Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (7)
- Intellectual Property Law (5)
- Civil Procedure (2)
- Commercial Law (2)
- Evidence (2)
-
- First Amendment (2)
- Privacy Law (2)
- Science and Technology Law (2)
- Communications Law (1)
- Constitutional Law (1)
- Criminal Law (1)
- Criminal Procedure (1)
- Entertainment, Arts, and Sports Law (1)
- Fourth Amendment (1)
- International Law (1)
- Labor and Employment Law (1)
- Litigation (1)
- National Security Law (1)
- Organizations Law (1)
- Sexuality and the Law (1)
- Keyword
-
- Copyright (5)
- Internet (4)
- Computers (2)
- Copyright infringement (2)
- Evidence (2)
-
- Intellectual property (2)
- Internet service providers (2)
- Privacy (2)
- Social Media (2)
- Software (2)
- 8 U.S.C. § 1189 (1)
- AI (1)
- AI-Based Evidence (1)
- Artificial Intelligence (1)
- Avatars (1)
- Big Data (1)
- Big data (1)
- Biographic data (1)
- Biometric data (1)
- Border searches (1)
- Business record (1)
- Child pornography (1)
- Child sexual exploitation (1)
- Child welfare (1)
- Click-Wrap (1)
- Commercial Speech (1)
- Computer (1)
- Computer programs (1)
- Computer science (1)
- Computer sound processing (1)
Articles 1 - 16 of 16
Full-Text Articles in Computer Law
Machines Like Me: A Proposal On The Admissibility Of Artificially Intelligent Expert Testimony, Andrew W. Jurs, Scott Devito
Machines Like Me: A Proposal On The Admissibility Of Artificially Intelligent Expert Testimony, Andrew W. Jurs, Scott Devito
Pepperdine Law Review
With the rapidly expanding sophistication of artificial intelligence systems, their reliability, and cost-effectiveness for solving problems, the current trend of admitting testimony based on artificially intelligent (AI) systems is only likely to grow. In that context, it is imperative for us to ask what rules of evidence judges today should use relating to such evidence. To answer that question, we provide an in-depth review of expert systems, machine learning systems, and neural networks. Based on that analysis, we contend that evidence from only certain types of AI systems meet the requirements for admissibility, while other systems do not. The break …
Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath
Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath
Pepperdine Law Review
The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton
Pepperdine Law Review
Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu
Pepperdine Law Review
This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …
Concerted Activity And Social Media: Why Facebook Is Nothing Like The Proverbial Water Cooler, Natalie J. Ferrall
Concerted Activity And Social Media: Why Facebook Is Nothing Like The Proverbial Water Cooler, Natalie J. Ferrall
Pepperdine Law Review
Social media is an increasingly powerful platform for expression. In late 2009, the National Labor Relations Board began to address the extent to which unionized employees could make disparaging comments about their employers on social media websites. To date, the Board has persisted in treating Internet communications the same as traditional, face-to-face interactions between employees. Additionally, the Board continues to apply dated precedent to current social media cases. This Comment argues that the Board's present approach is inadequate to address the distinct qualities of social media and sets forth recommendations for alternate ways to evaluate employee speech.
Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose
Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose
Pepperdine Law Review
The following article examines the protection offered to computers and computer programs, under the various applicable patent, copyright and trade secret laws. Concerning patent protection; the author discusses the history and current status of the patent laws, and analyzes in detail the landmark case of Diamond v. Diehr. Discussed also is an analysis of copyright protection for computer programs, offered by the 1980 amendments to section 117 of the 1976 Copyright Act; which paved the way for the increased protection.
The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long
The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long
Pepperdine Law Review
In recent years, the legal profession has run head on into the increasing use of computers and computerized information. Discovery and evidentiary rules developed to deal with written documentation may not be flexible enough to adequately cover this relatively new method of storing information. This comment examines various methods by which courts have attempted to deal with discovery and evidentiary problems involving computerized information, and suggests certain areas that should be explored in supporting or attacking the credibility of such information.
Beware Of The Highwayman On The Information Superhighway: A Balanced Proposal To Protect Copyrights Within The National Information Infrastructure, Chandra Gehri Spencer
Beware Of The Highwayman On The Information Superhighway: A Balanced Proposal To Protect Copyrights Within The National Information Infrastructure, Chandra Gehri Spencer
Pepperdine Law Review
No abstract provided.
Wet Footprints? Digital Watermarks: A Trail To The Copyright Infringer On The Internet, Rosemarie F. Jones
Wet Footprints? Digital Watermarks: A Trail To The Copyright Infringer On The Internet, Rosemarie F. Jones
Pepperdine Law Review
No abstract provided.
Commercial Access Contracts And The Internet: Does The Uniform Computer Information Transactions Act Clear The Air With Regard To Liabilities When An On-Line Access System Fails?, Morgan Stewart
Pepperdine Law Review
No abstract provided.
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel
Pepperdine Law Review
No abstract provided.
Double-Clicking On Fourth Amendment Protection: Encryption Creates A Reasonable Expectation Of Privacy, Sean J. Edgett
Double-Clicking On Fourth Amendment Protection: Encryption Creates A Reasonable Expectation Of Privacy, Sean J. Edgett
Pepperdine Law Review
No abstract provided.
Is Spam The Rock Of Sisyphus?: Whether The Can-Spam Act And Its Global Counterparts Will Delete Your E-Mail, Amy G. Marino
Is Spam The Rock Of Sisyphus?: Whether The Can-Spam Act And Its Global Counterparts Will Delete Your E-Mail, Amy G. Marino
Pepperdine Law Review
No abstract provided.
The Riaa V. The People: The Recording Industry's Misguided Attempt To Use The Legal System To Save Their Business Model, John A. Fedock
The Riaa V. The People: The Recording Industry's Misguided Attempt To Use The Legal System To Save Their Business Model, John A. Fedock
Pepperdine Law Review
No abstract provided.
Protecting Children From Online Exploitation And Abuse: An Overview Of Project Safe Childhood, Debra Wong Yang, Patricia A. Donahue
Protecting Children From Online Exploitation And Abuse: An Overview Of Project Safe Childhood, Debra Wong Yang, Patricia A. Donahue
Pepperdine Law Review
No abstract provided.
International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon
International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon
Pepperdine Law Review
No abstract provided.