Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (900)
- Selected Works (353)
- Schulich School of Law, Dalhousie University (291)
- SelectedWorks (241)
- University of Richmond (228)
-
- Maurer School of Law: Indiana University (205)
- University of Michigan Law School (185)
- Seattle University School of Law (164)
- Universitas Indonesia (145)
- Santa Clara Law (125)
- Duke Law (124)
- The Catholic University of America, Columbus School of Law (117)
- University of Washington School of Law (110)
- BLR (109)
- Vanderbilt University Law School (109)
- American University Washington College of Law (106)
- University of Maryland Francis King Carey School of Law (98)
- DePaul University (91)
- Brooklyn Law School (90)
- Southern Methodist University (86)
- New York Law School (77)
- University of Pennsylvania Carey Law School (77)
- University of Pittsburgh School of Law (74)
- Brigham Young University Law School (69)
- Fordham Law School (67)
- University of Colorado Law School (67)
- Columbia Law School (64)
- Pepperdine University (63)
- University of Georgia School of Law (62)
- Singapore Management University (59)
- Keyword
-
- Internet (591)
- Privacy (326)
- Copyright (258)
- Law and Technology (233)
- Technology (201)
-
- First Amendment (164)
- Google (164)
- Social media (137)
- Regulation (114)
- Intellectual Property Law (112)
- Science and Technology (112)
- Intellectual property (104)
- Cyberspace (93)
- Computer Law (92)
- Adwords (78)
- Cybersecurity (76)
- Facebook (76)
- Communications Law (75)
- Cyberlaw (71)
- Law and Society (71)
- Information (70)
- Surveillance (70)
- Trademark (70)
- Internet Law (66)
- Free speech (62)
- Intellectual Property (62)
- DMCA (60)
- Copyright law (59)
- Data (57)
- E-commerce (57)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (794)
- Canadian Journal of Law and Technology (249)
- Faculty Scholarship (246)
- Richmond Journal of Law & Technology (191)
- Seattle University Law Review (137)
-
- All Faculty Scholarship (131)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (124)
- Duke Law & Technology Review (118)
- Rosetta Stone v. Google (Joint Appendix) (116)
- Articles (112)
- Federal Communications Law Journal (112)
- ExpressO (107)
- Catholic University Journal of Law and Technology (104)
- SMU Science and Technology Law Review (77)
- Vanderbilt Journal of Entertainment & Technology Law (76)
- DePaul Journal of Art, Technology & Intellectual Property Law (71)
- Michigan Telecommunications & Technology Law Review (71)
- Publications (66)
- Washington Journal of Law, Technology & Arts (64)
- UIC Law Review (57)
- Faculty Publications (52)
- Research Collection Yong Pung How School Of Law (48)
- Indiana Law Journal (47)
- NYLS Law Review (46)
- Articles, Book Chapters, & Popular Press (38)
- BYU Law Review (38)
- Michigan Law Review (35)
- UIC Review of Intellectual Property Law (34)
- Fordham Law Review (32)
- Matthew Rimmer (32)
Articles 1 - 30 of 5834
Full-Text Articles in Law
Understanding Cyber Risk: Unpacking And Responding To Cyber Threats Facing The Public And Private Sectors, Lawrence J. Trautman, Scott Shackelford, Brian Elzweig, Peter Ormerod
Understanding Cyber Risk: Unpacking And Responding To Cyber Threats Facing The Public And Private Sectors, Lawrence J. Trautman, Scott Shackelford, Brian Elzweig, Peter Ormerod
University of Miami Law Review
Cyberattacks, data breaches, and ransomware continue to pose major threats to businesses, governments, and health and educational institutions worldwide. Ongoing successful instances of cybercrime involve sophisticated attacks from diverse sources such as organized crime syndicates, actors engaged in industrial espionage, nation-states, and even lone wolf actors having relatively few resources. Technological innovation continues to outpace the ability of U.S. law to keep pace, though other jurisdictions including the European Union have been more proactive. Nation-state and international criminal group ransomware attacks continue; Sony’s systems were hacked by a ransomware group; MGM Resorts disclosed that recovery from their September 2023 hack …
The Kids Are Not Alright: A Look Into The Absence Of Laws Protecting Children In Social Media, Libby Morehouse
The Kids Are Not Alright: A Look Into The Absence Of Laws Protecting Children In Social Media, Libby Morehouse
Loyola of Los Angeles Entertainment Law Review
No abstract provided.
Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter
Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
A Timeless Principle: Copyright Before The Statute Of Anne, Victoria Lieberman
A Timeless Principle: Copyright Before The Statute Of Anne, Victoria Lieberman
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Innovation At A Crossroads: The Supreme Court's Influence On Pharmaceuticals, Trade Policies, And Public Health, Beau Reeves
Innovation At A Crossroads: The Supreme Court's Influence On Pharmaceuticals, Trade Policies, And Public Health, Beau Reeves
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Beautifying The Human Experience: The Road To Knocking Out The Knockoff Industry Through Adaptions To Copyright & Design Patent Protections For Clothing, Moira Mccabe
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
All Eyez On Rap & Hip-Hop: Analyzing How Black Expression Is Criminalized And The Language Of The Rap Act Of 2022, Maia Young
Washington Journal of Law, Technology & Arts
The Black existence, in the United States of America, has always been regarded as a conditional right. Conventionally, Blackness must always be nonviolent and non-disruptive to safely exist. Because of this, Blackness cannot be confined to restraints and disrupts these conventions with acts of joy and creative expression. Black creativity is both unconventional and sacred. Black creative expression documents, preserves, and unifies cultural lived experiences, from a first-hand lens of those oppressed. Creative and artistic expression celebrates the myriad of stories that are a part of the collective Black experience. Yet, Black creative expression is now being weaponized by prosecutors …
Constitutional Rights Of Artificial Intelligence, Mizuki Hashiguchi
Constitutional Rights Of Artificial Intelligence, Mizuki Hashiguchi
Washington Journal of Law, Technology & Arts
On February 8, 2022, the Italian Parliament approved constitutional amendments to protect the environment. A member of Parliament stated that the environment is an element of Italy, and that safeguarding the environment means safeguarding humans. The need to protect the environment seems to have become a critical component of public conscience. Likewise, if society perceives that artificial intelligence is vitally important for humanity, does constitutional law allow constitutional rights for artificial intelligence to be created?
Extending constitutional rights to artificial intelligence may be consistent with the jurisprudential history of rights. Constitutional rights have undergone metamorphosis over time to protect new …
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Washington Journal of Law, Technology & Arts
This article discusses contemporary problems related to Artificial Intelligence (AI), law and the visual arts. It suggests that the fallacies of copyright law are already visible in legal conundrums raised by AI in the creative sector. These include, for instance, the lack of uniformity in relation to creations’ copyrightability, the massive scale of copyright infringement affecting visual artists and the creative industry, and the difficulties in implementing media regulation and cyber-regulation. The deeply cherished ‘human authorship’ criterion that was sustained recently by a US Federal Appeals Court in Thaler, in particular, is a short-term solution to the legal challenges …
Ai, Algorithms, And Awful Humans, Daniel J. Solove, Hideyuki Matsumi
Ai, Algorithms, And Awful Humans, Daniel J. Solove, Hideyuki Matsumi
Fordham Law Review
A profound shift is occurring in the way many decisions are made, with machines taking greater roles in the decision-making process. Two arguments are often advanced to justify the increasing use of automation and algorithms in decisions. The “Awful Human Argument” asserts that human decision-making is often awful and that machines can decide better than humans. Another argument, the “Better Together Argument,” posits that machines can augment and improve human decision-making. These arguments exert a powerful influence on law and policy.
In this Essay, we contend that in the context of making decisions about humans, these arguments are far too …
Chatgpt, Large Language Models, And Law, Harry Surden
Chatgpt, Large Language Models, And Law, Harry Surden
Fordham Law Review
This Essay explores Artificial Intelligence (AI) Large Language Models (LLMs) like ChatGPT/GPT-4, detailing the advances and challenges in applying AI to law. It first explains how these AI technologies work at an understandable level. It then examines the significant evolution of LLMs since 2022 and their improved capabilities in understanding and generating complex documents, such as legal texts. Finally, this Essay discusses the limitations of these technologies, offering a balanced view of their potential role in legal work.
The Antidote Of Free Speech: Censorship During The Pandemic, Christopher Keleher
The Antidote Of Free Speech: Censorship During The Pandemic, Christopher Keleher
Catholic University Law Review
Free speech in America stands at a precipice. The nation must decide if the First Amendment protects controversial, unconventional, and unpopular speech, or only that which is mainstream, fashionable, and government-approved. This debate is one of many legal battles brought to the fore during Covid-19. But the fallout of the free speech question will transcend Covid-19.
During the pandemic, the federal government took unprecedented steps to pressure private entities to push messages it approved and squelch those it did not. The Supreme Court will soon grapple with the issue of censorship during the pandemic. This article examines this litigation, along …
The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang
The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang
Duke Law & Technology Review
Higher education institutions (HEIs) are highly susceptible to cyberattacks, particularly those facilitated through phishing, due to the substantial volume of confidential student and staff data and valuable research information they hold. Despite federal legislations focusing on bolstering cybersecurity for critical institutions handling medical and financial data, HEIs have not received similar attention. This Note examines the minimal obligations imposed on HEIs by existing federal and state statutes concerning data breaches, the absence of requirements for HEIs to educate employees and students about phishing attacks, and potential strategies to improve student protection against data breaches.
Killing Two Birds With One Stone: Remedying Malicious Social Bot Behavior Via Section 230 Reform, Jackson Smith
Killing Two Birds With One Stone: Remedying Malicious Social Bot Behavior Via Section 230 Reform, Jackson Smith
William & Mary Business Law Review
As “interactive computer services” (social media sites) expanded over the past decade, so too did the prevalence of “social bots,” software programs that mimic human behavior online. The capacity social bots have to exponentially amplify often-harmful content has led to calls for greater accountability from social media companies in the way they manage bot presence on their sites. In response, many social media companies and private researchers have developed bot-detection methodologies to better govern social bot activities. At the same time, the prevalence of harmful content on social media sites has led to calls to reform Section 230 of the …
Online Disinhibited Contracts, Wayne R. Barnes
Online Disinhibited Contracts, Wayne R. Barnes
Faculty Scholarship
There have been at least two dominant forces at work in the realm of consumer contracting over the past several decades. One has been the rise and domination of the standard form contract (whereby merchants contract with consumers via the use of standardized, boilerplate terms and conditions that consumers do not read or understand). The second force has been the rise of e-commerce and the purchase of goods and services via websites and other online platforms, and the use of “wrap” formation methodology (whereby merchants obtain consumer assent to the online terms and conditions via the consumer’s informal click, scroll, …
Robots As Pirates, Henry H. Perritt Jr.
Robots As Pirates, Henry H. Perritt Jr.
Catholic University Law Review
Generative AI has created much excitement over its potential to create new works of authorship in the literary and graphical realms. Its underling machine-learning technology works by analyzing the relations among elements of preexisting material in enormous databases assembled from publicly available and licensed sources. Its algorithms “learn” to predict “what comes next” in different types of expression. A complete system thus can become glib in creating new factual summaries, essays, fictional stories and images.
A number of authors of the raw material used by Generative AI engines claim that the machine learning process infringes their copyrights. Careful evaluation of …
Digital Terror Crimes, Cody Corliss
Digital Terror Crimes, Cody Corliss
Law Faculty Scholarship
Terror actors operating within armed conflict have weaponized social media by using these platforms to threaten and spread images of brutality in order to taunt, terrify, and intimidate civilians. These acts or threats of violence are terror, a prohibited war crime in which acts or threats of violence are made with the primary purpose of spreading terror among the civilian population. The weaponization of terror content through social media is a digital terror crime.
This article is the first to argue that the war crime of terror applies to digital terror crimes perpetrated through social media platforms. It situates digital …
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Data Is What Data Does: Regulating Based On Harm And Risk Instead Of Sensitive Data, Daniel J. Solove
Northwestern University Law Review
Heightened protection for sensitive data is becoming quite trendy in privacy laws around the world. Originating in European Union (EU) data protection law and included in the EU’s General Data Protection Regulation, sensitive data singles out certain categories of personal data for extra protection. Commonly recognized special categories of sensitive data include racial or ethnic origin, political opinions, religious or philosophical beliefs, trade union membership, health, sexual orientation and sex life, and biometric and genetic data.
Although heightened protection for sensitive data appropriately recognizes that not all situations involving personal data should be protected uniformly, the sensitive data approach is …
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
University of Miami Business Law Review
But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
Piercing The Shield Of U.C.C. Article 4a: Estate Of Levin V. Wells Fargo Bank’S, Implications For Terrorism Victims’ Attachment Of Blocked Electronic Wire Transfers Originating From State Sponsors Of Terrorism, Olivia Lu
University of Miami Business Law Review
This Piece examines how ambiguity in the property interests that would be subject to attachment under section 201 of the Terrorism Risk Insurance Act (“TRIA”) and section 1610(g) of the Foreign Sovereign Immunities Act (“FSIA”) has affected efforts by victims of terrorism to fulfill their monetary judgments, especially in light of courts’ use of Article 4A of the Uniform Commercial Code to fill the definitional gap. This Piece focuses on a recent D.C. Circuit decision, Estate of Levin v. Wells Fargo Bank, N.A., analyzing its implications for terrorism victims holding monetary judgments to attach blocked electronic funds transfers (“EFTs”) originating …
Privacy’S Next Act, Erik Lampmann-Shaver
Privacy’S Next Act, Erik Lampmann-Shaver
Washington Journal of Law, Technology & Arts
This Article identifies and describes three data privacy policy developments from recent legislative sessions that may seem unrelated, but which I contend together offer clues about privacy law’s future over the short-to-medium term.
