Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Computer Law

Algorithmic Management And Collective Bargaining, Valerio De Stefano, Simon Taes Dec 2022

Algorithmic Management And Collective Bargaining, Valerio De Stefano, Simon Taes

Articles & Book Chapters

This article addresses the challenges raised by the introduction of algorithmic management and artificial intelligence in the world of work, focusing on the risks that new managerial technologies present for fundamental rights and principles, such as non-discrimination, freedom of association and the right to privacy. The article argues that collective bargaining is the most suitable regulatory instrument for responding to these challenges, and that current EU legislative initiatives do not adequately recognise the role of collective bargaining in this area. It also maps current initiatives undertaken by national trade union movements in Europe to govern algorithmic management.


The Relational Robot: A Normative Lens For Ai Legal Neutrality — Commentary On Ryan Abbott, The Reasonable Robot, Carys Craig Jun 2022

The Relational Robot: A Normative Lens For Ai Legal Neutrality — Commentary On Ryan Abbott, The Reasonable Robot, Carys Craig

Articles & Book Chapters

Artificial Intelligence (AI), we are told, is poised to disrupt almost every facet of our lives and society. From industrial labor markets to daily commutes, and from policing tactics to personal assistants, AI brings with it the usual promise and perils of change. How that change will unfold, however, and whether it will ultimately bestow upon us more benefits than harms, remains to be determined. A significant factor in setting the course for AI’s inevitable integration into society will be the legal framework within which it is developed and operationalized. Who will AI displace? What will it replace? What improvements …


Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane S. Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence Apr 2022

Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane S. Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence

Articles & Book Chapters

This special issue of the Canadian Journal of Law and Technology focuses on the growing problem of technology-facilitated gender-based violence (TFGBV): an expansive, dynamic, and rapidly evolving phenomenon that Jane Bailey and Carissima Mathen have defined as “a spectrum of behaviours carried out at least in some part through digital communications technologies, including actions that cause physical or psychological harm.” The collection of articles in this issue offers multi-disciplinary insights on TFGBV by bringing together the work of emerging scholars in information and media studies, communications, and law. This approach reflects our firm belief that in order to be meaningful …


Understanding Chilling Effects, Jonathon W. Penney Apr 2022

Understanding Chilling Effects, Jonathon W. Penney

Articles & Book Chapters

With digital surveillance and censorship on the rise, the amount of data available unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence and facial recognition technology for surveillance and data analytics, concerns about “chilling effects,” that is, the capacity for these activities to “chill” or deter people from exercising their rights and freedoms, have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work points. This has left significant gaps in understanding. This Article has attempted to fill that void, synthesizing theoretical and empirical insights from law, privacy, …


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier Mar 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier

Articles & Book Chapters

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …