Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Technology (12)
- Privacy (8)
- Artificial intelligence (7)
- VAT (7)
- Internet (6)
-
- Patents (6)
- Copyright law (5)
- Data (5)
- Software (5)
- Surveillance (5)
- AI (4)
- Bitcoin (4)
- Copyright (4)
- Machine learning (4)
- Transparency (4)
- Algorithmic governance (3)
- Berkeley Technology Law Journal (3)
- Columbia Law Review (3)
- Cyberspace (3)
- Data protection (3)
- Financial regulation (3)
- Innovation (3)
- Intellectual property (3)
- Law (3)
- Patent law (3)
- SSRN (3)
- Algorithmic discrimination (2)
- Artificial Intelligence (2)
- Automation (2)
- Big Data (2)
Articles 31 - 60 of 87
Full-Text Articles in Law
Taxing & Zapping Marijuana: Blockchain Compliance In The Trump Administration Part 3, Richard Thompson Ainsworth, Brendan Magauran
Taxing & Zapping Marijuana: Blockchain Compliance In The Trump Administration Part 3, Richard Thompson Ainsworth, Brendan Magauran
Faculty Scholarship
This is the third of a five-part series dealing with the rescission by U.S. Attorney General Jeff Sessions of the Obama-era policy that discouraged federal prosecutors from bringing charges in all but the most serious marijuana cases.
This article focuses on cyber-attacks on the main commercial chain, and the use of a private blockchain using HyperLedger Fabric as a platform.
This fraud is a direct, criminal attack; an attack designed to destroy/corrupt records of marijuana inventory and plant tags throughout the supply chain. The attack allows legalized marijuana to escape the system and be sold on the black market. A …
Zappers, Phantomware And Other Sales Suppression Software In The State Of Washington, Richard Thompson Ainsworth, Robert Chicoine
Zappers, Phantomware And Other Sales Suppression Software In The State Of Washington, Richard Thompson Ainsworth, Robert Chicoine
Faculty Scholarship
Electronic sales suppression (ESS) is a fraud that has been a (prominent) feature of the North American retail business since at least 1996. The first EES case in the US dates from 1981. ESS is a global problem. Depending on the jurisdiction, and the research study consulted, ESS is estimated to be present in 34% (of Canadian), 50% (of German – two studies), and 70% (of Swedish and Slovenian) businesses. It may be the case today, that “you cannot leave home without” encountering (or participating in) ESS.
The most common types of sales suppression technology are Zappers and Phantomware programming. …
Twenty Years Of Web Scraping And The Computer Fraud And Abuse Act, Andrew Sellars
Twenty Years Of Web Scraping And The Computer Fraud And Abuse Act, Andrew Sellars
Faculty Scholarship
"Web scraping" is a ubiquitous technique for extracting data from the World Wide Web, done through a computer script that will send tailored queries to websites to retrieve specific pieces of content. The technique has proliferated under the ever-expanding shadow of the Computer Fraud and Abuse Act (CFAA), which, among other things, prohibits obtaining information from a computer by accessing the computer without authorization or exceeding one's authorized access.
Unsurprisingly, many litigants have now turned to the CFAA in attempt to police against unwanted web scraping. Yet despite the rise in both web scraping and lawsuits about web scraping, practical …
Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman
Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman
Faculty Scholarship
Global efforts by states to cooperate through international rules in combating cyber threats have generated mixed results, at best. In this paper, we examine the architecture of the Proliferation Security Initiative (PSI) as a possible model for future cybersecurity cooperation among interested states. We identify several features of PSI’s architecture (rather than its substantive focus on non-proliferation) for further analysis, including PSI’s low entry costs, tiered structure, and flexibility, as well as its leveraging of both territorial jurisdiction and state consent. We conclude that, despite several hurdles visible in the scope of its membership and its legal framework, PSI still …
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Faculty Scholarship
The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …
Blockchain, Bitcoin, And Vat In The Gcc: The Missing Trader Example, Richard Thompson Ainsworth, Musaad Alwohaibi
Blockchain, Bitcoin, And Vat In The Gcc: The Missing Trader Example, Richard Thompson Ainsworth, Musaad Alwohaibi
Faculty Scholarship
Blockchain is coming to tax administration and will cause fundamental change. This article considers the potential for blockchain technology as it applies to the introduction of a value added tax in the Gulf Cooperation Council.
Blockchain technology disrupts centralized ledgers. Blockchain improves efficiency, security and transparency. Perhaps no centralized ledger system presents more challenges than that of the modern tax administration. The central data storage system of a modern tax authority contains all return, payment, and audit activity for all taxpayers arranged tax-by-tax for three years or longer periods of time.
It is likely that blockchain will come first to …
Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale
Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale
Faculty Scholarship
No abstract provided.
The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog
The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog
Faculty Scholarship
For the past thirty years, the general advice for those seeking to collect, use, and share people’s personal data in a responsible way was relatively straightforward: follow the fair information practices, often called the “FIPs.” These general guidelines were designed to ensure that data processors are accountable for their actions and that data subjects are safe, secure, and endowed with control over their personal information. The FIPs have proven remarkably sturdy against the backdrop of near-constant technological change. Yet in the age of social media, big data, and artificial intelligence, the FIPs have been pushed to their breaking point. We …
Enhanced Damages For Patent Infringement: A Normative Approach, Keith N. Hylton
Enhanced Damages For Patent Infringement: A Normative Approach, Keith N. Hylton
Faculty Scholarship
This paper takes a normative approach to patent infringement damages. Its underlying premise is that the goal of a damages regime should be to maximize society's welfare. Patent damages should therefore balance society's interest in encouraging innovation against the need to regulate infringement incentives. This balancing approach generates an optimal standard for awarding enhanced damages and guidelines for determining the size of the damages multiplier. On the legal standard, the approach developed here illuminates the factors that should be taken into consideration in the enhancement analysis, and, more importantly, the reasons those factors should be considered. On the precise size …
Whither (Not Wither) Copyleft, Eben Moglen
Whither (Not Wither) Copyleft, Eben Moglen
Faculty Scholarship
This article contains an edited version of Professor Eben Moglen’s speech at the SFLC Fall Conference 2016. It explores the topic of Copyleft, enforcement and community engagement from the perspective of one of the key individuals in the rise of Free and Open Source Software from interesting idea to a central pillar of the global technology industry.
Vatcoin: The Gcc's Cryptotaxcurrency, Richard Thompson Ainsworth, Musaad Alwohaibi, Mike Cheetham
Vatcoin: The Gcc's Cryptotaxcurrency, Richard Thompson Ainsworth, Musaad Alwohaibi, Mike Cheetham
Faculty Scholarship
Bitcoin is the world’s first peer-to-peer cryptocurrency. VATCoin is similar, but it is used in tax compliance. Both Bitcoin and VATCoin are distributive ledger applications built upon blockchain technology. Bitcoin’s ledger is public; VATCoin’s is private. If adopted, VATCoin could well become the world’s first government-mandated cryptotaxcurrency. Unlike Bitcoin, VATCoin will not be a speculative currency. It is always fixed to the home currency.
This paper proposes that the Gulf Cooperation Council (GCC) adopt VATCoin in its VAT Framework. The GCC is expected to have multiple 5% VATs in place by January 1, 2018. There is an ample amount of …
How Oracle Erred: Functionality, Useful Articles, And The Future Of Computer Copyright, Wendy J. Gordon
How Oracle Erred: Functionality, Useful Articles, And The Future Of Computer Copyright, Wendy J. Gordon
Faculty Scholarship
In Oracle v. Google (2015), the Federal Circuit addressed whether the " method header " components of a dominant computer program were uncopyrightable as " merging " with the headers' ideas or function. Google had copied the headers to ease the ability of third-party programmers to interact with Google's Android platform. The court rebuffed the copyrightability challenge; it reasoned that because the plaintiff's expression might have been written in alternative forms, there was no " merger " of idea and expression. But the Oracle court may have been asking the wrong question. In Lotus v. Borland (1995), the owner of …
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
The Notion And Practice Of Reputation And Professional Identity In Social Networking: From K-12 Through Law School, Roberta Bobbie Studwell
Faculty Scholarship
No abstract provided.
