Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3256 Full-Text Articles 2897 Authors 1259977 Downloads 99 Institutions

All Articles in Computer Law

Faceted Search

3256 full-text articles. Page 2 of 82.

Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble 2017 Fordham University School of Law

Wild Westworld: Section 230 Of The Cda And Social Networks’ Use Of Machine-Learning Algorithms, Catherine Tremble

Fordham Law Review

This Note argues that Facebook’s services—specifically the personalization of content through machine-learning algorithms—constitute the “development” of content and as such do not qualify for § 230 immunity. This Note analyzes the evolution of § 230 jurisprudence to help inform the development of a revised framework. This framework is guided by congressional and public policy goals and creates brighter lines for technological immunity. It tailors immunity to account for user data mined by ISPs and the pervasive effect that the use of that data has on users—two issues that courts have yet to confront. This Note concludes that under ...


Terrorist Incitement On The Internet, Alexander Tsesis 2017 Loyola University School of Law

Terrorist Incitement On The Internet, Alexander Tsesis

Fordham Law Review

I organized this symposium to advance understanding of how terrorist communications drive and influence social, political, religious, civil, literary, and artistic conduct. Viewing terrorist speech through wide prisms of law, culture, and contemporary media can provide lawmakers, adjudicators, and administrators a better understanding of how to contain and prevent the exploitation of modern communication technologies to influence, recruit, and exploit others to perpetrate ideologically driven acts of violence. Undertaking such a multipronged study requires not only looking at the personal and sociological appeals that extreme ideology exerts but also considering how to create political, administrative, educational, and economic conditions to ...


Free Speech And The Confluence Of National Security And Internet Exceptionalism, Alan K. Chen 2017 University of Denver Sturm College of Law

Free Speech And The Confluence Of National Security And Internet Exceptionalism, Alan K. Chen

Fordham Law Review

In this Article, I argue that, notwithstanding these contemporary developments, the Court got it mostly right in Brandenburg. Or, I want to at least suggest that it is premature to reconstruct the Brandenburg test to address perceived changes in our global environment. For the most part, Brandenburg has succeeded in mediating the balance between protecting political or ideological advocacy and enabling the government to regulate actual incitement, even in the contemporary era. Moreover, I argue that society should be especially wary of calls to narrow Brandenburg’s speech-protective standard because such changes might be significantly influenced by the confluence of ...


The Internet Will Not Break: Denying Bad Samaritans § 230 Immunity, Danielle Keats Citron, Benjamin Wittes 2017 University of Maryland Francis King Carey School of Law

The Internet Will Not Break: Denying Bad Samaritans § 230 Immunity, Danielle Keats Citron, Benjamin Wittes

Fordham Law Review

Section 230 is overdue for a rethinking. If courts do not construe the scope of federal immunity to avoid injustice, we argue, Congress should amend the law. This is not to discount the important role that the immunity provision has played over the past twenty years. Far from it. Section 230 immunity has enabled innovation and expression beyond the imagination of the operators of early bulletin boards and computer service providers the provision was designed to protect. But its overbroad interpretation has left victims of online abuse with no leverage against site operators whose business models facilitate abuse. This state ...


The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor 2017 University of Hull

The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor

Fordham Law Review

Gatekeeping is defined as the work of third parties “who are able to disrupt misconduct by withholding their cooperation from wrongdoers.”1 Internet intermediaries need to be far more proactive as gatekeepers than they are now. Socially responsible measures can prevent the translation of violent thoughts into violent actions. Designated monitoring mechanisms can potentially prevent such unfortunate events. This Article suggests an approach that harnesses the strengths and capabilities of the public and private sectors in offering practical solutions to pressing problems. It proposes that internet intermediaries should fight stringently against terror and further argues that a responsible gatekeeping approach ...


