Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,587 Full-Text Articles 4,393 Authors 3,320,199 Downloads 132 Institutions

All Articles in Computer Law

Faceted Search

4,587 full-text articles. Page 57 of 144.

The Indecency And Injustice Of Section 230 Of The Communications Decency Act, Mary Graw Leary 2018 The Catholic University of America, Columbus School of Law

The Indecency And Injustice Of Section 230 Of The Communications Decency Act, Mary Graw Leary

Scholarly Articles

Section 230 of the Communications Decency Act is a 1996 law wholly inadequate to address 21st Century problems. The most egregious example of this is online sex trafficking, which was allowed not only to exist, but also to thrive due, in large part, to §230. This Article examines the development of the jurisprudence regarding online advertising of sex-trafficking victims and juxtaposes the forces that created § 230 with those preventing its timely amendment. This Article argues that, although § 230 was never intended to create a regime of absolute immunity for defendant websites, a perverse interpretation of the non-sex …


Borders And Bits, Jennifer Daskal 2018 Vanderbilt University Law School

Borders And Bits, Jennifer Daskal

Vanderbilt Law Review

Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …


United States V. Ammons, Rebecca Ruffer 2018 New York Law School

United States V. Ammons, Rebecca Ruffer

NYLS Law Review

No abstract provided.


Perfecting Bitcoin, Kevin V. Tu 2018 University of Maryland Francis King Carey School of Law

Perfecting Bitcoin, Kevin V. Tu

Georgia Law Review

Bitcoin is still here. The price of Bitcoin rebounded-
setting a record high of $19,783.21 per Bitcoin in
December 2017 before dropping to a price of $8,690 per
Bitcoin as of March 22, 2018. Moreover, legal and
regulatory developments, like New York's BitLicense and
federal taxation of virtual currency as property, can be
viewed as legitimizing its use. The normalization of
virtual currency is evidenced by its increasingly
mainstream applications. Virtual currency can be used
as a faster and lower cost method of transferringfunds
domestically and internationally. A growing number of
retailers now accept virtual currency as a method of …


Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan 2018 New York University

Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan

Vanderbilt Law School Faculty Publications

Legal and policy scholars modeling direct actions into substantive topic classifications thus far have not employed computational methods. To compare the results of their conventional modeling methods with the computational method, we generated computational topic models of all direct actions over time periods other scholars have studied using conventional methods, and did the same for a case study of environmental-policy direct actions. Our computational model of all direct actions closely matched one of the two comprehensive empirical models developed using conventional methods. By contrast, our environmental-case-study model differed markedly from the only empirical topic model of environmental-policy direct actions using …


Is Tricking A Robot Hacking?, Ryan Calo, Ivan Evtimov, Earlence Fernandes, Tadayoshi Kohno, David O'Hair 2018 University of Washington School of Law

Is Tricking A Robot Hacking?, Ryan Calo, Ivan Evtimov, Earlence Fernandes, Tadayoshi Kohno, David O'Hair

Tech Policy Lab

The authors of this essay represent an interdisciplinary team of experts in machine learning, computer security, and law. Our aim is to introduce the law and policy community within and beyond academia to the ways adversarial machine learning (ML) alter the nature of hacking and with it the cybersecurity landscape. Using the Computer Fraud and Abuse Act of 1986—the paradigmatic federal anti-hacking law—as a case study, we mean to evidence the burgeoning disconnect between law and technical practice. And we hope to explain what is at stake should we fail to address the uncertainty that flows from the prospect that …


Differential Privacy: A Primer For A Non-Technical Audience, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O'Brien, Thomas Steinke, Salil Vadhan 2018 Vanderbilt University Law School

Differential Privacy: A Primer For A Non-Technical Audience, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O'Brien, Thomas Steinke, Salil Vadhan

Vanderbilt Journal of Entertainment & Technology Law

Differential privacy is a formal mathematical framework for quantifying and managing privacy risks. It provides provable privacy protection against a wide range of potential attacks, including those currently unforeseen. Differential privacy is primarily studied in the context of the collection, analysis, and release of aggregate statistics. These range from simple statistical estimations, such as averages, to machine learning. Tools for differentially private analysis are now in early stages of implementation and use across a variety of academic,industry, and government settings. Interest in the concept is growing among potential users of the tools, as well as within legal and policy communities, …


Corporate Cybersecurity: The International Threat To Private Networks And How Regulations Can Mitigate It, Eric J. Hyla 2018 Vanderbilt University Law School

Corporate Cybersecurity: The International Threat To Private Networks And How Regulations Can Mitigate It, Eric J. Hyla

