Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (11)
- Internet Law (11)
- Law and Society (8)
- Computer Law (6)
- Business Organizations Law (4)
-
- Commercial Law (4)
- National Security Law (4)
- Banking and Finance Law (3)
- Constitutional Law (3)
- Law and Economics (3)
- Legal Profession (3)
- Privacy Law (3)
- Property Law and Real Estate (3)
- Securities Law (3)
- Antitrust and Trade Regulation (2)
- Civil Procedure (2)
- Economics (2)
- Entertainment, Arts, and Sports Law (2)
- Evidence (2)
- International Humanitarian Law (2)
- International Law (2)
- Jurisprudence (2)
- Law Enforcement and Corrections (2)
- Law and Race (2)
- Social and Behavioral Sciences (2)
- Administrative Law (1)
- Air and Space Law (1)
- Anthropology (1)
- Institution
-
- American University Washington College of Law (9)
- SelectedWorks (4)
- University of Cincinnati College of Law (3)
- Boston University School of Law (2)
- Georgetown University Law Center (2)
-
- Selected Works (2)
- Singapore Management University (2)
- University of Maryland Francis King Carey School of Law (2)
- BLR (1)
- Cleveland State University (1)
- Florida International University College of Law (1)
- Osgoode Hall Law School of York University (1)
- Pace University (1)
- Schulich School of Law, Dalhousie University (1)
- Texas A&M University School of Law (1)
- University of Colorado Law School (1)
- University of Georgia School of Law (1)
- University of Pittsburgh School of Law (1)
- Yeshiva University, Cardozo School of Law (1)
- Publication Year
- Publication
-
- Faculty Scholarship (5)
- Lawrence J. Trautman Sr. (4)
- American University National Security Law Brief (3)
- Articles in Law Reviews & Other Academic Journals (3)
- University of Cincinnati Law Review (3)
-
- Amicus Briefs (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Research Collection Yong Pung How School Of Law (2)
- Alfred C. Yen (1)
- All Papers (1)
- American University Journal of Gender, Social Policy & the Law (1)
- Articles (1)
- Book Chapters (1)
- Canadian Journal of Law and Technology (1)
- Danielle Keats Citron (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- ExpressO (1)
- Faculty Publications (1)
- Law Faculty Articles and Essays (1)
- Publications (1)
- Scholarly Works (1)
- Publication Type
Articles 1 - 30 of 37
Full-Text Articles in Science and Technology Law
A Toothless Tcpa: An Analysis Of Article Iii Standing, Personal Jurisdiction, And The Disjuncture Problem’S Impact On The Efficacy Of The Telephone Consumer Protection Act, Sebastian W. Johnson
A Toothless Tcpa: An Analysis Of Article Iii Standing, Personal Jurisdiction, And The Disjuncture Problem’S Impact On The Efficacy Of The Telephone Consumer Protection Act, Sebastian W. Johnson
University of Cincinnati Law Review
No abstract provided.
Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley
Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley
University of Cincinnati Law Review
Law enforcement officers performing drug interdiction on interstate highways have to decide nearly every day whether there is reasonable suspicion to detain motorists until a trained dog can sniff for the presence of drugs. The officers’ assessments are often wrong, however, and lead to unnecessary detentions of innocent persons and the suppression of drugs found on guilty ones. We propose a computational method of evaluating suspicion in these encounters and offer experimental results from early efforts demonstrating its feasibility. With the assistance of large language and predictive machine learning models, it appears that judges, advocates, and even police officers could …
The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson
The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson
University of Cincinnati Law Review
This Article sheds light on a unique but centrally important “twenty-first century” issue involving electronic discovery in federal civil litigation that is just beginning to percolate in federal district courts. Historically, courts have held that a document attached to or enclosed with another document must be produced together when produced in response to a discovery request, as that is how the document was “kept in the usual course of business” and how it is “ordinarily maintained or in a reasonably usable form,” as the Federal Rules of Civil Procedure have required for decades. Today, parties are pushing back on whether …
The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba
The Promise And Perils Of Tech Whistleblowing, Hannah Bloch-Wehba
Faculty Scholarship
Whistleblowers and leakers wield significant influence in technology law and policy. On topics ranging from cybersecurity to free speech, tech whistleblowers spur congressional hearings, motivate the introduction of legislation, and animate critical press coverage of tech firms. But while scholars and policymakers have long called for transparency and accountability in the tech sector, they have overlooked the significance of individual disclosures by industry insiders—workers, employees, and volunteers—who leak information that firms would prefer to keep private.
