Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,325 Full-Text Articles 3,092 Authors 1,294,808 Downloads 106 Institutions

All Articles in Computer Law

Faceted Search

3,325 full-text articles. Page 6 of 84.

Oversharenting: Is It Really Your Story To Tell?, 33 J. Marshall J. Info. Tech. & Privacy L. 121 (2018), Holly Kathleen Hall 2018 John Marshall Law School

Oversharenting: Is It Really Your Story To Tell?, 33 J. Marshall J. Info. Tech. & Privacy L. 121 (2018), Holly Kathleen Hall

The John Marshall Journal of Information Technology & Privacy Law

Social media is about sharing information. If you are a parent, often the tendency is to relate every aspect of your children’s lives. Most of the time, children do not consent to postings about them and will have a permanent digital shadow created by their parents that follows them the rest of their lives. The purpose of this article is to analyze the current status and potential future of children’s online privacy from a comparative legal approach, highlighting recent case law in the United Kingdom, which is trending toward carving out special privacy rights for children. This contrasts ...


Nothing Personal, It’S Just Business: How Google’S Course Of Business Operates At The Expense Of Consumer Privacy, 33 J. Marshall J. Info. Tech. & Privacy L. 187 (2018), Kayla McKinnon 2018 John Marshall Law School

Nothing Personal, It’S Just Business: How Google’S Course Of Business Operates At The Expense Of Consumer Privacy, 33 J. Marshall J. Info. Tech. & Privacy L. 187 (2018), Kayla Mckinnon

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Are “Evan’S Law” And The Textalyzer Immediate Solutions To Today’S Rapid Changes In Technology Or Encroachments On Drivers’ Privacy Rights?, 33 J. Marshall J. Info. Tech. & Privacy L. 143 (2018), Aggie Baumert 2018 John Marshall Law School

Are “Evan’S Law” And The Textalyzer Immediate Solutions To Today’S Rapid Changes In Technology Or Encroachments On Drivers’ Privacy Rights?, 33 J. Marshall J. Info. Tech. & Privacy L. 143 (2018), Aggie Baumert

The John Marshall Journal of Information Technology & Privacy Law

No abstract provided.


Response, Bridges Ii: The Law--Stem Alliance & Next Generation Innovation, Harry Surden 2018 University of Colorado Law School

Response, Bridges Ii: The Law--Stem Alliance & Next Generation Innovation, Harry Surden

Articles

Technological change recently has altered business models in the legal field, and these changes will continue to affect the practice of law itself. How can we, as educators, prepare law students to meet the challenges of new technology throughout their careers?


United States V. Lambis: A Good Call For Cellphones, Cell-Site Simulators, And The Fourth Amendment, Kathryn E. Gardner 2018 University of Oklahoma College of Law

United States V. Lambis: A Good Call For Cellphones, Cell-Site Simulators, And The Fourth Amendment, Kathryn E. Gardner

Oklahoma Law Review

No abstract provided.


Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong 2018 Professor of Law, University of Cincinnati College of Law

Symbols, Systems, And Software As Intellectual Property: Time For Contu, Part Ii?, Timothy K. Armstrong

Faculty Articles and Other Publications

The functional nature of computer software underlies two propositions that were, until recently, fairly well settled in intellectual property law: first, that software, like other utilitarian articles, may qualify for patent protection; and second, that the scope of copyright protection for software is comparatively limited. Both propositions have become considerably shakier as a result of recent court decisions. Following Alice Corp. v. CLS Bank Int’l, 134 S. Ct. 2347 (2014), the lower courts have invalidated many software patents as unprotectable subject matter. Meanwhile, Oracle America v. Google Inc., 750 F.3d 1339 (Fed. Cir. 2014) extended far more expansive ...


Results May Vary, Susan Nevelow Mart 2018 University of Colorado Law School

Results May Vary, Susan Nevelow Mart

Articles

No abstract provided.


Data Localization The Unintended Consequences Of Privacy Litigation, H Jacqueline Brehmer 2018 American University Washington College of Law

Data Localization The Unintended Consequences Of Privacy Litigation, H Jacqueline Brehmer

American University Law Review

No abstract provided.


The Indecency And Injustice Of Section 230 Of The Communications Decency Act, Mary Graw Leary 2018 The Catholic University of America, Columbus School of Law

The Indecency And Injustice Of Section 230 Of The Communications Decency Act, Mary Graw Leary

Scholarly Articles and Other Contributions

Section 230 of the Communications Decency Act is a 1996 law wholly inadequate to address 21st Century problems. The most egregious example of this is online sex trafficking, which was allowed not only to exist, but also to thrive due, in large part, to §230. This Article examines the development of the jurisprudence regarding online advertising of sex-trafficking victims and juxtaposes the forces that created § 230 with those preventing its timely amendment. This Article argues that, although § 230 was never intended to create a regime of absolute immunity for defendant websites, a perverse interpretation of the non-sex trafficking jurisprudence ...


Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley 2018 Columbia Law School

Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley

Faculty Scholarship

Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results ...


The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski 2018 University of Colorado Law School

The Gdpr’S Version Of Algorithmic Accountability, Margot Kaminski

Articles

No abstract provided.


Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert 2018 University of Pennsylvania Law School

Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert

Faculty Scholarship at Penn Law

Automated financial product advisors – “robo advisors” – are emerging across the financial services industry, helping consumers choose investments, banking products, and insurance policies. Robo advisors have the potential to lower the cost and increase the quality and transparency of financial advice for consumers. But they also pose significant new challenges for regulators who are accustomed to assessing human intermediaries. A well-designed robo advisor will be honest and competent, and it will recommend only suitable products. Because humans design and implement robo advisors, however, honesty, competence, and suitability cannot simply be assumed. Moreover, robo advisors pose new scale risks that are different ...


That Was Close! Reward Reporting Of Cybersecurity “Near Misses”, Jonathan Bair, Steven M. Bellovin, Andrew Manley, Blake Reid, Adam Shostak 2018 University of Colorado Law School

That Was Close! Reward Reporting Of Cybersecurity “Near Misses”, Jonathan Bair, Steven M. Bellovin, Andrew Manley, Blake Reid, Adam Shostak

Articles

Building, deploying, and maintaining systems with sufficient cybersecurity is challenging. Faster improvement would be valuable to society as a whole. Are we doing as much as we can to improve? We examine robust and long-standing systems for learning from near misses in aviation, and propose the creation of a Cyber Safety Reporting System (CSRS).

To support this argument, we examine the liability concerns which inhibit learning, including both civil and regulatory liability. We look to the way in which cybersecurity engineering and science is done today, and propose that a small amount of ‘policy entrepreneurship’ could have substantial positive impact ...


Understanding The Human Element In Search Algorithms And Discovering How It Affects Search Results, Susan Nevelow Mart 2018 University of Colorado Law School

Understanding The Human Element In Search Algorithms And Discovering How It Affects Search Results, Susan Nevelow Mart

Articles

When legal researchers search in online databases for the information they need to solve a legal problem, they need to remember that the algorithms that are returning results to them were designed by humans. The world of legal research is a human-constructed world, and the biases and assumptions the teams of humans that construct the online world bring to the task are imported into the systems we use for research. This article takes a look at what happens when six different teams of humans set out to solve the same problem: how to return results relevant to a searcher’s ...


A Few Criminal Justice Big Data Rules, Stephen E. Henderson 2017 University of Oklahoma College of Law

A Few Criminal Justice Big Data Rules, Stephen E. Henderson

Stephen E Henderson

As with most new things, the big data revolution in criminal justice has historic antecedents—indeed, a 1965 Presidential Commission called for some of the same data analysis that police departments and courts are today developing and implementing.  But there is no doubt we are on the precipice of a criminal justice data revolution, and it is a good time to take stock and to begin developing guidelines so that, as much as possible, criminal justice systems might reap the benefits and avoid the pitfalls of this newly data-centric world.  In that spirit, I propose ten high-level rules to guide ...


Black Letter Law, Dan Svantesson 2017 Bond University

Black Letter Law, Dan Svantesson

Law Faculty Publications

[Extract] The topic of how well the tool of black letter law works in the Internet law setting is of course huge, and associated with obvious definitional challenges. To point to but one; how ought we define “black letter law” in our present legal culture where legal rules necessarily must take account of the technical reality in which they operate? Indeed, given Wikipedia’s definition of “black letter laws” as laws that are “the well-established technical legal rules that are no longer subject to reasonable dispute,” one may legitimately question whether we can speak of any real black letter law ...


Foreword: The Food Law Era, Nathan Cortez 2017 Southern Methodist University

Foreword: The Food Law Era, Nathan Cortez

Science and Technology Law Review

No abstract provided.


Cybersecurity And Tax Information: A Vicious Cycle?, Diane M. Ring 2017 Boston College Law School

Cybersecurity And Tax Information: A Vicious Cycle?, Diane M. Ring

Boston College Law School Faculty Papers

A review of Michael Hatfield, Cybersecurity and Tax Reform, 93 Ind. L.J., scheduled to be published in Spring 2018.


A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller 2017 Washington & Lee University School of Law

A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller

Russell A. Miller

Germany is widely regarded as a global model for the privacy protection its constitutional regime offers against intrusive intelligence-gathering and law enforcement surveillance. There is some basis for Germany’s privacy “exceptionalism,” especially as the text of the German Constitution (“Basic Law”) provides explicit textual protections that America’s Eighteenth Century Constitution lacks. The German Federal Constitutional Court has added to those doctrines with an expansive interpretation of the more general rights to dignity (Basic Law Article 1) and the free development of one’s personality (Basic Law Article 2). This jurisprudence includes constitutional liberty guarantees such as the absolute ...


An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short 2017 University of Maine School of Law

An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short

Maine Law Review

The emergence of technological advances has traditionally created new and unique legal problems. The solutions to counter these problems are often drawn from our legal traditions and adapted to an ever-modernizing world. However, as Professor Coase opined at the dawn of the communication technology revolution, “lawyers and economists should not be so overwhelmed by the emergence of new technologies as to change the existing legal and economic system without first making quite certain that this is required.” Examination and reflection, in other words, is paramount to instituting a sound legal framework to encompass developing legal problems in technology. This Article ...


Digital Commons powered by bepress