Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Colorado Law School (396)
- University of Pennsylvania Carey Law School (165)
- University of Michigan Law School (148)
- Boston University School of Law (135)
- American University Washington College of Law (87)
-
- Columbia Law School (68)
- Schulich School of Law, Dalhousie University (68)
- Singapore Management University (60)
- New York Law School (52)
- University of Pittsburgh School of Law (49)
- Georgetown University Law Center (45)
- William & Mary Law School (42)
- Penn State Law (40)
- Chicago-Kent College of Law (37)
- Maurer School of Law: Indiana University (37)
- Texas A&M University School of Law (36)
- University of Nebraska - Lincoln (34)
- The Catholic University of America, Columbus School of Law (29)
- University of Washington School of Law (28)
- Brooklyn Law School (27)
- Vanderbilt University Law School (27)
- University of Missouri-Kansas City School of Law (26)
- University of Maryland Francis King Carey School of Law (24)
- Washington and Lee University School of Law (24)
- Southern Methodist University (22)
- University of Miami Law School (22)
- Cornell University Law School (20)
- Pace University (20)
- Washington University in St. Louis (19)
- Georgia State University College of Law (17)
- Keyword
-
- Technology (212)
- Privacy (137)
- Artificial intelligence (97)
- Colorado (83)
- Climate change (72)
-
- Intellectual property (66)
- AI (65)
- Innovation (64)
- Internet (64)
- Copyright (63)
- Law (63)
- Hydraulic fracturing (58)
- Fracing (56)
- Fracking (56)
- Patents (56)
- Regulation (54)
- Science (53)
- Surveillance (52)
- United States (51)
- Patent law (47)
- Patent (45)
- West (43)
- Water (42)
- Biotechnology (40)
- California (40)
- Law and Technology (39)
- Wyoming (37)
- Artificial Intelligence (36)
- Antitrust (35)
- Ethics (35)
- Publication Year
- Publication
-
- Faculty Scholarship (340)
- All Faculty Scholarship (218)
- Articles (193)
- Publications (113)
- Faculty Publications (68)
-
- Articles in Law Reviews & Other Academic Journals (64)
- Articles, Book Chapters, & Popular Press (61)
- Scholarly Articles (53)
- Research Collection Yong Pung How School Of Law (52)
- Journal Articles (48)
- Articles & Chapters (34)
- Georgetown Law Faculty Publications and Other Works (34)
- Articles by Maurer Faculty (32)
- Book Chapters (31)
- Space, Cyber, and Telecommunications Law Program: Faculty Publications (28)
- The Future of Natural Resources Law and Policy (Summer Conference, June 6-8) (28)
- Other Publications (27)
- Vanderbilt Law School Faculty Publications (27)
- Faculty Works (26)
- Western Water Law, Policy and Management: Ripples, Currents, and New Channels for Inquiry (Martz Summer Conference, June 3-5) (26)
- Faculty Articles (22)
- Faculty Journal Articles and Book Chapters (22)
- Law Faculty Scholarship (22)
- Water, Climate and Uncertainty: Implications for Western Water Law, Policy, and Management (Summer Conference, June 11-13) (22)
- Water and Air Quality Issues in Oil and Gas Development: The Evolving Framework of Regulation and Management (Martz Summer Conference, June 5-6) (21)
- Uncovering the Hidden Resource: Groundwater Law, Hydrology, and Policy in the 1990s (Summer Conference, June 15-17) (20)
- Elisabeth Haub School of Law Faculty Publications (19)
- Scholarship@WashULaw (19)
- Proceedings of the Sino-American Conference on Environmental Law (August 16) (17)
- Faculty Publications By Year (16)
- File Type
Articles 31 - 60 of 2156
Full-Text Articles in Law
Venture Capital's Esg Problem, Ryan A. Ashburn
Venture Capital's Esg Problem, Ryan A. Ashburn
Law Student Publications
Venture capital (“VC”) is repeatedly described as one of the “crown jewels” of the U.S. economy for its role in financing startups and innovation. However, recent corporate scandals, including fraud, have exposed a darker side of the VC industry and the startups in which venture capitalists (“VCs”) invest. For example, Theranos received $686 million in VC funding yet proved to be nothing more than a “house of cards” once it came to light that Theranos falsified blood test results. When Theranos founder Elizabeth Holmes was convicted of fraud, many VCs tried to distance themselves, saying Theranos was an exception and …
Regulation Of Standards In Technology Markets Between Competition Policy And International Trade - The Chinese And European Experience (Foreword), Paolo Davide Farah
Regulation Of Standards In Technology Markets Between Competition Policy And International Trade - The Chinese And European Experience (Foreword), Paolo Davide Farah
Book Chapters
The regulation of standard setting varies significantly across regions and covering and comparing in detail the EU and Chinese regimes is an interesting decision and illustrates how two highly bureaucratic systems address the regulation of technological advancements.
