.
No Good Deed Goes Unpunished: The Duties Held By Malware Researchers, Penetration Testers, And "White Hat" Hackers, Jon Watkins
No Good Deed Goes Unpunished: The Duties Held By Malware Researchers, Penetration Testers, And "White Hat" Hackers, Jon Watkins
Minnesota Journal of Law, Science & Technology
No abstract provided.
Rewriting The "Book Of The Machine": Regulatory And Liability Issues For The Internet Of Things, Jane Kirtley, Scott Memmel
Rewriting The "Book Of The Machine": Regulatory And Liability Issues For The Internet Of Things, Jane Kirtley, Scott Memmel
Minnesota Journal of Law, Science & Technology
No abstract provided.
Rise Of The Intelligent Information Brokers: Role Of Computational Law Applications In Administering The Dynamic Cybersecurity Threat Surface In Iot, Eran Kahana
Minnesota Journal of Law, Science & Technology
No abstract provided.
Out Of Thin Air: Trade Secrets, Cybersecurity, And The Wrongful Acquisition Tort, Sharon Sandeen
Out Of Thin Air: Trade Secrets, Cybersecurity, And The Wrongful Acquisition Tort, Sharon Sandeen
Minnesota Journal of Law, Science & Technology
No abstract provided.
Biotechnology's Great Divide: Strengthening The Relationship Between Patent Law And Bioethics In The Age Of Crispr-Cas9, Hannah M. Mosby
Biotechnology's Great Divide: Strengthening The Relationship Between Patent Law And Bioethics In The Age Of Crispr-Cas9, Hannah M. Mosby
Minnesota Journal of Law, Science & Technology
No abstract provided.
The Court Must Play Its Interpretative Role: Defending The Defend Trade Secrets Act’S Extraterritorial Reach, Jada M. Colon
The Court Must Play Its Interpretative Role: Defending The Defend Trade Secrets Act’S Extraterritorial Reach, Jada M. Colon
The University of Cincinnati Intellectual Property and Computer Law Journal
The exact reach of the Defend Trade Secrets Act’s extraterritoriality provision has yet to be interpreted by the courts. If United States securities, trademark, and antitrust law serves as any indication of what is to be expected, the Defend Trade Secrets Act may be subject to an inconsistent array of interpretation. When faced with interpreting the extraterritorial scope of the Defend Trade Secrets Act for the first time, the court must set a strong precedent by enacting a single, uniform effects test that will not falter when applied in different circumstances and by different circuits. Courts interpreting United States securities, …
“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng
“Private” Cybersecurity Standards? Cyberspace Governance, Multistakeholderism, And The (Ir)Relevance Of The Tbt Regime, Shin-Yi Peng
Cornell International Law Journal
We are now living in a hyper-connected world, with a myriad of devices continuously linked to the Internet. Our growing dependence on such devices exposes us to a variety of cybersecurity threats. This ever-increasing connectivity means that vulnerabilities can be introduced at any phase of the software development cycle. Cybersecurity risk management, therefore, is more important than ever to governments at all developmental stages as well as to companies of all sizes and across all sectors. The awareness of cybersecurity threats affects the importance placed on the use of standards and certification as an approach.
Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer
Regulating Data As Property: A New Construct For Moving Forward, Jeffrey Ritter, Anna Mayer
Duke Law & Technology Review
The global community urgently needs precise, clear rules that define ownership of data and express the attendant rights to license, transfer, use, modify, and destroy digital information assets. In response, this article proposes a new approach for regulating data as an entirely new class of property. Recently, European and Asian public officials and industries have called for data ownership principles to be developed, above and beyond current privacy and data protection laws. In addition, official policy guidances and legal proposals have been published that offer to accelerate realization of a property rights structure for digital information. But how can ownership …
Tax Compliance In A Decentralizing Economy, Manoj Viswanathan
Tax Compliance In A Decentralizing Economy, Manoj Viswanathan
Georgia State University Law Review
Tax compliance in the United States has long relied on information from centralized intermediaries—the financial institutions,employers, and brokers that help ensure income is reported and taxes are paid. Yet while the IRS remains tied to these centralized entities,consumers and businesses are not. New technologies, such as sharing economy platforms (companies such as Airbnb, Uber, and Instacart)and the blockchain (the platform on which various cryptocurrencies are based) are providing new, decentralized options for exchanging goods and services.
Without legislative and agency intervention, these technologies pose a critical threat to the reporting system underlying domestic and international tax compliance. Until now, legal …
Hacking The Internet Of Things: Vulnerabilities, Dangers, And Legal Responses, Sara Sun Beale, Peter Berris
Hacking The Internet Of Things: Vulnerabilities, Dangers, And Legal Responses, Sara Sun Beale, Peter Berris
Duke Law & Technology Review
The Internet of Things (IoT) is here and growing rapidly as consumers eagerly adopt internet-enabled devices for their utility, features, and convenience. But this dramatic expansion also exacerbates two underlying dangers in the IoT. First, hackers in the IoT may attempt to gain control of internet-enabled devices, causing negative consequences in the physical world. Given that objects with internet connectivity range from household appliances and automobiles to major infrastructure components, this danger is potentially severe. Indeed, in the last few years, hackers have gained control of cars, trains, and dams, and some experts think that even commercial airplanes could be …
Pirate Tales From The Deep [Web]: An Exploration Of Online Copyright Infringement In The Digital Age, Nicholas C. Butland, Justin J. Sullivan
Pirate Tales From The Deep [Web]: An Exploration Of Online Copyright Infringement In The Digital Age, Nicholas C. Butland, Justin J. Sullivan
University of Massachusetts Law Review
Technology has seen a boom over the last few decades, making innovative leaps that border on science fiction. With the most recent technological leap came a new frontier of intellectual property and birthed a new class of criminal: the cyber-pirate. This Article discusses cyber-piracy and its interactions and implications for modern United States copyright law. The Article explains how copyright law, unprepared for the boom, struggled to adapt as courts reconciled the widely physical perceptions of copyright with the digital information being transferred between billions of users instantaneously. The Article also explores how cyber-piracy has made, and continues to make, …