Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pittsburgh School of Law (19)
- Maurer School of Law: Indiana University (7)
- University of Pennsylvania Carey Law School (5)
- Singapore Management University (4)
- University of Nebraska - Lincoln (4)
-
- City University of New York (CUNY) (2)
- Selected Works (2)
- Ateneo de Manila University (1)
- Brigham Young University Law School (1)
- Calvin University (1)
- Chicago-Kent College of Law (1)
- Chinese Academy of Sciences (1)
- DePaul University (1)
- Duke Law (1)
- Embry-Riddle Aeronautical University (1)
- Georgetown University Law Center (1)
- James Madison University (1)
- Loyola University Chicago (1)
- Roger Williams University (1)
- Seattle University School of Law (1)
- Technological University Dublin (1)
- University of Cincinnati College of Law (1)
- University of Connecticut (1)
- University of Kentucky (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Nebraska Medical Center (1)
- University of New Orleans (1)
- University of Rhode Island (1)
- University of Washington School of Law (1)
- Walden University (1)
- Keyword
-
- Privacy (10)
- Cybersecurity (7)
- Governance (7)
- E-Lert (6)
- Electronic Databases (6)
-
- Indiana University Electronic Resources Newsletter (6)
- Information (6)
- Legal Research (6)
- Yolanda Jones (6)
- Copyright (5)
- Indiana University Law Library (5)
- Indiana University School of Law (5)
- Intellectual property (5)
- Commons (4)
- Surveillance (4)
- Artificial intelligence (3)
- Big Data (3)
- Knowledge (3)
- Knowledge commons (3)
- Technology (3)
- AI (2)
- Access (2)
- Big data (2)
- Blockchain (2)
- Common pools (2)
- Data (2)
- Data analytics (2)
- Data breach (2)
- Data security (2)
- Data-intensive science (2)
- Publication Year
- Publication
-
- Articles (14)
- All Faculty Scholarship (6)
- Book Chapters (6)
- E-lert (6)
- Copyright, Fair Use, Scholarly Communication, etc. (4)
-
- Research Collection School Of Computing and Information Systems (3)
- Articles by Maurer Faculty (1)
- Brigham Young University International Law & Management Review (1)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (1)
- Capstone Experience (1)
- Capstones (1)
- Conference papers (1)
- Daniel J Gervais (1)
- DePaul Magazine (1)
- Faculty Scholarship (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Graduate School of Business Publications (1)
- James Madison Undergraduate Research Journal (JMURJ) (1)
- Journal of Business & Technology Law (1)
- Journal of Digital Forensics, Security and Law (1)
- Law Library Newsletters/Blog (1)
- MPA/MPP/MPFM Capstone Projects (1)
- Publications and Research (1)
- Published Works (1)
- Research Collection Yong Pung How School Of Law (1)
- Robert Sprague (1)
- School of Business: Faculty Publications and Other Works (1)
- Seattle Journal of Technology, Environmental & Innovation Law (1)
- Theses and Major Papers (1)
- University Faculty Publications and Creative Works (1)
- Publication Type
- File Type
Articles 1 - 30 of 67
Full-Text Articles in Law
Link Tank
DePaul Magazine
A new JD certificate program in information technology, cybersecurity and data privacy provides DePaul University students with proficiency in both law and tech.
