Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2,119 Full-Text Articles 1,946 Authors 877,161 Downloads 83 Institutions

All Articles in Computer Law

Faceted Search

2,119 full-text articles. Page 1 of 41.

Rants And Raves: Craigslist's Attempt To Stop Innovating Third-Party Web Developers With Copyright Law, Stephanie Marie Davies 2016 University of Georgia School of Law

Rants And Raves: Craigslist's Attempt To Stop Innovating Third-Party Web Developers With Copyright Law, Stephanie Marie Davies

Journal of Intellectual Property Law

No abstract provided.


I Cann't Believe It's Not Better: Why New Gtlds Aer Bad For Brand Owners And Trademark Law, Alexandra Morgan Joseph 2016 University of Georgia School of Law

I Cann't Believe It's Not Better: Why New Gtlds Aer Bad For Brand Owners And Trademark Law, Alexandra Morgan Joseph

Journal of Intellectual Property Law

No abstract provided.


Capitol Records, Inc: Holding No Public Performance Violations For Deleting Duplicative Files Off Cloud Servers And The Positive Future Implications Regarding Consumer Efficiency, Christina Chow 2016 University of Georgia School of Law

Capitol Records, Inc: Holding No Public Performance Violations For Deleting Duplicative Files Off Cloud Servers And The Positive Future Implications Regarding Consumer Efficiency, Christina Chow

Journal of Intellectual Property Law

No abstract provided.


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson 2016 University of Oklahoma College of Law

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible. Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records. And those records not only store our past, but thanks to data mining and big data, in many circumstances they are eerily good at predicting our future. So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond? How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology? Is it meaningfully ...


Law As Information In The Era Of Data-Driven Agency, Mireille Hildebrandt 2015

Law As Information In The Era Of Data-Driven Agency, Mireille Hildebrandt

Mireille Hildebrandt

This contribution is the written version of the 2015 Chorley Lecture at the London School of Economics. It introduces the mathematical theory of information that ‘informs’ computer systems, the internet and all that has been built upon it. The aim of the author is to invite lawyers to reconsider the grammar and alphabet of modern positive law and of the Rule of Law, in the face of the alternative grammar and alphabet of a data-driven society. Instead of either embracing or rejecting the technological transitions that reconfigure the operations of the law, this article argues that lawyers should collaborate with ...


Cloud Investigations By European Data Protection Authorities: An Empirical Account, Asma Vranaki 2015 University of Oxford

Cloud Investigations By European Data Protection Authorities: An Empirical Account, Asma Vranaki

Asma Vranaki

This chapter draws on qualitative interviews, documentary analysis and observation data to analyse how European data protection authorities ('EU DPAs') exercise one of their statutory enforcement powers, namely, investigations more frequently to determine the compliance of cloud providers with the relevant data protection laws. The empirical analysis presented in this chapter supports two arguments. Firstly, the investigations of cloud providers by EU DPAs ('Cloud Investigations') are complex regulatory processes that often involve different co-operative relationships between various actors, such as DPAs. In reality, manifold interactions and practices, such as facilitative instruments, are deployed to form and perform such collaborations which ...


New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee, Larissa Lee 2015 University of Utah

New Kids On The Blockchain: How Bitcoin's Technology Could Reinvent The Stock Market, Larissa Lee, Larissa Lee

Larissa Lee

Bitcoin is the first and most successful digital currency in the world. It is polarized in the news almost daily, with either glowing reviews of the many benefits of an alternative and international currency, or doomsday predictions of anarchy, deflation, and another tulip bubble.
This Article focuses on the truly innovative aspect of Bitcoin—and that which has gone mostly unnoticed since its inception—the technological platform used to transfer Bitcoin from one party to another. This technology is called the Blockchain. The Blockchain eschews a bank or other middleman and allows parties to transfer funds directly to one another ...


Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao 2015 Catholic University of America, Columbus School of Law

Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao

Catholic University Journal of Law and Technology

No abstract provided.


Oracle America, Inc. V. Google, Inc.,750 F.3d 1339 (Fed. Cir. 2014), Cert. Denied: Ideas, Methods, And Expression - Whose Innovation Is Protected?, Christopher J. Geissler 2015 Catholic University of America, Columbus School of Law

Oracle America, Inc. V. Google, Inc.,750 F.3d 1339 (Fed. Cir. 2014), Cert. Denied: Ideas, Methods, And Expression - Whose Innovation Is Protected?, Christopher J. Geissler

Catholic University Journal of Law and Technology

No abstract provided.


Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges 2015 Google Inc; University of Colorado at Boulder; Katholieke Universiteit Leuven

Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges

Patrick T. Ryan

This essay looks at the the different roles that institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the layered model of the Internet. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications to show why it is important for different institutions within the governance system to focus on their areas of expertise (e.g., the ITU, ICANN, and IGF). Several areas of conflict are reviewed, such as the desire to promote more broadband infrastructure (a topic that is in ...


The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss 2015 University of Georgia School of Law

The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss

Journal of Intellectual Property Law

No abstract provided.


Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker 2015 University of Georgia School of Law

Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker

Journal of Intellectual Property Law

No abstract provided.


Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell 2015 University of Georgia School of Law

Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell

Journal of Intellectual Property Law

No abstract provided.


This Researcher Has An Interesting Theory For Why Robots Need Legal Rights, Danielle Muoio, Danielle Muoio 2015 Business Insider

This Researcher Has An Interesting Theory For Why Robots Need Legal Rights, Danielle Muoio, Danielle Muoio

Yueh-Hsuan Weng

It's inevitable that at some point down the road, humans will regularly interact with robots. Humanoid robots are being developed to do everything from working alongside astronauts in space to serving as your personal assistant. Which is why Yueh-Hsuan Weng, a research associate and co-founder of the ROBOLAW.ASIA Initiative at Peking University, says we need a set of laws that will guide how humans interact with robots. Weng is specifically advocating to give robots a special legal status called the "Third Existence," which aims to help protect robots, as well as their owners.


An Exclusive Interview With Un And Iso Experts In Robots And Regulation, Christof Heyns, Gurvinder S. Virk, Yueh-Hsuan Weng, Christof Heyns, Gurvinder S. Virk, Yueh-Hsuan Weng 2015 United Nations

An Exclusive Interview With Un And Iso Experts In Robots And Regulation, Christof Heyns, Gurvinder S. Virk, Yueh-Hsuan Weng, Christof Heyns, Gurvinder S. Virk, Yueh-Hsuan Weng

Yueh-Hsuan Weng

An Exclusive Tech and Law Center Interview with UN and ISO experts in Robots and Regulation, thanks to our distinguished fellow - Dr. Yueh-Hsuan Weng, ROBOLAW.ASIA Initiative.


Incident Of Drunk Man Kicking Humanoid Robot Raises Legal Questions, Lisa Zyga, Lisa Zyga 2015 PhysOrg

Incident Of Drunk Man Kicking Humanoid Robot Raises Legal Questions, Lisa Zyga, Lisa Zyga

Yueh-Hsuan Weng

A few weeks ago, a drunk man in Japan was arrested for kicking a humanoid robot that was stationed as a greeter at a SoftBank, Corp., store, which develops the robots. According to the police report, the man said he was angry at the attitude of one of the store clerks. The "Pepper robot" now moves more slowly, and its internal computer system may have been damaged. Under current Japanese law, the man can be charged with damage to property, but not injury, since injury is a charge reserved for humans. Dr. Yueh-Hsuan Weng, who is cofounder of the ROBOLAW ...


Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker 2015 University of Maryland Francis King Carey School of Law

Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker

Homeland Security Publications

No abstract provided.


Regulation Of Unknown: Does The Humanoid Robot “Pepper” Need Red Flag Laws?, Yueh-Hsuan Weng, Yueh-Hsuan Weng 2015 Tech and Law Center

Regulation Of Unknown: Does The Humanoid Robot “Pepper” Need Red Flag Laws?, Yueh-Hsuan Weng, Yueh-Hsuan Weng

Yueh-Hsuan Weng

Pepper the robot, developed by SoftBank and manufactured by Foxconn, is able to socially interact with human beings based on its emotion reading and learning capabilities. It even has a biomorphic shape, just like us. However, recently a Pepper robot was attacked by a drunkard in Japan in September 2015. This incident is worth discussing, as there may be clues for us to think about the emerging issue for robots to be members of our society. Besides, the incident has been received with immense scrutiny from the public as it is regarding a humanlike sociable machine that was inappropriately treated ...


Future Strategies For Improving Consent In Electronic Contracting, Ran Bi, Ran Bi 2015 Jinan University / Dacheng Law Offices

Future Strategies For Improving Consent In Electronic Contracting, Ran Bi, Ran Bi

Ran Bi

China's economy has been running deep into an exciting phrase called “Internet +”. In North America, most businesses have online presence and conduct numerous transactions online. Unprecedentedly, electronic contracts have been governing more Individuals and corporations’ legal relationships in a growing proportion of businesses and everyday life.

E-contracts, usually with no physical architecture, are easy to “sign”—people just click one or two icons on a computer / smartphone screen after “reading” (scroll down) the contents. However, e-contracts are standard form contracts which are provided by vendors . Users are easy to become victims of exploitative terms, because their consent has been ...


Google Book Search, Transformative Use, And Commercial Intermediation: An Economic Perspective, Kelvin Hiu Fai Kwok 2015 University of Hong Kong

Google Book Search, Transformative Use, And Commercial Intermediation: An Economic Perspective, Kelvin Hiu Fai Kwok

Yale Journal of Law and Technology

This Article examines two important features of many copyright fair use cases: transformative use and commercial intermediation. While the issue of transformative use has arisen in many fair use cases, there is a lack of consistency and clear guidance on the meaning of “transformativeness” and how the degree of transformativeness is to be assessed. Additionally, in analyzing commercial use, courts have largely failed to appreciate the distinctive role played by “commercial intermediaries” in facilitating socially beneficial uses of copyrighted works. This Article advances economically grounded proposals for improving the way in which courts analyze transformative use and commercial intermediation.


Digital Commons powered by bepress