Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

From The Myth Of Babel To Google Translate: Confronting Malicious Use Of Artificial Intelligence—Copyright And Algorithmic Biases In Online Translation Systems, Shlomit Yanisky-Ravid, Cynthia Martens Sep 2019

From The Myth Of Babel To Google Translate: Confronting Malicious Use Of Artificial Intelligence—Copyright And Algorithmic Biases In Online Translation Systems, Shlomit Yanisky-Ravid, Cynthia Martens

Seattle University Law Review

Many of us rely on Google Translate and other Artificial Intelligence and Machine Learning (AI) online translation daily for personal or commercial use. These AI systems have become ubiquitous and are poised to revolutionize human communication across the globe. Promising increased fluency across cultures by breaking down linguistic barriers and promoting cross-cultural relationships in a way that many civilizations have historically sought and struggled to achieve, AI translation affords users the means to turn any text—from phrases to books—into cognizable expression. This Article discusses the burgeoning possibilities in the 3A Era (Advanced, Autonomous, AI systems) of AI online translation as …


Designating The Dangerous: From Blacklists To Watch Lists, Daniel J. Steinbock Jan 2006

Designating The Dangerous: From Blacklists To Watch Lists, Daniel J. Steinbock

Seattle University Law Review

This Article aims to remedy that gap with respect to one important component of the country's current anti-terrorism strategy watch lists and to suggest some ways to avoid the worst excesses of the 1950s. A comparison of the two periods also serves to shed some light on the question of whether our institutions have learned from the experiences of the past in striking the balance between security and civil liberties. Part II of this Article gives a brief and broad-brush description of the McCarthy era blacklists and loyalty-security programs. Part III then describes the operation, bases for inclusion, and uses …