The Importance Of Accessible Government Data In Advancing Environmental Justice, Frank D. Lomonte, Daniel Delgado
The Importance Of Accessible Government Data In Advancing Environmental Justice, Frank D. Lomonte, Daniel Delgado
William & Mary Environmental Law and Policy Review
Part I of this Article sets forth the history and animating principles of the environmental justice movement in the United States during the 1970s, which developed as an adjunct to the larger civil rights movement. Part II then turns to the role of documents and data in exposing where toxins present a risk to public health and where documentation habitually falls short. It discusses how freedom of information laws can unlock access to the documents and data that quantify environmental hazards but also how those laws fail to produce reliable results because of the influence of regulated industries. Part III …
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Book Chapters
Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …
Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li
Big Data Technology Enabling Legal Supervision, Qingjie Liu, Shuo Liu, Yirong Wu, Yueqiang Weng, Yihao Wen, Ming Li
Bulletin of Chinese Academy of Sciences (Chinese Version)
Legal supervision plays an important role in the national governance system and capacity. In the era of digital revolution, the rapid development of digital procuratorial work with big data legal supervision as the core promotes to reshape the legal supervision and governance system. In this study, the inherent need of legal supervision for active prosecution in the new era, and the innovative role of new public interest litigation in comprehensive social governance, are firstly analyzed. Then, the core meaning and reshaping role of big-data-enabling-legalsupervision and supervision-promoting-national-governance of digital prosecution are discussed. After summarizing the practical experiences and challenges of big …
Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander
Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander
School of Business: Faculty Publications and Other Works
Popular approaches to building data from unstructured text come with limitations, such as scalability, interpretability, replicability, and real-world applicability. These can be overcome with Context Rule Assisted Machine Learning (CRAML), a method and no-code suite of software tools that builds structured, labeled datasets which are accurate and reproducible. CRAML enables domain experts to access uncommon constructs within a document corpus in a low-resource, transparent, and flexible manner. CRAML produces document-level datasets for quantitative research and makes qualitative classification schemes scalable over large volumes of text. We demonstrate that the method is useful for bibliographic analysis, transparent analysis of proprietary data, …
Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley
Prospects For Legal Analytics: Some Approaches To Extracting More Meaning From Legal Texts, Kevin D. Ashley
University of Cincinnati Law Review
No abstract provided.
Clinical Interactions In Electronic Medical Records Towards The Development Of A Token-Economy Model, Nicole Allison S. Co, Jason Limcaco, Hans Calvin L. Tan, Ma. Regina Justina E. Estuar, Christian E. Pulmano, Dennis Andrew Villamor, Quirino Sugon Jr, Maria Cristina G. Bautista, Paulyn Jean Acacio-Claro
Clinical Interactions In Electronic Medical Records Towards The Development Of A Token-Economy Model, Nicole Allison S. Co, Jason Limcaco, Hans Calvin L. Tan, Ma. Regina Justina E. Estuar, Christian E. Pulmano, Dennis Andrew Villamor, Quirino Sugon Jr, Maria Cristina G. Bautista, Paulyn Jean Acacio-Claro
Graduate School of Business Publications
The use of electronic medical records (EMRs) plays a crucial role in the successful implementation of the Universal Healthcare Law which promises quality and affordable healthcare to all Filipinos. Consequently, the current adoption of EMRs should be studied from the perspective of the healthcare provider. As most studies look into use of EMRs by doctors or patients, there are very few that extend studies to look at possible interaction of doctor and patient in the same EMR environment. Understanding this interaction paves the way for possible incentives that will increase the use and adoption of the EMR. This study uses …
Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Spurring Digital Transformation In Singapore's Legal Industry, Xin Juan Chua, Steven M. Miller
Spurring Digital Transformation In Singapore's Legal Industry, Xin Juan Chua, Steven M. Miller
Research Collection School Of Computing and Information Systems
COVID-19 has transformed the way we live and work. It has caused the processes and operations of businesses and organisations to be restructured, as well as transformed business models. A 2020 McKinsey Global survey reported that companies all over the world claim they have accelerated the digitalisation of their customer and supply-chain interactions, as well as their internal operations, by three to four years. They also said they thought the share of digital or digitally enabled products in their portfolios has advanced by seven years. While technology transformation is not new to the legal profession, COVID-19 has cemented the importance …
Building Legal Datasets, Jerrold Soh
Building Legal Datasets, Jerrold Soh
Research Collection Yong Pung How School Of Law
Data-centric AI calls for better, not just bigger, datasets. As data protection laws with extra-territorial reach proliferate worldwide, ensuring datasets are legal is an increasingly crucial yet overlooked component of “better”. To help dataset builders become more willing and able to navigate this complex legal space, this paper reviews key legal obligations surrounding ML datasets, examines the practical impact of data laws on ML pipelines, and offers a framework for building legal datasets.
Smart Contracts: Will Fintech Be The Catalyst For The Next Global Financial Crisis?, Randall Duran, Paul Griffin
Smart Contracts: Will Fintech Be The Catalyst For The Next Global Financial Crisis?, Randall Duran, Paul Griffin
Research Collection School Of Computing and Information Systems
Purpose: This paper aims to examine the risks associated with smart contracts, a disruptive financial technology (FinTech) innovation, and assesses how in the future they could threaten the integrity of the global financial system. Design/methodology/approach: A qualitative approach is used to identify risk factors related to the use of new financial innovations, by examining how over-the-counter (OTC) derivatives contributed to the Global Financial Crisis (GFC) which occurred during 2007 and 2008. Based on this analysis, the potential for similar concerns with smart contracts are evaluated, drawing on the failure of The DAO on the Ethereum blockchain, which involved the loss …
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
An Analysis Of Technological Components In Relation To Privacy In A Smart City, Kayla Rutherford, Ben Lands, A. J. Stiles
James Madison Undergraduate Research Journal (JMURJ)
A smart city is an interconnection of technological components that store, process, and wirelessly transmit information to enhance the efficiency of applications and the individuals who use those applications. Over the course of the 21st century, it is expected that an overwhelming majority of the world’s population will live in urban areas and that the number of wireless devices will increase. The resulting increase in wireless data transmission means that the privacy of data will be increasingly at risk. This paper uses a holistic problem-solving approach to evaluate the security challenges posed by the technological components that make up a …
The Use Of Digital Millenium Copyright Act To Stifle Speech Through Non-Copyright Related Takedowns, Miller Freeman
The Use Of Digital Millenium Copyright Act To Stifle Speech Through Non-Copyright Related Takedowns, Miller Freeman
Seattle Journal of Technology, Environmental & Innovation Law
In 1998, Congress passed the Digital Millennium Copyright Act. This law provided new methods of protecting copyright in online media. These protections shift the normal judicial process that would stop the publication of infringing materials to private actors: the online platforms. As a result, online platforms receive notices of infringement and issue takedowns of allegedly copyrighted works without the judicial process which normally considers the purpose of the original notice of infringement. In at least one case, discussed in detail below, this has resulted in a notice and takedown against an individual for reasons not related to the purpose of …
Scraping Bepress: Downloading Dissertations For Preservation, Stephen Zweibel
Scraping Bepress: Downloading Dissertations For Preservation, Stephen Zweibel
Copyright, Fair Use, Scholarly Communication, etc.
This article will describe our process developing a script to automate downloading of documents and secondary materials from our library’s BePress repository. Our objective was to collect the full archive of dissertations and associated files from our repository into a local disk for potential future applications and to build out a preservation system.
Unlike at some institutions, our students submit directly into BePress, so we did not have a separate repository of the files; and the backup of BePress content that we had access to was not in an ideal format (for example, it included “withdrawn” items and did not …
Data Governance And The Emerging University, Michael J. Madison
Data Governance And The Emerging University, Michael J. Madison
Book Chapters
Knowledge and information governance questions are tractable primarily in institutional terms, rather than in terms of abstractions such as knowledge itself or individual or social interests. This chapter offers the modern research university as an example. Practices of data-intensive research by university-based researchers, sometimes reduced to the popular phrase “Big Data,” pose governance challenges for the university. The chapter situates those challenges in the traditional understanding of the university as an institution for understanding forms and flows of knowledge. At a broad level, the chapter argues that the new salience of data exposes emerging shifts in the social, cultural, and …
The Trust Principles For Digital Repositories, Dawei Lin, Jonathan Crabtree, Ingrid Dillo, Robert R. Downs, Rorie Edmunds, David Giaretta, Marisa De Giusti, Hervé L'Hours, Wim Hugo, Reyna Jenkyns, Varsha Khodiyar, Maryann E. Martone, Mustapha Mokrane, Vivek Navale, Jonathan Petters, Barbara Sierman, Dina V. Sokolova, Martina Stockhause, John Westbrook
The Trust Principles For Digital Repositories, Dawei Lin, Jonathan Crabtree, Ingrid Dillo, Robert R. Downs, Rorie Edmunds, David Giaretta, Marisa De Giusti, Hervé L'Hours, Wim Hugo, Reyna Jenkyns, Varsha Khodiyar, Maryann E. Martone, Mustapha Mokrane, Vivek Navale, Jonathan Petters, Barbara Sierman, Dina V. Sokolova, Martina Stockhause, John Westbrook
Copyright, Fair Use, Scholarly Communication, etc.
