Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Seattle University School of Law (36)
- Schulich School of Law, Dalhousie University (19)
- Southern Methodist University (17)
- The Catholic University of America, Columbus School of Law (13)
- DePaul University (6)
-
- American University Washington College of Law (5)
- William & Mary Law School (5)
- Texas A&M University School of Law (3)
- Brooklyn Law School (2)
- Northwestern Pritzker School of Law (2)
- University of Colorado Law School (2)
- University of Richmond (2)
- University of Washington School of Law (2)
- Columbia Law School (1)
- Duquesne University (1)
- Maurer School of Law: Indiana University (1)
- Old Dominion University (1)
- Pace University (1)
- Roger Williams University (1)
- University of Miami Law School (1)
- University of Pittsburgh School of Law (1)
- University of Texas Rio Grande Valley (1)
- Villanova University Charles Widger School of Law (1)
- Keyword
-
- Technology (10)
- Privacy (9)
- AI (8)
- Artificial intelligence (7)
- Law (4)
-
- National security (4)
- Social media (4)
- Cryptocurrency (3)
- Data privacy (3)
- Government regulation (3)
- Intellectual Property (3)
- Law and technology (3)
- Washington (3)
- A.I. (2)
- Accountability (2)
- Bitcoin (2)
- Blockchain (2)
- Cryptocurrencies (2)
- Cybersecurity (2)
- Innovation (2)
- Internet (2)
- Interoperability (2)
- Misinformation (2)
- NFTs (2)
- Regulation (2)
- Section 230 (2)
- Social Media (2)
- TikTok (2)
- Transparency (2)
- #MeToo (1)
- Publication
-
- Seattle University Law Review (33)
- Canadian Journal of Law and Technology (19)
- SMU Science and Technology Law Review (17)
- Catholic University Journal of Law and Technology (13)
- Faculty Scholarship (4)
-
- DePaul Journal of Art, Technology & Intellectual Property Law (3)
- Joint PIJIP/TLS Research Paper Series (3)
- Seattle Journal of Technology, Environmental & Innovation Law (3)
- American University National Security Law Brief (2)
- Brooklyn Journal of International Law (2)
- DePaul Magazine (2)
- Northwestern Journal of Technology and Intellectual Property (2)
- Popular Media (2)
- Publications (2)
- William & Mary Law Review (2)
- Articles (1)
- Book Chapters (1)
- Cybersecurity Undergraduate Research Showcase (1)
- DePaul Business & Commercial Law Journal (1)
- Duquesne Law Review (1)
- Faculty Publications (1)
- Indiana Law Journal (1)
- Law Student Publications (1)
- Pace Law Review (1)
- Research Symposium (1)
- Roger Williams University Law Review (1)
- University of Miami Law Review (1)
- University of Richmond Law Review (1)
- Washington Law Review (1)
- William & Mary Business Law Review (1)
- Publication Type
Articles 1 - 30 of 124
Full-Text Articles in Science and Technology Law
Trademark Infringement: The Likelihood Of Confusion Of Nfts In The Us And Eu, Sara Sachs
Trademark Infringement: The Likelihood Of Confusion Of Nfts In The Us And Eu, Sara Sachs
Brooklyn Journal of International Law
The immutability of non-fungible tokens has made it an invaluable tool for asset ownership and authentication across a variety of industries. With the proliferation of NFTs comes the need to protect trademarks and prevent consumer confusion in the digital age. This Note explores the existing legal framework for trademark law in the United States and European Union. This Note argues for a new trademark standard that reflects the interconnected nature of a global digital society.
Large Language Models: Ai's Legal Revolution, Adam Allen Bent
Large Language Models: Ai's Legal Revolution, Adam Allen Bent
Pace Law Review
This article contemplates and advocates for the use of Artificial Intelligence (“AI”) through Large Language Models (“LLM”) in legal practice. The author ultimately addresses the need to orient LMMs within varying legal contexts including academia, private practice, as well as the U.S. court system. Additionally, the author emphasizes the inevitability of AI and LLM systems infiltrating legal practice, and the reality that the industry must acknowledge and accept these systems to regulate and to provide better while still ethical legal services. Large Language Models: AI’s Legal Revolution, begins by walking the reader through the history of technological innovation of AI, …
A Public Technology Option, Hannah Bloch-Wehba
A Public Technology Option, Hannah Bloch-Wehba
Faculty Scholarship
Private technology increasingly underpins public governance. But the state’s growing reliance on private firms to provide a variety of complex technological products and services for public purposes brings significant costs for transparency: new forms of governance are becoming less visible and less amenable to democratic control. Transparency obligations initially designed for public agencies are a poor fit for private vendors that adhere to a very different set of expectations.
Aligning the use of technology in public governance with democratic values calls for rethinking, and in some cases abandoning, the legal structures and doctrinal commitments that insulate private vendors from meaningful …
After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge
After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge
Faculty Scholarship
Bitcoin and the other cryptocurrencies spawned by the innovation of blockchain programming have exploded in prominence, both in gains of massive market value and in dramatic market losses, the latter most notably seen in connection with the failure of the FTX cryptocurrency exchange in November 2022. After years of investment and speculation, however, something crucial has faded: the original use case for Bitcoin as a system of payment. Can cryptocurrency-as-a-payment-system be saved, or are day traders and speculators the actual cryptocurrency future? This article suggests that cryptocurrency has been hobbled by a lack of foundational commercial and consumer-protection law that …
Trademarks In An Algorithmic World, Christine Haight Farley
Trademarks In An Algorithmic World, Christine Haight Farley
Washington Law Review
According to the sole normative foundation for trademark protection—“search costs” theory—trademarks transmit useful information to consumers, enabling an efficient marketplace. The marketplace, however, is in the midst of a fundamental change. Increasingly, retail is virtual, marketing is data-driven, and purchasing decisions are automated by AI. Predictive analytics are changing how consumers shop. Search costs theory no longer accurately describes the function of trademarks in this marketplace. Consumers now have numerous digital alternatives to trademarks that more efficiently provide them with increasingly accurate product information. Just as store shelves are disappearing from consumers’ retail experience, so are trademarks disappearing from their …
Either The Law Will Govern Ai, Or Ai Will Govern The Law, Margaret Hu
Either The Law Will Govern Ai, Or Ai Will Govern The Law, Margaret Hu
Popular Media
No abstract provided.
Caging The Bored Ape: How The Ftc's Expanded Anti-Monopoly Authority Can Tame "Nfts" For Web 3.0, J. Scott Colesanti
Caging The Bored Ape: How The Ftc's Expanded Anti-Monopoly Authority Can Tame "Nfts" For Web 3.0, J. Scott Colesanti
William & Mary Business Law Review
Non-Fungible Tokens, or “NFTs,” ballooned into a 40-billion-dollar industry in under a decade. Their creators include artists, corporations, entrepreneurs, fraudsters—and even Donald Trump. While NFT owners and traders could be any of us, the parties running the marketplaces are hidden. NFT regulators have yet to be identified. Most alarmingly, the dominant NFT marketplaces are dangerously centralized. Accordingly, the publicized tales of exorbitant or manipulated NFT prices and frequent related scams abound. Meanwhile cryptocurrency—the technology enabling the life of an NFT—remains beset with, at best, theoretical models for effective regulation a full generation after its emergence.
To propose a rational start …
Leveraging Technology To Promote Access To Justice, Amy Emerson
Leveraging Technology To Promote Access To Justice, Amy Emerson
Faculty Publications
No abstract provided.
Link Tank
DePaul Magazine
A new JD certificate program in information technology, cybersecurity and data privacy provides DePaul University students with proficiency in both law and tech.
Full Issue: Fall 2023
DePaul Magazine
In DePaul Magazine's fall 2023, President Robert L. Manuel unveils his Designing DePaul road map to position the university for monumental impact. We also highlight an innovative program that merges law and tech, an initiative centering humanities in collaborative, community-based interactions, and the ascendance of soprano Janai Brugger (SOM '05) on the international opera stage.
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
The Eyes Beyond The Screen: Digital Media Policy And Child Health, Yahia Al-Qudah
The Eyes Beyond The Screen: Digital Media Policy And Child Health, Yahia Al-Qudah
Research Symposium
Background: Modern communication technology and digital media have provided society with a foundation for instant messaging. Pictures, videos, and texts connect individuals with families, friends, and the world. Consequently, digital media has accelerated exposure to risk in which children and adolescents are most vulnerable. This project’s objective is to 1) congregate and highlight current knowledge about the impact of digital media on child health, and 2) underline deficiencies in related laws and regulations as well as offer solutions in digital media policy.
Methods: A systematic literature review was conducted through the JAMA Pediatrics database with keywords such as “digital media,” …
A Trusted Framework For Cross-Border Data Flows, Alex Joel
A Trusted Framework For Cross-Border Data Flows, Alex Joel
Joint PIJIP/TLS Research Paper Series
The German Marshall Fund of the United States (GMF), in cooperation with the Tech, Law and Security Program (TLS) of the American University Washington College of Law, and with support from Microsoft, convened a Global Taskforce to Promote Trusted Sharing of Data comprising experts from civil society, academia, and industry to submit proposals for harmonizing approaches to global data use and sharing. Former US Ambassador to the Organisation for Economic Co-operation and Development (OECD) and GMF Distinguished Fellow Karen Kornbluh and Microsoft Chief Privacy Officer and Corporate Vice President Julie Brill co-chaired the taskforce; TLS Senior Project Director Alex Joel …
Two Visions Of Digital Sovereignty, Sujit Raman
Two Visions Of Digital Sovereignty, Sujit Raman
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli
Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli
Brooklyn Journal of International Law
States have resorted to meddling in the elections of their counterparts throughout history. Recently, though, there has been an exponential increased in the use of the possibilities provided by technology. Attention to this phenomenon has deservedly grown quickly and exponentially. This has led to debates focusing on the adequacy of international legal rules and general principles to respond to foreign cyber election interference. In many of these debates some have expressed doubts and skepticism about the adequacy of current international law to confront foreign election interference through cyber means. There have also been disagreements about the applicable standards to fight …
Ethics At The Speed Of Business, James A. Doppke Jr.
Ethics At The Speed Of Business, James A. Doppke Jr.
DePaul Business & Commercial Law Journal
This paper discusses several ways in which the Illinois Rules of Professional Conduct, and the Illinois Supreme Court Rules, construct barriers that prevent lawyers and businesses from accomplishing reasonable commercial goals. Often, those barriers arise from outdated concepts, or terminology that does not reflect current business realities. The paper argues for the amendment of specific Rules to enhance lawyers’ and businesses’ respective abilities to conduct their affairs more efficiently, without sacrificing public protection in the process.
The Future Of Data Protection Enforcement In Canada: Lessons From The Gdpr, Guilda Rostama, Teresa Scassa
The Future Of Data Protection Enforcement In Canada: Lessons From The Gdpr, Guilda Rostama, Teresa Scassa
Canadian Journal of Law and Technology
Imagine a not-too-distant scenario in which a private sector organization in Canada is investigated by the Privacy Commissioner of Canada jointly with the Commissioners of Quebec, British Columbia (‘‘BC”), and Alberta in relation to complaints that it shared massive quantities of personal data with third parties contrary to its stated practices in its privacy policies. Imagine also that each of the commissioners is empowered under newly amended data protection legislation to issue substantial Administrative Monetary Penalties (‘‘AMPs”). If each of the commissioners finds that its respective laws were breached, should the organization be subject to four different AMPs, or just …
Slouching Toward Regulation: Assessing Bill 88 As A Solution For Workplace Surveillance Harms, Danielle E. Thompson, Adam Molnar
Slouching Toward Regulation: Assessing Bill 88 As A Solution For Workplace Surveillance Harms, Danielle E. Thompson, Adam Molnar
Canadian Journal of Law and Technology
Employee monitoring applications (‘‘EMAs”) are proliferating in Canada and provide employers with sophisticated surveillance tools for the monitoring of workers (e.g., on-device video surveillance, browser activity, and email monitoring). In response to concerns about these increasingly invasive surveillance practices, the Government of Ontario passed Bill 88, the Working for Workers Act, 2022, which requires all employers with 25 or more workers to have a written policy stating whether and how they electronically monitor their employees. Bill 88 marks a more explict attempt to regulate workplace surveillance in a modern digital context in Canada; however; however, an analysis of the Bill’s …
When Your Boss Is An Algorithm: Preserving Canadian Employment Standards In The Digital Economy, Fife Ogunde
When Your Boss Is An Algorithm: Preserving Canadian Employment Standards In The Digital Economy, Fife Ogunde
Canadian Journal of Law and Technology
The platform or ‘‘gig” economy is a rapidly growing economy in Canada. Between 2005 and 2016, the share of gig workers among all workers in Canada rose from 5.5% to 8.2%. These include independent contractors, select freelancers and platform workers. In 2018, 28% of Canadians aged 18 and older reported making money through online platforms. Research by Payments Canada in 2021 showed gig workers as representing more than one in 10 Canadian adults with more than one in three Canadian businesses employing gig workers. As the share of platform workers in the economy has grown, so has the discussion regarding …
The Challenge Designing Intermediary Liability Laws, Emily Laidlaw
The Challenge Designing Intermediary Liability Laws, Emily Laidlaw
Canadian Journal of Law and Technology
The ideal framework for intermediary liability has vexed policymakers since the internet’s commercialization. The quest has taken on a frenzied pace in recent years with intense scrutiny of who they are, what they do and what they should be responsible for. Over the years a theme has emerged from my discussions about intermediaries, and its subset platforms, and it prompts me to explore it as the focus of this article. My question is simple: why is it so difficult for law and policymakers to agree on a regulatory framework?
This article tackles two parts of the regulatory challenge that are …
The Need For Cyber Resilience Of Space Assets: Law And Policy Considerations Of Ensuring Cybersecurity In Outer Space, Daniella Febbraro
The Need For Cyber Resilience Of Space Assets: Law And Policy Considerations Of Ensuring Cybersecurity In Outer Space, Daniella Febbraro
Canadian Journal of Law and Technology
In 2018, NASA’s Jet Propulsion Laboratory was the subject of a data breach where over 500 megabytes of data from a major mission system was stolen by hackers. This attack affected NASA’s Deep Space Network, prompting the United States Johnson Space Center to disconnect the International Space Station from the affected gateway due to fears that mission systems could become compromised. NASA has acknowledged that its vast online presence, which includes thousands of publicly accessible datasets, offers a large potential target for cybercriminals. The 2018 incident was one of many, with NASA experiencing more than 6000 cyberattacks from 2017-2021 alone. …
Opaque Notification: A Country-By-Country Review, Lauren Mantel
Opaque Notification: A Country-By-Country Review, Lauren Mantel
Joint PIJIP/TLS Research Paper Series
No abstract provided.
A New Right Is The Wrong Tactic: Bring Legal Actions Against States For Internet Shutdowns Instead Of Working Towards A Human Right To The Internet (Part 1), Jay Conrad
Seattle Journal of Technology, Environmental & Innovation Law
A New Right is the Wrong Tactic: Bring Legal Actions Against States for Internet Shutdowns Instead of Working Towards a Human Right to the Internet (Part 1) is the first of a two-part series dealing with an increasingly prevalent threat to human rights: State-sanctioned Internet shutdowns. Part 1 details the current tactics and impacts of Internet shutdowns and which human rights are most likely to be violated by or during a shutdown. Part 2 will address the deficiencies of advocating for Internet access to be a recognized human right as a means of combatting shutdowns. Despite the popularity of this …
Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina
Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Texas’ War On Social Media: Censorship Or False Flag, Leni Morales
Texas’ War On Social Media: Censorship Or False Flag, Leni Morales
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
On The Danger Of Not Understanding Technology, Fredric I. Lederer
On The Danger Of Not Understanding Technology, Fredric I. Lederer
Popular Media
No abstract provided.
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Some Legal And Practical Challenges In The Investigation Of Cybercrime, Ritz Carr
Cybersecurity Undergraduate Research Showcase
According to the Internet Crime Complaint Center (IC3), in 2021, the United States lost around $6.9 billion to cybercrime. In 2022, that number grew to over $10.2 billion (IC3, 2022). In one of many efforts to combat cybercrimes, at least 40 states “introduced or considered more than 250 bills or resolutions that deal significantly with cybersecurity” with 24 states officially enacting a total of 41 bills (National Conference on State Legislatures, 2022).
The world of cybercrime evolves each day. Nevertheless, challenges arise when we investigate and prosecute cybercrime, which will be examined in the following collection of essays that highlight …
Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang
Telegraph, Telephone And The Internet: The Making Of The Symbiotic Model Of Surveillance States, Dongsheng Zang
Articles
In the early 2000s, shortly before the September 11 attacks, Daniel J. Solove noted that computer databases in the United States were controlled by public as well as private bureaucracies. In that sense, Solove argued, the "Big Brother" metaphor "fails to capture the most important dimension of the database problem." In his 2008 Lockhart lecture, constitutional law scholar Jack M. Balkin argued that the United States has gradually transformed from a welfare and national security state to a National Surveillance State: "a new form of governance that features the collection, collation, and analysis of information about populations both in the …
The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar
The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar
Northwestern Journal of Technology and Intellectual Property
Biased black-box algorithms have drawn increasing levels of scrutiny from the public. This is especially true for those black-box algorithms with the potential to negatively affect protected or vulnerable populations.1 One type of these black-box algorithms, a neural network, is both opaque and capable of high accuracy. However, neural networks do not provide insights into the relative importance, underlying relationships, structures of the predictors or covariates with the modelled outcomes.2 There are methods to combat a neural network’s lack of transparency: globally or locally interpretable post-hoc explanatory models.3 However, the threat of such measures usually does not bar an actor …