Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 61 - 90 of 1133

Full-Text Articles in Computer Sciences

Criminal Policy To Combat The Spread Of Electronic Rumours (Under Decree-Law No. 34 Of 2021 On Combating Rumours And Cyber Crimes), Ashraf Kandil Jul 2022

Criminal Policy To Combat The Spread Of Electronic Rumours (Under Decree-Law No. 34 Of 2021 On Combating Rumours And Cyber Crimes), Ashraf Kandil

Journal of Police and Legal Sciences

The UAE's role in combating electronic rumors and reducing its dissemination has been demonstrated by the legislative development of IT crime laws in the UAE. The most recent is the issuance of the Federal Decree-Law No. (34) of 2021 concerning the fight against rumors and cybercrime. Otherwise, the problem of the current study revolves around the flexibility of drafting the procedural texts in order to deal with the constant development of the forms and circumstances of spreading rumors, as well as to indicate their effectiveness in reducing their effects. Therefore, the current study aims to identify the criminal policy to …


To License Or Not To License Reexamined: An Updated Report On Licensing Of Digital Examiners Under State Private Investigator Statutes, Thomas Lonardo, Alan Rea, Doug White Jul 2022

To License Or Not To License Reexamined: An Updated Report On Licensing Of Digital Examiners Under State Private Investigator Statutes, Thomas Lonardo, Alan Rea, Doug White

Journal of Digital Forensics, Security and Law

In this update to the 2015 study, the authors examine US state statutes and regulations relating to licensing and enforcement of Digital Examiner functions under each state’s private investigator/detective statute. As with the prior studies, the authors find that very few state statutes explicitly distinguish between Private Investigators (PI) and Digital Examiners (DE), and when they do, they either explicitly require a license or exempt them from the licensing statute. As noted in the previous 2015 study there is a minor trend in which some states are moving to exempt DE from PI licensing requirements. We examine this trend as …


Biometrics And An Ai Bill Of Rights, Margaret Hu Jul 2022

Biometrics And An Ai Bill Of Rights, Margaret Hu

Faculty Publications

This Article contends that an informed discussion on an AI Bill of Rights requires grappling with biometric data collection and its integration into emerging AI systems. Biometric AI systems serve a wide range of governmental purposes, including policing, border security and immigration enforcement, and biometric cyberintelligence and biometric-enabled warfare. These systems are increasingly categorized as "high-risk" when deployed in ways that may impact fundamental constitutional rights and human rights. There is growing recognition that high-risk biometric AI systems, such as facial recognition identification, can pose unprecedented challenges to criminal procedure rights. This Article concludes that a failure to recognize these …


Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur Jun 2022

Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur

Publications and Research

What if people had the ability to assert their own legally binding permissions for data collection, use, sharing, and retention by the technologies they use? The IEEE P7012 has been working on an interoperability specification for machine-readable personal privacy terms to support this ability since 2018. The premise behind the work of IEEE P7012 is that people need technology that works on their behalf—i.e. software agents that assert the individual’s permissions and preferences in a machine-readable format.

Thanks to a grant from the IEEE Technical Activities Board Committee on Standards (TAB CoS), we were able to explore the attitudes of …


Gauging The Acceptance Of Contact Tracing Technology: An Empirical Study Of Singapore Residents’ Concerns With Sharing Their Information And Willingness To Trust, Ee-Ing Ong, Wee Ling Loo Jun 2022

Gauging The Acceptance Of Contact Tracing Technology: An Empirical Study Of Singapore Residents’ Concerns With Sharing Their Information And Willingness To Trust, Ee-Ing Ong, Wee Ling Loo

Research Collection Yong Pung How School Of Law

In response to the COVID-19 pandemic, governments began implementing various forms of contact tracing technology. Singapore’s implementation of its contact tracing technology, TraceTogether, however, was met with significant concern by its population, with regard to privacy and data security. This concern did not fit with the general perception that Singaporeans have a high level of trust in its government. We explore this disconnect, using responses to our survey (conducted pre-COVID-19) in which we asked participants about their level of concern with the government and business collecting certain categories of personal data. The results show that respondents had less concern with …


Where Is The Author: The Copyright Protection For Ai-Generated Works, Chieh Huang Jun 2022

