Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 26 of 26

Full-Text Articles in Science and Technology Studies

Regulating Machine Learning: The Challenge Of Heterogeneity, Cary Coglianese Feb 2023

Regulating Machine Learning: The Challenge Of Heterogeneity, Cary Coglianese

All Faculty Scholarship

Machine learning, or artificial intelligence, refers to a vast array of different algorithms that are being put to highly varied uses, including in transportation, medicine, social media, marketing, and many other settings. Not only do machine-learning algorithms vary widely across their types and uses, but they are evolving constantly. Even the same algorithm can perform quite differently over time as it is fed new data. Due to the staggering heterogeneity of these algorithms, multiple regulatory agencies will be needed to regulate the use of machine learning, each within their own discrete area of specialization. Even these specialized expert agencies, though, …


Assessing Automated Administration, Cary Coglianese, Alicia Lai Apr 2022

Assessing Automated Administration, Cary Coglianese, Alicia Lai

All Faculty Scholarship

To fulfill their responsibilities, governments rely on administrators and employees who, simply because they are human, are prone to individual and group decision-making errors. These errors have at times produced both major tragedies and minor inefficiencies. One potential strategy for overcoming cognitive limitations and group fallibilities is to invest in artificial intelligence (AI) tools that allow for the automation of governmental tasks, thereby reducing reliance on human decision-making. Yet as much as AI tools show promise for improving public administration, automation itself can fail or can generate controversy. Public administrators face the question of when exactly they should use automation. …


Moving Toward Personalized Law, Cary Coglianese Mar 2022

Moving Toward Personalized Law, Cary Coglianese

All Faculty Scholarship

Rules operate as a tool of governance by making generalizations, thereby cutting down on government officials’ need to make individual determinations. But because they are generalizations, rules can result in inefficient or perverse outcomes due to their over- and under-inclusiveness. With the aid of advances in machine-learning algorithms, however, it is becoming increasingly possible to imagine governments shifting away from a predominant reliance on general rules and instead moving toward increased reliance on precise individual determinations—or on “personalized law,” to use the term Omri Ben-Shahar and Ariel Porat use in the title of their 2021 book. Among the various technological, …


Algorithm Vs. Algorithm, Cary Coglianese, Alicia Lai Jan 2022

Algorithm Vs. Algorithm, Cary Coglianese, Alicia Lai

All Faculty Scholarship

Critics raise alarm bells about governmental use of digital algorithms, charging that they are too complex, inscrutable, and prone to bias. A realistic assessment of digital algorithms, though, must acknowledge that government is already driven by algorithms of arguably greater complexity and potential for abuse: the algorithms implicit in human decision-making. The human brain operates algorithmically through complex neural networks. And when humans make collective decisions, they operate via algorithms too—those reflected in legislative, judicial, and administrative processes. Yet these human algorithms undeniably fail and are far from transparent. On an individual level, human decision-making suffers from memory limitations, fatigue, …


From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter Jan 2022

From Negative To Positive Algorithm Rights, Cary Coglianese, Kat Hefter

All Faculty Scholarship

Artificial intelligence, or “AI,” is raising alarm bells. Advocates and scholars propose policies to constrain or even prohibit certain AI uses by governmental entities. These efforts to establish a negative right to be free from AI stem from an understandable motivation to protect the public from arbitrary, biased, or unjust applications of algorithms. This movement to enshrine protective rights follows a familiar pattern of suspicion that has accompanied the introduction of other technologies into governmental processes. Sometimes this initial suspicion of a new technology later transforms into widespread acceptance and even a demand for its use. In this paper, we …


Regulating New Tech: Problems, Pathways, And People, Cary Coglianese Dec 2021

Regulating New Tech: Problems, Pathways, And People, Cary Coglianese

All Faculty Scholarship

New technologies bring with them many promises, but also a series of new problems. Even though these problems are new, they are not unlike the types of problems that regulators have long addressed in other contexts. The lessons from regulation in the past can thus guide regulatory efforts today. Regulators must focus on understanding the problems they seek to address and the causal pathways that lead to these problems. Then they must undertake efforts to shape the behavior of those in industry so that private sector managers focus on their technologies’ problems and take actions to interrupt the causal pathways. …


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo Jan 2016

Wireless Network Neutrality: Technological Challenges And Policy Implications, Christopher S. Yoo

All Faculty Scholarship

One key aspect of the debate over network neutrality has been whether and how network neutrality should apply to wireless networks. The existing commentary has focused on the economics of wireless network neutrality, but to date a detailed analysis of how the technical aspects of wireless networks affect the implementation of network neutrality has yet to appear in the literature. As an initial matter, bad handoffs, local congestion, and the physics of wave propagation make wireless broadband networks significantly less reliable than fixed broadband networks. These technical differences require the network to manage dropped packets and congestion in a way …


Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle Jan 2016

Tightening The Ooda Loop: Police Militarization, Race, And Algorithmic Surveillance, Jeffrey L. Vagle

All Faculty Scholarship

This Article examines the role military automated surveillance and intelligence systems and techniques have supported a self-reinforcing racial bias when used by civilian police departments to enhance predictive policing programs. I will focus on two facets of this problem. First, my research will take an inside-out perspective, studying the role played by advanced military technologies and methods within civilian police departments, and how they have enabled a new focus on deterrence and crime prevention by creating a system of structural surveillance where decision support relies increasingly upon algorithms and automated data analysis tools, and which automates de facto penalization and …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Layers Of Law: The Case Of E-Cigarettes, Eric A. Feldman Jan 2014

Layers Of Law: The Case Of E-Cigarettes, Eric A. Feldman

All Faculty Scholarship

This paper, written for a symposium on "Layers of Law and Social Order," connects the current debate over the regulation of electronic cigarettes with socio-legal scholarship on law, norms, and social control. Although almost every aspect of modern life that is subject to regulation can be seen through the framework ‘layers of law,’ e-cigarettes are distinguished by the rapid emergence of an unusually dense legal and regulatory web. In part, the dense fabric of e-cigarette law and regulation, both within and beyond the US, results from the lack of robust scientific and epidemiological data on the behavioral and health consequences …


Patent Value And Citations: Creative Destruction Or Strategic Disruption?, David S. Abrams, Ufuk Akcigit, Jillian Popadak Nov 2013

Patent Value And Citations: Creative Destruction Or Strategic Disruption?, David S. Abrams, Ufuk Akcigit, Jillian Popadak

All Faculty Scholarship

Prior work suggests that more valuable patents are cited more and this view has become standard in the empirical innovation literature. Using an NPE-derived dataset with patent-specific revenues we find that the relationship of citations to value in fact forms an inverted-U, with fewer citations at the high end of value than in the middle. Since the value of patents is concentrated in those at the high end, this is a challenge to both the empirical literature and the intuition behind it. We attempt to explain this relationship with a simple model of innovation, allowing for both productive and strategic …


The Taxation Of Cloud Computing And Digital Content, David Shakow Jul 2013

The Taxation Of Cloud Computing And Digital Content, David Shakow

All Faculty Scholarship

“Cloud computing” raises important and difficult questions in state tax law, and for Federal taxes, particularly in the foreign tax area. As cloud computing solutions are adopted by businesses, items we view as tangible are transformed into digital products. In this article, I will describe the problems cloud computing poses for tax systems. I will show how current law is applied to cloud computing and will identify the difficulties current approaches face as they are applied to this developing technology.

My primary interest is how Federal tax law applies to cloud computing, particularly as the new technology affects international transactions. …


Shots For Tots?, Eric A. Feldman May 2013

Shots For Tots?, Eric A. Feldman

All Faculty Scholarship

By endorsing the use of a vaccine that makes the experience of puffing on a cigarette deeply distasteful, Lieber and Millum have taken the first few tentative steps into a future filled with medical interventions that manipulate individual preferences. It is tempting to embrace the careful arguments of “Preventing Sin” and celebrate the possibility that the profound individual and social costs of smoking will finally be tamed. Yet there is something unsettling about the possibility that parental discretion may be on the cusp of a radical expansion, one that involves a new and unexplored approach to behavior modification.


When Antitrust Met Facebook, Christopher S. Yoo Jul 2012

When Antitrust Met Facebook, Christopher S. Yoo

All Faculty Scholarship

Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …


The Uncertain Future Of "Hot News" Misappropriation After Barclays Capital V. Theflyonthewall.Com, Shyamkrishna Balganesh Jun 2012

The Uncertain Future Of "Hot News" Misappropriation After Barclays Capital V. Theflyonthewall.Com, Shyamkrishna Balganesh

All Faculty Scholarship

This is a follow-up piece to Professor Balganesh's 'Hot News': The Enduring Myth of Property in News, 111 COLUM. L. REV. 419 (2011), based on the Second Circuit's decision in Barclays Capital Inc. v. Theflyonthewall.com, 650 F.3d 876 (2d Cir. 2011).


Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo Mar 2011

Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo

All Faculty Scholarship

This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.


Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo Nov 2010

Product Life Cycle Theory And The Maturation Of The Internet, Christopher S. Yoo

All Faculty Scholarship

Much of the recent debate over Internet policy has focused on the permissibility of business practices that are becoming increasingly common, such as new forms of network management, prioritization, pricing, and strategic partnerships. This Essay analyzes these developments through the lens of the management literature on the product life cycle, dominant designs, technological trajectories and design hierarchies, and the role of complementary assets in determining industry structure. This analysis suggests that many of these business practices may represent nothing more than a reflection of how the nature of competition changes as industries mature. This in turn suggests that network neutrality …


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


Network Neutrality Or Internet Innovation?, Christopher S. Yoo Apr 2010

Network Neutrality Or Internet Innovation?, Christopher S. Yoo

All Faculty Scholarship

Over the past two decades, the Internet has undergone an extensive re-ordering of its topology that has resulted in increased variation in the price and quality of its services. Innovations such as private peering, multihoming, secondary peering, server farms, and content delivery networks have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Relatedly, network providers have begun to employ an increasingly varied array of business arrangements and pricing. This variation has been interpreted by some as network providers attempting to promote their self interest at the expense of the public. In fact, these …


Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo Jan 2010

Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo

All Faculty Scholarship

The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …


The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo Dec 2009

The Convergence Of Broadcasting And Telephony: Legal And Regulatory Implications, Christopher S. Yoo

All Faculty Scholarship

This article, written for the inaugural issue of a new journal, analyzes the extent to which the convergence of broadcasting and telephony induced by the digitization of communications technologies is forcing policymakers to rethink their basic approach to regulating these industries. Now that voice and video are becoming available through every transmission technology, policymakers can no longer define the scope of regulatory obligations in terms of the mode of transmission. In addition, jurisdictions that employ separate agencies to regulate broadcasting and telephony must reform their institutional structures to bring both within the ambit of a single regulatory agency. The emergence …


Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo Feb 2009

Network Neutrality After Comcast: Toward A Case-By-Case Approach To Reasonable Network Management, Christopher S. Yoo

All Faculty Scholarship

The Federal Communications Commission’s recent Comcast decision has rejected categorical, ex ante restrictions on Internet providers’ ability to manage their networks in favor of a more flexible approach that examines each dispute on a case-by-case basis, as I have long advocated. This book chapter, written for a conference held in February 2009, discusses the considerations that a case-by-case approach should take into account. First, allowing the network to evolve will promote innovation by allowing the emergence of applications that depend on a fundamentally different network architecture. Indeed, as the universe of Internet users and applications becomes more heterogeneous, it is …


Problems Of Equity And Efficiency In The Design Of International Greenhouse Gas Cap-And-Trade Schemes, Jason S. Johnston Jan 2009

Problems Of Equity And Efficiency In The Design Of International Greenhouse Gas Cap-And-Trade Schemes, Jason S. Johnston

All Faculty Scholarship

This article argues that international greenhouse gas (GHG) cap-and-trade schemes suffer from inherent problems of enforceability and verifiability that both cause significant inefficiencies and create inevitable tradeoffs between equity and efficiency. A standard result in the economic analysis of international GHG cap and trade schemes is that an allocation of initial permits that favors poor, developing countries (making such countries net sellers in equilibrium) may be necessary not only to further redistributive goals but also the efficiency of the GHG cap and trade scheme. This coincidence of equity and efficiency is, however, unlikely to be realized under more realistic assumptions …


Did Trips Spur Innovation? An Empirical Analysis Of Patent Duration And Incentives To Innovate, David S. Abrams Jan 2009

Did Trips Spur Innovation? An Empirical Analysis Of Patent Duration And Incentives To Innovate, David S. Abrams

All Faculty Scholarship

How to structure IP laws in order to maximize social welfare by striking the right balance between incentives to innovate and access to innovation is an empirical question. It is a challenging one to answer, both because innovation is difficult to value and changes in IP protection are rare. The 1995 TRIPS agreement provides a unique opportunity to learn about this question for two reasons. First, the adoption of the agreement was uncertain until shortly before adoption, making it a plausibly exogenous change to patent duration. Second, the nature of the law change meant that the patent duration change was …


Toward A Unified Theory Of Access To Local Telephone Systems, Daniel F. Spulber, Christopher S. Yoo Dec 2008

Toward A Unified Theory Of Access To Local Telephone Systems, Daniel F. Spulber, Christopher S. Yoo

All Faculty Scholarship

One of the most distinctive developments in telecommunications policy over the past few decades has been the increasingly broad array of access requirements regulatory authorities have imposed on local telephone providers. In so doing, policymakers did not fully consider whether the justifications for regulating telecommunications remained valid. They also allowed each access regime to be governed by its own pricing methodology and set access prices in a way that treated each network component as if it existed in isolation. The result was a regulatory regime that was internally inconsistent, vulnerable to regulatory arbitrage, and unable to capture the interactions among …