Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Legislation (2)
- AI ethics (1)
- AI responsibility (1)
- Administrative law (1)
- Administrative state (1)
-
- Agency rule (1)
- Algorithm (1)
- Artificial intelligence (1)
- Bag of Words (1)
- Block.one (1)
- Blockchain (1)
- Civil liberties (1)
- Congress (1)
- Crypto (1)
- Cryptocurrency (1)
- Data analytics (1)
- Data collection (1)
- Data privacy (1)
- Data protection (1)
- Decentralization (1)
- Digital coin (1)
- Digital token (1)
- Federal securities law (1)
- Filtering (1)
- Financial technology (1)
- Guidance (1)
- Howey test (1)
- Internet jurisdiction (1)
- Internet law (1)
- Investors (1)
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Business Intelligence
Assessing Smart Nation Singapore As An International Model For Ai Responsibility, Philip L. Frana
Assessing Smart Nation Singapore As An International Model For Ai Responsibility, Philip L. Frana
International Journal on Responsibility
While AI and other smart technologies greatly contribute to material aspects of well-being, there are concerns that they threaten quality of life in Singapore. Smart technologies and digital governance have freed up labor for activities where human empathy and understanding are unique and indispensable, but also threaten to undermine human dignity and accountability. This paper undertakes a comprehensive assessment of Singapore as an international model for AI responsibility from the perspective of the history and philosophy of technological governance. It examines the evolution of regulatory frameworks, ethical considerations, and key legal documents and social initiatives shaping the nation’s approach to …
Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley
Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley
University of Cincinnati Law Review
No abstract provided.
The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao
Catholic University Journal of Law and Technology
The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.
This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …
Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo
Dissertations
In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.
To address …
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
A False Sense Of Security: How Congress And The Sec Are Dropping The Ball On Cryptocurrency, Tessa E. Shurr
Dickinson Law Review (2017-Present)
Today, companies use blockchain technology and digital assets for a variety of purposes. This Comment analyzes the digital token. If the Securities and Exchange Commission (SEC) views a digital token as a security, then the issuer of the digital token must comply with the registration and extensive disclosure requirements of federal securities laws.
To determine whether a digital asset is a security, the SEC relies on the test that the Supreme Court established in SEC v. W.J. Howey Co. Rather than enforcing a statute or agency rule, the SEC enforces securities laws by applying the Howey test on a fact-intensive …
Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels
Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels
SMU Data Science Review
In this paper, we present an analysis of features influencing Yelp's proprietary review filtering algorithm. Classifying or misclassifying reviews as recommended or non-recommended affects average ratings, consumer decisions, and ultimately, business revenue. Our analysis involves systematically sampling and scraping Yelp restaurant reviews. Features are extracted from review metadata and engineered from metrics and scores generated using text classifiers and sentiment analysis. The coefficients of a multivariate logistic regression model were interpreted as quantifications of the relative importance of features in classifying reviews as recommended or non-recommended. The model classified review recommendations with an accuracy of 78%. We found that reviews …
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Journal of International Technology and Information Management
This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.
The Digital Dionysus: Nietzsche & The Network-Centric Condition
The Digital Dionysus: Nietzsche & The Network-Centric Condition
Dan Mellamphy
No abstract provided.