Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Pennsylvania Carey Law School

Discipline
Keyword
Publication Year

Articles 1 - 30 of 33

Full-Text Articles in Science and Technology Studies

Regulating Machine Learning: The Challenge Of Heterogeneity, Cary Coglianese Feb 2023

Regulating Machine Learning: The Challenge Of Heterogeneity, Cary Coglianese

All Faculty Scholarship

Machine learning, or artificial intelligence, refers to a vast array of different algorithms that are being put to highly varied uses, including in transportation, medicine, social media, marketing, and many other settings. Not only do machine-learning algorithms vary widely across their types and uses, but they are evolving constantly. Even the same algorithm can perform quite differently over time as it is fed new data. Due to the staggering heterogeneity of these algorithms, multiple regulatory agencies will be needed to regulate the use of machine learning, each within their own discrete area of specialization. Even these specialized expert agencies, though, …


Assessing Automated Administration, Cary Coglianese, Alicia Lai Apr 2022

Assessing Automated Administration, Cary Coglianese, Alicia Lai

All Faculty Scholarship

To fulfill their responsibilities, governments rely on administrators and employees who, simply because they are human, are prone to individual and group decision-making errors. These errors have at times produced both major tragedies and minor inefficiencies. One potential strategy for overcoming cognitive limitations and group fallibilities is to invest in artificial intelligence (AI) tools that allow for the automation of governmental tasks, thereby reducing reliance on human decision-making. Yet as much as AI tools show promise for improving public administration, automation itself can fail or can generate controversy. Public administrators face the question of when exactly they should use automation. …


Moving Toward Personalized Law, Cary Coglianese Mar 2022

Moving Toward Personalized Law, Cary Coglianese

All Faculty Scholarship

Rules operate as a tool of governance by making generalizations, thereby cutting down on government officials’ need to make individual determinations. But because they are generalizations, rules can result in inefficient or perverse outcomes due to their over- and under-inclusiveness. With the aid of advances in machine-learning algorithms, however, it is becoming increasingly possible to imagine governments shifting away from a predominant reliance on general rules and instead moving toward increased reliance on precise individual determinations—or on “personalized law,” to use the term Omri Ben-Shahar and Ariel Porat use in the title of their 2021 book. Among the various technological, …


Algorithm Vs. Algorithm, Cary Coglianese, Alicia Lai Jan 2022

Algorithm Vs. Algorithm, Cary Coglianese, Alicia Lai

All Faculty Scholarship

Critics raise alarm bells about governmental use of digital algorithms, charging that they are too complex, inscrutable, and prone to bias. A realistic assessment of digital algorithms, though, must acknowledge that government is already driven by algorithms of arguably greater complexity and potential for abuse: the algorithms implicit in human decision-making. The human brain operates algorithmically through complex neural networks. And when humans make collective decisions, they operate via algorithms too—those reflected in legislative, judicial, and administrative processes. Yet these human algorithms undeniably fail and are far from transparent. On an individual level, human decision-making suffers from memory limitations, fatigue, …


From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter Jan 2022

From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter

All Faculty Scholarship

Artificial intelligence, or “AI,” is raising alarm bells. Advocates and scholars propose policies to constrain or even prohibit certain AI uses by governmental entities. These efforts to establish a negative right to be free from AI stem from an understandable motivation to protect the public from arbitrary, biased, or unjust applications of algorithms. This movement to enshrine protective rights follows a familiar pattern of suspicion that has accompanied the introduction of other technologies into governmental processes. Sometimes this initial suspicion of a new technology later transforms into widespread acceptance and even a demand for its use. In this paper, we …


Regulating New Tech: Problems, Pathways, And People, Cary Coglianese Dec 2021

Regulating New Tech: Problems, Pathways, And People, Cary Coglianese

All Faculty Scholarship

New technologies bring with them many promises, but also a series of new problems. Even though these problems are new, they are not unlike the types of problems that regulators have long addressed in other contexts. The lessons from regulation in the past can thus guide regulatory efforts today. Regulators must focus on understanding the problems they seek to address and the causal pathways that lead to these problems. Then they must undertake efforts to shape the behavior of those in industry so that private sector managers focus on their technologies’ problems and take actions to interrupt the causal pathways. …


Antitrust And Platform Monopoly, Herbert J. Hovenkamp Nov 2021

Antitrust And Platform Monopoly, Herbert J. Hovenkamp

All Faculty Scholarship

Are large digital platforms that deal directly with consumers “winner take all,” or natural monopoly, firms? That question is surprisingly complex and does not produce the same answer for every platform. The closer one looks at digital platforms the less they seem to be winner-take-all. As a result, competition can be made to work in most of them. Further, antitrust enforcement, with its accommodation of firm variety, is generally superior to any form of statutory regulation that generalizes over large numbers.

