Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Colorado Law School (6)
- Boston University School of Law (4)
- University of Pennsylvania Carey Law School (3)
- Washington and Lee University School of Law (3)
- Maurer School of Law: Indiana University (2)
-
- University of Michigan Law School (2)
- University of Pittsburgh School of Law (2)
- Chicago-Kent College of Law (1)
- Columbia Law School (1)
- Cornell University Law School (1)
- Florida State University College of Law (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Miami Law School (1)
- Keyword
-
- Algorithms (6)
- Black box (5)
- Empirical (5)
- Human/computer interaction (5)
- Legal research (5)
-
- Data (4)
- Privacy (4)
- Artificial intelligence (3)
- Cybersecurity (3)
- Surveillance (3)
- Technology (3)
- Biometrics (2)
- Cyberattacks (2)
- Elections (2)
- Information technology (2)
- 1976 Copyright Act (1)
- 2016 U.S. Election (1)
- 2016 U.S. Presidential election (1)
- AALL Publications (1)
- AALL Spectrum (1)
- AI (1)
- Adjudicating by algorithm (1)
- Agent-based models (1)
- Artificial Intelligence (1)
- Artificial agents (1)
- Automation (1)
- Autonomous systems (1)
- Autonomy (1)
- Barack Obama (1)
- Bearer instruments (1)
- Publication
Articles 1 - 28 of 28
Full-Text Articles in Law
Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii
Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii
Articles
Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …
Algorithmic Contracts, Lauren Henry Scholz
Algorithmic Contracts, Lauren Henry Scholz
Scholarly Publications
Algorithmic contracts are contracts in which an algorithm determines a party’s obligations. Some contracts are algorithmic because the parties used algorithms as negotiators before contract formation, choosing which terms to offer or accept. Other contracts are algorithmic because the parties agree that an algorithm to be run at some time after the contract formation will serve as a gap-filler. Such agreements are already common in high speed trading of financial products and will soon spread to other contexts. However, contract law doctrine does not currently have a coherent approach to describing the creation and enforcement of algorithmic contracts. This Article …
The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow
The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow
All Faculty Scholarship
Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.
Data For The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart
Data For The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart
Research Data
These documents underlie and are cited in this empirical study: Susan Nevelow Mart, The Algorithm as a Human Artifact: Implications for Legal [Re]Search, 109 Law Libr. J. 387, 409 n.123 (2017), available at http://scholar.law.colorado.edu/articles/755/.
The ZIP file contains three files: one PDF document ("Tables for Charts 1-3"), and two SPSS files ("Data Archive" and "Syntax Archive" (SPSS version 24)). The "Syntax Archive" file may be viewed in a text editor (e.g., Notepad) as well as in SPSS.
Appendix B: The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart
Appendix B: The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart
Research Data
This document, "Search Instructions for Algorithm Study," is an electronic Appendix B to, and is cited in, the empirical study: Susan Nevelow Mart, The Algorithm as a Human Artifact: Implications for Legal [Re]Search, 109 Law Libr. J. 387, 400 n.78 (2017), available at http://scholar.law.colorado.edu/articles/755/.
Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin
Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin
Cornell Law Faculty Publications
When it was revealed that the Russian government interfered in the 2016 U.S. presidential election by hacking into the email system of the Democratic National Committee and releasing its emails, international lawyers were divided over whether the cyber-attack violated international law. President Obama seemingly went out of his way to describe the attack as a mere violation of “established international norms of behavior,” though some international lawyers were more willing to describe the cyber-attack as a violation of international law. However, identifying the exact legal norm that was contravened turns out to be harder than it might otherwise appear. To …
Regulating By Robot: Administrative Decision Making In The Machine-Learning Era, Cary Coglianese, David Lehr
Regulating By Robot: Administrative Decision Making In The Machine-Learning Era, Cary Coglianese, David Lehr
All Faculty Scholarship
Machine-learning algorithms are transforming large segments of the economy, underlying everything from product marketing by online retailers to personalized search engines, and from advanced medical imaging to the software in self-driving cars. As machine learning’s use has expanded across all facets of society, anxiety has emerged about the intrusion of algorithmic machines into facets of life previously dependent on human judgment. Alarm bells sounding over the diffusion of artificial intelligence throughout the private sector only portend greater anxiety about digital robots replacing humans in the governmental sphere. A few administrative agencies have already begun to adopt this technology, while others …
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Faculty Scholarship
The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
All Faculty Scholarship
What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.
Blockchain, Bitcoin, And Vat In The Gcc: The Missing Trader Example, Richard Thompson Ainsworth, Musaad Alwohaibi
Blockchain, Bitcoin, And Vat In The Gcc: The Missing Trader Example, Richard Thompson Ainsworth, Musaad Alwohaibi
Faculty Scholarship
Blockchain is coming to tax administration and will cause fundamental change. This article considers the potential for blockchain technology as it applies to the introduction of a value added tax in the Gulf Cooperation Council.
Blockchain technology disrupts centralized ledgers. Blockchain improves efficiency, security and transparency. Perhaps no centralized ledger system presents more challenges than that of the modern tax administration. The central data storage system of a modern tax authority contains all return, payment, and audit activity for all taxpayers arranged tax-by-tax for three years or longer periods of time.
It is likely that blockchain will come first to …
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey
All Faculty Scholarship
This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …
Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale
Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale
Faculty Scholarship
No abstract provided.
Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu
Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu
Scholarly Articles
This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.
This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
From The National Surveillance State To The Cybersurveillance State, Margaret Hu
Scholarly Articles
This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …
Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett
Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett
Scholarly Articles
Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data. Amid this increasingly digitized education landscape, parents and educators have begun to raise concerns about the scope and security of student data collection.
Industry players, rather than policymakers, have so far led efforts to protect student data. Central to these efforts is the Student Privacy Pledge, a set of standards that providers of digital education services have voluntarily adopted. By many accounts, the Pledge has been a success. …
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …
Siri-Ously 2.0: What Artificial Intelligence Reveals About The First Amendment, Toni M. Massaro, Helen Norton, Margot E. Kaminski
Siri-Ously 2.0: What Artificial Intelligence Reveals About The First Amendment, Toni M. Massaro, Helen Norton, Margot E. Kaminski
Publications
The First Amendment may protect speech by strong Artificial Intelligence (AI). In this Article, we support this provocative claim by expanding on earlier work, addressing significant concerns and challenges, and suggesting potential paths forward.
This is not a claim about the state of technology. Whether strong AI — as-yet-hypothetical machines that can actually think — will ever come to exist remains far from clear. It is instead a claim that discussing AI speech sheds light on key features of prevailing First Amendment doctrine and theory, including the surprising lack of humanness at its core.
Courts and commentators wrestling with free …
Every Algorithm Has A Pov, Susan Nevelow Mart
Every Algorithm Has A Pov, Susan Nevelow Mart
Publications
When legal researchers search in online databases for the information they need to solve a legal problem, they need to remember that the algorithms that are returning results to them were designed by humans. The world of legal research is a human-constructed world, and the biases and assumptions the teams of humans that construct the online world bring to the task are imported into the systems we use for research. This article takes a look at what happens when six different teams of humans set out to solve the same problem: how to return results relevant to a searcher’s query …
Research Algorithms Have A Point Of View: The Effect Of Human Decision Making On Your Search Results, Susan Nevelow Mart
Research Algorithms Have A Point Of View: The Effect Of Human Decision Making On Your Search Results, Susan Nevelow Mart
Publications
No abstract provided.
The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog
The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog
Faculty Scholarship
For the past thirty years, the general advice for those seeking to collect, use, and share people’s personal data in a responsible way was relatively straightforward: follow the fair information practices, often called the “FIPs.” These general guidelines were designed to ensure that data processors are accountable for their actions and that data subjects are safe, secure, and endowed with control over their personal information. The FIPs have proven remarkably sturdy against the backdrop of near-constant technological change. Yet in the age of social media, big data, and artificial intelligence, the FIPs have been pushed to their breaking point. We …
The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler
The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart
The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart
Publications
The results of using the search algorithms in Westlaw, Lexis Advance, Fastcase, Google Scholar, Ravel, and Casetext are compared. Six groups of humans created six different algorithms, and the results are a testament to the variability of human problem solving. That variability has implications both for researching and teaching research.
Transforming Election Cybersecurity, David P. Fidler
Transforming Election Cybersecurity, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …
Fetishizing Copies, Jessica Litman
Fetishizing Copies, Jessica Litman
Book Chapters
Our copyright laws encourage authors to create new works and communicate them to the public, because we hope that people will read the books, listen to the music, see the art, watch the films, run the software, and build and inhabit the buildings. That is the way that copyright promotes the Progress of Science. Recently, that not-very-controversial principle has collided with copyright owners’ conviction that they should be able to control, or at least collect royalties from, all uses of their works. A particularly ill-considered manifestation of this conviction is what I have decided to call copy-fetish. This is the …
Enhanced Damages For Patent Infringement: A Normative Approach, Keith N. Hylton
Enhanced Damages For Patent Infringement: A Normative Approach, Keith N. Hylton
Faculty Scholarship
This paper takes a normative approach to patent infringement damages. Its underlying premise is that the goal of a damages regime should be to maximize society's welfare. Patent damages should therefore balance society's interest in encouraging innovation against the need to regulate infringement incentives. This balancing approach generates an optimal standard for awarding enhanced damages and guidelines for determining the size of the damages multiplier. On the legal standard, the approach developed here illuminates the factors that should be taken into consideration in the enhancement analysis, and, more importantly, the reasons those factors should be considered. On the precise size …
Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin
Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin
Articles
It is no longer reasonable to assume that electronic communications can be kept private from governments or private-sector actors. In theory, encryption can protect the content of such communications, and anonymity can protect the communicator's identity. But online anonymity-one of the two most important tools that protect online communicative freedom-is under practical and legal attack all over the world. Choke-point regulation, online identification requirements, and data-retention regulations combine to make anonymity very difficult as a practical matter and, in many countries, illegal. Moreover, key internet intermediaries further stifle anonymity by requiring users to disclose their real names.
This Article traces …
Whither (Not Wither) Copyleft, Eben Moglen
Whither (Not Wither) Copyleft, Eben Moglen
Faculty Scholarship
This article contains an edited version of Professor Eben Moglen’s speech at the SFLC Fall Conference 2016. It explores the topic of Copyleft, enforcement and community engagement from the perspective of one of the key individuals in the rise of Free and Open Source Software from interesting idea to a central pillar of the global technology industry.