Terrorist Advocacy And Exceptional Circumstances, David S. Han 2017 Pepperdine University School of Law

Terrorist Advocacy And Exceptional Circumstances, David S. Han

Fordham Law Review

This Article proceeds as follows. Part I discusses the harmful effects of terrorist advocacy and outlines the present doctrinal treatment of such speech. Part II discusses the issue of exceptional circumstances and highlights the two approaches courts might take to account for them: applying strict scrutiny to the case at hand or broadly reformulating the First Amendment’s doctrinal boundaries. Part III sets forth my central thesis: courts should adhere to case-by-case strict scrutiny analysis, rather than broad doctrinal reformulation, as the initial means of accounting for exceptional circumstances with respect to terrorist advocacy. This approach reflects the vital importance ...


Free Speech And National Security Bootstraps, Heidi Kitrosser 2017 University of Minnesota Law School

Free Speech And National Security Bootstraps, Heidi Kitrosser

Fordham Law Review

It is troubling that courts treat administrative designations—specifically, both FTO determinations and information classification—as bootstraps by which to yank speech restrictions from the clutches of probing judicial scrutiny. This Article builds on existing scholarly critiques to identify and examine the common thread of national security bootstrapping that runs through both sets of cases. The hope is that in so doing, some greater light may be shed both on the cases themselves and, more broadly, on the costs and benefits of judicial deference to executive national security claims where civil rights and civil liberties are at stake.


Entertaining Satan: Why We Tolerate Terrorist Incitement, Andrew Koppelman 2017 Northwestern University

Entertaining Satan: Why We Tolerate Terrorist Incitement, Andrew Koppelman

Fordham Law Review

Words are dangerous. That is why governments sometimes want to suppress speech. The law of free speech reflects a settled decision that, at the time that law was adopted, the dangers were worth tolerating. But people keep dreaming up nasty new things to do with speech. Recently, the Islamic State of Iraq and Syria (ISIS) and other terrorist organizations have employed a small army of Iagos on the internet to recruit new instruments of destruction. Some of what they have posted is protected speech under present First Amendment law. In response, scholars have suggested that there should be some new ...


Terrorists Are Always Muslim But Never White: At The Intersection Of Critical Race Theory And Propaganda, Caroline Mala Corbin 2017 University of Miami School of Law

Terrorists Are Always Muslim But Never White: At The Intersection Of Critical Race Theory And Propaganda, Caroline Mala Corbin

Fordham Law Review

When you hear the word “terrorist,” who do you picture? Chances are, it is not a white person. In the United States, two common though false narratives about terrorists who attack America abound. We see them on television, in the movies, on the news, and, currently, in the Trump administration. The first is that “terrorists are always (brown) Muslims.” The second is that “white people are never terrorists.” Different strands of critical race theory can help us understand these two narratives. One strand examines the role of unconscious cognitive biases in the production of stereotypes, such as the stereotype of ...


The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum 2017 New York University School of Law

The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum

Fordham Law Review

The panel I was assigned to, for this distinguished gathering of scholars at Fordham Law School, where I had previously been a professor for twentythree years, was given the name, “Caution Against Overreaching.” Overreaching and the caution it occasions, in this case, refer to the First Amendment, a uniquely American absolutist, legalistic obsession. For many who fixate on such matters, the government must never be allowed to trample upon the unfettered free speech rights guaranteed under America’s first, and most favorite, Amendment.


Social Media Accountability For Terrorist Propaganda, Alexander Tsesis 2017 Loyola University School of Law

Social Media Accountability For Terrorist Propaganda, Alexander Tsesis

Fordham Law Review

Terrorist organizations have found social media websites to be invaluable for disseminating ideology, recruiting terrorists, and planning operations. National and international leaders have repeatedly pointed out the dangers terrorists pose to ordinary people and state institutions. In the United States, the federal Communications Decency Act’s § 230 provides social networking websites with immunity against civil law suits. Litigants have therefore been unsuccessful in obtaining redress against internet companies who host or disseminate third-party terrorist content. This Article demonstrates that § 230 does not bar private parties from recovery if they can prove that a social media company had received complaints about ...


