Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Artificial intelligence (11)
- Privacy (6)
- Intellectual property (5)
- Copyright (3)
- Cybercrime (3)
-
- Law enforcement (3)
- Algorithms (2)
- Cloud computing (2)
- Criminal law (2)
- Cybersecurity (2)
- Data security (2)
- First Amendment (2)
- International law (2)
- Patent law (2)
- Personal data (2)
- Regulation (2)
- AI models (1)
- Algorithmic practices (1)
- Anonymous (1)
- Antitrust (1)
- Arbitration (1)
- Artificial Intelligence laws (1)
- Artificial intelligence inventorship (1)
- Augmented reality (1)
- Authorization (1)
- Automation (1)
- Big data (1)
- Bilateral investment treaty (1)
- Biomedical (1)
- Blockchain (1)
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 55
Full-Text Articles in Law
Regulation Priorities For Artificial Intelligence Foundation Models, Matthew R. Gaske
Regulation Priorities For Artificial Intelligence Foundation Models, Matthew R. Gaske
Vanderbilt Journal of Entertainment & Technology Law
This Article responds to the call in technology law literature for high-level frameworks to guide regulation of the development and use of Artificial Intelligence (AI) technologies. Accordingly, it adapts a generalized form of the fintech Innovation Trilemma framework to argue that a regulatory scheme can prioritize only two of three aims when considering AI oversight: (1) promoting innovation, (2) mitigating systemic risk, and (3) providing clear regulatory requirements. Specifically, this Article expressly connects legal scholarship to research in other fields focusing on foundation model AI systems and explores this kind of system’s implications for regulation priorities from the geopolitical and …
A Compulsory Solution To The Machine Problem: Recognizing Artificial Intelligence As Inventors In Patent Law, Cole G. Merritt
A Compulsory Solution To The Machine Problem: Recognizing Artificial Intelligence As Inventors In Patent Law, Cole G. Merritt
Vanderbilt Journal of Entertainment & Technology Law
Artificial Intelligence (AI) is already disrupting and will likely continue to disrupt many industries. Despite the role AI already plays, AI systems are becoming increasingly powerful. Ultimately, these systems may become a powerful tool that can lead to the discovery of important inventions or significantly reduce the time required to discover these inventions. Even now, AI systems are independently inventing. However, the resulting AI-generated inventions are unable to receive patent protection under current US patent law. This unpatentability may lead to inefficient results and ineffectively serves the goals of patent law.
To embrace the development and power of AI, Congress …
The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby
The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby
Vanderbilt Journal of Entertainment & Technology Law
A small number of large companies hold most of the world’s data. Once in the hands of these companies, data subjects have little control over the use and sharing of their data. Additionally, this data is not generally available to small and medium enterprises or organizations who seek to use it for social good. A number of solutions have been proposed to limit Big Tech “power,” including antitrust actions and stricter privacy laws, but these measures are not likely to address both the oversharing and under-sharing of personal data. Although the data trust concept is being actively explored in the …
The Death Of The Legal Subject, Katrina Geddes
The Death Of The Legal Subject, Katrina Geddes
Vanderbilt Journal of Entertainment & Technology Law
The law is often engaged in prediction. In the calculation of tort damages, for example, a judge will consider what the tort victim’s likely future earnings would have been, but for their particular injury. Similarly, when considering injunctive relief, a judge will assess whether the plaintiff is likely to suffer irreparable harm if a preliminary injunction is not granted. And for the purposes of a child custody evaluation, a judge will consider which parent will provide an environment that is in the best interests of the child.
Relative to other areas of law, criminal law is oversaturated with prediction. Almost …
Human-Centered Design To Address Biases In Artificial Intelligence, Ellen W. Clayton, You Chen, Laurie L. Novak, Shilo Anders, Bradley Malin
Human-Centered Design To Address Biases In Artificial Intelligence, Ellen W. Clayton, You Chen, Laurie L. Novak, Shilo Anders, Bradley Malin
Vanderbilt Law School Faculty Publications
The potential of artificial intelligence (AI) to reduce health care disparities and inequities is recognized, but it can also exacerbate these issues if not implemented in an equitable manner. This perspective identifies potential biases in each stage of the AI life cycle, including data collection, annotation, machine learning model development, evaluation, deployment, operationalization, monitoring, and feedback integration. To mitigate these biases, we suggest involving a diverse group of stakeholders, using human-centered AI principles. Human-centered AI can help ensure that AI systems are designed and used in a way that benefits patients and society, which can reduce health disparities and inequities. …
Returning Integrated Genomic Risk And Clinical Recommendations: The Emerge Study, Ellen W. Clayton, Jodell E. Linder, Aimee Allworth, Sara T. Bland, 100 Others...
Returning Integrated Genomic Risk And Clinical Recommendations: The Emerge Study, Ellen W. Clayton, Jodell E. Linder, Aimee Allworth, Sara T. Bland, 100 Others...
Vanderbilt Law School Faculty Publications
The potential of artificial intelligence (AI) to reduce health care disparities and inequities is recognized, but it can also exacerbate these issues if not implemented in an equitable manner. This perspective identifies potential biases in each stage of the AI life cycle, including data collection, annotation, machine learning model development, evaluation, deployment, operationalization, monitoring, and feedback integration. To mitigate these biases, we suggest involving a diverse group of stakeholders, using human-centered AI principles. Human-centered AI can help ensure that AI systems are designed and used in a way that benefits patients and society, which can reduce health disparities and inequities. …
The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader
The Pivotal Role Of International Human Rights Law In Defeating Cybercrime: Amid A (Un-Backed) Global Treaty On Cybercrime, Professor Fatemah Albader
Vanderbilt Journal of Transnational Law
On May 26, 2021, the General Assembly of the United Nations adopted a resolution approving the drafting of a new global treaty on cybercrime, which commenced in February 2022. The proposed UN agreement on cybercrime regulation has garnered significant criticism among the international community, namely by state delegates, human rights advocates, and nongovernmental organizations. Fears stem from the belief that such a treaty would be used to legitimize abusive practices and undermine fundamental human rights. National cybercrime laws already unduly restrict human rights. However, at a time where the global community has moved toward a digital world, it becomes even …
The Law And Politics Of Ransomware, Asaf Lubin
The Law And Politics Of Ransomware, Asaf Lubin
Vanderbilt Journal of Transnational Law
What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between twenty thousand and thirty thousand per day in the United States alone. That is a ransomware attack every eleven seconds, each of which …
Comparative Cybersecurity Law In Socialist Asia, Ngoc S. Bui, Jyh-An Lee
Comparative Cybersecurity Law In Socialist Asia, Ngoc S. Bui, Jyh-An Lee
Vanderbilt Journal of Transnational Law
This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam in 2017 and 2018, respectively. The two laws both converge and diverge. Their convergences include the stringent regulation of banned acts, network operators, critical infrastructure, data localization, and personal data. These are all shaped by the immediate diffusion of China's Cybersecurity Law in Vietnam and broader structural factors: namely, the common features of the socialist state, socialist legality, and the statist approach to human rights. The foundational divergence is between the Chinese notion of cybersecurity sovereignty and the Vietnamese notion of national cyberspace, which is …
Ai Derivatives: The Application To The Derivative Work Right To Literary And Artistic Productions Of Ai Machines, Daniel J. Gervais
Ai Derivatives: The Application To The Derivative Work Right To Literary And Artistic Productions Of Ai Machines, Daniel J. Gervais
Vanderbilt Law School Faculty Publications
This Article predicts that there will be attempts to use courts to try to broaden the derivative work right in litigation either to prevent the use of, or claim protection for, literary and artistic productions made by Artificial Intelligence (AI) machines. This Article considers the normative valence of, and the (significant) doctrinal pitfalls associated with, such attempts. It also considers a possible legislative alternative, namely attempts to introduce a new sui generis right in AI productions. Finally, this Article explains how, whether such attempts succeed or not, the debate on rights (if any) in productions made by AI machines is …
A Compulsory Solution To The Machine Problem, Cole G. Merritt
A Compulsory Solution To The Machine Problem, Cole G. Merritt
Vanderbilt Law School Faculty Publications
Artificial Intelligence (AI) is already disrupting and will likely continue to disrupt many industries. Despite the role AI already plays, AI systems are becoming increasingly powerful. Ultimately, these systems may become a powerful tool that can lead to the discovery of important inventions or significantly reduce the time required to discover these inventions. Even now, AI systems are independently inventing. However, the resulting AI-generated inventions are unable to receive patent protection under current US patent law. This unpatentability may lead to inefficient results and ineffectively serves the goals of patent law.
To embrace the development and power of AI, Congress …
“Computer Says No!”: The Impact Of Automation On The Discretionary Power Of Public Officers, Doa A. Elyounes
“Computer Says No!”: The Impact Of Automation On The Discretionary Power Of Public Officers, Doa A. Elyounes
Vanderbilt Journal of Entertainment & Technology Law
The goal of this Article is to unpack the “human in the loop” requirement in the process of automation. It will analyze the impact of automation on street-level bureaucrats and lay out the steps policy makers need to take into account to ensure that meaningful human discretion is maintained. This issue is examined by comparing two algorithms related to the use of automation to detect and investigate fraud in welfare benefits. The first algorithm is used by Michigan’s Unemployment Insurance Agency for detecting and investigating unemployment fraud. This is a draconian algorithm with the ability to automatically decide to cut …
Algorithmic Opacity, Private Accountability, And Corporate Social Disclosure In The Age Of Artificial Intelligence, Sylvia Lu
Vanderbilt Journal of Entertainment & Technology Law
Today, firms develop machine-learning algorithms to control human decisions in nearly every industry, creating a structural tension between commercial opacity and democratic transparency. In many of their commercial applications, advanced algorithms are technically complicated and privately owned, which allows them to hide from legal regimes and prevents public scrutiny. However, they may demonstrate their negative effects—erosion of democratic norms, damages to financial gains, and extending harms to stakeholders—without warning. Nevertheless, because the inner workings and applications of algorithms are generally incomprehensible and protected as trade secrets, they can be completely shielded from public surveillance. One of the solutions to this …
The Machine As Author, Daniel J. Gervais
The Machine As Author, Daniel J. Gervais
Vanderbilt Law School Faculty Publications
Machines are increasingly good at emulating humans and laying siege to what has been a strictly human outpost: intellectual creativity.
At this juncture, we cannot know with certainty how high machines will reach on the creativity ladder when compared to, or measured against, their human counterparts, but we do know this. They are far enough already to force us to ask a genuinely hard and complex question, one that intellectual property (“IP”) scholars and courts will need to answer soon; namely, whether copyrights should be granted to productions made not by humans but by machines.
This Article’s specific objective is …
Fintech And International Financial Regulation, Yesha Yadav
Fintech And International Financial Regulation, Yesha Yadav
Vanderbilt Law School Faculty Publications
This Article shows that fintech exacerbates the difficulties of standard setting in international financial regulation. Earlier work introduced the "Innovation Trilemma" (the Trilemma). When seeking to balance the goals of achieving market integrity and innovation through clear and simple rulemaking, regulators can-at best-achieve only two out of these three objectives. Fintech's unique characteristics- a reliance on automation and artificial intelligence, novel types of big data, as well as the use of disintermediating financial supply chains comprising a mix of traditional firms as well as technology specialists and newcomers-complicates the application of the Trilemma. Rulemaking struggles to achieve needed clarity where …
People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke
People V. Robots: A Roadmap For Enforcing California's New Online Bot Disclosure Act, Barry Stricke
Vanderbilt Journal of Entertainment & Technology Law
Bots are software applications that complete tasks automatically. A bot's communication is disembodied, so humans can mistake it for a real person, and their misbelief can be exploited by the bot owner to deploy malware or phish personal data. Bots also pose as consumers posting online product reviews or spread (often fake) news, and a bot owner can coordinate multiple social-network accounts to trick a network's "trending" algorithms, boosting the visibility of specific content, sowing and exacerbating controversy, or fabricating an impression of mass individual consensus. California's 2019 Bolstering Online Transparency Act (the "CA Bot Act') imposes conspicuous disclosure requirements …
The Very Brief History Of Decentralized Blockchain Governance, Michael Abramowicz
The Very Brief History Of Decentralized Blockchain Governance, Michael Abramowicz
Vanderbilt Journal of Entertainment & Technology Law
A new form of blockchain governance involving the use of formal games that incentivize participants to identify focal resolutions to normative questions is emerging. This symposium contribution provides a brief survey of the literature proposing and critiquing the use of such mechanisms of decentralized decision-making, and it evaluates early laboratory and real-world experiments with this approach.
Cybersecurity And The Protection Of Digital Assets: Assessing The Role Of International Investment Law And Arbitration, Julien Chaisse, Cristen Bauer
Cybersecurity And The Protection Of Digital Assets: Assessing The Role Of International Investment Law And Arbitration, Julien Chaisse, Cristen Bauer
Vanderbilt Journal of Entertainment & Technology Law
The digital era provides many opportunities, yet it also presents several unique challenges with regard to cybersecurity and the protection of digital assets. Cybercrime has changed the international legal landscape as nations, businesses, and legislators grapple with how to deal with this rapidly evolving, multifaceted problem. As there is no international mechanism for protection of foreign investors in this regard, some scholars are advocating for the use of Bilateral Investment Treaties (BITs) as part of a 'olycentric" approach to cyber peace. With an uptick in digital development and more development on the horizon, it will be important to establish what …
Exploring The Interfaces Between Big Data And Intellectual Property Law, Daniel J. Gervais
Exploring The Interfaces Between Big Data And Intellectual Property Law, Daniel J. Gervais
Vanderbilt Law School Faculty Publications
This article reviews the application of several IP rights (copyright, patent, sui generis database right, data exclusivity and trade secret) to Big Data. Beyond the protection of software used to collect and process Big Data corpora, copyright’s traditional role is challenged by the relatively unstructured nature of the non-relational (noSQL) databases typical of Big Data corpora. This also impacts the application of the EU sui generis right in databases. Misappropriation (tort-based) or anti-parasitic behaviour protection might apply, where available, to data generated by AI systems that has high but short-lived value. Copyright in material contained in Big Data corpora must …
Neuroscience, Artificial Intelligence, And The Case Against Solitary Confinement, Francis X. Shen
Neuroscience, Artificial Intelligence, And The Case Against Solitary Confinement, Francis X. Shen
Vanderbilt Journal of Entertainment & Technology Law
Prolonged solitary confinement remains in widespread use in the United States despite many legal challenges. A difficulty when making the legal case against solitary confinement is proffering sufficiently systematic and precise evidence of the detrimental effects of the practice on inmates' mental health. Given this need for further evidence, this Article explores how neuroscience and artificial intelligence (AI) might provide new evidence of the effects of solitary confinement on the human brain.
This Article argues that both neuroscience and AI are promising in their potential ability to present courts with new types of evidence on the effects of solitary confinement …
Borders And Bits, Jennifer Daskal
Borders And Bits, Jennifer Daskal
Vanderbilt Law Review
Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …
Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan
Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan
Vanderbilt Law School Faculty Publications
Legal and policy scholars modeling direct actions into substantive topic classifications thus far have not employed computational methods. To compare the results of their conventional modeling methods with the computational method, we generated computational topic models of all direct actions over time periods other scholars have studied using conventional methods, and did the same for a case study of environmental-policy direct actions. Our computational model of all direct actions closely matched one of the two comprehensive empirical models developed using conventional methods. By contrast, our environmental-case-study model differed markedly from the only empirical topic model of environmental-policy direct actions using …
Differential Privacy: A Primer For A Non-Technical Audience, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O'Brien, Thomas Steinke, Salil Vadhan
Differential Privacy: A Primer For A Non-Technical Audience, Alexandra Wood, Micah Altman, Aaron Bembenek, Mark Bun, Marco Gaboardi, James Honaker, Kobbi Nissim, David R. O'Brien, Thomas Steinke, Salil Vadhan
Vanderbilt Journal of Entertainment & Technology Law
Differential privacy is a formal mathematical framework for quantifying and managing privacy risks. It provides provable privacy protection against a wide range of potential attacks, including those currently unforeseen. Differential privacy is primarily studied in the context of the collection, analysis, and release of aggregate statistics. These range from simple statistical estimations, such as averages, to machine learning. Tools for differentially private analysis are now in early stages of implementation and use across a variety of academic,industry, and government settings. Interest in the concept is growing among potential users of the tools, as well as within legal and policy communities, …
Corporate Cybersecurity: The International Threat To Private Networks And How Regulations Can Mitigate It, Eric J. Hyla
Corporate Cybersecurity: The International Threat To Private Networks And How Regulations Can Mitigate It, Eric J. Hyla
Vanderbilt Journal of Entertainment & Technology Law
Cyberattacks are occurring at an accelerating pace. Foreign nations are increasingly utilizing hacking as a tool for economic gain, acts of aggression, or international political expression. At risk are US consumers'personal data, private firms' bottom line, and the economies'integrity. In response, federal and state lawmakers have issued a series of disparate, uncoordinated policies seeking to strengthen cybersecurity practices. However, recent events indicate that these policies are less than ideal. This Note suggests that a unified response to cybersecurity is required and calls for the establishment of a single, central federal agency with authority over all cybersecurity regulations. Such an agency …
Virtual Reality Exceptionalism, Gilad Yadin
Virtual Reality Exceptionalism, Gilad Yadin
Vanderbilt Journal of Entertainment & Technology Law
Virtual reality is here. In just a few years, the technology moved from science fiction to the Internet, from specialized research facilities to living rooms. These new virtual reality environments are connected, collaborative, and social-built to deliver a subjective psychological effect that believably simulates spatial physical reality. Cognitive research shows that this effect is powerful enough that virtual reality users act and interact in ways that mirror real-world social and moral norms and behavior.
