Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Law

Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii Nov 2017

Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii

Articles

Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …


Algorithmic Contracts, Lauren Henry Scholz Oct 2017

Algorithmic Contracts, Lauren Henry Scholz

Scholarly Publications

Algorithmic contracts are contracts in which an algorithm determines a party’s obligations. Some contracts are algorithmic because the parties used algorithms as negotiators before contract formation, choosing which terms to offer or accept. Other contracts are algorithmic because the parties agree that an algorithm to be run at some time after the contract formation will serve as a gap-filler. Such agreements are already common in high speed trading of financial products and will soon spread to other contexts. However, contract law doctrine does not currently have a coherent approach to describing the creation and enforcement of algorithmic contracts. This Article …


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

All Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Data For The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart Jul 2017

Data For The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart

Research Data

These documents underlie and are cited in this empirical study: Susan Nevelow Mart, The Algorithm as a Human Artifact: Implications for Legal [Re]Search, 109 Law Libr. J. 387, 409 n.123 (2017), available at http://scholar.law.colorado.edu/articles/755/.

The ZIP file contains three files: one PDF document ("Tables for Charts 1-3"), and two SPSS files ("Data Archive" and "Syntax Archive" (SPSS version 24)). The "Syntax Archive" file may be viewed in a text editor (e.g., Notepad) as well as in SPSS.


Appendix B: The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart Jul 2017

Appendix B: The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart

Research Data

This document, "Search Instructions for Algorithm Study," is an electronic Appendix B to, and is cited in, the empirical study: Susan Nevelow Mart, The Algorithm as a Human Artifact: Implications for Legal [Re]Search, 109 Law Libr. J. 387, 400 n.78 (2017), available at http://scholar.law.colorado.edu/articles/755/.


Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin Jun 2017

Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin

Cornell Law Faculty Publications

When it was revealed that the Russian government interfered in the 2016 U.S. presidential election by hacking into the email system of the Democratic National Committee and releasing its emails, international lawyers were divided over whether the cyber-attack violated international law. President Obama seemingly went out of his way to describe the attack as a mere violation of “established international norms of behavior,” though some international lawyers were more willing to describe the cyber-attack as a violation of international law. However, identifying the exact legal norm that was contravened turns out to be harder than it might otherwise appear. To …


Regulating By Robot: Administrative Decision Making In The Machine-Learning Era, Cary Coglianese, David Lehr Jun 2017

Regulating By Robot: Administrative Decision Making In The Machine-Learning Era, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are transforming large segments of the economy, underlying everything from product marketing by online retailers to personalized search engines, and from advanced medical imaging to the software in self-driving cars. As machine learning’s use has expanded across all facets of society, anxiety has emerged about the intrusion of algorithmic machines into facets of life previously dependent on human judgment. Alarm bells sounding over the diffusion of artificial intelligence throughout the private sector only portend greater anxiety about digital robots replacing humans in the governmental sphere. A few administrative agencies have already begun to adopt this technology, while others …


Interpretation Catalysts In Cyberspace, Rebecca Ingber Jun 2017

Interpretation Catalysts In Cyberspace, Rebecca Ingber

Faculty Scholarship

The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …


Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews May 2017

Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews

All Faculty Scholarship

What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.


Blockchain, Bitcoin, And Vat In The Gcc: The Missing Trader Example, Richard Thompson Ainsworth, Musaad Alwohaibi Feb 2017

Blockchain, Bitcoin, And Vat In The Gcc: The Missing Trader Example, Richard Thompson Ainsworth, Musaad Alwohaibi

Faculty Scholarship

Blockchain is coming to tax administration and will cause fundamental change. This article considers the potential for blockchain technology as it applies to the introduction of a value added tax in the Gulf Cooperation Council.

Blockchain technology disrupts centralized ledgers. Blockchain improves efficiency, security and transparency. Perhaps no centralized ledger system presents more challenges than that of the modern tax administration. The central data storage system of a modern tax authority contains all return, payment, and audit activity for all taxpayers arranged tax-by-tax for three years or longer periods of time.