This Article offers an account of the rise and influence of tech whistleblowing. Radical information asymmetries pervade tech law and policy. Firms exercise near-complete …
Legalbench: A Collaboratively Built Benchmark For Measuring Legal Reasoning In Large Language Models, Neel Guha, Julian Nyarko, Daniel E. Ho, Christopher Ré, Adam Chilton, Aditya Narayana, Alex Chohlas-Wood, Austin Peters, Brandon Waldon, Daniel Rockmore, Diego A. Zambrano, Dmitry Talisman, Enam Hoque, Faiz Surani, Frank Fagan, Galit Sarfaty, Gregory M. Dickinson, Haggai Porat, Jason Hegland, Jessica Wu, Joe Nudell, Joel Niklaus, John Nay, Jonathan H. Choi, Kevin Tobia, Margaret Hagan, Megan Ma, Michael A. Livermore, Nikon Rasumov-Rahe, Nils Holzenberger, Noam Kolt, Peter Henderson, Sean Rehaag, Sharad Goel, Shang Gao, Spencer Williams, Sunny Gandhi, Tom Zur, Varun Iyer, Zehua Li
Legalbench: A Collaboratively Built Benchmark For Measuring Legal Reasoning In Large Language Models, Neel Guha, Julian Nyarko, Daniel E. Ho, Christopher Ré, Adam Chilton, Aditya Narayana, Alex Chohlas-Wood, Austin Peters, Brandon Waldon, Daniel Rockmore, Diego A. Zambrano, Dmitry Talisman, Enam Hoque, Faiz Surani, Frank Fagan, Galit Sarfaty, Gregory M. Dickinson, Haggai Porat, Jason Hegland, Jessica Wu, Joe Nudell, Joel Niklaus, John Nay, Jonathan H. Choi, Kevin Tobia, Margaret Hagan, Megan Ma, Michael A. Livermore, Nikon Rasumov-Rahe, Nils Holzenberger, Noam Kolt, Peter Henderson, Sean Rehaag, Sharad Goel, Shang Gao, Spencer Williams, Sunny Gandhi, Tom Zur, Varun Iyer, Zehua Li
All Papers
The advent of large language models (LLMs) and their adoption by the legal community has given rise to the question: what types of legal reasoning can LLMs perform? To enable greater study of this question, we present LegalBench: a collaboratively constructed legal reasoning benchmark consisting of 162 tasks covering six different types of legal reasoning. LegalBench was built through an interdisciplinary process, in which we collected tasks designed and hand-crafted by legal professionals. Because these subject matter experts took a leading role in construction, tasks either measure legal reasoning capabilities that are practically useful, or measure reasoning skills that lawyers …
Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton
Future-Proofing U.S. Laws For War Crimes Investigations In The Digital Era, Rebecca Hamilton
Articles in Law Reviews & Other Academic Journals
Advances in information technology have irrevocably changed the nature of war crimes investigations. The pursuit of accountability for the most serious crimes of concern to the international community now invariably requires access to digital evidence. The global reach of platforms like Facebook, YouTube, and Twitter means that much of that digital evidence is held by U.S. social media companies, and access to it is subject to the U.S. Stored Communications Act.
