Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 23 of 23

Full-Text Articles in Law

Machines Like Me: A Proposal On The Admissibility Of Artificially Intelligent Expert Testimony, Andrew W. Jurs, Scott Devito Apr 2024

Machines Like Me: A Proposal On The Admissibility Of Artificially Intelligent Expert Testimony, Andrew W. Jurs, Scott Devito

Pepperdine Law Review

With the rapidly expanding sophistication of artificial intelligence systems, their reliability, and cost-effectiveness for solving problems, the current trend of admitting testimony based on artificially intelligent (AI) systems is only likely to grow. In that context, it is imperative for us to ask what rules of evidence judges today should use relating to such evidence. To answer that question, we provide an in-depth review of expert systems, machine learning systems, and neural networks. Based on that analysis, we contend that evidence from only certain types of AI systems meet the requirements for admissibility, while other systems do not. The break …


Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath Jan 2023

Typing A Terrorist Attack: Using Tools From The War On Terror To Fight The War On Ransomware, Jake C. Porath

Pepperdine Law Review

The United States faces a grave challenge in its fight against cyberattacks from abroad. Chief among the foreign cyber threats comes from a finite number of “ransomware-as-a-service” gangs, which are responsible for extorting billions of dollars from American citizens and companies annually. Prosecuting these cybercriminals has proven exceedingly difficult. Law enforcement often struggles to forensically trace ransomware attacks, which makes identifying and prosecuting the perpetrators challenging. Moreover, even when prosecutors can identify the perpetrators of these attacks, the ransomware gangs are headquartered in foreign adversarial nations that do not extradite criminals to the United States. Finally, ransomware gangs are governed …


The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton Jul 2020

The First Amendment And Data Privacy: Securing Data Privacy Laws That Withstand Constitutional Muster, Kathryn Peyton

Pepperdine Law Review

Given the growing ubiquity of digital technology’s presence in people’s lives today, it is becoming increasingly more necessary to secure data privacy protections. People interact with technology constantly, ranging from when engaging in business activates, such as corresponding through emails or doing research online, to more innocuous activities like driving, shopping, or talking with friends and family. The advances in technology have made possible the creation of digital trails whenever someone interacts with such technology. Companies aggregate data from data trails and use predictive analytics to create detailed profiles about citizen-consumers. This information is typically used for profit generating purposes. …


Copyrighting Experiences: How Copyright Law Applies To Virtual Reality Programs, Alexis Dunne Oct 2019

Copyrighting Experiences: How Copyright Law Applies To Virtual Reality Programs, Alexis Dunne

The Journal of Business, Entrepreneurship & the Law

This note will attempt to shed light on the question of what kind of protection copyright law affords VR experiences. Part II discusses the nature of VR experiences and their implementation through specifically tailored VR technology. Part III provides an overview of copyright protection, its limitations, and specifically the history of the copyrightability of computer programs. Parts IV and V outline case law relevant to the discussion of the copyrightability of different types of VR experiences and how that case law similarly or dissimilarly apply to the protection of VR experiences. Part IV focuses on protecting VR experiences as a …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu Jul 2015

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Pepperdine Law Review

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that “collect-it-all” tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


How To Avoid The Death Of Your Case By Two Billion Paper Cuts: Encouraging Arbitration As An Alternative Way To Resolve Costly Discovery Disputes, Tzipora Goodfriend-Gelernter Feb 2014

How To Avoid The Death Of Your Case By Two Billion Paper Cuts: Encouraging Arbitration As An Alternative Way To Resolve Costly Discovery Disputes, Tzipora Goodfriend-Gelernter

Pepperdine Dispute Resolution Law Journal

This article analyzes the costly effect of electronic information on discovery practice and advocates for the arbitration of discovery disputes. Part II discusses the background of electronic discovery, the evolution of our reliance on ESI (electronically stored information) as part of our modern day discovery practice, and the benefits and detriments of electronic discovery. Part III discusses the effects of our reliance on electronic discovery and the implications of those effects on litigating parties. It examines how the increasingly computer-based world of discovery has increased the cost of litigation disputes significantly and proposes using the patent arbitration model as a …


Concerted Activity And Social Media: Why Facebook Is Nothing Like The Proverbial Water Cooler, Natalie J. Ferrall May 2013

Concerted Activity And Social Media: Why Facebook Is Nothing Like The Proverbial Water Cooler, Natalie J. Ferrall

Pepperdine Law Review

Social media is an increasingly powerful platform for expression. In late 2009, the National Labor Relations Board began to address the extent to which unionized employees could make disparaging comments about their employers on social media websites. To date, the Board has persisted in treating Internet communications the same as traditional, face-to-face interactions between employees. Additionally, the Board continues to apply dated precedent to current social media cases. This Comment argues that the Board's present approach is inadequate to address the distinct qualities of social media and sets forth recommendations for alternate ways to evaluate employee speech.


In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang Apr 2013

In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang

Journal of the National Association of Administrative Law Judiciary

The first section of this paper examines the historical differences that have led to the American approach to privacy and the European approach to privacy. The second section will examine the current U.S. model, and the third section will examine the EU model. Next, the fourth section will compare and contrast the two models. Finally, the last section will argue that the U.S. should have a regulatory agency and describe how that should look and run.