Where Is The Author: The Copyright Protection For Ai-Generated Works, Chieh Huang

Maurer Theses and Dissertations

The two groups of the human-or-machine questions, whether AI-generated works are copyrightable and whether AI-generated works have human authors, are revisiting the current copyright law with the emergence of AI-generated works. These revisiting questions reveal that the current authorship requirement fails to provide a clear and operable standard on evaluating a human contributor’s intellectual labor for creative output. Such a defect of the current authorship requirement has to be fixed to respond to the technological change of artificial intelligence and the burgeoning prevalence of AI- or advanced computer program-generated works.

This dissertation’s main goal is to fix the flaw …


Problematic Ai — When Should We Use It?, Fredric Lederer May 2022

Problematic Ai — When Should We Use It?, Fredric Lederer

Popular Media

No abstract provided.


Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa May 2022

Small Business Cybersecurity: A Loophole To Consumer Data, Matthew R. Espinosa

The Scholar: St. Mary's Law Review on Race and Social Justice

Small businesses and small minority owned businesses are vital to our nation’s economy; therefore legislation, regulation, and policy has been created in order to assist them in overcoming their economic stability issues and ensure they continue to serve the communities that rely on them. However, there is not a focus on regulating nor assisting small businesses to ensure their cybersecurity standards are up to par despite them increasingly becoming a victim of cyberattacks that yield high consequences. The external oversight and assistance is necessary for small businesses due to their lack of knowledge in implementing effective cybersecurity policies, the fiscal …


Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley May 2022

Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley

University of Cincinnati Law Review

No abstract provided.


The Executive’S Guide To Getting Ai Wrong, Jerrold Soh May 2022

The Executive’S Guide To Getting Ai Wrong, Jerrold Soh

Asian Management Insights

It’s all math. Really.


Unreasonable: A Strict Liability Solution To The Ftc’S Data Security Problem, James C. Cooper, Bruce H. Kobayashi Apr 2022

Unreasonable: A Strict Liability Solution To The Ftc’S Data Security Problem, James C. Cooper, Bruce H. Kobayashi

Michigan Technology Law Review

For over two decades, the FTC creatively employed its capacious statute to police against shoddy data practices. Although the FTC’s actions were arguably needed at the time to fill a gap in enforcement, there are reasons to believe that its current approach has outlived its usefulness and is in serious need of updating. In particular, our analysis shows that the FTC’s current approach to data security is unlikely to instill anything close to optimal incentives for data holders. These shortcomings cannot be fixed through changes to the FTC enforcement approach, as they are largely generated by a mismatch between the …


A New Metaphor: How Artificial Intelligence Links Legal Reasoning And Mathematical Thinking, Melissa E. Love Koenig, Colleen Mandell Apr 2022

A New Metaphor: How Artificial Intelligence Links Legal Reasoning And Mathematical Thinking, Melissa E. Love Koenig, Colleen Mandell

Marquette Law Review

Artificial intelligence’s (AI’s) impact on the legal community expands exponentially each year. As AI advances, lawyers have more powerful tools to enhance their ability to research and analyze the law, as well as to draft contracts and other legal documents. Lawyers are already using tools powered by AI and are learning to shift their methodologies to take advantage of these enhancements. To continue to grow into their shifting role, lawyers should understand the relationship between AI, mathematics, and legal reasoning.


Application Of U.S. Sanction Laws And Ransomware Payments, Trinity Woodbury Apr 2022

Application Of U.S. Sanction Laws And Ransomware Payments, Trinity Woodbury

Cybersecurity Undergraduate Research Showcase

Ransomware is a major threat that widely affects individuals and organizations, including businesses. Ransomware victims face the situation of potentially paying ransom payments to threat actors, some of whom might be foreign-based criminals. Ransomware affects victims from all sectors and industries.