It is likely that blockchain will come first to …


Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey Jan 2017

Legal Mechanisms For Governing The Transition Of Key Domain Name Functions To The Global Multi-Stakeholder Community, Christopher S. Yoo, Aaron Shull, Paul Twomey

All Faculty Scholarship

This Chapter proposes an alternative approach to the IANA transition that migrates the existing core contractual requirements imposed by the US government to the existing IANA functions customers. It also advances modest internal accountability revisions that could be undertaken within ICANN’s existing structure. Specifically, it advocates that the Independent Review Tribunal charged with reviewing certain ICANN board of directors-related decisions be selected by a multi-stakeholder committee rather than being subject to approval by ICANN and expanding the grounds for review to cover all of the rubrics recommended by ICANN’s “Improving Institutional Confidence” process in 2008-2009, including fairness, fidelity to the …


Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale Jan 2017

Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu Jan 2017

Biometric Cyberintelligence And The Posse Comitatus Act, Margaret Hu

Scholarly Articles

This Article addresses the rapid growth of what the military and the intelligence community refer to as “biometric-enabled intelligence.” This newly emerging intelligence tool is reliant upon biometric databases—for example, digitalized storage of scanned fingerprints and irises, digital photographs for facial recognition technology, and DNA. This Article introduces the term “biometric cyberintelligence” to more accurately describe the manner in which this new tool is dependent upon cybersurveillance and big data’s massintegrative systems.

This Article argues that the Posse Comitatus Act of 1878, designed to limit the deployment of federal military resources in the service of domestic policies, will be difficult …


From The National Surveillance State To The Cybersurveillance State, Margaret Hu Jan 2017

From The National Surveillance State To The Cybersurveillance State, Margaret Hu

Scholarly Articles

This article anchors the phenomenon of bureaucratized cybersurveillance around the concept of the National Surveillance State, a theory attributed to Professor Jack Balkin of Yale Law School and Professor Sanford Levinson of the University of Texas School of Law. Pursuant to the theory of the National Surveillance State, because of the routinized and administrative nature of government-led surveillance, normalized mass surveillance is viewed as justified under crime and counterterrorism policy rationales. This article contends that the Cybersurveillance State is the successor to the National Surveillance State. The Cybersurveillance State harnesses technologies that fuse biometric and biographic data for risk assessment, …


Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett Jan 2017

Peeling Back The Student Privacy Pledge, Alexi Pfeffer-Gillett

Scholarly Articles

Education software is a multi-billion dollar industry that is rapidly growing. The federal government has encouraged this growth through a series of initiatives that reward schools for tracking and aggregating student data. Amid this increasingly digitized education landscape, parents and educators have begun to raise concerns about the scope and security of student data collection.

Industry players, rather than policymakers, have so far led efforts to protect student data. Central to these efforts is the Student Privacy Pledge, a set of standards that providers of digital education services have voluntarily adopted. By many accounts, the Pledge has been a success. …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Siri-Ously 2.0: What Artificial Intelligence Reveals About The First Amendment, Toni M. Massaro, Helen Norton, Margot E. Kaminski Jan 2017

Siri-Ously 2.0: What Artificial Intelligence Reveals About The First Amendment, Toni M. Massaro, Helen Norton, Margot E. Kaminski

Publications

The First Amendment may protect speech by strong Artificial Intelligence (AI). In this Article, we support this provocative claim by expanding on earlier work, addressing significant concerns and challenges, and suggesting potential paths forward.

This is not a claim about the state of technology. Whether strong AI — as-yet-hypothetical machines that can actually think — will ever come to exist remains far from clear. It is instead a claim that discussing AI speech sheds light on key features of prevailing First Amendment doctrine and theory, including the surprising lack of humanness at its core.

Courts and commentators wrestling with free …


Every Algorithm Has A Pov, Susan Nevelow Mart Jan 2017

Every Algorithm Has A Pov, Susan Nevelow Mart

Publications

When legal researchers search in online databases for the information they need to solve a legal problem, they need to remember that the algorithms that are returning results to them were designed by humans. The world of legal research is a human-constructed world, and the biases and assumptions the teams of humans that construct the online world bring to the task are imported into the systems we use for research. This article takes a look at what happens when six different teams of humans set out to solve the same problem: how to return results relevant to a searcher’s query …


Research Algorithms Have A Point Of View: The Effect Of Human Decision Making On Your Search Results, Susan Nevelow Mart Jan 2017

Research Algorithms Have A Point Of View: The Effect Of Human Decision Making On Your Search Results, Susan Nevelow Mart

Publications

No abstract provided.


The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog Jan 2017

The Inadequate, Invaluable Fair Information Practices, Woodrow Hartzog

Faculty Scholarship

For the past thirty years, the general advice for those seeking to collect, use, and share people’s personal data in a responsible way was relatively straightforward: follow the fair information practices, often called the “FIPs.” These general guidelines were designed to ensure that data processors are accountable for their actions and that data subjects are safe, secure, and endowed with control over their personal information. The FIPs have proven remarkably sturdy against the backdrop of near-constant technological change. Yet in the age of social media, big data, and artificial intelligence, the FIPs have been pushed to their breaking point. We …


The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler Jan 2017

The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart Jan 2017

The Algorithm As A Human Artifact: Implications For Legal [Re]Search, Susan Nevelow Mart

Publications

The results of using the search algorithms in Westlaw, Lexis Advance, Fastcase, Google Scholar, Ravel, and Casetext are compared. Six groups of humans created six different algorithms, and the results are a testament to the variability of human problem solving. That variability has implications both for researching and teaching research.


Transforming Election Cybersecurity, David P. Fidler Jan 2017

Transforming Election Cybersecurity, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


Fetishizing Copies, Jessica Litman Jan 2017

Fetishizing Copies, Jessica Litman

Book Chapters

Our copyright laws encourage authors to create new works and communicate them to the public, because we hope that people will read the books, listen to the music, see the art, watch the films, run the software, and build and inhabit the buildings. That is the way that copyright promotes the Progress of Science. Recently, that not-very-controversial principle has collided with copyright owners’ conviction that they should be able to control, or at least collect royalties from, all uses of their works. A particularly ill-considered manifestation of this conviction is what I have decided to call copy-fetish. This is the …


Enhanced Damages For Patent Infringement: A Normative Approach, Keith N. Hylton Jan 2017

Enhanced Damages For Patent Infringement: A Normative Approach, Keith N. Hylton

Faculty Scholarship

This paper takes a normative approach to patent infringement damages. Its underlying premise is that the goal of a damages regime should be to maximize society's welfare. Patent damages should therefore balance society's interest in encouraging innovation against the need to regulate infringement incentives. This balancing approach generates an optimal standard for awarding enhanced damages and guidelines for determining the size of the damages multiplier. On the legal standard, the approach developed here illuminates the factors that should be taken into consideration in the enhancement analysis, and, more importantly, the reasons those factors should be considered. On the precise size …


Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin Jan 2017

Lessons Learned Too Well: Anonymity In A Time Of Surveillance, A. Michael Froomkin

Articles

It is no longer reasonable to assume that electronic communications can be kept private from governments or private-sector actors. In theory, encryption can protect the content of such communications, and anonymity can protect the communicator's identity. But online anonymity-one of the two most important tools that protect online communicative freedom-is under practical and legal attack all over the world. Choke-point regulation, online identification requirements, and data-retention regulations combine to make anonymity very difficult as a practical matter and, in many countries, illegal. Moreover, key internet intermediaries further stifle anonymity by requiring users to disclose their real names.

This Article traces …


Whither (Not Wither) Copyleft, Eben Moglen Jan 2017

Whither (Not Wither) Copyleft, Eben Moglen

Faculty Scholarship

This article contains an edited version of Professor Eben Moglen’s speech at the SFLC Fall Conference 2016. It explores the topic of Copyleft, enforcement and community engagement from the perspective of one of the key individuals in the rise of Free and Open Source Software from interesting idea to a central pillar of the global technology industry.