Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Computer Law

Machines Like Me: A Proposal On The Admissibility Of Artificially Intelligent Expert Testimony, Andrew W. Jurs, Scott Devito Apr 2024

Machines Like Me: A Proposal On The Admissibility Of Artificially Intelligent Expert Testimony, Andrew W. Jurs, Scott Devito

Pepperdine Law Review

With the rapidly expanding sophistication of artificial intelligence systems, their reliability, and cost-effectiveness for solving problems, the current trend of admitting testimony based on artificially intelligent (AI) systems is only likely to grow. In that context, it is imperative for us to ask what rules of evidence judges today should use relating to such evidence. To answer that question, we provide an in-depth review of expert systems, machine learning systems, and neural networks. Based on that analysis, we contend that evidence from only certain types of AI systems meet the requirements for admissibility, while other systems do not. The break …


Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath Jan 2023

Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath

Pepperdine Law Review

The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …


The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton Jul 2020

The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton

Pepperdine Law Review

Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Jul 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Concerted Activity And Social Media: Why Facebook Is Nothing Like The Proverbial Water Cooler, Natalie J. Ferrall May 2013

Concerted Activity And Social Media: Why Facebook Is Nothing Like The Proverbial Water Cooler, Natalie J. Ferrall

Pepperdine Law Review

Social media is an increasingly powerful platform for expression. In late 2009, the National Labor Relations Board began to address the extent to which unionized employees could make disparaging comments about their employers on social media websites. To date, the Board has persisted in treating Internet communications the same as traditional, face-to-face interactions between employees. Additionally, the Board continues to apply dated precedent to current social media cases. This Comment argues that the Board's present approach is inadequate to address the distinct qualities of social media and sets forth recommendations for alternate ways to evaluate employee speech.


Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose Feb 2013

Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose

Pepperdine Law Review

The following article examines the protection offered to computers and computer programs, under the various applicable patent, copyright and trade secret laws. Concerning patent protection; the author discusses the history and current status of the patent laws, and analyzes in detail the landmark case of Diamond v. Diehr. Discussed also is an analysis of copyright protection for computer programs, offered by the 1980 amendments to section 117 of the 1976 Copyright Act; which paved the way for the increased protection.


The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long Jan 2013

The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long

Pepperdine Law Review

In recent years, the legal profession has run head on into the increasing use of computers and computerized information. Discovery and evidentiary rules developed to deal with written documentation may not be flexible enough to adequately cover this relatively new method of storing information. This comment examines various methods by which courts have attempted to deal with discovery and evidentiary problems involving computerized information, and suggests certain areas that should be explored in supporting or attacking the credibility of such information.


Beware Of The Highwayman On The Information Superhighway: A Balanced Proposal To Protect Copyrights Within The National Information Infrastructure, Chandra Gehri Spencer Oct 2012

Beware Of The Highwayman On The Information Superhighway: A Balanced Proposal To Protect Copyrights Within The National Information Infrastructure, Chandra Gehri Spencer

Pepperdine Law Review

No abstract provided.


Wet Footprints? Digital Watermarks: A Trail To The Copyright Infringer On The Internet, Rosemarie F. Jones Oct 2012

Wet Footprints? Digital Watermarks: A Trail To The Copyright Infringer On The Internet, Rosemarie F. Jones

Pepperdine Law Review

No abstract provided.


Commercial Access Contracts And The Internet: Does The Uniform Computer Information Transactions Act Clear The Air With Regard To Liabilities When An On-Line Access System Fails?, Morgan Stewart Oct 2012

Commercial Access Contracts And The Internet: Does The Uniform Computer Information Transactions Act Clear The Air With Regard To Liabilities When An On-Line Access System Fails?, Morgan Stewart

Pepperdine Law Review

No abstract provided.


Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel Oct 2012

Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel

Pepperdine Law Review

No abstract provided.


Double-Clicking On Fourth Amendment Protection: Encryption Creates A Reasonable Expectation Of Privacy, Sean J. Edgett Apr 2012

Double-Clicking On Fourth Amendment Protection: Encryption Creates A Reasonable Expectation Of Privacy, Sean J. Edgett

Pepperdine Law Review

No abstract provided.


Is Spam The Rock Of Sisyphus?: Whether The Can-Spam Act And Its Global Counterparts Will Delete Your E-Mail, Amy G. Marino Mar 2012

Is Spam The Rock Of Sisyphus?: Whether The Can-Spam Act And Its Global Counterparts Will Delete Your E-Mail, Amy G. Marino

Pepperdine Law Review

No abstract provided.


The Riaa V. The People: The Recording Industry's Misguided Attempt To Use The Legal System To Save Their Business Model, John A. Fedock Mar 2012

The Riaa V. The People: The Recording Industry's Misguided Attempt To Use The Legal System To Save Their Business Model, John A. Fedock

Pepperdine Law Review

No abstract provided.


Protecting Children From Online Exploitation And Abuse: An Overview Of Project Safe Childhood, Debra Wong Yang, Patricia A. Donahue Mar 2012

Protecting Children From Online Exploitation And Abuse: An Overview Of Project Safe Childhood, Debra Wong Yang, Patricia A. Donahue

Pepperdine Law Review

No abstract provided.


International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon Feb 2012

International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon

Pepperdine Law Review

No abstract provided.