The first is the proliferation, worldwide and in U.S. states, of legislative proposals and statutes referred to as “age-appropriate design codes.” Originating in the United Kingdom, age-appropriate design codes typically apply to online services “directed to children” and subject such services to transparency, default settings, and other requirements. Chief among them is an implied obligation to conduct ongoing assessments of whether a service could be deemed “directed …
Limits Of Algorithmic Fair Use, Jacob Alhadeff, Cooper Cuene, Max Del Real
Limits Of Algorithmic Fair Use, Jacob Alhadeff, Cooper Cuene, Max Del Real
Washington Journal of Law, Technology & Arts
In this article, we apply historical copyright principles to the evolving state of text-to-image generation and explore the implications of emerging technological constructs for copyright’s fair use doctrine. Artificial intelligence (“AI”) is frequently trained on copyrighted works, which usually involves extensive copying without owners’ authorization. Such copying could constitute prima facie copyright infringement, but existing guidance suggests fair use should apply to most machine learning contexts. Mark Lemley and Bryan Casey argue that training machine learning (“ML”) models on copyrighted material should generally be permitted under fair use when the model’s outputs transcends the purpose of its inputs. Their arguments …
Coded Social Control: China’S Normalization Of Biometric Surveillance In The Post Covid-19 Era, Michelle Miao
Coded Social Control: China’S Normalization Of Biometric Surveillance In The Post Covid-19 Era, Michelle Miao
Washington Journal of Law, Technology & Arts
This article investigates the longevity of health QR codes, a digital instrument of pandemic surveillance, in post-COVID China. From 2020 to 2022, China widely used this tri-color tool to combat the COVID-19 pandemic. A commonly held assumption is that health QR codes have become obsolete in post-pandemic China. This study challenges such an assumption. It reveals their persistence and integration - through mobile apps and online platforms - beyond the COVID-19 public health emergency. A prolonged, expanded and normalized use of tools which were originally intended for contact tracing and pandemic surveillance raises critical legal and ethical concerns. Moreover, their …
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Washington Journal of Law, Technology & Arts
If digital platforms are found liable on hybrid antitrust-data protection violations, by how much should individual users be compensated? While traditional antitrust literature offers some estimation techniques, these methods were developed mostly around the idea that anti-competitive conduct manifests in supra-competitive prices, lost profits, or lost customers, all of which are easily quantifiable using commercially available evidence.
In digital markets, where antitrust violations are often intertwined with data protection issues, several complications arise. First, unlike transactions covered by traditional treble damage estimation techniques, “data-for-services” dealings are not evidenced by receipts. Second, personal data valuation is highly contextual and prone to …
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Privacy Purgatory: Why The United States Needs A Comprehensive Federal Data Privacy Law, Emily Stackhouse Taetzsch
Journal of Legislation
No abstract provided.
The Need For Corporate Guardrails In U.S. Industrial Policy, Lenore Palladino
The Need For Corporate Guardrails In U.S. Industrial Policy, Lenore Palladino
Seattle University Law Review
U.S. politicians are actively “marketcrafting”: the passage of the Bipartisan Infrastructure Law, the CHIPS and Science Act, and the Inflation Reduction Act collectively mark a new moment of robust industrial policy. However, these policies are necessarily layered on top of decades of shareholder primacy in corporate governance, in which corporate and financial leaders have prioritized using corporate profits to increase the wealth of shareholders. The Administration and Congress have an opportunity to use industrial policy to encourage a broader reorientation of U.S. businesses away from extractive shareholder primacy and toward innovation and productivity. This Article examines discrete opportunities within the …
New Rules For A New Era: Regulating Artificial Intelligence In The Legal Field, Hunter Cyran
New Rules For A New Era: Regulating Artificial Intelligence In The Legal Field, Hunter Cyran
Journal of Law, Technology, & the Internet
As Artificial Intelligence (AI) continues to evolve at a rapid pace, many industries have already started integrating new technologies to reduce costs and labor. While this is practical for some industries, the legal industry should be cautious before fully integrating AI. Some legal-service providers are already developing and offering new AI products. But the legal industry must approach these new products with some skepticism. While AI may eventually bring positive changes to the legal industry, AI currently has many flaws. This can create negative unintended consequences for attorneys and judges that are unaware of these flaws. Further, AI is not …
The Future Of The Christchurch Call To Action: How To Build Multistakeholder Initiatives To Address Content Moderation Challenges, Rachel Wolbers
The Future Of The Christchurch Call To Action: How To Build Multistakeholder Initiatives To Address Content Moderation Challenges, Rachel Wolbers
Journal of Law, Technology, & the Internet
This article explores the challenges the New Zealand Government faced after the events in Christchurch on 15 March 2019, where a violent gunman killed 51 people and live-streamed his attack on social media. The video was viewed millions of times in the days following, even as the tech companies took extraordinary efforts to reduce its virality. To find a long-term solution that ended the proliferation of this violent content while protecting human rights, the New Zealand Government decided to take a non-regulatory approach that worked alongside tech companies and civil society. The result was the creation of the Christchurch Call …
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents