Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Law

"The Law Doesn't Work Like A Computer": Exploring Software Licensing Issues Faced By Legal Practitioners, Nathan Wintersgill, Trevor Stalnaker, Laura A. Heymann, Oscar Chaparro, Denys Poshyvanyk Jul 2024

"The Law Doesn't Work Like A Computer": Exploring Software Licensing Issues Faced By Legal Practitioners, Nathan Wintersgill, Trevor Stalnaker, Laura A. Heymann, Oscar Chaparro, Denys Poshyvanyk

Faculty Publications

Most modern software products incorporate open source components, which requires compliance with each component’s licenses. As noncompliance can lead to significant repercussions, organizations often seek advice from legal practitioners to maintain license compliance, address licensing issues, and manage the risks of noncompliance. While legal practitioners play a critical role in the process, little is known in the software engineering community about their experiences within the open source license compliance ecosystem. To fill this knowledge gap, a joint team of software engineering and legal researchers designed and conducted a survey with 30 legal practitioners and related occupations and then held 16 …


Analog Analogies: Intel V. Hamidi And The Future Of Trespass To Chattels, Maureen E. Brady, James Y. Stern Aug 2023

Analog Analogies: Intel V. Hamidi And The Future Of Trespass To Chattels, Maureen E. Brady, James Y. Stern

Faculty Publications

A symposium on great torts cases of the twenty-first century must include Intel Corp. v. Hamidi, the canonical case about whether unwanted e-mail spam sent to a company’s server could give rise to a trespass to chattels claim. While much has been written about Intel, in this Essay, we argue that Intel is as much of a classic for what it reveals about the old-fashioned tort as it is for its more closely examined ruling on “cybertrespass.” The dueling personal property analogies chosen by the majority and dissenting opinions in Intel reveal basic and fundamental disagreements about what …


An Initial Examination Of Computer Programs As Creative Works, Trina C. Kershaw, Ralph D. Clifford, Firas Khatib, Adnan El-Nasan Jan 2022

An Initial Examination Of Computer Programs As Creative Works, Trina C. Kershaw, Ralph D. Clifford, Firas Khatib, Adnan El-Nasan

Faculty Publications

Products from many domains (art, music, engineering design, literature, etc.) are considered to be creative works, but there is a misconception that computer programs are limited by set expressions and thus have no room for creativity. To determine whether computer programs are creative works, we collected programs from 23 advanced graduate students that were written to solve simple and complex bioinformatics problems. These programs were assessed for their variability of expression using a new measurement that we designed. They were also evaluated on several elements of their creativity using a version of Cropley and Kaufman’s (2012) Creative Solution Diagnosis Scale …


Brief Of Amicus Curiae Interdisciplinary Research Team On Programmer Creativity In Support Of Respondent, Ralph D. Clifford, Firas Khatib, Trina Kershaw, Kavitha Chandra, Jay Mccarthy Jan 2020

Brief Of Amicus Curiae Interdisciplinary Research Team On Programmer Creativity In Support Of Respondent, Ralph D. Clifford, Firas Khatib, Trina Kershaw, Kavitha Chandra, Jay Mccarthy

Faculty Publications

This brief answers the two primary issues that are associated with the first question before the Court. First, the programmers’ expression of the Java-based application programmer interfaces (“APIs”) are sufficiently creative to satisfy that requirement of copyright law. Second, the idea expression limitation codified in Section 102(b) of Copyright Act does not establish that the APIs are ideas. Both of these assertions are supported by the empirical research undertaken by the Research Team. This brief expresses no opinion on the resolution of the fair use question that is also before the Court.


Smart Contracts And The Limits Of Computerized Commerce, Eric D. Chason Jan 2020

Smart Contracts And The Limits Of Computerized Commerce, Eric D. Chason

Faculty Publications

Smart contracts and cryptocurrencies have sparked considerable interest among legal scholars in recent years, and a growing body of scholarship focuses on whether smart contracts and cryptocurrencies can sidestep law and regulation altogether. Bitcoin is famously decentralized, without any central actor controlling the system. Its users remain largely anonymous, using alphanumeric addresses instead of legal names. Ethereum shares these traits and also supports smart contracts that can automate the transfer of the Ethereum cryptocurrency (known as ether). Ethereum also supports specialized "tokens" that can be tied to the ownership of assets, goods, and services that exist completely outside of the …


Expanding Access To Remedies Through E-Court Initiatives, Amy J. Schmitz Jan 2019

Expanding Access To Remedies Through E-Court Initiatives, Amy J. Schmitz

Faculty Publications

Virtual courthouses, artificial intelligence (AI) for determining cases, and algorithmic analysis for all types of legal issues have captured the interest of judges, lawyers, educators, commentators, business leaders, and policymakers. Technology has become the “fourth party” in dispute resolution through the growing field of online dispute resolution (ODR), which includes the use of a broad spectrum of technologies in negotiation, mediation, arbitration, and other dispute resolution processes. Indeed, ODR shows great promise for expanding access to remedies, or justice. In the United States and abroad, however, ODR has mainly thrived within e-commerce companies like eBay and Alibaba, while most public …