This is the first Article to look at the legal landscape facing international investigators seeking access to digital evidence regarding genocide, war crimes, crimes against humanity, and aggression. It …
Property's Boundaries, James Toomey
Property's Boundaries, James Toomey
Elisabeth Haub School of Law Faculty Publications
Property law has a boundary problem. Courts are routinely called upon to decide whether certain kinds of things can be owned--cells, genes, organs, gametes, embryos, corpses, personal data, and more. Under prevailing contemporary theories of property law, questions like these have no justiciable answers. Because property has no conceptual essence, they maintain, its boundaries are arbitrary--a flexible normative choice more properly legislative than judicial.
This Article instead offers a straightforward descriptive theory of property's boundaries. The common law of property is legitimated by its basis in the concept of ownership, a descriptive relationship of absolute control that exists outside of …
Legal Dispositionism And Artificially-Intelligent Attributions, Jerrold Soh
Legal Dispositionism And Artificially-Intelligent Attributions, Jerrold Soh
Research Collection Yong Pung How School Of Law
It is conventionally argued that because an artificially-intelligent (AI) system acts autonomously, its makers cannot easily be held liable should the system's actions harm. Since the system cannot be liable on its own account either, existing laws expose victims to accountability gaps and need to be reformed. Recent legal instruments have nonetheless established obligations against AI developers and providers. Drawing on attribution theory, this paper examines how these seemingly opposing positions are shaped by the ways in which AI systems are conceptualised. Specifically, folk dispositionism underpins conventional legal discourse on AI liability, personality, publications, and inventions and leads us towards …
Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan
Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan
Canadian Journal of Law and Technology
It is a common claim that law is always catching up with technology. This is not entirely fair. The European Union’s General Data Protection Regulation1 (GDPR) could be viewed as a case of technology having to catch up to the law. That said, clearly there are challenges in law and in the legal profession, both in terms of how the law can adapt to changes in the digital world and the disruption of the legal profession. On the former point, there are perhaps three broad schools of thought: existing law is sufficient for adapting to new technological challenges, as it …
How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid
How To Get Away With Discrimination: The Use Of Algorithms To Discriminate In The Internet Entertainment Industry, Sumra Wahid
American University Journal of Gender, Social Policy & the Law
In July 2021, Ziggi Tyler posted a video on TikTok, a popular video sharing platform, where he expressed his frustration with being a Black content creator on TikTok. The video showed Ziggi typing phrases such as “Black Lives Matter” or “Black success” into his Marketplace creator bio, which the app would immediately flag as inappropriate content. However, when Ziggi replaced those words with “white supremacy” or “white success,” no inappropriateness warning appeared. Although a TikTok spokesperson responded to the video clarifying that the app had mistakenly flagged phrases without considering word order, Ziggi refused to let an algorithm absolve TikTok …
Letter Form The Editor, Wayne Rash, Iii
Letter Form The Editor, Wayne Rash, Iii
American University National Security Law Brief
In our last issue of The National Security Law Brief, Vol. 13, No. 1, we highlighted the dynamism that makes National Security Law such an exciting field. In this issue, No. 2, we continue with the dynamism theme. National security law is a field in constant change that often leaves us questioning how these changes will shape the law.
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant
American University National Security Law Brief
Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski
American University National Security Law Brief
Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …
Digital Habit Evidence, Andrew Guthrie Ferguson
Digital Habit Evidence, Andrew Guthrie Ferguson
Articles in Law Reviews & Other Academic Journals
This Article explores how “habit evidence” will become a catalyst for a new form of digital proof based on the explosive growth of smart homes, smart cars, smart devices, and the Internet of Things. Habit evidence is the rule that certain sorts of semiautomatic, regularized responses to particular stimuli are trustworthy and thus admissible under the Federal Rules of Evidence (“FRE”) 406 “Habit; Routine Practice” and state equivalents.
