Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (38)
- University of Colorado Law School (24)
- Boston University School of Law (20)
- Schulich School of Law, Dalhousie University (11)
- University of Michigan Law School (10)
-
- University of Pittsburgh School of Law (10)
- American University Washington College of Law (7)
- Texas A&M University School of Law (7)
- Washington and Lee University School of Law (6)
- Chicago-Kent College of Law (5)
- Columbia Law School (5)
- UIC School of Law (5)
- City University of New York (CUNY) (4)
- Pace University (4)
- California Western School of Law (3)
- University of Washington School of Law (3)
- Maurer School of Law: Indiana University (2)
- Osgoode Hall Law School of York University (2)
- Roger Williams University (2)
- The Catholic University of America, Columbus School of Law (2)
- University of Baltimore Law (2)
- University of Missouri-Kansas City School of Law (2)
- William & Mary Law School (2)
- Cornell University Law School (1)
- Duke Law (1)
- Florida International University College of Law (1)
- Fordham Law School (1)
- Golden Gate University School of Law (1)
- Mercer University School of Law (1)
- Penn State Dickinson Law (1)
- Keyword
-
- Privacy (28)
- Technology (24)
- AI (19)
- Artificial intelligence (17)
- Internet (16)
-
- Algorithms (15)
- Surveillance (15)
- Computer Law (12)
- Copyright (10)
- Software (10)
- Black box (9)
- Data (9)
- Law and Technology (9)
- Legal research (9)
- Machine learning (9)
- Regulation (9)
- Intellectual Property Law (8)
- Law (8)
- Bitcoin (7)
- Blockchain (7)
- Communications Law (7)
- Cybersecurity (7)
- Empirical (7)
- Human/computer interaction (7)
- Science and Technology (7)
- Security (7)
- Artificial Intelligence (6)
- Automation (6)
- Computers (6)
- Innovation (6)
- Publication Year
- Publication
-
- All Faculty Scholarship (45)
- Faculty Scholarship (35)
- Publications (22)
- Articles (19)
- Articles, Book Chapters, & Popular Press (9)
-
- Scholarly Articles (8)
- Articles in Law Reviews & Other Academic Journals (6)
- Book Chapters (5)
- UIC Law Open Access Faculty Scholarship (5)
- Elisabeth Haub School of Law Faculty Publications (4)
- Faculty Publications (3)
- Articles & Book Chapters (2)
- Articles by Maurer Faculty (2)
- Faculty Works (2)
- Publications and Research (2)
- Reports & Public Policy Documents (2)
- Research Data (2)
- Articles, Chapters in Books and Other Contributions to Scholarly Works (1)
- Continuing Legal Education (CLE) Lecture Series (1)
- Cornell Law Faculty Working Papers (1)
- Events (1)
- Faculty Scholarly Works (1)
- GGU Law Review Blog (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Judicature International (1)
- Law Faculty Scholarship (1)
- Law Librarian Scholarship (1)
- Law School Blogs (1)
- Libraries Faculty and Staff Scholarship and Research (1)
- Library Philosophy and Practice (e-journal) (1)
Articles 1 - 30 of 191
Full-Text Articles in Computer Law
Ks Pop Celebrating Three Years Of Tech-Driven Justice For All, Ayyoub Ajmi
Ks Pop Celebrating Three Years Of Tech-Driven Justice For All, Ayyoub Ajmi
Faculty Works
This article explores the development and impact of the Kansas Protection Order Portal (KS POP), highlighting the vital role of law librarians in the portal's design and implementation. The article showcases how KS POP has streamlined the legal process for domestic violence, sexual assault, and human trafficking victims in Kansas, marking a significant advancement in accessible legal support and serving as a model for future innovations in the justice system.
Risky Speech Systems: Tort Liability For Ai-Generated Illegal Speech, Margot E. Kaminski
Risky Speech Systems: Tort Liability For Ai-Generated Illegal Speech, Margot E. Kaminski
Publications
No abstract provided.
Orthogonalizing Inputs, Talia B. Gillis
Orthogonalizing Inputs, Talia B. Gillis
Faculty Scholarship
This paper examines an approach to algorithmic discrimination that seeks to blind predictions to protected characteristics by orthogonalizing inputs. The approach uses protected characteristics (such as race or sex) during the training phase of a model but masks these during deployment. The approach posits that including these characteristics in training prevents correlated features from acting as proxies, while assigning uniform values to them at deployment ensures decisions do not vary by group status.
Using a prediction exercise of loan defaults basedon mortgage HMDA data and German credit data, the paper highlights the limitations of this orthogonalization strategy. Applying a lasso …
After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge
After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge
Faculty Scholarship
Bitcoin and the other cryptocurrencies spawned by the innovation of blockchain programming have exploded in prominence, both in gains of massive market value and in dramatic market losses, the latter most notably seen in connection with the failure of the FTX cryptocurrency exchange in November 2022. After years of investment and speculation, however, something crucial has faded: the original use case for Bitcoin as a system of payment. Can cryptocurrency-as-a-payment-system be saved, or are day traders and speculators the actual cryptocurrency future? This article suggests that cryptocurrency has been hobbled by a lack of foundational commercial and consumer-protection law that …
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Articles by Maurer Faculty
The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …
Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim
Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim
Articles
FTX’s recent collapse highlights the overall instability that blockchain assets and digital financial markets face. While the use of blockchain technology and crypto assets is widely prevalent, the associated market is still largely unregulated, and the future of digital asset regulation is also unclear. The lack of clarity and regulation has led to public distrust and has called for more dedicated regulation of digital assets. Among those regulatory efforts, tax policy plays an important role. This Essay introduces comprehensive regulatory frameworks for blockchain-based assets that have been introduced globally and domestically, and it shows that tax reporting is the key …
The Role Of Ethical Principles In Ai Startups, James Bessen, Stephen Michael Impink, Robert Seamans
The Role Of Ethical Principles In Ai Startups, James Bessen, Stephen Michael Impink, Robert Seamans
Faculty Scholarship
Do high-tech startups benefit from developing more ethical AI? AI startups implement policies and take actions to manage ethical issues associated with data collection, storage, and usage and adapt to the norms of their industry. This paper describes these startups' ethics-related actions, including ethical AI policy adoption, and examines how these actions relate to startup performance. We find that merely adopting an ethical AI policy (i.e., a less costly signal) does not relate to increased performance. However, there is evidence that investors reward startups that take more costly preventative pro-ethics actions, like seeking expert guidance, training employees about unconscious bias, …
Making Virtual Things, Joshua A.T. Fairfield
Making Virtual Things, Joshua A.T. Fairfield
Scholarly Articles
People value virtual things—such as NFTs—because such assets trigger and satisfy deep-seated narratives of property and ownership. The cause of the recent series of failures to regulate virtual assets, and the resulting crashes, has been a failure to take seriously the ways people perceive and use the assets. Current legal frameworks fail to support buyers’ and users’ expectations of ownership in virtual things they purchase.
Making virtual things is a matter of social construction of value. Virtual things, like real-world things, have value because a community values them for a purpose. It therefore makes no sense to discount how and …
The Failure Of Market Efficiency, William Magnuson
The Failure Of Market Efficiency, William Magnuson
Faculty Scholarship
Recent years have witnessed the near total triumph of market efficiency as a regulatory goal. Policymakers regularly proclaim their devotion to ensuring efficient capital markets. Courts use market efficiency as a guiding light for crafting legal doctrine. And scholars have explored in great depth the mechanisms of market efficiency and the role of law in promoting it. There is strong evidence that, at least on some metrics, our capital markets are indeed more efficient than they have ever been. But the pursuit of efficiency has come at a cost. By focusing our attention narrowly on economic efficiency concerns—such as competition, …
How The Blockchain Undermined Digital Ownership, Aaron Perzanowski
How The Blockchain Undermined Digital Ownership, Aaron Perzanowski
Articles
The shift from a market built around the sale of tangible goods to one premised on the licensing of digital content and services has done significant and lasting damage to the notion of individual ownership. The emergence of blockchain technology, while certainly not necessary to reverse these trends, promised an opportunity to attract investment and demonstrate consumer demand for marketplaces that recognize meaningful digital ownership. Simultaneously, it offered an avenue for alleviating worries about hypothetical widespread reproduction and unchecked distribution of copyrighted works. Instead, many of the most visible blockchain projects in recent years—the proliferation of new cryptocurrencies and the …
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Book Chapters
Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …
Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars
Bridging The Computer Science – Law Divide, Azer Bestavros, Stacey Dogan, Paul Ohm, Andrew Sellars
Faculty Scholarship
Many pressing societal questions can be answered only by bringing experts from different disciplines together. Questions around misinformation and disinformation, platform power, surveillance capitalism, information privacy, and algorithmic bias, among many others, reside at the intersection of computer science and law. We need to develop institutions that bring together computer scientists and legal scholars to work together on issues like these, and to train new innovators, thought leaders, counselors, and policymakers with hybrid training in both disciplines. In Universities, the disciplines of Computer Science (CS) and Law are separated by many wide chasms. Differences in standards, language, methods, and culture …
Using Artificial Intelligence In The Law Review Submissions Process, Brenda M. Simon
Using Artificial Intelligence In The Law Review Submissions Process, Brenda M. Simon
Faculty Scholarship
The use of artificial intelligence to help editors examine law review submissions may provide a way to improve an overburdened system. This Article is the first to explore the promise and pitfalls of using artificial intelligence in the law review submissions process. Technology-assisted review of submissions offers many possible benefits. It can simplify preemption checks, prevent plagiarism, detect failure to comply with formatting requirements, and identify missing citations. These efficiencies may allow editors to address serious flaws in the current selection process, including the use of heuristics that may result in discriminatory outcomes and dependence on lower-ranked journals to conduct …
Algorithmic Governance From The Bottom Up, Hannah Bloch-Wehba
Algorithmic Governance From The Bottom Up, Hannah Bloch-Wehba
Faculty Scholarship
Artificial intelligence and machine learning are both a blessing and a curse for governance. In theory, algorithmic governance makes government more efficient, more accurate, and more fair. But the emergence of automation in governance also rests on public-private collaborations that expand both public and private power, aggravate transparency and accountability gaps, and create significant obstacles for those seeking algorithmic justice. In response, a nascent body of law proposes technocratic policy changes to foster algorithmic accountability, ethics, and transparency.
This Article examines an alternative vision of algorithmic governance, one advanced primarily by social and labor movements instead of technocrats and firms. …
Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer
Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer
Elisabeth Haub School of Law Faculty Publications
This article finds fault with the judiciaries' failure to create a set of common law norms for social media wrongs. In cases concerning social media harms, the Supreme Court and lower courts have consistently adhered to traditional pre-social media principles, failing to use the power of the common law to create a kind of Internet Justice.
Part I of this article reviews social media history and explores how judicial decisions created a fertile bed for social media harm to blossom. Part II illustrates social media harms across several doctrinal disciplines and highlights judicial reluctance to embrace the realities of social …
Content Moderation As Surveillance, Hannah Bloch-Wehba
Content Moderation As Surveillance, Hannah Bloch-Wehba
Faculty Scholarship
Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …
Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt
Artificial Justice: The Quandary Of Ai In The Courtroom, Paul W. Grimm, Maura R. Grossman, Sabine Gless, Mireille Hildebrandt
Judicature International
No abstract provided.
Data Vu: Why Breaches Involve The Same Stories Again And Again, Woodrow Hartzog, Daniel Solove
Data Vu: Why Breaches Involve The Same Stories Again And Again, Woodrow Hartzog, Daniel Solove
Shorter Faculty Works
In the classic comedy Groundhog Day, protagonist Phil, played by Bill Murray, asks “What would you do if you were stuck in one place and every day was exactly the same, and nothing that you did mattered?” In this movie, Phil is stuck reliving the same day over and over, where the events repeat in a continual loop, and nothing he does can stop them. Phil’s predicament sounds a lot like our cruel cycle with data breaches.
Every year, organizations suffer more data spills and attacks, with personal information being exposed and abused at alarming rates. While Phil …
Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg
Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg
Articles
The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier
Articles & Book Chapters
End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …
Nft: The Next Big Thing?, Golden Gate University School Of Law
Nft: The Next Big Thing?, Golden Gate University School Of Law
GGU Law Review Blog
In 2021, Non-Fungible Tokens (“NFTs”) have taken the world of digital art to new heights. Artists are beginning to “tokenize” their art and sell them in NFT marketplaces for highly lucrative prices where bids can be made only with cryptocurrency. The “hype” surrounding NFTs grows by the day, thousands of new NFTs are being “minted” everyday. Even celebrities are getting involved in this digital movement. It seems however, that we have seen only the infancy of the blockchain based technology and that it may soon venture off beyond the world of digital art. For those in the legal profession, it …
Bilski And The Information Age A Decade Later, Michael J. Meurer
Bilski And The Information Age A Decade Later, Michael J. Meurer
Faculty Scholarship
In the years from State Street in 1999 to Alice in 2014, legal scholars vigorously debated whether patents should be used to incentivize the invention of business methods. That attention has waned just as economists have produced important new research on the topic, and just as artificial intelligence and cloud computing are changing the nature of business method innovation. This chapter rejoins the debate and concludes that the case for patent protection of business methods is weaker now than it was a decade ago.
Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai
Governing The Interface Between Natural And Formal Language In Smart Contracts, Joshua A.T. Fairfield, Niloufer Selvadurai
Scholarly Articles
Much of the confusion about the proper regulation of smart contracts stems from the fact that both code and law are expressed in language. Natural (human) and formal (computer) languages are profoundly different, however. Natural language in the form of a true legal contract expresses human meaning and expectation. Code simply acts, and when code acts contrary to the understanding of the parties to a contract, courts must have a theoretical and legal basis in order to intervene--which this Article provides.
Present scholarship on the governance of smart contracts centers on logistical problems relating to the effects of automation on …
Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield
Tokenized: The Law Of Non-Fungible Tokens And Unique Digital Property, Joshua A.T. Fairfield
Scholarly Articles
Markets for unique digital property--digital equivalents of rare artworks, collectible trading cards, and other assets that gain value from scarcity--have exploded in the past few years. At root is the next iteration of blockchain technology, unique digital assets called non-fungible tokens. Unlike bitcoin, where one coin is the same as another, NFTs are unique, each with different attributes. An NFT that represented ownership of Boardwalk would be quite different from one that represented Baltic Avenue.
NFTs have grown from a few early breakout successes to a rapidly developing market for unique digital treasures. The attraction to buyers is that, unlike …
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon Penney, Bruce Schneier
Articles, Book Chapters, & Popular Press
End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …
Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim
Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim
Reports & Public Policy Documents
The Women’s Legal Education and Action Fund (LEAF) commends the Nova Scotia government for reviewing its Intimate Images and Cyber-protection Act (the Act) and seeking public input for this review. Nova Scotia has been, and continues to be, a leader in Canada for its role in advancing innovative laws and supports for people targeted by technology-facilitated violence (TFV), digital abuse, and the non-consensual distribution of intimate images (NCDII). As these forms of harmful behaviour evolve and become better understood, it is important to revisit this legislation to assess whether it is providing meaningful and accessible responses to such serious social …
Modeling Through, Ryan Calo
Modeling Through, Ryan Calo
Articles
Theorists of justice have long imagined a decision-maker capable of acting wisely in every circumstance. Policymakers seldom live up to this ideal. They face well-understood limits, including an inability to anticipate the societal impacts of state intervention along a range of dimensions and values. Policymakers cannot see around corners or address societal problems at their roots. When it comes to regulation and policy-setting, policymakers are often forced, in the memorable words of political economist Charles Lindblom, to “muddle through” as best they can.
Powerful new affordances, from supercomputing to artificial intelligence, have arisen in the decades since Lindblom’s 1959 article …
Blockchain Networks As Knowledge Commons, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Martin B. H. Weiss, Michael J. Madison
Blockchain Networks As Knowledge Commons, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Martin B. H. Weiss, Michael J. Madison
Articles
Researchers interested in blockchains are increasingly attuned to questions of governance, including how blockchains relate to government, the ways blockchains are governed, and ways blockchains can improve prospects for successful self-governance. Our paper joins this research by exploring the implications of the Governing Knowledge Commons (GKC) framework to analyze governance of blockchains. Our novel contributions are making the case that blockchain networks represent knowledge commons governance, in the sense that they rely on collectively-managed technologies to pool and manage distributed information, illustrating the usefulness and novelty of the GCK methodology with an empirical case study of the evolution of Bitcoin, …
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Faculty Scholarship
Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.
In this short Essay, we propose a model for legislating data loyalty. Our …
The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen
The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen
Articles
In response to widespread skepticism about the recent rise of “tech ethics”, many critics have called for legal reform instead. In contrast with the “ethics response”, critics consider the “lawfulness response” more capable of disciplining the excesses of the technology industry. In fact, both are simultaneously vulnerable to industry capture and capable of advancing a more democratic egalitarian agenda for the information economy. Both ethics and law offer a terrain of contestation, rather than a predetermined set of commitments by which to achieve more democratic and egalitarian technological production. In advancing this argument, the essay focuses on two misunderstandings common …