Licensing & Law Who Owns An Avatar?, Tyler T. Ochoa, Jaime Banks Jan 2018

Licensing & Law Who Owns An Avatar?, Tyler T. Ochoa, Jaime Banks

Faculty Publications

Both players and game developers have great influence over how avatars—via their assembled components— manifest in digital game play. Developers craft their foundational platforms and draw on those infrastructures to craft dynamic code that enables movements, appearances, and abilities. But those potentials call into question whether avatars are avatars until they are played—players click avatars into being, customize their bodies and attire, drive their actions and interactions, and sometimes bring them outside the game world through physical representations. So, given avatars’ joint reliance on developers and players, and given legal frameworks such as copyright law, who really “owns” a video …


Reader Privacy In Digital Library Collaborations: Signs Of Commitment, Opportunities For Improvement, Anne Klinefelter Oct 2016

Reader Privacy In Digital Library Collaborations: Signs Of Commitment, Opportunities For Improvement, Anne Klinefelter

Faculty Publications

Libraries collaborate to digitize collections large and small in order to provide information with fewer geographical, temporal, or socio-economic barriers. These collaborations promise economy of scale and breadth of impact, both for access to content and for preservation of decaying print source material. Some suggest this increased access to information through the digital environment comes at the expense of reader privacy, a value that United States librarians have advanced for nearly eighty years. Multiplying risks to digital reader privacy are said to weaken librarians’ commitment to privacy of library use and to overwhelm libraries’ ability to ensure confidential access to …


Taxonomy Of The Snowden Disclosures, Margaret Hu Oct 2015

Taxonomy Of The Snowden Disclosures, Margaret Hu

Faculty Publications

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Apr 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Faculty Publications

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that "collect-it-all" tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum Jan 2010

Making The Punishment Fit The (Computer) Crime: Rebooting Notions Of Possession For The Federal Sentencing Of Child Pornography Offenses, Jelani Jefferson Exum

Faculty Publications

(Excerpt)

Sexual exploitation of children is a real and disturbing problem. However, when it comes to the sentencing of child pornography possessors, the U.S. federal system has a problem, as well. This Article adds to the current, heated discussion on what is happening in the sentencing of federal child pornography possession offenses, why nobody is satisfied, and how much the Federal Sentencing Guidelines are to blame. At the heart of this Article are the forgotten players in the discussion—computers and the Internet—and their role in changing the realities of child pornography possession. This Article argues that computers and the Internet …


Search Engine Bias And The Demise Of Search Engine Utopianism, Eric Goldman Jan 2006

Search Engine Bias And The Demise Of Search Engine Utopianism, Eric Goldman

Faculty Publications

Due to search engines' automated operations, people often assume that search engines display search results neutrally and without bias. However, this perception is mistaken. Like any other media company, search engines affirmatively control their users' experiences, which has the consequence of skewing search results (a phenomenon called "search engine bias"). Some commentators believe that search engine bias is a defect requiring legislative correction. Instead, this Essay argues that search engine bias is the beneficial consequence of search engines optimizing content for their users. The Essay further argues that the most problematic aspect of search engine bias, the "winner-take all" effect …


Taxing Trademarks And Domain Names, Xuan-Thao Nguyen, Jeffrey A. Maine Jan 2006

Taxing Trademarks And Domain Names, Xuan-Thao Nguyen, Jeffrey A. Maine

Faculty Publications

With the arrival of global electronic commerce transactions on the Internet, new forms of intellectual property rights, such as Internet domain names, have emerged. Today, Internet domain names are some companies' most valuable assets. Yet law professors, attorneys, and judges struggle with the legal nature of domain names, which is far from settled. Questions drawing recent attention include: How should domain names be valued? Can domain names be used as collateral in secured transactions, and how does one perfect a security interest in domain names? What will happen to domain names in bankruptcy?


Access Denied: Improper Use Of The Computer Fraud And Abuse Act To Control Information On Publicly Accessible Internet Websites, Christine Galbraith Davik Jan 2004

Access Denied: Improper Use Of The Computer Fraud And Abuse Act To Control Information On Publicly Accessible Internet Websites, Christine Galbraith Davik

Faculty Publications

The Computer Fraud and Abuse Act (CFAA) was originally enacted in 1984 as a criminal statute to address hacking and the growing problem of computer crime. Recently, however, in an attempt to control competition and maintain market share, a number of companies have sought to prevent entities they deem unwelcome from obtaining data on their websites. Utilizing the civil action provisions of the CFAA, these companies have surprisingly succeeded in convincing federal courts that hacking includes accessing and using the factual information a company has chosen to post on a publicly available website. Despite the fact that many of the …


A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker Jan 2001

A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker

Faculty Publications

This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.


W(H)Ither Warranty: The B(L)Oom Of Products Liability Theory In Cases Of Deficient Software Design, Peter A. Alces Jan 1999

W(H)Ither Warranty: The B(L)Oom Of Products Liability Theory In Cases Of Deficient Software Design, Peter A. Alces

Faculty Publications

No abstract provided.


When Y2k Causes "Economic Loss" To "Other Property", Peter A. Alces, Aaron S. Book Jan 1999

When Y2k Causes "Economic Loss" To "Other Property", Peter A. Alces, Aaron S. Book

Faculty Publications

No abstract provided.