While well established since the common law, “habit” has made only an inconsistent appearance in reported cases and has been underutilized in trial practice. But intriguingly, once applied to the world of …
Why Digital Policing Is Different, Andrew Ferguson
Why Digital Policing Is Different, Andrew Ferguson
Articles in Law Reviews & Other Academic Journals
Many Fourth Amendment debates boil down to following argument: if police can already do something in an analog world, why does it matter that new digital technology allows them to do it better, more efficiently, or faster? This Article addresses why digital is, in fact, different when it comes to police surveillance technologies. The Article argues that courts should think of these digital technologies not as enhancements of traditional analog policing practices but as something completely different, warranting a different Fourth Amendment approach. Properly understood, certain digital searches should be legally distinguishable from analog search precedent such that the older …
Moonshots, Matthew Wansley
Moonshots, Matthew Wansley
Articles
In the last half-century, technological progress has stagnated. Rapid advances in information technology disguise the slow pace of productivity growth in other fields. Reigniting technological progress may require firms to invest in moonshots—long-term projects to commercialize innovations. Yet all but a few giant tech firms shy away from moonshots, even when the expected returns would justify the investment. The root of the problem is corporate structure. The process of developing a novel technology does not generate the kind of interim feedback that shareholders need to monitor managers and managers need to motivate employees. Managers who anticipate these agency problems invest …
Contracts Formed By Software: An Approach From The Law Of Mistake, Vincent Ooi
Contracts Formed By Software: An Approach From The Law Of Mistake, Vincent Ooi
Research Collection Yong Pung How School Of Law
A ‘Contracting Problem’ arises when software is used to autonomously enter into contracts without human input. Questions arise as to how and whether there can be an expression of an objective intention to be legally bound. This article considers three leading solutions to the Contracting Problem. The ‘Mere Tools Theory’, which views software as ‘mere tools’ of communication, is too harsh as it binds users to any software malfunction. The Agency Approach, which treats software as Electronic Agents, capable of contracting on behalf of their users, is untenable as it ascribes unrealistic characteristics to software. The article submits that the …
How To Build More Equitable Vaccine Distribution Technology, Laura M. Moy, Yael Cannon
How To Build More Equitable Vaccine Distribution Technology, Laura M. Moy, Yael Cannon
Georgetown Law Faculty Publications and Other Works
The COVID-19 pandemic and the distribution of vaccines that promise to bring it to an end have spotlighted inequities in our nation’s healthcare system. But the vaccine distribution problem illustrates a peculiar fact of our digital era: just how hard it is to ensure equitable delivery of services via the internet. This is especially the case when distributing a scarce critical resource as quickly as possible on a massive scale.
In this Brookings Institution article, Professors Laura Moy and Yael Cannon argue that digital infrastructure is a critical determinant of health, and call for the restructuring of online vaccine appointment …
Brief For The Coalition Against Patent Abuse As Amicus Curiae In Support No Party, Charles Duan
Brief For The Coalition Against Patent Abuse As Amicus Curiae In Support No Party, Charles Duan
Amicus Briefs
Perhaps unexpectedly, a case on the constitutionality of the Patent Trial and Appeal Board has major significance to the pressing policy crisis of drug prices in the United States. Erroneously issued patents monopolize medical therapies, making them unaffordable or inaccessible to numerous Americans. The inter partes review proceedings that the Board conducts have repeatedly and successfully overcome such patents, enabling competition and dramatically lowering prices. This Court should ensure the continued viability of the Board and of inter partes review, by preserving the Board’s objectivity and independence from executive branch political influence.
The Football As Intellectual Property Object, Michael J. Madison
The Football As Intellectual Property Object, Michael J. Madison
Book Chapters
The histories of technology and culture are filled with innovations that emerged and took root by being shared widely, only to be succeeded by eras of growth framed by intellectual property. The Internet is a modern example. The football, also known as the pelota, ballon, bola, balón, and soccer ball, is another, older, and broader one. The football lies at the core of football. Intersections between the football and intellectual property law are relatively few in number, but the football supplies a focal object through which the great themes of intellectual property have shaped the game: origins; innovation and …
Brief For The R Street Institute As Amicus Curiae In Support Of Respondents, Charles Duan
Brief For The R Street Institute As Amicus Curiae In Support Of Respondents, Charles Duan
Amicus Briefs
The government and its agencies should be treated as a “person” that may petition to institute post-issuance review proceedings under the America Invents Act, for two reasons. First, permitting the government to seek review of patents under these proceedings best realizes the intent of Congress to make those proceedings widely available. Second, compared to the government’s alternative option for administratively challenging patents, AIA post-issuance review better serves important norms of procedure and governance, including transparency, due process, and separation of functions.
