Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

"Cyborg Justice" And The Risk Of Technological-Legal Lock-In, Rebecca Crootof Jan 2019

"Cyborg Justice" And The Risk Of Technological-Legal Lock-In, Rebecca Crootof

Law Faculty Publications

Although Artificial Intelligence (AI) is already of use to litigants and legal practitioners, we must be cautious and deliberate in incorporating AI into the common law judicial process. Human beings and machine systems process information and reach conclusions in fundamentally different ways, with AI being particularly ill-suited for the rule application and value balancing required of human judges. Nor will “cyborg justice”—hybrid human/AI judicial systems that attempt to marry the best of human and machine decisionmaking and minimize the drawbacks of both—be a panacea. While such systems would ideally maximize the strengths of human and machine intelligence, they might also …


International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof Jan 2018

International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof

Law Faculty Publications

States are not being held accountable for the vast majority of their harmful cyberoperations, largely because classifications created in physical space do not map well onto the cyber domain. Most injurious and invasive cyberoperations are not cybercrimes and do not constitute cyberwarfare, nor are states extending existing definitions of wrongful acts permitting countermeasures to cyberoperations (possibly to avoid creating precedent restricting their own activities). Absent an appropriate label, victim states have few effective and nonescalatory responsive options, and the harms associated with these incidents lie where they fall.

This Article draws on tort law and international law principles to construct …


Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman Jul 2015

Internet Giants As Quasi-Governmental Actors And The Limits Of Contractual Consent, D. A. Jeremy Telman

Law Faculty Publications

Although the government’s data-mining program relied heavily on information and technology that the government received from private companies, relatively little of the public outrage generated by Edward Snowden’s revelations was directed at those private companies. We argue that the mystique of the Internet giants and the myth of contractual consent combine to mute criticisms that otherwise might be directed at the real data-mining masterminds. As a result, consumers are deemed to have consented to the use of their private information in ways that they would not agree to had they known the purposes to which their information would be put …


The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga Jan 2013

The Internet Is Not A Super Highway: Using Metaphors To Communicate Information And Communications Policy, Kristen Jakobsen Osenga

Law Faculty Publications

Do metaphors influence our information policy preferences? Professor Osenga thinks so, which makes it especially important to choose the right one, as a metaphor is often the primary tool the general public uses to understand information policy. Using a five-point rubric, she evaluates, among others, understanding the Internet as “tubes,” “highway,” “space (cyberspace),” “coffee shop/bar” and “cloud.” Osenga finds them all lacking in important ways. However, she believes the metaphor of the Internet as “ecosystem” is very promising and deserves to be further developed.


The Law Of Cyber-Attack, Rebecca Crootof, Oona A. Hathaway Jan 2012

The Law Of Cyber-Attack, Rebecca Crootof, Oona A. Hathaway

Law Faculty Publications

Cyber-attacks have become increasingly common in recent years. Capable of shutting down nuclear centrifuges, air defense systems, and electrical grids, cyber-attacks pose a serious threat to national security. As a result, some have suggested that cyber-attacks should be treated as acts of war. Yet the attacks look little like the armed attacks that the law of war has traditionally regulated. This Article examines how existing law may be applied-and adapted and amended-to meet the distinctive challenge posed by cyber-attacks. It begins by clarifying what cyber-attacks are and how they already are regulated by existing bodies of law, including the law …


The Business Fallout From The Rapid Obsolescence And Plannedobsolescence Of High-Tech Products: Downsizing Of Noncompetition Agreements, Ann C. Hodges, Porcher L. Taylor Iii Jan 2005

The Business Fallout From The Rapid Obsolescence And Plannedobsolescence Of High-Tech Products: Downsizing Of Noncompetition Agreements, Ann C. Hodges, Porcher L. Taylor Iii

Law Faculty Publications

The recent rapid pace of technological change has made human capital more important, yet it has rendered the employee’s knowledge base obsolete more quickly. Employers use covenants not to compete, restricting employees from switching to work for competitors, in order to retain knowledgeable personnel. Currently, the lack of predictability in interpreting noncompete agreements allows employers to draft overly-lengthy noncompetes, encourages enforcement litigation, and curtails employees from changing jobs because of the fear of litigation. Employees should not be prevented from working for competitors for longer than is necessary to protect the employer’s legitimate interest. Use of obsolescence as a guide …


Aliens, The Internet, And "Purposeful Availment": A Reassessment Of Fifth Amendment Limits On Personal Jurisdiction, Wendy Collins Perdue Jan 2004

Aliens, The Internet, And "Purposeful Availment": A Reassessment Of Fifth Amendment Limits On Personal Jurisdiction, Wendy Collins Perdue

Law Faculty Publications

The international community has been struggling with questions of who should regulate the Internet and how, but little consensus has emerged. For the United States, consideration of the pros and cons of the alternative jurisdictional approaches to e-commerce and cyberspace is complicated by an overlay of constitutional law. While the rest of the world considers the policy implications of a country of origin versus a country of destination approach, the United States is wrestling with what constitutes "purposeful availment" under the Due Process Clause.

The Supreme Court has never squarely considered what limits the Fifth Amendment imposes on assertions of …


The National Conference On Legal Information Issues: Selected Essays, Timothy L. Coggins Jan 1996

The National Conference On Legal Information Issues: Selected Essays, Timothy L. Coggins

Law Faculty Publications

During the past decade, information technology developments have the dissemination and use of legal and legal-related In 1995, the American Association of Law Libraries, a organization with more than 5,000 members, convened the first "National Conference on Legal Information Issues" in conjunction with its eighty-eighth meeting. National Conference provided a forum for members of the legal and information communities to discuss the challenging problems and issues arising from the dynamic technological changes that have impacted the creation, dissemination and use of legal information. The National Conference assembled more than 2,500 librarians, law faculty and deans, judges court administrators, practicing attorneys …