Assuming that an antitrust violation is found, what should be the remedy? Breaking up large firms subject to extensive …


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

All Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Do Androids Dream Of Bad News?, Heidi H. Liu Jan 2017

Do Androids Dream Of Bad News?, Heidi H. Liu

All Faculty Scholarship

Breaking bad news is one of the toughest things to do in any field dealing with client care. As automation and technology increasingly interweave with human experience, there is growing concern about whether automated agents (‘‘AAs”) would be adequate to perform such a complex emotional act. In this paper, I draw from the literature in psychology and computer science to understand how individuals might react to automated agents (AAs) and address some of the strengths and limitations of AAs. I raise several legal and empirical issues that future designers and users of AAs must consider, including disclosure of and liability …


The Poverty Of The Neuroscience Of Poverty: Policy Payoff Or False Promise?, Amy L. Wax Jan 2017

The Poverty Of The Neuroscience Of Poverty: Policy Payoff Or False Promise?, Amy L. Wax

All Faculty Scholarship

A recent body of work in neuroscience examines the brains of people suffering from social and economic disadvantage. This article assesses claims that this research can help generate more effective strategies for addressing these social conditions and their effects. It concludes that the so-called neuroscience of deprivation has no unique practical payoff, and that scientists, journalists, and policy-makers should stop claiming otherwise. Because this research does not, and generally cannot, distinguish between innate versus environmental causes of brain characteristics, it cannot predict whether neurological and behavioral deficits can be addressed by reducing social deprivation. Also, knowledge of brain mechanisms yields …


Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo Jan 2016

Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo

All Faculty Scholarship

One key aspect of the debate over network neutrality has been whether and how network neutrality should apply to wireless networks. The existing commentary has focused on the economics of wireless network neutrality, but to date a detailed analysis of how the technical aspects of wireless networks affect the implementation of network neutrality has yet to appear in the literature. As an initial matter, bad handoffs, local congestion, and the physics of wave propagation make wireless broadband networks significantly less reliable than fixed broadband networks. These technical differences require the network to manage dropped packets and congestion in a way …


Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle Jan 2016

Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle

All Faculty Scholarship

This Article examines the role military automated surveillance and intelligence systems and techniques have supported a self-reinforcing racial bias when used by civilian police departments to enhance predictive policing programs. I will focus on two facets of this problem. First, my research will take an inside-out perspective, studying the role played by advanced military technologies and methods within civilian police departments, and how they have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools, and which automates de facto penalization and …


Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern Apr 2015

Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern

All Faculty Scholarship

Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Layers Of Law: The Case Of E-Cigarettes, Eric A. Feldman Jan 2014

Layers Of Law: The Case Of E-Cigarettes, Eric A. Feldman

All Faculty Scholarship

This paper, written for a symposium on "Layers of Law and Social Order," connects the current debate over the regulation of electronic cigarettes with socio-legal scholarship on law, norms, and social control. Although almost every aspect of modern life that is subject to regulation can be seen through the framework ‘layers of law,’ e-cigarettes are distinguished by the rapid emergence of an unusually dense legal and regulatory web. In part, the dense fabric of e-cigarette law and regulation, both within and beyond the US, results from the lack of robust scientific and epidemiological data on the behavioral and health consequences …


Patent Value And Citations: Creative Destruction Or Strategic Disruption?, David S. Abrams, Ufuk Akcigit, Jillian Popadak Nov 2013

Patent Value And Citations: Creative Destruction Or Strategic Disruption?, David S. Abrams, Ufuk Akcigit, Jillian Popadak

All Faculty Scholarship

Prior work suggests that more valuable patents are cited more and this view has become standard in the empirical innovation literature. Using an NPE-derived dataset with patent-specific revenues we find that the relationship of citations to value in fact forms an inverted-U, with fewer citations at the high end of value than in the middle. Since the value of patents is concentrated in those at the high end, this is a challenge to both the empirical literature and the intuition behind it. We attempt to explain this relationship with a simple model of innovation, allowing for both productive and strategic …


The Taxation Of Cloud Computing And Digital Content, David Shakow Jul 2013

The Taxation Of Cloud Computing And Digital Content, David Shakow

All Faculty Scholarship

“Cloud computing” raises important and difficult questions in state tax law, and for Federal taxes, particularly in the foreign tax area. As cloud computing solutions are adopted by businesses, items we view as tangible are transformed into digital products. In this article, I will describe the problems cloud computing poses for tax systems. I will show how current law is applied to cloud computing and will identify the difficulties current approaches face as they are applied to this developing technology.