Net Neutrality: Preparing For The Future, Jennifer Wong Mar 2013

Net Neutrality: Preparing For The Future, Jennifer Wong

Journal of the National Association of Administrative Law Judiciary

No abstract provided.


Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin Mar 2013

Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin

Journal of the National Association of Administrative Law Judiciary

No abstract provided.


Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose Feb 2013

Protection Of Intellectual Property Rights In Computers And Computer Programs: Recent Developments , Alan C. Rose

Pepperdine Law Review

The following article examines the protection offered to computers and computer programs, under the various applicable patent, copyright and trade secret laws. Concerning patent protection; the author discusses the history and current status of the patent laws, and analyzes in detail the landmark case of Diamond v. Diehr. Discussed also is an analysis of copyright protection for computer programs, offered by the 1980 amendments to section 117 of the 1976 Copyright Act; which paved the way for the increased protection.


The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long Jan 2013

The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long

Pepperdine Law Review

In recent years, the legal profession has run head on into the increasing use of computers and computerized information. Discovery and evidentiary rules developed to deal with written documentation may not be flexible enough to adequately cover this relatively new method of storing information. This comment examines various methods by which courts have attempted to deal with discovery and evidentiary problems involving computerized information, and suggests certain areas that should be explored in supporting or attacking the credibility of such information.


Beware Of The Highwayman On The Information Superhighway: A Balanced Proposal To Protect Copyrights Within The National Information Infrastructure, Chandra Gehri Spencer Oct 2012

Beware Of The Highwayman On The Information Superhighway: A Balanced Proposal To Protect Copyrights Within The National Information Infrastructure, Chandra Gehri Spencer

Pepperdine Law Review

No abstract provided.


Wet Footprints? Digital Watermarks: A Trail To The Copyright Infringer On The Internet, Rosemarie F. Jones Oct 2012

Wet Footprints? Digital Watermarks: A Trail To The Copyright Infringer On The Internet, Rosemarie F. Jones

Pepperdine Law Review

No abstract provided.


Commercial Access Contracts And The Internet: Does The Uniform Computer Information Transactions Act Clear The Air With Regard To Liabilities When An On-Line Access System Fails?, Morgan Stewart Oct 2012

Commercial Access Contracts And The Internet: Does The Uniform Computer Information Transactions Act Clear The Air With Regard To Liabilities When An On-Line Access System Fails?, Morgan Stewart

Pepperdine Law Review

No abstract provided.


Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel Oct 2012

Internet-Based Fans: Why The Entertainment Industries Cannot Depend On Traditional Copyright Protections , Thomas C. Inkel

Pepperdine Law Review

No abstract provided.


Double-Clicking On Fourth Amendment Protection: Encryption Creates A Reasonable Expectation Of Privacy, Sean J. Edgett Apr 2012

Double-Clicking On Fourth Amendment Protection: Encryption Creates A Reasonable Expectation Of Privacy, Sean J. Edgett

Pepperdine Law Review

No abstract provided.


Is Spam The Rock Of Sisyphus?: Whether The Can-Spam Act And Its Global Counterparts Will Delete Your E-Mail, Amy G. Marino Mar 2012

Is Spam The Rock Of Sisyphus?: Whether The Can-Spam Act And Its Global Counterparts Will Delete Your E-Mail, Amy G. Marino

Pepperdine Law Review

No abstract provided.


The Riaa V. The People: The Recording Industry's Misguided Attempt To Use The Legal System To Save Their Business Model, John A. Fedock Mar 2012

The Riaa V. The People: The Recording Industry's Misguided Attempt To Use The Legal System To Save Their Business Model, John A. Fedock

Pepperdine Law Review

No abstract provided.


Protecting Children From Online Exploitation And Abuse: An Overview Of Project Safe Childhood, Debra Wong Yang, Patricia A. Donahue Mar 2012

Protecting Children From Online Exploitation And Abuse: An Overview Of Project Safe Childhood, Debra Wong Yang, Patricia A. Donahue

Pepperdine Law Review

No abstract provided.


Copyright Arbitration Royalty Panels And The Webcasting Controversy: The Antithesis Of Good Alternative Dispute Resolution, Jeremy Delibero Mar 2012

Copyright Arbitration Royalty Panels And The Webcasting Controversy: The Antithesis Of Good Alternative Dispute Resolution, Jeremy Delibero

Pepperdine Dispute Resolution Law Journal

Music is becoming increasingly synonymous with big business and corporate influence. The advent of Internet radio and streaming webcasts are simply one example of this shift. Organizations such as the Radio Industry Association of America ("RIAA") have discovered a new way to receive royalties from the performance of musical works, and have fought vigorously to obtain favorable rates to achieve the maximum profit. On the other hand, small webcasters have fought equally hard to avoid these large rates. Although arguments for each side are equally persuasive, neither is persuasive enough to force a compromise. In attempting to solve these disputes, …


International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon Feb 2012

International Travel With A "Digital Briefcase": If Customs Officials Can Search A Laptop, Will The Right Against Self-Incrimination Contravene This Authority?, Ashley H. Verdon

Pepperdine Law Review

No abstract provided.


Software Licenses, Source Code Escrows, And Trustee Powers Under 11 U.S.C. §365, James E. Raymond Jan 2012

Software Licenses, Source Code Escrows, And Trustee Powers Under 11 U.S.C. §365, James E. Raymond

The Journal of Business, Entrepreneurship & the Law

No abstract provided.