Ai Insurance: How Liability Insurance Can Drive The Responsible Adoption Of Artificial Intelligence In Health Care, Ariel Dora Stern, Avi Goldfarb, Timo Minssen, W. Nicholson Price Ii Apr 2022

Ai Insurance: How Liability Insurance Can Drive The Responsible Adoption Of Artificial Intelligence In Health Care, Ariel Dora Stern, Avi Goldfarb, Timo Minssen, W. Nicholson Price Ii

Articles

Despite enthusiasm about the potential to apply artificial intelligence (AI) to medicine and health care delivery, adoption remains tepid, even for the most compelling technologies. In this article, the authors focus on one set of challenges to AI adoption: those related to liability. Well-designed AI liability insurance can mitigate predictable liability risks and uncertainties in a way that is aligned with the interests of health care’s main stakeholders, including patients, physicians, and health care organization leadership. A market for AI insurance will encourage the use of high-quality AI, because insurers will be most keen to underwrite those products that are …


Volume Introduction, I. Glenn Cohen, Timo Minssen, W. Nicholson Price Ii, Christopher Robertson, Carmel Shachar Mar 2022

Volume Introduction, I. Glenn Cohen, Timo Minssen, W. Nicholson Price Ii, Christopher Robertson, Carmel Shachar

Other Publications

Medical devices have historically been less regulated than their drug and biologic counterparts. A benefit of this less demanding regulatory regime is facilitating innovation by making new devices available to consumers in a timely fashion. Nevertheless, there is increasing concern that this approach raises serious public health and safety concerns. The Institute of Medicine in 2011 published a critique of the American pathway allowing moderate-risk devices to be brought to the market through the less-rigorous 501(k) pathway,1 flagging a need for increased postmarket review and surveillance. High-profile recalls of medical devices, such as vaginal mesh products, along with reports globally …


Proposed L-Shape Pattern On Ufs Acm For Risk Analysis, Abhishek Asthana, Padma Lochan Pradhan Dr Mar 2022

Proposed L-Shape Pattern On Ufs Acm For Risk Analysis, Abhishek Asthana, Padma Lochan Pradhan Dr

Journal of Digital Forensics, Security and Law

At this cloud age, there is tremendous growth in business, services, resources, and cloud technology. This growth comes with a risk of unsafe, unordered, and uncertainty due to unauthorized access and theft of confidential propriety data. Our objective is to model around Read, Write and Execute to resolve these unordered, unsafe, and uncertain issues. We will develop a L-Shape pattern model matching UFS ACM to minimize the accessibilities based on RIGHT & ROLE of the resources and maximize the quality of services for safety and high availability. The preventive, detective, corrective (PDC) services are the major roles for all levels …


Chatgpt Goes To Law School, Jonathan H. Choi, Kristin E. Hickman, Amy B. Monahan, Daniel Schwarcz Mar 2022

Chatgpt Goes To Law School, Jonathan H. Choi, Kristin E. Hickman, Amy B. Monahan, Daniel Schwarcz

Journal of Legal Education

No abstract provided.


A Critical Comparison Of Brave Browser And Google Chrome Forensic Artefacts, Stuart Berham, Sarah Morris Mar 2022

A Critical Comparison Of Brave Browser And Google Chrome Forensic Artefacts, Stuart Berham, Sarah Morris

Journal of Digital Forensics, Security and Law

Digital forensic practitioners are tasked with the identification, recovery and analysis of Internet browser artefacts which may have been used in the pursuit of committing a civil or criminal offence. This research paper critically compares the most downloaded browser, Google Chrome, against an increasingly popular Chromium browser known as Brave, said to offer privacy-by-default. With increasing forensic caseloads, data complexity, and requirements for method validation to satisfy ISO 17025 accreditation, recognising the similarities and differences between the browsers, developed on the same underlying technology is essential. The paper describes a series of conducted experiments and subsequent analysis to identify artefacts …


Moving Toward Personalized Law, Cary Coglianese Mar 2022

Moving Toward Personalized Law, Cary Coglianese

All Faculty Scholarship

Rules operate as a tool of governance by making generalizations, thereby cutting down on government officials’ need to make individual determinations. But because they are generalizations, rules can result in inefficient or perverse outcomes due to their over- and under-inclusiveness. With the aid of advances in machine-learning algorithms, however, it is becoming increasingly possible to imagine governments shifting away from a predominant reliance on general rules and instead moving toward increased reliance on precise individual determinations—or on “personalized law,” to use the term Omri Ben-Shahar and Ariel Porat use in the title of their 2021 book. Among the various technological, …


Trust In Robotics: A Multi-Staged Decision-Making Approach To Robots In Community, Wenxi Zhang, Willow Wong, Mark Findlay Mar 2022

Trust In Robotics: A Multi-Staged Decision-Making Approach To Robots In Community, Wenxi Zhang, Willow Wong, Mark Findlay

Centre for AI & Data Governance

Pivoting on the desired outcome of social good within the wider robotics ecosystem, trust is identified as the central adhesive of the HRI interface. However, building trust between humans and robots involves more than improving the machine’s technical reliability or trustworthiness in function. This paper presents a holistic, community-based approach to trust-building, where trust is understood as a multifaceted and multi-staged looped relation that depends heavily on context and human perceptions. Building on past literature that identifies dispositional and learned stages of trust, our proposed Decision to Trust model considers more extensively the human and situational factors influencing how trust …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel Feb 2022

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek Jan 2022

On The Horizon: Nanosatellite Constellations Will Revolutionize The Internet Of Things (Iot), Diane Janosek

Seattle Journal of Technology, Environmental & Innovation Law

The Internet of Things has experienced exponential growth and use across the globe with 25.1 billion devices currently in use. Until recently, the functionality of the IoT was dependent on secure data flow between internet terrestrial stations and the IoT devices. Now, a new alternative path of data flow is on the horizon.

IoT device manufacturers are now looking to outer space nanosatellite constellations to connect to a different type of internet. This new internet is no longer terrestrial with fiber cables six feet underground but now looking up, literally, 200 to 300 miles above the earth, to communicate, connect …


Me2b Alliance Validation Testing Report: Consumer Perception Of Legal Policies In Digital Technology, Noreen Y. Whysel, Karina Alexanyan, Shaun Spaulting, Julia Little Jan 2022

Me2b Alliance Validation Testing Report: Consumer Perception Of Legal Policies In Digital Technology, Noreen Y. Whysel, Karina Alexanyan, Shaun Spaulting, Julia Little

Publications and Research

Our relationship with technology involves legal agreements that we either review or enter into when using a technology, namely privacy policies and terms of service or terms of use (“TOS/TOU”). We initiated this research to understand if providing a formal rating of the legal policies (privacy policies and TOS/TOUs) would be valuable to consumers (or Me-s). From our early qualitative discussions, we noticed that people were unclear on whether these policies were legally binding contracts or not. Thus, a secondary objective emerged to quantitatively explore whether people knew who these policies protected (if anyone), and if the policies were perceived …


Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020, Martin Novak Jan 2022

Digital Evidence In Appeals Of Criminal Cases Before The U.S. Courts Of Appeal: A Review Of Decisions And Examination Of The Legal Landscape From 2016 – 2020, Martin Novak

Journal of Digital Forensics, Security and Law

This study is a follow-up to Digital Evidence in Criminal Cases before the U.S. Courts of Appeal: Trends and Issues for Consideration – 2010 to 2015. The current study examines appeals of criminal cases before the United States Courts of Appeal from January 2016 through August 2020, where one or more appeal claims were related to digital evidence. The purpose of this research was to determine if the legal landscape has changed since 2015; examine the most relevant legal issues related to digital evidence; and analyze how precedential cases may have affected digital forensics as evidence.


Security Strategy In Combating Online Extremist Ideologies In Uae, Khalid Al-Qasimi Jan 2022

Security Strategy In Combating Online Extremist Ideologies In Uae, Khalid Al-Qasimi

Journal of Police and Legal Sciences

This study aims at identifying the role of security strategies; the foundations of correct belief and good upbringing in the face of extremist ideology in order to protect the intellectual security of society. The researcher adopted the descriptive analytical approach in order to describe and analyze the role of the security strategy, the foundations of the correct faith and good upbringing in spreading moderation and combating extremist ideology through electronic websites.