My primary interest is how Federal tax law applies to cloud computing, particularly as the new technology affects international transactions. …


Shots For Tots?, Eric A. Feldman May 2013

Shots For Tots?, Eric A. Feldman

All Faculty Scholarship

By endorsing the use of a vaccine that makes the experience of puffing on a cigarette deeply distasteful, Lieber and Millum have taken the first few tentative steps into a future filled with medical interventions that manipulate individual preferences. It is tempting to embrace the careful arguments of “Preventing Sin” and celebrate the possibility that the profound individual and social costs of smoking will finally be tamed. Yet there is something unsettling about the possibility that parental discretion may be on the cusp of a radical expansion, one that involves a new and unexplored approach to behavior modification.


Poisoning The Next Apple? The America Invents Act And Individual Inventors, David S. Abrams, R. Polk Wagner Mar 2013

Poisoning The Next Apple? The America Invents Act And Individual Inventors, David S. Abrams, R. Polk Wagner

All Faculty Scholarship

The Leahy-Smith America Invents Act, the most significant patent law reform effort in two generations, has a dark side: It seems likely to decrease the patenting behavior of small inventors, a category which occupies special significance in American innovation history. In this paper we empirically predict the effects of the major change in the law: a shift in the patent priority rules from the United States’ traditional “first-to-invent” system to the predominant “first-to-file” system. While there has been some theoretical work on this topic, we use the Canadian experience with a similar change as a natural experiment to shed …


When Antitrust Met Facebook, Christopher S. Yoo Jul 2012

When Antitrust Met Facebook, Christopher S. Yoo

All Faculty Scholarship

Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …


The Uncertain Future Of "Hot News" Misappropriation After Barclays Capital V. Theflyonthewall.Com, Shyamkrishna Balganesh Jun 2012

The Uncertain Future Of "Hot News" Misappropriation After Barclays Capital V. Theflyonthewall.Com, Shyamkrishna Balganesh

All Faculty Scholarship

This is a follow-up piece to Professor Balganesh's 'Hot News': The Enduring Myth of Property in News, 111 COLUM. L. REV. 419 (2011), based on the Second Circuit's decision in Barclays Capital Inc. v. Theflyonthewall.com, 650 F.3d 876 (2d Cir. 2011).


Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo Mar 2011

Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo

All Faculty Scholarship

This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.


Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo Nov 2010

Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo

All Faculty Scholarship

Much of the recent debate over Internet policy has focused on the permissibility of business practices that are becoming increasingly common, such as new forms of network management, prioritization, pricing, and strategic partnerships. This Essay analyzes these developments through the lens of the management literature on the product life cycle, dominant designs, technological trajectories and design hierarchies, and the role of complementary assets in determining industry structure. This analysis suggests that many of these business practices may represent nothing more than a reflection of how the nature of competition changes as industries mature. This in turn suggests that network neutrality …


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


Network Neutrality Or Internet Innovation?, Christopher S. Yoo Apr 2010

Network Neutrality Or Internet Innovation?, Christopher S. Yoo

All Faculty Scholarship

Over the past two decades, the Internet has undergone an extensive re-ordering of its topology that has resulted in increased variation in the price and quality of its services. Innovations such as private peering, multihoming, secondary peering, server farms, and content delivery networks have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Relatedly, network providers have begun to employ an increasingly varied array of business arrangements and pricing. This variation has been interpreted by some as network providers attempting to promote their self interest at the expense of the public. In fact, these …


Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo Jan 2010

Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo

All Faculty Scholarship

The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …


The Changing Patterns Of Internet Usage, Christopher S. Yoo Jan 2010

The Changing Patterns Of Internet Usage, Christopher S. Yoo

All Faculty Scholarship

The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …


The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo Dec 2009

The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo

All Faculty Scholarship

This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …


Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo Feb 2009

Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo

All Faculty Scholarship

The Federal Communications Commission’s recent Comcast decision has rejected categorical, ex ante restrictions on Internet providers’ ability to manage their networks in favor of a more flexible approach that examines each dispute on a case-by-case basis, as I have long advocated. This book chapter, written for a conference held in February 2009, discusses the considerations that a case-by-case approach should take into account. First, allowing the network to evolve will promote innovation by allowing the emergence of applications that depend on a fundamentally different network architecture. Indeed, as the universe of Internet users and applications becomes more heterogeneous, it is …