The analysis demonstrates how not only legal and economic considerations play a role in the regulation of standards, but also and most importantly political ones. The “openness” of China’s standardization is a telling example in this regard. China created a specific system for standard setting and invested heavily in high-tech industries. Initially, the State backed the industry to support the creation of a …
Artificial Intelligence And Ethics .Docx, Carol Bast
Artificial Intelligence And Ethics .Docx, Carol Bast
EGS Content
This paper focuses on the impact that artificial intelligence has had on the practice of law and ethics rules. In some respects, the ethics rules, comments, and continuing legal education requirements incorporate knowledge of technology into the duty of attorney competence. After offering a primer on artificial intelligence and attorney ethics, the paper discusses certain proposals for revising the ethics rules, comments, and continuing legal education requirements.
New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd
New Tech, Old Problem: The Rise Of Virtual Rent-To-Own Agreements, Carrie Floyd
Fellow, Adjunct, Lecturer, and Research Scholar Works
This Article explores how fintech has disrupted the traditional rent-to-own (RTO) industry, giving rise to new, virtual RTO agreements (VirTOs). These VirTOs have enabled the RTO industry to expand into the service industry and to markets for products not traditionally associated with rentals, such as vehicle repairs, pet ownership, and medical devices. This Article analyzes this development.
RTO agreements purport to rent products to a consumer until the conclusion of a set number of renewable rental payments, at which point ownership transfers. The fundamental characteristic of these agreements – and why they are not regulated as loans – are that …
Getting Real About Protecting Privacy, Scott Skinner-Thompson
Getting Real About Protecting Privacy, Scott Skinner-Thompson
Publications
No abstract provided.
Legal Issues In Blockchain, Cryptocurrency, And Non-Fungible Tokens (Nfts), Christa Laser
Legal Issues In Blockchain, Cryptocurrency, And Non-Fungible Tokens (Nfts), Christa Laser
Law Faculty Articles and Essays
When do new technologies require changes in the law? Judge Easterbrook argued in 1996 that there is no more need for a "Law of Cyberspace" than there ever was for a "Law of the Horse." Rather, existing laws spanning multiple fields are often sufficient to cover niche factual applications and even new technological change. The same is true now for "The Law of Blockchain." Nonetheless, blockchain marketplace participants lack any cohesive, useful analysis to tum to that is neutral in outcome and performs a comprehensive analysis spanning the multitude of laws affecting the whole ecosystem. We might not need a …
Locating Liability For Medical Ai, W. Nicholson Price Ii, I. Glenn Cohen
Locating Liability For Medical Ai, W. Nicholson Price Ii, I. Glenn Cohen
Articles
When medical AI systems fail, who should be responsible, and how? We argue that various features of medical AI complicate the application of existing tort doctrines and render them ineffective at creating incentives for the safe and effective use of medical AI. In addition to complexity and opacity, the problem of contextual bias, where medical AI systems vary substantially in performance from place to place, hampers traditional doctrines. We suggest instead the application of enterprise liability to hospitals—making them broadly liable for negligent injuries occurring within the hospital system—with an important caveat: hospitals must have access to the information needed …
Virtual Energy, Joel B. Eisen, Felix Mormann, Heather E. Payne
Virtual Energy, Joel B. Eisen, Felix Mormann, Heather E. Payne
Faculty Scholarship
From employment to education, many areas of our daily lives have gone virtual, including the virtual workplace and virtual classes. By comparison, the way we generate, deliver, and consume electricity is an anachronism. And the electric industry’s outdated business model and regulatory framework are failing. For the last century-and-a-half, we have relied on ever larger power plants to generate the electricity we consume, often hundreds of miles away from the point of production. But the outsized carbon footprint of these power plants and the need to transmit their output over long distances threaten the electric grid’s reliability, affordability, and long-term …
Biomanipulation, Laura K. Donohue
Biomanipulation, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
Scientific and technological advances in the latter part of the 20th century catapulted biometrics forward. Thus, Carleton Simon in 1935 may have postulated using retinal vasculature for biometric identification. But it took forty years for an Eyedentify patent to bring the idea to fruition. In 1937, John Henry Wigmore similarly anticipated using oscilloscopes to identify individuals by speech patterns. Decades later, digitization and speech processors made voiceprint identification possible. Biological discoveries led to the adoption of deoxyribonucleic acid (DNA) sequencing. And while Alphonse Bertillon in the late 19th century postulated iris distinctions, it was only in 1991 that …
Contract-Wrapped Property, Danielle D'Onfro
Contract-Wrapped Property, Danielle D'Onfro
Scholarship@WashULaw
For nearly two centuries, the law has allowed servitudes that “run with” real property while consistently refusing to permit servitudes attached to personal property. That is, owners of land can establish new, specific requirements for the property that bind all future owners—but owners of chattels cannot. In recent decades, however, firms have increasingly begun relying on contract provisions that purport to bind future owners of chattels. These developments began in the context of software licensing, but they have started to migrate to chattels not encumbered by software. Courts encountering these provisions have mostly missed their significance, focusing instead on questions …
Risky Speech Systems: Tort Liability For Ai-Generated Illegal Speech, Margot E. Kaminski
Risky Speech Systems: Tort Liability For Ai-Generated Illegal Speech, Margot E. Kaminski
Publications
No abstract provided.