Law And The Blockchain, Usha Rodrigues
Law And The Blockchain, Usha Rodrigues
Scholarly Works
All contracts are necessarily incomplete. The inefficiencies of bargaining over every contingency, coupled with humans’ innate bounded rationality, mean that contracts cannot anticipate and address every potential eventuality. One role of law is to fill gaps in incomplete contracts with default rules. The blockchain is a distributed ledger that allows the cryptographic recording of transactions and permits “smart” contracts that self-execute automatically if their conditions are met. Because humans code the contracts of the blockchain, gaps in these contracts will arise. Yet in the world of “smart contracting” on the blockchain, there is no place for the law to step …
Techno-Optimism & Access To The Legal System, Tanina Rostain
Techno-Optimism & Access To The Legal System, Tanina Rostain
Georgetown Law Faculty Publications and Other Works
For legal technologists, apps raise the prospect of putting the law in the hands of disadvantaged people who feel powerless to deal with their legal problems. These aspirations are heartening, but they rest on unrealistic assumptions about how people living in poverty deal with legal problems. People who are poor very rarely resort to the law to solve their problems. In the situations when they do seek solutions, they confront educational and material impediments to finding, understanding, and using online legal tools effectively. Literacy is a significant barrier. More than 15 percent of all adults living in the United States …
A Rule Of Persons, Not Machines: The Limits Of Legal Automation, Frank A. Pasquale
A Rule Of Persons, Not Machines: The Limits Of Legal Automation, Frank A. Pasquale
Faculty Scholarship
No abstract provided.
How Do Lawyers Think Differently From Stem Professionals When Approaching Problems And Risk, Jessica Silbey
How Do Lawyers Think Differently From Stem Professionals When Approaching Problems And Risk, Jessica Silbey
Faculty Scholarship
Conference: Bridges II: The Law-STEM Alliance & Next Generation Innovation
Following the Bridges II conference, a select group of scholars met to discuss challenges facing law and technology. NULRO, along with David Schwartz and Leslie Oster, asked the participants to respond to prompts generated from that meeting.
E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce, Cyber, And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
By now, almost without exception, every business has an internet presence, and is likely engaged in e-commerce. What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What potential risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials …
Regulating Real-World Surveillance, Margot E. Kaminski
Regulating Real-World Surveillance, Margot E. Kaminski
Publications
A number of laws govern information gathering, or surveillance, by private parties in the physical world. But we lack a compelling theory of privacy harm that accounts for the state's interest in enacting these laws. Without a theory of privacy harm, these laws will be enacted piecemeal. Legislators will have a difficult time justifying the laws to constituents; the laws will not be adequately tailored to legislative interest; and courts will find it challenging to weigh privacy harms against other strong values, such as freedom of expression.
This Article identifies the government interest in enacting laws governing surveillance by private …
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …
Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman
Virtual Currencies: Bitcoin & What Now After Liberty Reserve, Silk Road, And Mt. Gox?, Lawrence J. Trautman
Lawrence J. Trautman Sr.
During 2013, the U.S. Treasury Department evoked the first use of the 2001 Patriot Act to exclude virtual currency provider Liberty Reserve from the U.S. financial system. This article will discuss: the regulation of virtual currencies; cybercrimes and payment systems; darknets, Tor and the “deep web;” Bitcoin; Liberty Reserve; Silk Road and Mt. Gox. Virtual currencies have quickly become a reality, gaining significant traction in a very short period of time, and are evolving rapidly. Virtual currencies present particularly difficult law enforcement challenges because of their: ability to transcend national borders in the fraction of a second; unique jurisdictional issues; …
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …