Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Antitrust (2)
- Artificial intelligence (2)
- Computer Law (2)
- Law and technology (2)
- Technology Law (2)
-
- AI (1)
- Artificial Intelligence (1)
- Bias (1)
- Biometric Data (1)
- Civil litigation (1)
- Civil procedure (1)
- Copyright (1)
- Data Privacy (1)
- Data analytics (1)
- Defend Trade Secrets Act (1)
- E-discovery (1)
- Electronic discovery (1)
- Empirical (1)
- Extraterritorial Reach (1)
- Extraterritoriality Misappropriation (1)
- Facebook (1)
- Federal Rules of Civil Procedure (1)
- Federal litigation (1)
- Fourth Amendment (1)
- Law and AI (1)
- Law enforcement (1)
- LegalZoom (1)
- Lethal Autonomous Weapon Systems (1)
- Lethal Autonomous Weapons Systems (1)
- Machine learning (1)
Articles 1 - 22 of 22
Full-Text Articles in Law
Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley
Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley
University of Cincinnati Law Review
Law enforcement officers performing drug interdiction on interstate highways have to decide nearly every day whether there is reasonable suspicion to detain motorists until a trained dog can sniff for the presence of drugs. The officers’ assessments are often wrong, however, and lead to unnecessary detentions of innocent persons and the suppression of drugs found on guilty ones. We propose a computational method of evaluating suspicion in these encounters and offer experimental results from early efforts demonstrating its feasibility. With the assistance of large language and predictive machine learning models, it appears that judges, advocates, and even police officers could …
The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson
The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson
University of Cincinnati Law Review
This Article sheds light on a unique but centrally important “twenty-first century” issue involving electronic discovery in federal civil litigation that is just beginning to percolate in federal district courts. Historically, courts have held that a document attached to or enclosed with another document must be produced together when produced in response to a discovery request, as that is how the document was “kept in the usual course of business” and how it is “ordinarily maintained or in a reasonably usable form,” as the Federal Rules of Civil Procedure have required for decades. Today, parties are pushing back on whether …
The Unregulated World Of Your Most Personal Of Personal Information: A Proposal For A Federal Biometric Information Privacy Law, Isabel M. Vuyk
The Unregulated World Of Your Most Personal Of Personal Information: A Proposal For A Federal Biometric Information Privacy Law, Isabel M. Vuyk
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Why Outlaw Laws?: An Argument For A Probationary Period For Lethal Autonomous Weapons Systems Under Meaningful Human Control., Katherine E. Vuyk
Why Outlaw Laws?: An Argument For A Probationary Period For Lethal Autonomous Weapons Systems Under Meaningful Human Control., Katherine E. Vuyk
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley
Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley
University of Cincinnati Law Review
No abstract provided.
Dirty Little Secrets: The Constitutional Feasibility Of Implementing Legislation To Compel Licensing Of Trade Secrets To End The Covid-19 Pandemic, Noah Olson
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Losing Dignity: Eroding Privacy Rights Of Immigrants In Technology-Based Immigration Enforcement, Inma Sumaita
Losing Dignity: Eroding Privacy Rights Of Immigrants In Technology-Based Immigration Enforcement, Inma Sumaita
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Infringement, She Wrote: The Intellectual Property Rights Of Victims In True Crime Craze, Laura Callihan
Infringement, She Wrote: The Intellectual Property Rights Of Victims In True Crime Craze, Laura Callihan
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
The Patentability Of Inventions With Artificial Intelligence Listed As An Inventor Following Thaler V. Hirshfeld, Kaitlyn Taylor
The Patentability Of Inventions With Artificial Intelligence Listed As An Inventor Following Thaler V. Hirshfeld, Kaitlyn Taylor
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Stifling Dissent Or Enforcing Rules? The State Of Speech Rights In Online Forums, Noah Olson
Stifling Dissent Or Enforcing Rules? The State Of Speech Rights In Online Forums, Noah Olson
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
“Storytime: We’Re Being Sued” – Copyright Infringement And Fair Use In The Digital Era, Mikayla Spencer
“Storytime: We’Re Being Sued” – Copyright Infringement And Fair Use In The Digital Era, Mikayla Spencer
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
The Importance Of Being Earnestly Innovative: The Increasing Role Of Intellectual Property Law In The Global Economy, Inma Sumaita