As information and communication technology has become pervasive in our society, we are increasingly dependent on both digital data and repositories that provide access to and enable the use of such resources. Repositories must earn the trust of the communities they intend to serve and demonstrate that they are reliable and capable of appropriately managing the data they hold.
Following a year-long public discussion and building on existing community consensus , several stakeholders, representing various segments of the digital repository community, have collaboratively developed and endorsed a set of guiding principles to demonstrate digital repository trustworthiness. Transparency, Responsibility, User focus, …
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
All Faculty Scholarship
Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.
This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …
Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane
MPA/MPP/MPFM Capstone Projects
Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …
The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard
The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard
Copyright, Fair Use, Scholarly Communication, etc.
Executive Summary
Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.
1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.
2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot
Journal of Digital Forensics, Security and Law
This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …
A Characterization Of The Medical-Legal Partnership (Mlp) Of Nebraska Medicine, Jordan Pieper
A Characterization Of The Medical-Legal Partnership (Mlp) Of Nebraska Medicine, Jordan Pieper
Capstone Experience
This research study was completed at Legal Aid of Nebraska’s Health, Education, and Law Project through the partnership it has formed working with Nebraska Medicine and Iowa Legal Aid. Traditionally, health and disease have always been viewed exclusively as "healthcare" issues. But with healthcare consistently growing towards holistic approaches to help patients, we now know there are deeper, structural conditions of society that can act as strong driving forces of a person's poor daily living conditions that can negatively impact health. The importance of a Medical-Legal Partnership is that it considers a patient's social determinants of health (SDHs). The goal …
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Daniel J Gervais
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Capstones
Breadcrumbs: Privacy as a Privilege Abstract
By: Prachi Bhardwaj
In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.
That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
All Faculty Scholarship
No abstract provided.
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …
Copyright Law And The Supply Of Creative Work: Evidence From The Movies, Ivan Paak Liang Png, Qiu-Hong Wang
Copyright Law And The Supply Of Creative Work: Evidence From The Movies, Ivan Paak Liang Png, Qiu-Hong Wang
Research Collection School Of Computing and Information Systems
There is almost no empirical evidence on the extent to whichcopyright law works in the sense of increasing the production of creative work.Here, we study the impact of two major changes in copyright law – the extensionof copyright term and the European Rental Directive – on the production ofmovies. In a panel of 23 OECD countries, among which 19 extendedcopyright term at various times between 1991–2005, we found no statisticallyrobust evidence that copyright term extension was associated with higher movie production.In a panel of 17 European countries between 1991–2005, wefound no statistically robust evidence that compliance with the RentalDirective was …
Big Data And The Fourth Estate: Protecting The Development Of News Media Monitoring Databases, Joseph A. Tomain
Big Data And The Fourth Estate: Protecting The Development Of News Media Monitoring Databases, Joseph A. Tomain
Articles by Maurer Faculty
No abstract provided.
Information Abundance And Knowledge Commons, Michael J. Madison
Information Abundance And Knowledge Commons, Michael J. Madison
Book Chapters
Standard accounts of IP law describe systems of legal exclusion intended to prompt the production and distribution of intellectual resources, or information and knowledge, by making those things artificially scarce. The argument presented here frames IP law instead as one of several possible institutional responses to the need to coordinate the use of intellectual resources given their natural abundance, and not necessarily useful or effective responses at that. The chapter aims to shift analytic and empirical frameworks from those grounded in law to those grounded in governance, and from IP law in isolation to IP law as part of resource …
Understanding Access To Things: A Knowledge Commons Perspective, Michael J. Madison
Understanding Access To Things: A Knowledge Commons Perspective, Michael J. Madison
Book Chapters
This chapter explores the related ideas of access to knowledge resources and shared governance of those resources, often known as commons. Knowledge resources consist of many types and forms. Some are tangible, and some are intangible. Some are singular; some are reproduced in copies. Some are singular or unique; some are collected or pooled. Some are viewed, used, or consumed only by a single person; for some resources, collective or social consumption is the norm. Any given resource often has multiple attributes along these dimensions, depending on whether one examines the resource’s physical properties, its creative or inventive properties, or …