Contemporary cyberlaw theory is largely based on the notion that cyberspace is exceptional enough to warrant its own specific rules. This premise, a descendant of early …
The Bot Legal Code: Developing A Legally Compliant Artificial Intelligence, Edmund Mokhtarian
The Bot Legal Code: Developing A Legally Compliant Artificial Intelligence, Edmund Mokhtarian
Vanderbilt Journal of Entertainment & Technology Law
The advent of sophisticated artificial intelligence (AI) agents, or bots, raises the question: How do we ensure that these bots act appropriately? Within a decade, AI will be ubiquitous, with billions of active bots influencing nearly every industry and daily activity. Given the extensiveness of AI activity, it will be nearly impossible to explicitly program bots with detailed instructions on permitted and prohibited actions, particularly as they face unpredictable, novel situations. Rather, if risks to humans are to be mitigated, bots must have some overriding moral or legal compass--a set of "AI Laws"--to allow them to adapt to whatever scenarios …
A Free Ride: Data Brokers'rent-Seeking Behavior And The Future Of Data Inequality, Krishnamurty Muralidhar, Laura Palk
A Free Ride: Data Brokers'rent-Seeking Behavior And The Future Of Data Inequality, Krishnamurty Muralidhar, Laura Palk
Vanderbilt Journal of Entertainment & Technology Law
Historically, researchers obtained data from independent studies and government data. However, as public outcry for privacy regarding the government's maintenance of data has increased, the discretionary release of government data has decreased or become so anonymized that its relevance is limited. Research necessarily requires access to complete and accurate data. As such, researchers are turning to data brokers for the same, and often more, data than they can obtain from the government. Data brokers base their products and services on data gathered from a variety of free public sources and via the government-created Internet. Data brokers then recategorize the existing …
Linking The Public Benefit To The Corporation: Blockchain As A Solution For Certification In An Age Of "Do-Good" Business, Margaret D. Fowler
Linking The Public Benefit To The Corporation: Blockchain As A Solution For Certification In An Age Of "Do-Good" Business, Margaret D. Fowler
Vanderbilt Journal of Entertainment & Technology Law
As part of its now-infamous emissions scandal, Volkswagen spent tens of millions of dollars on advertising geared toward environmentally conscious consumers. The scandal is an example of "greenwashing," which, along with the corresponding term "fairwashing," represents the information asymmetry present in product markets that involve claims of social and environmental responsibility in companies' production practices. As consumers and investors demand responsible production practices from both traditional corporations and entities organized under the newer corporate form known as public benefit corporations (PBCs), it becomes even more important to verify that those entities' supply chains are, in fact, meeting standards for the …
The Money Mule: Its Discursive Construction And The Implications, Rainer Hulsse
The Money Mule: Its Discursive Construction And The Implications, Rainer Hulsse
Vanderbilt Journal of Transnational Law
The proceeds of cybercrime are typically laundered by money mules--people used by criminal organizations to interrupt the financial paper trail by transferring money for the criminals. This Article analyzes the discursive construction of the money mule in documents of national and international anti-money laundering authorities such as Financial Intelligence Units (FIUs), Europol, and the Financial Action Task Force (FATF). It shows how case study narratives, visualizations, and metaphors contribute to an understanding of the money mule as an innocent victim of organized crime networks from West Africa and Eastern Europe, supported by money remittance companies like Western Union. These constructions …
Applying The Law Of Proportionality To Cyber Conflict: Suggestions For Practitioners, Eric Boylan
Applying The Law Of Proportionality To Cyber Conflict: Suggestions For Practitioners, Eric Boylan
Vanderbilt Journal of Transnational Law
This Note examines the applicability of the law of armed conflict, and particularly the concept of proportionality, to cyber attacks. After exploring deviations in terminology that may lead to confusion in the field, it considers the difficulties associated with applying an area of law first implemented in the post-World War II era to technologies that have only become vitally important in recent years. Delving into some of the facets of cyber technology that make it unique as a potential battleground, this Note examines why those qualities make the law of proportionality particularly difficult to apply. Acknowledging that the law of …