The Importance Of Being Earnestly Innovative: The Increasing Role Of Intellectual Property Law In The Global Economy, Inma Sumaita
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Intellectual Property & National Security, James Morrison
Intellectual Property & National Security, James Morrison
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
The Patentability Of Antibodies For Use In Medications After Amgen V. Sanofi, Kaitlyn Taylor
The Patentability Of Antibodies For Use In Medications After Amgen V. Sanofi, Kaitlyn Taylor
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Copyright Claims And Constitutional Games: The Constitutionality Of The Copyright Claims Board Following The Supreme Court Ruling In Arthrex, Laura Callihan
Copyright Claims And Constitutional Games: The Constitutionality Of The Copyright Claims Board Following The Supreme Court Ruling In Arthrex, Laura Callihan
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Market Power And Switching Costs: An Empirical Study Of Online Networking Market, Shin-Ru Cheng
Market Power And Switching Costs: An Empirical Study Of Online Networking Market, Shin-Ru Cheng
University of Cincinnati Law Review
In recent years, states have launched several antitrust investigations targeting digital platforms. A major difficulty in these investigations is demonstrating the extent of a digital platform’s market power. Market power is defined as the control of the output or the price without the loss of business to competitors. As will be explored in this Article, market power is a critical component in an antitrust analysis. On several occasions, courts have adopted the switching costs approach in their analysis of market power. According to this approach, market power may be inferred when the costs of switching from one supplier to another …
Strategic Lawsuits Against Public Participation In The Age Of Online Speech: The Relevance Of Anti-Slapp And Anti-Cyberslapp Legislation, Lauren Merk
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Information Crossroads: Intersection Of Military And Civilian Interpretations Of Cyber Attack And Defense, Carlos Plazas
Information Crossroads: Intersection Of Military And Civilian Interpretations Of Cyber Attack And Defense, Carlos Plazas
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
What The Supreme Court Is Likely To Do In The Presently Pending Case Google V. Oracle, Jennifer Campbell
What The Supreme Court Is Likely To Do In The Presently Pending Case Google V. Oracle, Jennifer Campbell
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Can David Really Beat Goliath? A Look Into The Anti-Competitive Restrictions Of Apple Inc. And Google, Llc, Emily Feeley
Can David Really Beat Goliath? A Look Into The Anti-Competitive Restrictions Of Apple Inc. And Google, Llc, Emily Feeley
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
The Court Must Play Its Interpretative Role: Defending The Defend Trade Secrets Act’S Extraterritorial Reach, Jada M. Colon
The Court Must Play Its Interpretative Role: Defending The Defend Trade Secrets Act’S Extraterritorial Reach, Jada M. Colon
The University of Cincinnati Intellectual Property and Computer Law Journal
The exact reach of the Defend Trade Secrets Act’s extraterritoriality provision has yet to be interpreted by the courts. If United States securities, trademark, and antitrust law serves as any indication of what is to be expected, the Defend Trade Secrets Act may be subject to an inconsistent array of interpretation. When faced with interpreting the extraterritorial scope of the Defend Trade Secrets Act for the first time, the court must set a strong precedent by enacting a single, uniform effects test that will not falter when applied in different circumstances and by different circuits. Courts interpreting United States securities, …
Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder
Our Time Is Better Spent Influencing Future Disruption: A Call To End The Indiscriminate War Against Self-Help Legal Technology, Olivia Holder
The University of Cincinnati Intellectual Property and Computer Law Journal
Under the guise of consumer protection, lawyers and bar associations have used disparate litigious mechanisms to thwart, inadvertently or not, the use of self-help legal technology. This paper will demonstrate that such adversity is not logical after a consideration of the technical functions that the software performs and unduly restricts underserved populations’ access to the law because of the misapplication of policy to vaguely worded laws. This paper will provide a thorough analysis of legal action taken against the high-profile company LegalZoom under the theory of unauthorized practice of law provides direct support of this claim. Summary and critique of …