Chatgpt, Ai Large Language Models, And Law, Harry Surden
Chatgpt, Ai Large Language Models, And Law, Harry Surden
Publications
This Essay explores Artificial Intelligence (AI) Large Language Models (LLMs) like ChatGPT/GPT-4, detailing the advances and challenges in applying AI to law. It first explains how these AI technologies work at an understandable level. It then examines the significant evolution of LLMs since 2022 and their improved capabilities in understanding and generating complex documents, such as legal texts. Finally, this Essay discusses the limitations of these technologies, offering a balanced view of their potential role in legal work.
Constructing Ai Speech, Margot E. Kaminski, Meg Leta Jones
Constructing Ai Speech, Margot E. Kaminski, Meg Leta Jones
Publications
Artificial Intelligence (AI) systems such as ChatGPT can now produce convincingly human speech, at scale. It is tempting to ask whether such AI-generated content “disrupts” the law. That, we claim, is the wrong question. It characterizes the law as inherently reactive, rather than proactive, and fails to reveal how what may look like “disruption” in one area of the law is business as usual in another. We challenge the prevailing notion that technology inherently disrupts law, proposing instead that law and technology co-construct each other in a dynamic interplay reflective of societal priorities and political power. This Essay instead deploys …
Emerging Technology's Unfamiliarity With Commercial Law, Carla L. Reyes
Emerging Technology's Unfamiliarity With Commercial Law, Carla L. Reyes
Faculty Journal Articles and Book Chapters
Over the course of a three-year, collaborative process that was open to the public, the Uniform Law Commission (ULC) and the American Law Institute (ALI) undertook a project to revise the Uniform Commercial Code (UCC) to account for the impact of emerging technologies on commercial transactions. The amendments, approved jointly by the ULC and ALI in July 2022, touch on aspects of the entire UCC, but one change has inspired ire and attracted national media attention: a proposed revision to the definition of “money.” The 2022 UCC Amendments alter the definition of “money” to account for the introduction of central …
Digital Rummaging, Andrew Guthrie Ferguson
Digital Rummaging, Andrew Guthrie Ferguson
Articles in Law Reviews & Other Academic Journals
The digital world encodes our lives with incriminating clues. How you travel, live, love, and shop are tracked through growing surveillance technologies. Police have recognized this reality and are actively exploiting new surveillance tools for investigative purposes.
The Fourth Amendment—the constitutional protection meant to limit police search powers—has not kept up with the privacy and security threats of these new digital technologies. Current doctrine has remained stymied by legal tests asking all the wrong questions about “reasonable expectations of privacy” and “trespass” searches. While the Supreme Court has acknowledged that “digital is different,” it has not yet provided a coherent …
Content Moderation On End-To-End Encrypted Systems: A Legal Analysis, Charles Duan, James Grimmelmann
Content Moderation On End-To-End Encrypted Systems: A Legal Analysis, Charles Duan, James Grimmelmann
Articles in Law Reviews & Other Academic Journals
Online messaging platforms like Signal and Google’s Messages increasingly use end-to-end encryption (E2EE), in which messages are encrypted on the sender’s device and decrypted on the recipient’s, so that no one else—not even the platform itself—can read them. Although E2EE protects privacy and advances human rights, the law enforcement community and others have criticized its growing use. In their view, E2EE prevents platforms and government authorities from responding to abuses and criminal activity, including child exploitation, malware, scams, and disinformation. At times, they have argued that E2EE is inherently incompatible with effective content moderation.
Computer science researchers have responded to …
Researcher Access To Social Media Data: Lessons From Clinical Trial Data Sharing, Christopher J. Morten, Gabriel Nicholas, Salomé Viljoen
Researcher Access To Social Media Data: Lessons From Clinical Trial Data Sharing, Christopher J. Morten, Gabriel Nicholas, Salomé Viljoen
Faculty Scholarship
For years, social media companies have sparred with lawmakers over how much independent access to platform data they should provide researchers. Sharing data with researchers allows the public to better understand the risks and harms associated with social media, including areas such as misinformation, child safety, and political polarization. Yet researcher access is controversial. Privacy advocates and companies raise the potential privacy threats of researchers using such data irresponsibly. In addition, social media companies raise concerns over trade secrecy: the data these companies hold and the algorithms powered by that data are secretive sources of competitive advantage. This Article shows …
Chapter 16: Revisioning Algorithms As A Black Feminist Project, Ngozi Okidegbe
Chapter 16: Revisioning Algorithms As A Black Feminist Project, Ngozi Okidegbe
Faculty Scholarship
We live in an age of predictive algorithms.1 Jurisdictions across the country are utilizing algorithms to make or influence life-altering decisions in a host of governmental decision-making processes—criminal justice, education, and social assistance to name a few.2 One justification given for this algorithmic turn concerns redressing historical and current inequalities within governmental decision-making.3 The hope is that the predictions produced by these predictive systems can correct this problem by providing decision-makers with the information needed to make fairer, more accurate, and consistent decisions.4 For instance, jurisdictions claim that their turn to risk assessment algorithms in bail, …
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Privacy Nicks: How The Law Normalizes Surveillance, Woodrow Hartzog, Evan Selinger, Johanna Gunawan
Faculty Scholarship
Privacy law is failing to protect individuals from being watched and exposed, despite stronger surveillance and data protection rules. The problem is that our rules look to social norms to set thresholds for privacy violations, but people can get used to being observed. In this article, we argue that by ignoring de minimis privacy encroachments, the law is complicit in normalizing surveillance. Privacy law helps acclimate people to being watched by ignoring smaller, more frequent, and more mundane privacy diminutions. We call these reductions “privacy nicks,” like the proverbial “thousand cuts” that lead to death.
Privacy nicks come from the …
Two Ai Truths And A Lie, Woodrow Hartzog
Two Ai Truths And A Lie, Woodrow Hartzog
Faculty Scholarship
Industry will take everything it can in developing Artificial Intelligence (AI) systems. We will get used to it. This will be done for our benefit. Two of these things are true and one of them is a lie. It is critical that lawmakers identify them correctly. In this Essay, I argue that no matter how AI systems develop, if lawmakers do not address the dynamics of dangerous extraction, harmful normalization, and adversarial self-dealing, then AI systems will likely be used to do more harm than good.
Given these inevitabilities, lawmakers will need to change their usual approach to regulating technology. …
Against Engagement, Neil Richards, Woodrow Hartzog
Against Engagement, Neil Richards, Woodrow Hartzog
Faculty Scholarship
In this Article, we focus on a key dimension of commercial surveillance by data-intensive digital platforms that is too often treated as a supporting cast member instead of a star of the show: the concept of engagement. Engagement is, simply put, a measure of time, attention, and other interactions with a service. The economic logic of engagement is simple: more engagement equals more ads watched equals more revenue. Engagement is a lucrative digital business model, but it is problematic in several ways that lurk beneath the happy sloganeering of a “free” internet
Our goal in this Article is to isolate …
Kafka In The Age Of Ai And The Futility Of Privacy As Control, Daniel Solove, Woodrow Hartzog
Kafka In The Age Of Ai And The Futility Of Privacy As Control, Daniel Solove, Woodrow Hartzog
Faculty Scholarship
Despite writing more than a century ago, Franz Kafka captured the core problem of digital technologies—how individuals are rendered powerless and vulnerable. Over the past fifty years, and especially in the twenty-first century, privacy laws have been sprouting up around the world. These laws are often based heavily on an Individual Control Model that aims to empower individuals with rights to help them control the collection, use, and disclosure of their data.
In this Article, we argue that although Kafka starkly shows us the plight of the disempowered individual, his work also paradoxically suggests that empowering the individual isn’t the …
The Great Scrape: The Clash Between Scraping And Privacy, Daniel J. Solove, Woodrow Hartzog
The Great Scrape: The Clash Between Scraping And Privacy, Daniel J. Solove, Woodrow Hartzog
Faculty Scholarship
Artificial intelligence (AI) systems depend on massive quantities of data, often gathered by “scraping” – the automated extraction of large amounts of data from the internet. A great deal of scraped data is about people. This personal data provides the grist for AI tools such as facial recognition, deep fakes, and generative AI. Although scraping enables web searching, archival, and meaningful scientific research, scraping for AI can also be objectionable or even harmful to individuals and society.
Organizations are scraping at an escalating pace and scale, even though many privacy laws are seemingly incongruous with the practice. In this Article, …
Update On Patent-Related Cases In Computers And Electronics, Karishma Jiva Cartwright, Timothy T. Hsieh, Saurabh Vishnubhakat
Update On Patent-Related Cases In Computers And Electronics, Karishma Jiva Cartwright, Timothy T. Hsieh, Saurabh Vishnubhakat
Faculty Articles
This paper provides an overview of patent cases relating to computer and electronics technology that were not taken up by the Supreme Court during the October 2022 term. As of this writing, the Supreme Court has not granted certiorari in any patent-related cases for its October 2021 Term. The Court has, however, called for the views of the Solictor General in four cases, indicating higher interest and raising the possibility that one or more of these cases may appear on the Court's merits docket for the October 2022 Term. Additionally, though the Court denied certiorari in Baxter v. Becton, Dickinson, …
Maurer Environmental Law Expert Is Lead Author On Science Insights Policy Forum Article, James Owsley Boyd
Maurer Environmental Law Expert Is Lead Author On Science Insights Policy Forum Article, James Owsley Boyd
Keep Up With the Latest News from the Law School (blog)
Environmental champions and conservationists will mark the 50th anniversary of the Endangered Species Act later this month. That is the law requiring federal agencies to use all methods necessary to prevent extinctions and ensure that federal actions not jeopardize the continued existence of species on the brink of disappearing from the face of the Earth.
In the leadup to the December 27th anniversary, several publications have begun examining the Act’s history and impact over five decades.
Science, the world’s third-most influential scholarly journal based on Google Scholar citations, invited experts from around the country to look ahead as well …
The Structure Of Secondary Copyright Liability, Felix T. Wu
The Structure Of Secondary Copyright Liability, Felix T. Wu
Faculty Articles
Secondary copyright liability and secondary patent liability largely parallel each other. And yet, secondary copyright cases are often quite different from secondary patent cases. Whereas most secondary patent infringers act in a way that targets a particular patent or group of related patents, secondary copyright infringement mostly arises in the context of technologies or services that work across all copyrighted works. Secondary copyright liability raises issues of platform liability in ways that secondary patent liability usually does not.
The current structure and framing of secondary copyright liability inadequately account for this distinction. The result is that secondary copyright liability tends …
Aclp - Comments To The Fcc Re Net Neutrality - December 2023, New York Law School
Aclp - Comments To The Fcc Re Net Neutrality - December 2023, New York Law School
Reports and Resources
No abstract provided.
Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen
Tech Supremacy: The New Arms Race Between China And The United States, Xuan-Thao Nguyen
Articles
In the brewing tech war between the United States and China, the quest for tech supremacy is in full force. Through enacting a series of laws and policies, China aims to reach its goal of tech supremacy. If China succeeds, U.S. corporations will face a daunting task in competing against Chinese products and services in core industries and in sectors where artificial intelligence and technological breakthroughs reign. This Article is the first to identify and analyze China’s 2022 Law on Science and Technology Progress, Personal Information Protection Law, Made in China 2025, National Intellectual Property Strategies, and digital currency e-CNY; …
After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge
After Ftx: Can The Original Bitcoin Use Case Be Saved?, Mark Burge
Faculty Scholarship
Bitcoin and the other cryptocurrencies spawned by the innovation of blockchain programming have exploded in prominence, both in gains of massive market value and in dramatic market losses, the latter most notably seen in connection with the failure of the FTX cryptocurrency exchange in November 2022. After years of investment and speculation, however, something crucial has faded: the original use case for Bitcoin as a system of payment. Can cryptocurrency-as-a-payment-system be saved, or are day traders and speculators the actual cryptocurrency future? This article suggests that cryptocurrency has been hobbled by a lack of foundational commercial and consumer-protection law that …
A Public Technology Option, Hannah Bloch-Wehba
A Public Technology Option, Hannah Bloch-Wehba
Faculty Scholarship
Private technology increasingly underpins public governance. But the state’s growing reliance on private firms to provide a variety of complex technological products and services for public purposes brings significant costs for transparency: new forms of governance are becoming less visible and less amenable to democratic control. Transparency obligations initially designed for public agencies are a poor fit for private vendors that adhere to a very different set of expectations.
Aligning the use of technology in public governance with democratic values calls for rethinking, and in some cases abandoning, the legal structures and doctrinal commitments that insulate private vendors from meaningful …