Terror On Your Timeline: Criminalizing Terrorist Incitement On Social Media Through Doctrinal Shift, Zachary Leibowitz 2017 Fordham University School of Law

Terror On Your Timeline: Criminalizing Terrorist Incitement On Social Media Through Doctrinal Shift, Zachary Leibowitz

Fordham Law Review

The United States faces a barrage of threats from terrorist organizations on a daily basis. The government takes some steps to prevent these threats from coming to fruition, but not much is being done proactively. Any person can log into a social media account to preach hate and incite violence against the United States and its citizenry, and sometimes these words result in action. When speakers are not held accountable, they can continue to incite the masses to violent action across the United States. This Note proposes a new incitement doctrine to prevent these speakers from being able to spread ...


Algorithmic Jim Crow, Margaret Hu 2017 Washington and Lee University School of Law

Algorithmic Jim Crow, Margaret Hu

Fordham Law Review

This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on ...


Privacy Vs. Piracy, SONIA K. KATYAL 2017 Selected Works

Privacy Vs. Piracy, Sonia K. Katyal

Sonia Katyal

A few years ago, it was fanciful to imagine a world where intellectual property owners - such as record companies, soft ware owners, and publishers - were capable of invading the most sacred areas of the home in order to track, deter, and control uses of their products. Yet, today, strategies of copyright enforcement have rapidly multiplied, each strategy more invasive than the last. This new surveillance exposes the paradoxical nature of the Internet: It offers both the consumer and creator a seemingly endless capacity for human expression - a virtual marketplace of ideas- alongside an insurmountable array of capacities for panoptic surveillance ...


Health Information Technology, E-Prescribing And Hurricane Katrina: Could Electronic Health Records Have Made A Difference, Robert Malone 2017 University of Oklahoma College of Law

Health Information Technology, E-Prescribing And Hurricane Katrina: Could Electronic Health Records Have Made A Difference, Robert Malone

Oklahoma Journal of Law and Technology

No abstract provided.


Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone 2017 University of Oklahoma College of Law

Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone

Oklahoma Journal of Law and Technology

No abstract provided.


Health Information Technology: Transforming The Healthcare Industry For The 21st Century, Robert Malone 2017 University of Oklahoma College of Law

Health Information Technology: Transforming The Healthcare Industry For The 21st Century, Robert Malone

Oklahoma Journal of Law and Technology

No abstract provided.


Toward A Direct Functional Relationship Requirement For Claims To Software Encoded On A Computer-Readable Storage Medium: Rethinking In Re Beauregard In Response To The Uspto's Interim Guidelines Regarding The Patentability Of Data Signal Claims, Elizabeth A. Richardson 2017 University of Oklahoma College of Law

Toward A Direct Functional Relationship Requirement For Claims To Software Encoded On A Computer-Readable Storage Medium: Rethinking In Re Beauregard In Response To The Uspto's Interim Guidelines Regarding The Patentability Of Data Signal Claims, Elizabeth A. Richardson

Oklahoma Journal of Law and Technology

No abstract provided.


Terms Of Service And The Computer Fraud And Abuse Act: A Trap For The Unwary?, David A. Puckett 2017 University of Oklahoma College of Law

Terms Of Service And The Computer Fraud And Abuse Act: A Trap For The Unwary?, David A. Puckett

Oklahoma Journal of Law and Technology

No abstract provided.


Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert 2017 University of Pennsylvania Law School

Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert

Faculty Scholarship

Automated financial product advisors – “robo advisors” – are emerging across the financial services industry, helping consumers choose investments, banking products, and insurance policies. Robo advisors have the potential to lower the cost and increase the quality and transparency of financial advice for consumers. But they also pose significant new challenges for regulators who are accustomed to assessing human intermediaries. A well-designed robo advisor will be honest and competent, and it will recommend only suitable products. Because humans design and implement robo advisors, however, honesty, competence, and suitability cannot simply be assumed. Moreover, robo advisors pose new scale risks that are different ...


Digital Commons powered by bepress