Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Science and Technology Law (45)
- Internet Law (44)
- Physical Sciences and Mathematics (34)
- Computer Sciences (33)
- Information Security (33)
-
- Privacy Law (21)
- Intellectual Property Law (17)
- Banking and Finance Law (11)
- First Amendment (11)
- Consumer Protection Law (10)
- Other Law (9)
- Administrative Law (7)
- Communications Law (6)
- Constitutional Law (6)
- Legislation (6)
- Law and Society (5)
- Commercial Law (4)
- Criminal Law (4)
- Civil Rights and Discrimination (3)
- Criminal Procedure (3)
- International Law (3)
- Law Enforcement and Corrections (3)
- Social and Behavioral Sciences (3)
- Taxation-Federal (3)
- Torts (3)
- Accounting Law (2)
- Business (2)
- Comparative and Foreign Law (2)
- Institution
-
- Embry-Riddle Aeronautical University (33)
- Seattle University School of Law (9)
- University of Minnesota Law School (8)
- Chicago-Kent College of Law (7)
- Vanderbilt University Law School (7)
-
- Schulich School of Law, Dalhousie University (6)
- Duke Law (5)
- Southern Methodist University (4)
- University of Washington School of Law (4)
- Georgia State University College of Law (3)
- UIC School of Law (3)
- Brooklyn Law School (2)
- Cornell University Law School (2)
- Nova Southeastern University (2)
- SJ Quinney College of Law, University of Utah (2)
- University of Georgia School of Law (2)
- University of Michigan Law School (2)
- West Virginia University (2)
- American University Washington College of Law (1)
- Loyola Marymount University and Loyola Law School (1)
- Marquette University Law School (1)
- New York Law School (1)
- Northwestern Pritzker School of Law (1)
- Notre Dame Law School (1)
- Universitas Indonesia (1)
- University of Cincinnati College of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Massachusetts School of Law (1)
- University of Miami Law School (1)
- University of Oklahoma College of Law (1)
- Keyword
-
- Banking and Finance (7)
- Data Aggregation (7)
- FinTech (7)
- Intellegence (7)
- Automation (6)
-
- Privacy (5)
- Artificial (4)
- Blockchain (4)
- Internet (4)
- Singularity (4)
- Ai (3)
- Artifical (3)
- Bitcoin (3)
- Control (3)
- Cybersecurity (3)
- Discussion (3)
- Symposium (3)
- AI (2)
- Algorithms (2)
- Big Data (2)
- Bots (2)
- DNA (2)
- DNA Mixture (2)
- Data (2)
- Data privacy (2)
- Digital forensics (2)
- Digital privacy (2)
- Human (2)
- Law Review (2)
- Law enforcement (2)
- Publication
-
- Journal of Digital Forensics, Security and Law (33)
- Seattle University Law Review (9)
- Minnesota Journal of Law, Science & Technology (8)
- Chicago-Kent Law Review (7)
- Canadian Journal of Law and Technology (6)
-
- Vanderbilt Journal of Entertainment & Technology Law (6)
- Duke Law & Technology Review (5)
- Georgia State University Law Review (3)
- SMU Science and Technology Law Review (3)
- UIC John Marshall Journal of Information Technology & Privacy Law (3)
- Brooklyn Journal of Corporate, Financial & Commercial Law (2)
- Nova Law Review (2)
- Utah Law Review (2)
- Washington Journal of Law, Technology & Arts (2)
- Washington Law Review (2)
- West Virginia Law Review (2)
- American University Law Review (1)
- Cornell International Law Journal (1)
- Cornell Law Review (1)
- Georgia Journal of International & Comparative Law (1)
- Georgia Law Review (1)
- Journal of Legislation (1)
- Jurnal Hukum & Pembangunan (1)
- Loyola of Los Angeles Law Review (1)
- Marquette Law Review (1)
- Maryland Law Review (1)
- Michigan Telecommunications & Technology Law Review (1)
- NYLS Law Review (1)
- Northwestern Journal of International Law & Business (1)
- Oklahoma Law Review (1)
Articles 31 - 60 of 117
Full-Text Articles in Computer Law
Artificial Intellegence And Policing: First Questions, Elizabeth E. Joh
Artificial Intellegence And Policing: First Questions, Elizabeth E. Joh
Seattle University Law Review
Artificial intelligence is playing an increasingly larger role in all sectors of society, including policing. Many police departments are already using artificial intelligence (AI) to help predict and identify suspicious persons and places.1 Increased computational power and oceans of data have given rise to inferences about violence and threats.2 AI will change policing just as it will healthcare, insurance, commerce, and transportation. But what questions should we ask about AI and policing?
Ethical Machines?, Ariela Tubert
Ethical Machines?, Ariela Tubert
Seattle University Law Review
This Article explores the possibility of having ethical artificial intelligence. It argues that we face a dilemma in trying to develop artificial intelligence that is ethical: either we have to be able to codify ethics as a set of rules or we have to value a machine’s ability to make ethical mistakes so that it can learn ethics like children do. Neither path seems very promising, though perhaps by thinking about the difficulties with each we may come to a better understanding of artificial intelligence and ourselves.
Introduction, Annette Clark
Introduction, Annette Clark
Seattle University Law Review
Introductory remarks given by Dean Annette Clark at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law.”
Keynote Address, Ryan Calo
Keynote Address, Ryan Calo
Seattle University Law Review
Transcript of the keynote address at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law.” The keynote address is presented by Ryan Calo and discusses the current status of artificial intelligence learning, and how this current status is moving toward robotic singularity.
Robotic Speakers And Human Listeners, Helen Norton
Robotic Speakers And Human Listeners, Helen Norton
Seattle University Law Review
This article discusses protected First Amendment speech and how this protection should be applied to robotic speech. Robotic speech is that created by automated means, currently “bots” but the producers of automated speech are evolving. The article further differentiates between rights of the producers of this speech and listeners or consumers of the speech, and the impact of First Amendment protections on each group.
Panel 2: Accountability For The Actions Of Robots, Ryan Calo, Howard Jay Chizeck, Elizabeth Joh, Blake Hannaford
Panel 2: Accountability For The Actions Of Robots, Ryan Calo, Howard Jay Chizeck, Elizabeth Joh, Blake Hannaford
Seattle University Law Review
Transcript of the panel discussion at the 2018 Seattle University School of Law symposium “Singularity: AI and the Law” discussing human control and Artificial Intellegence learning. The panel participants are Ryan Calo, Howard Jay Chizeck, Elizabeth Joh, and Blake Hannaford.
Virtual Ethics And The Creeper Act, Justin Tiehen
Virtual Ethics And The Creeper Act, Justin Tiehen
Seattle University Law Review
A legal and moral discussion of the development of child sex bots (CSB), childlike sex dolls, comparing society-at-large’s general squeamishness of the area, and attempts to regulate (for example, the CREEPER Act) with the prophylactic therapeutic benefits of these robots.
Nova Law Review Full Issue Volume 42, Issue 3
Control On Blockchain Network, Aleksei Gudkov
Revisiting Belligerent Reprisals In The Age Of Cyber?
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Publication Information
Journal of Digital Forensics, Security and Law
No abstract provided.
Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels
Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels
SMU Data Science Review
In this paper, we present an analysis of features influencing Yelp's proprietary review filtering algorithm. Classifying or misclassifying reviews as recommended or non-recommended affects average ratings, consumer decisions, and ultimately, business revenue. Our analysis involves systematically sampling and scraping Yelp restaurant reviews. Features are extracted from review metadata and engineered from metrics and scores generated using text classifiers and sentiment analysis. The coefficients of a multivariate logistic regression model were interpreted as quantifications of the relative importance of features in classifying reviews as recommended or non-recommended. The model classified review recommendations with an accuracy of 78%. We found that reviews …
Deploying The Secret Police: The Use Of Algorithms In The Criminal Justice System, Jessica Gabel Cino
Deploying The Secret Police: The Use Of Algorithms In The Criminal Justice System, Jessica Gabel Cino
Georgia State University Law Review
Algorithms saturate our lives today; from curated song lists to recommending “friends” and news feeds, they factor into some of the most human aspects of decision-making, tapping into preferences based on an ever-growing amount of data. Regardless of whether the algorithm pertains to routing you around traffic jams or finding your next dinner, there is little regulation and even less transparency regarding just how these algorithms work. Paralleling this societal adoption, the criminal justice system now employs algorithms in some of the most important aspects of investigation and decision-making.
The lack of oversight is abundantly apparent in the criminal justice …
The First Amendment Case For Public Access To Secret Algorithms Used In Criminal Trials, Vera Eidelman
The First Amendment Case For Public Access To Secret Algorithms Used In Criminal Trials, Vera Eidelman
Georgia State University Law Review
As this Article sets forth, once a computerized algorithm is used by the government, constitutional rights may attach. And, at the very least, those rights require that algorithms used by the government as evidence in criminal trials be made available—both to litigants and the public. Scholars have discussed how the government’s refusal to disclose such algorithms runs afoul of defendants’ constitutional rights, but few have considered the public’s interest in these algorithms—or the widespread impact that public disclosure and auditing could have on ensuring their quality.
This Article aims to add to that discussion by setting forth a theory of …
Prioritizing Privacy In The Courts And Beyond, Babette Boliek
Prioritizing Privacy In The Courts And Beyond, Babette Boliek
Cornell Law Review
Big data has affected American life and business in a variety of ways—inspiring both technological development and industrial change. The legal protections for a person’s right to his or her own personal information, however, have not matched the growth in the collection and aggregation of data. These legal shortcomings are exacerbated when third party privacy interests are at stake in litigation. Judicial orders to compel sensitive data are expressly permitted even under the few privacy statutes that may limit data transfers. Historically, the Federal Rules of Civil Procedure favor generous disclosure of information. But as litigation becomes more technical and …
Privacy Regulation In The Age Of Biometrics That Deal With A New World Order Of Information, Michael Monajemi
Privacy Regulation In The Age Of Biometrics That Deal With A New World Order Of Information, Michael Monajemi
University of Miami International and Comparative Law Review
No abstract provided.
Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton
Curtailing Online Service Provider Immunity From Liability: An Advocacy For The Entension Of Roommates.Com, Corey Patton
Seattle University Law Review
Section 230 of the Communications Decency Act (CDA) was enacted following the controversial decision in Stratton Oakmont, Inc. v. Prodigy Servs. Co., where an interactive computer service provider was held liable for a libelous message posted by a user on one of its financial message boards. The court determined that the service provider was a “publisher” of the libelous message for the purposes of state law because it had engaged in screening and moderating of other objectionable posts on its message boards but failed to remove the libelous message in question. Because the service provider voluntarily self-policed some of the …
Emerging Technologies Challenging Current Legal Paradigms, W. Keith Robinson
Emerging Technologies Challenging Current Legal Paradigms, W. Keith Robinson
Minnesota Journal of Law, Science & Technology
No abstract provided.
Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman
Remnants Of Net Neutrality: Policing Unlawful Content Through Broadband Providers, Aaron Lerman
Brooklyn Journal of Corporate, Financial & Commercial Law
The 2015 Open Internet Order, released by The Federal Communication Commission (FCC), introduced sweeping, new rules that promised to preserve an equal and open Internet to consumers. These rules, otherwise known as “Net Neutrality,” prohibited broadband and internet service providers from impairing, blocking, or throttling access to “lawful content” online. But with a new administration and agenda, the FCC’s 2017 Restoring Internet Freedom Order repealed Net Neutrality. Since then, various states have pushed back against the repeal, with some adopting their own versions of the 2015 Open Internet Order’s Net Neutrality, keeping most of the rule language intact, including the …
The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung
The Race Is On! Regulating Self-Driving Vehicles Before They Hit The Streets, Jack Liechtung
Brooklyn Journal of Corporate, Financial & Commercial Law
As the world braces itself for the unveiling of autonomous vehicles, the idea of regulation and oversight has gone largely undetected. Though some states have already begun enacting legislation ahead of the technology’s wide release, the regulatory landscape across the country is in disarray. It is imperative that both manufacturers and consumers be given some sort of uniform understanding as to how the automation is overseen throughout the manufacturing process and how liability will be levied in the case of inevitable mistakes on our nation’s roadways. This Note proposes that the National Highway Traffic Safety Administration be responsible for providing …
Securing The Internet Of Healthcare, Scott J. Shackelford, Michael Mattioli, Steve Myers, Austin Brady
Securing The Internet Of Healthcare, Scott J. Shackelford, Michael Mattioli, Steve Myers, Austin Brady
Minnesota Journal of Law, Science & Technology
No abstract provided.
Governing Behind The Cloud: Is Transparency Too "Burdensome" In The Digital Age?, Sam Louwagie
Governing Behind The Cloud: Is Transparency Too "Burdensome" In The Digital Age?, Sam Louwagie
Minnesota Journal of Law, Science & Technology
No abstract provided.
No Good Deed Goes Unpunished: The Duties Held By Malware Researchers, Penetration Testers, And "White Hat" Hackers, Jon Watkins
No Good Deed Goes Unpunished: The Duties Held By Malware Researchers, Penetration Testers, And "White Hat" Hackers, Jon Watkins
Minnesota Journal of Law, Science & Technology
No abstract provided.
Rewriting The "Book Of The Machine": Regulatory And Liability Issues For The Internet Of Things, Jane Kirtley, Scott Memmel
Rewriting The "Book Of The Machine": Regulatory And Liability Issues For The Internet Of Things, Jane Kirtley, Scott Memmel
Minnesota Journal of Law, Science & Technology
No abstract provided.
Rise Of The Intelligent Information Brokers: Role Of Computational Law Applications In Administering The Dynamic Cybersecurity Threat Surface In Iot, Eran Kahana
Minnesota Journal of Law, Science & Technology
No abstract provided.
Out Of Thin Air: Trade Secrets, Cybersecurity, And The Wrongful Acquisition Tort, Sharon Sandeen
Out Of Thin Air: Trade Secrets, Cybersecurity, And The Wrongful Acquisition Tort, Sharon Sandeen
Minnesota Journal of Law, Science & Technology
No abstract provided.