Vanderbilt Journal of Entertainment & Technology Law

Cyberattacks are occurring at an accelerating pace. Foreign nations are increasingly utilizing hacking as a tool for economic gain, acts of aggression, or international political expression. At risk are US consumers'personal data, private firms' bottom line, and the economies'integrity. In response, federal and state lawmakers have issued a series of disparate, uncoordinated policies seeking to strengthen cybersecurity practices. However, recent events indicate that these policies are less than ideal. This Note suggests that a unified response to cybersecurity is required and calls for the establishment of a single, central federal agency with authority over all cybersecurity regulations. Such an agency …


Licensing & Law Who Owns An Avatar?, Tyler T. Ochoa, Jaime Banks 2018 Santa Clara University School of Law

Licensing & Law Who Owns An Avatar?, Tyler T. Ochoa, Jaime Banks

Faculty Publications

Both players and game developers have great influence over how avatars—via their assembled components— manifest in digital game play. Developers craft their foundational platforms and draw on those infrastructures to craft dynamic code that enables movements, appearances, and abilities. But those potentials call into question whether avatars are avatars until they are played—players click avatars into being, customize their bodies and attire, drive their actions and interactions, and sometimes bring them outside the game world through physical representations. So, given avatars’ joint reliance on developers and players, and given legal frameworks such as copyright law, who really “owns” a video …


Understanding The Human Element In Search Algorithms And Discovering How It Affects Search Results, Susan Nevelow Mart 2018 University of Colorado Law School

Understanding The Human Element In Search Algorithms And Discovering How It Affects Search Results, Susan Nevelow Mart

Publications

When legal researchers search in online databases for the information they need to solve a legal problem, they need to remember that the algorithms that are returning results to them were designed by humans. The world of legal research is a human-constructed world, and the biases and assumptions the teams of humans that construct the online world bring to the task are imported into the systems we use for research. This article takes a look at what happens when six different teams of humans set out to solve the same problem: how to return results relevant to a searcher’s query …


The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski 2018 University of Colorado Law School

The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski

Publications

No abstract provided.


That Was Close! Reward Reporting Of Cybersecurity “Near Misses”, Jonathan Bair, Steven M. Bellovin, Andrew Manley, Blake Reid, Adam Shostak 2018 University of Colorado Law School

That Was Close! Reward Reporting Of Cybersecurity “Near Misses”, Jonathan Bair, Steven M. Bellovin, Andrew Manley, Blake Reid, Adam Shostak

Publications

Building, deploying, and maintaining systems with sufficient cybersecurity is challenging. Faster improvement would be valuable to society as a whole. Are we doing as much as we can to improve? We examine robust and long-standing systems for learning from near misses in aviation, and propose the creation of a Cyber Safety Reporting System (CSRS).

To support this argument, we examine the liability concerns which inhibit learning, including both civil and regulatory liability. We look to the way in which cybersecurity engineering and science is done today, and propose that a small amount of ‘policy entrepreneurship’ could have substantial positive impact. …


Prolegomenon On Pornography, Gerard V. Bradley 2018 Notre Dame Law School

Prolegomenon On Pornography, Gerard V. Bradley

Journal Articles

Debates about pornography have always included arguments about its “effects.” Now we can gauge the effects of specifically computerized pornography. These novel effects include scientific research showing that digitalized pornography affects the brain and nervous system in harmful ways that no centerfold ever could. Accessing pornography online makes interactive and directive engagement with it possible, so that the consumer is no longer limited to staring at a two-dimensional representation of a stranger in the nude. The action now is more adventurous. The consumer’s involvement is more intimate and directive. What he does lies somewhere between looking at a centerfold and …


Virtual Reality Exceptionalism, Gilad Yadin 2018 Vanderbilt University Law School

Virtual Reality Exceptionalism, Gilad Yadin

Vanderbilt Journal of Entertainment & Technology Law

Virtual reality is here. In just a few years, the technology moved from science fiction to the Internet, from specialized research facilities to living rooms. These new virtual reality environments are connected, collaborative, and social-built to deliver a subjective psychological effect that believably simulates spatial physical reality. Cognitive research shows that this effect is powerful enough that virtual reality users act and interact in ways that mirror real-world social and moral norms and behavior.

Contemporary cyberlaw theory is largely based on the notion that cyberspace is exceptional enough to warrant its own specific rules. This premise, a descendant of early …


The Bot Legal Code: Developing A Legally Compliant Artificial Intelligence, Edmund Mokhtarian 2018 Vanderbilt University Law School

The Bot Legal Code: Developing A Legally Compliant Artificial Intelligence, Edmund Mokhtarian

Vanderbilt Journal of Entertainment & Technology Law

The advent of sophisticated artificial intelligence (AI) agents, or bots, raises the question: How do we ensure that these bots act appropriately? Within a decade, AI will be ubiquitous, with billions of active bots influencing nearly every industry and daily activity. Given the extensiveness of AI activity, it will be nearly impossible to explicitly program bots with detailed instructions on permitted and prohibited actions, particularly as they face unpredictable, novel situations. Rather, if risks to humans are to be mitigated, bots must have some overriding moral or legal compass--a set of "AI Laws"--to allow them to adapt to whatever scenarios …


Unbundling Employment Flexible Benefits For The Gig Economy, Seth C. Oranburg 2018 University of New Hampshire School of Law

Unbundling Employment Flexible Benefits For The Gig Economy, Seth C. Oranburg

Law Faculty Scholarship

Federal labor law requires employers to give employees a rigid bundle of benefits, including the right to unionize, unemployment insurance, worker’s compensation insurance, health insurance, family medical leave, and more. These benefits are not free—benefits cost about one-third of wages—and someone must pay for them. Which of these benefits are worth their cost? This Article takes a theoretical approach to that problem and proposes a flexible benefits solution.

Labor law developed under a traditional model of work: long-term employees depended on a single employer to engage in goods-producing work. Few people work that way today. Instead, modern workers are increasingly …


Fintech: Antidote To Rent-Seeking?, Jeremy Kidd 2018 Mercer University School of Law

Fintech: Antidote To Rent-Seeking?, Jeremy Kidd

Articles

Fintech is a reality of our modern society, and will likely become even more so in the future. Peer-to-peer lending, cybercurrencies, smart contracts, algorithmic lending, and more, have required adaptation by consumers and producers of financial services. Our modes of doing business will continue to be challenged and changed by these and other Fintech innovations, almost certainly expanding beyond merely “promot[ing] financial inclusion, expand[ing] access to capital for individuals and small businesses, and more broadly reshap[ing] how society interacts with financial services.” By reducing transaction costs, advancing technology opens the doors to innovations the likes of which we might not …


The Missing Hyperlink — An Empirical Study: Can Canadian Laws Effectively Protect Consumers Purchasing Online?, Mariella Montplaisir 2018 Schulich School of Law, Dalhousie University

The Missing Hyperlink — An Empirical Study: Can Canadian Laws Effectively Protect Consumers Purchasing Online?, Mariella Montplaisir

Canadian Journal of Law and Technology

Canadian consumer protection legislation applicable to online transactions generally works by a two-pronged method: first, private international law rules ensure that in most cases, consumers can sue in their home province under that province’s law; and, second, a wide range of substantive obligations are imposed on merchants, and failure to comply with these obligations provides consumers with a right of cancellation. This study considers the private international law rules applicable to online consumer contracts, and discusses the unique jurisdictional challenges presented by online transactions. This study also provides an overview of Canadian legislation applicable to online consumer transactions, and examines …


Social Media Threats: Examining The Canadian Criminal Law Response, Benjamin Perrin 2018 Schulich School of Law, Dalhousie University

Social Media Threats: Examining The Canadian Criminal Law Response, Benjamin Perrin

Canadian Journal of Law and Technology

This article begins by discussing the legislative history, essential elements, and purpose of the threats offence in s. 264.1(1) of the Criminal Code. It then analyzes major reported Canadian judicial decisions dealing with social media threats, based on the five themes identified above. Finally, this article concludes by highlighting the implications and limitations of this study, as well as areas for future research.


Public Authority Liability And The Regulation Of Nanotechnology: A European Perspective, Nina Natalia Baranowska 2018 Schulich School of Law, Dalhousie University

Public Authority Liability And The Regulation Of Nanotechnology: A European Perspective, Nina Natalia Baranowska

Canadian Journal of Law and Technology

This paper argues that in certain circumstances public authorities should be liable for regulating nanotechnology. Nanotechnology is an emerging field of technology that enables to control shape and size of various structures, devices and systems at nanometer scale on which one nanometer is equal to one-billionth of a meter. In spite of being a nascent field of science and technology, its scope of application – in the food, pharmaceuticals, cosmetics, construction, textile, electronics, and agricultural industries – is expanding rapidly. The risks associated to nanotechnology, however, and its long-term consequences are still largely unknown, particularly in regards to its health …


Digital Commons powered by bepress