The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron
The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron
Faculty Scholarship
No abstract provided.
A Machine Learning Classifier For Corporate Opportunity Waivers, Gabriel V. Rauterberg, Eric L. Talley
A Machine Learning Classifier For Corporate Opportunity Waivers, Gabriel V. Rauterberg, Eric L. Talley
Faculty Scholarship
Rauterberg & Talley (2017) develop a data set of “corporate opportunity waivers” (COWs) – significant contractual modifications of fiduciary duties – sampled from SEC filings. Part of their analysis utilizes a machine learning (ML) classifier to extend their data set beyond the hand-coded sample. Because the ML approach is likely unfamiliar to some readers, and in the light of its great potential across other areas of law and finance research, this note explains the basic components using a simple example, and it demonstrates strategies for calibrating and evaluating the classifier.
Spying Inc., Danielle Keats Citron
Spying Inc., Danielle Keats Citron
Faculty Scholarship
The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s calls, texts, snap chats, photos, calendar updates, and movements. Domestic abusers and stalkers frequently turn to stalking apps because they are undetectable even to sophisticated phone owners.
Business is booming for stalking app providers, even though their entire enterprise is arguably illegal. Federal and state wiretapping laws ban the manufacture, sale, or advertisement of devices knowing their design makes them primarily useful for the surreptitious interception of electronic communications. But those laws are rarely, if ever, …
Disruption And Deference, Olivier Sylvain
Disruption And Deference, Olivier Sylvain
Faculty Scholarship
Online video streaming applications enable users to watch over the-air broadcast programs at any time and almost on any device. As such, they challenge the pertinence of traditional video distribution law and the broadcast network system on which it is based. Congress enacted the Transmit Clause of the 1976 Copyright Act to resolve the high-stakes tussle between broadcasters and cable providers. But, today, that provision is ill-suited to resolving whether unauthorized streaming infringes on broadcasters’ copyright to perform works publicly. Its scope is ambiguous enough that judges across the country were notably divided on whether it reaches online video distribution—that …
Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale
Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale
Faculty Scholarship
Julie Cohen's Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship.
Brief Of Amici Curiae Law, Business, And Economics Scholars In Alice Corp. V. Cls Bank, No. 13-298, Jason Schultz, Brian Love, James Bessen, Michael J. Meurer
Brief Of Amici Curiae Law, Business, And Economics Scholars In Alice Corp. V. Cls Bank, No. 13-298, Jason Schultz, Brian Love, James Bessen, Michael J. Meurer
Faculty Scholarship
The Federal Circuit’s expansion of patentable subject matter in the 1990s led to a threefold increase in software patents, many of which contain abstract ideas merely tethered to a general-purpose computer. There is little evidence, however, to suggest this expansion has produced an increase in software innovation. The software industry was highly innovative in the decade immediately prior to this expansion, when the viability of software patentability was unclear and software patents were few. When surveyed, most software developers oppose software patenting, and, in practice, software innovators tend to rely on other tools to capture market share such as first-mover …
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Rethinking Online Privacy In Canada: Commentary On Voltage Pictures V. John And Jane Doe, Ngozi Okidegbe
Faculty Scholarship
This article problematizes the use of the bona fide case standard as the legal standard for a court to order a third party Internet Service Provider ("ISP") to disclose subscriber information to a copyright owner in online piracy cases. It argues that ISP account holders have a reasonable expectation of privacy in their subscriber information. It contends that the current bona fide case standard affords a relatively low threshold of protection for Internet users’ subscriber information. The reason for which the article takes this position is that the bona fide case standard can be met solely by IP address evidence, …
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Faculty Scholarship
This article discusses the intellectual property issues from "meatspace" to online services and the Internet. It further explores intellectual property issues from the Internet to the Cloud. Finally, it discusses the implications of cloud computing for trade secret protection.
Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt
Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt
Faculty Scholarship
The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …
Google And Search-Engine Market Power, Mark R. Patterson
Google And Search-Engine Market Power, Mark R. Patterson
Faculty Scholarship
A significant and growing body of commentary considers whether possible manipulation of search results by Google could give rise to antitrust liability. Surprisingly, though, little serious attention has been paid to whether Google has market power. Those who favor antitrust scrutiny of Google generally cite its large market share, from which they infer or assume its dominance. Those who are skeptical of competition law’s role in regulating search, on the other hand, usually cite Google’s 'competition is only a click away' mantra to suggest that Google’s market position is precarious. In fact, the issue of Google’s power is more complicated …
Machine Speech, Tim Wu
Machine Speech, Tim Wu
Faculty Scholarship
Computers are making an increasing number of important decisions in our lives. They fly airplanes, navigate traffic, and even recommend books. In the process, computers reason through automated algorithms and constantly send and receive information, sometimes in ways that mimic human expression. When can such communications, called here “algorithmic outputs,” claim First Amendment protection?
Sealand, Havenco, And The Rule Of Law, James Grimmelmann
Sealand, Havenco, And The Rule Of Law, James Grimmelmann
Faculty Scholarship
In 2000, a group of American entrepreneurs moved to a former World War II anti-aircraft platform in the North Sea, seven miles off the British coast, and launched HavenCo, one of the strangest start-ups in Internet history. A former pirate radio broadcaster, Roy Bates, had occupied the platform in the 1960s, moved his family aboard, and declared it to be the sovereign Principality of Sealand. HavenCo's founders were opposed to governmental censorship and control of the Internet; by putting computer servers on Sealand, they planned to create a "data haven" for unpopular speech, safely beyond the reach of any other …
Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh
Patent Litigation And The Internet, Samantha Zyontz, John R. Allison, Emerson H. Tiller, Tristan Bligh
Faculty Scholarship
Patent infringement litigation has not only increased dramatically in frequency over the past few decades,1 but also has also seen striking growth in both stakes and cost.2 Although a relatively rich literature has added much to our understanding of the nature, causes, and consequences of patent litigation during the past two decades,3 many interesting questions remain inadequately addressed. The nuances of and trends in patent litigation in different technology fields and industries, for example, are still understudied.4 Litigation of patents on new technologies has likewise received a dearth of attention. Here we seek to help begin …
Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman
Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman
Faculty Scholarship
In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."
To what extent is …
Virtual Intermediaries: Consumption Tax Problems In Japan, Europe, And The United States - The Case Of The Virtual Travel Agent, Richard Thompson Ainsworth
Virtual Intermediaries: Consumption Tax Problems In Japan, Europe, And The United States - The Case Of The Virtual Travel Agent, Richard Thompson Ainsworth
Faculty Scholarship
Marketplace technology is (inadvertently) chipping away at the effectiveness of consumption taxes – the Japanese Consumption Tax (CT), the European value added tax (VAT), and the American sales tax (ST) are all affected. Frequently a technology-patch or a law change can repair the tax-damage, but sometimes even though a patch or a change is known the design of the levy (or the politics behind the design) impedes application. This paper assesses these consumption taxes by considering the impact that virtual travel agents have had on revenue yields. The paper draws specific conclusions for the Japanese CT, because this consumption tax …
Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio
Sexting And Teenagers: Omg R U Going 2 Jail???, Catherine Arcabascio
Faculty Scholarship
No abstract provided.
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Faculty Scholarship
Internet service providers and search engines have mapped the web, accelerated e-commerce, and empowered new communities. They also pose new challenges for law. Individuals are rapidly losing the ability to affect their own image on the web - or even to know what data are presented about them. When web users attempt to find information or entertainment, they have little assurance that a carrier or search engine is not biasing the presentation of results in accordance with its own commercial interests.
Technology’s impact on privacy and democratic culture needs to be at the center of internet policy-making. Yet before they …