The study has arrived at a number of findings, the most important of which are: extremist ideology cannot be confronted by traditional methods, but must be combated through modern …


Clinical Interactions In Electronic Medical Records Towards The Development Of A Token-Economy Model, Nicole Allison S. Co, Jason Limcaco, Hans Calvin L. Tan, Ma. Regina Justina E. Estuar, Christian E. Pulmano, Dennis Andrew Villamor, Quirino Sugon Jr, Maria Cristina G. Bautista, Paulyn Jean Acacio-Claro Jan 2022

Clinical Interactions In Electronic Medical Records Towards The Development Of A Token-Economy Model, Nicole Allison S. Co, Jason Limcaco, Hans Calvin L. Tan, Ma. Regina Justina E. Estuar, Christian E. Pulmano, Dennis Andrew Villamor, Quirino Sugon Jr, Maria Cristina G. Bautista, Paulyn Jean Acacio-Claro

Graduate School of Business Publications

The use of electronic medical records (EMRs) plays a crucial role in the successful implementation of the Universal Healthcare Law which promises quality and affordable healthcare to all Filipinos. Consequently, the current adoption of EMRs should be studied from the perspective of the healthcare provider. As most studies look into use of EMRs by doctors or patients, there are very few that extend studies to look at possible interaction of doctor and patient in the same EMR environment. Understanding this interaction paves the way for possible incentives that will increase the use and adoption of the EMR. This study uses …


Technical Behaviours Of Child Sexual Exploitation Material Offenders, Chad Steel, Emily Newman, Suzanne O'Rourke, Ethel Quayle Jan 2022

Technical Behaviours Of Child Sexual Exploitation Material Offenders, Chad Steel, Emily Newman, Suzanne O'Rourke, Ethel Quayle

Journal of Digital Forensics, Security and Law

An exploration of the technological behaviours of previously convicted child sexual exploitation material (CSEM) offenders provides a foundation for future applied research into deterrence, investigation, and treatment efforts. This study evaluates the technology choices and transitions of individuals previously convicted of CSEM offenses. Based on their inclusion in two sex offender registries, anonymous survey results (n=78) were collected from English-speaking adults within the United States. CSEM offenders chose technologies based on both utility and perceived risk; peer-to-peer and web-browsers were the most common gateway technologies and showed substantial sustained usage; a substantial minority of users never stored CSEM and only …


Forensic Discoverability Of Ios Vault Applications, Alissa Gilbert, Kathryn C. Seigfried-Spellar Jan 2022

Forensic Discoverability Of Ios Vault Applications, Alissa Gilbert, Kathryn C. Seigfried-Spellar

Journal of Digital Forensics, Security and Law

Vault Applications are used to store potentially sensitive information on a smartphone; and are available on Android and iOS. The purpose of using these applications could be used to hide potential evidence or illicit photos. After comparing five different iOS photo vaults, each vault left evidence and photos behind. However, of the three forensic toolkits used, each produced different results in their scans of the phone. The media left behind was due to the photo vaults not protecting their information as claimed, and using basic obfuscation techniques in place of security controls. Future research will look at how newer security …


Part I - Ai And Data As Medical Devices, W. Nicholson Price Ii Jan 2022

Part I - Ai And Data As Medical Devices, W. Nicholson Price Ii

Other Publications

It may seem counterintuitive to open a book on medical devices with chapters on software and data, but these are the frontiers of new medical device regulation and law. Physical devices are still crucial to medicine, but they – and medical practice as a whole – are embedded in and permeated by networks of software and caches of data. Those software systems are often mindbogglingly complex and largely inscrutable, involving artificial intelligence and machine learning. Ensuring that such software works effectively and safely remains a substantial challenge for regulators and policymakers. Each of the three chapters in this part examines …


Algorithm Vs. Algorithm, Cary Coglianese, Alicia Lai Jan 2022

Algorithm Vs. Algorithm, Cary Coglianese, Alicia Lai

All Faculty Scholarship

Critics raise alarm bells about governmental use of digital algorithms, charging that they are too complex, inscrutable, and prone to bias. A realistic assessment of digital algorithms, though, must acknowledge that government is already driven by algorithms of arguably greater complexity and potential for abuse: the algorithms implicit in human decision-making. The human brain operates algorithmically through complex neural networks. And when humans make collective decisions, they operate via algorithms too—those reflected in legislative, judicial, and administrative processes. Yet these human algorithms undeniably fail and are far from transparent. On an individual level, human decision-making suffers from memory limitations, fatigue, …