Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Science and Technology Law

A Toothless Tcpa: An Analysis Of Article Iii Standing, Personal Jurisdiction, And The Disjuncture Problem’S Impact On The Efficacy Of The Telephone Consumer Protection Act, Sebastian W. Johnson May 2024

A Toothless Tcpa: An Analysis Of Article Iii Standing, Personal Jurisdiction, And The Disjuncture Problem’S Impact On The Efficacy Of The Telephone Consumer Protection Act, Sebastian W. Johnson

University of Cincinnati Law Review

No abstract provided.


Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley May 2024

Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley

University of Cincinnati Law Review

Law enforcement officers performing drug interdiction on interstate highways have to decide nearly every day whether there is reasonable suspicion to detain motorists until a trained dog can sniff for the presence of drugs. The officers’ assessments are often wrong, however, and lead to unnecessary detentions of innocent persons and the suppression of drugs found on guilty ones. We propose a computational method of evaluating suspicion in these encounters and offer experimental results from early efforts demonstrating its feasibility. With the assistance of large language and predictive machine learning models, it appears that judges, advocates, and even police officers could …


The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson May 2024

The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson

University of Cincinnati Law Review

This Article sheds light on a unique but centrally important “twenty-first century” issue involving electronic discovery in federal civil litigation that is just beginning to percolate in federal district courts. Historically, courts have held that a document attached to or enclosed with another document must be produced together when produced in response to a discovery request, as that is how the document was “kept in the usual course of business” and how it is “ordinarily maintained or in a reasonably usable form,” as the Federal Rules of Civil Procedure have required for decades. Today, parties are pushing back on whether …


Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan Jan 2023

Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan

Canadian Journal of Law and Technology

It is a common claim that law is always catching up with technology. This is not entirely fair. The European Union’s General Data Protection Regulation1 (GDPR) could be viewed as a case of technology having to catch up to the law. That said, clearly there are challenges in law and in the legal profession, both in terms of how the law can adapt to changes in the digital world and the disruption of the legal profession. On the former point, there are perhaps three broad schools of thought: existing law is sufficient for adapting to new technological challenges, as it …


How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid Jan 2023

How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid

American University Journal of Gender, Social Policy & the Law

In July 2021, Ziggi Tyler posted a video on TikTok, a popular video sharing platform, where he expressed his frustration with being a Black content creator on TikTok. The video showed Ziggi typing phrases such as “Black Lives Matter” or “Black success” into his Marketplace creator bio, which the app would immediately flag as inappropriate content. However, when Ziggi replaced those words with “white supremacy” or “white success,” no inappropriateness warning appeared. Although a TikTok spokesperson responded to the video clarifying that the app had mistakenly flagged phrases without considering word order, Ziggi refused to let an algorithm absolve TikTok …


Letter Form The Editor, Wayne Rash, Iii Jan 2023

Letter Form The Editor, Wayne Rash, Iii

American University National Security Law Brief

In our last issue of The National Security Law Brief, Vol. 13, No. 1, we highlighted the dynamism that makes National Security Law such an exciting field. In this issue, No. 2, we continue with the dynamism theme. National security law is a field in constant change that often leaves us questioning how these changes will shape the law.


The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant Jan 2023

The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant

American University National Security Law Brief

Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …


Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski Jan 2023

Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski

American University National Security Law Brief

Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …