Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale Sep 2014

Interview On The Black Box Society, Lawrence Joseph, Frank A. Pasquale

Faculty Scholarship

Hidden algorithms drive decisions at major Silicon Valley and Wall Street firms. Thanks to automation, those firms can approve credit, rank websites, and make myriad other decisions instantaneously. But what are the costs of their methods? And what exactly are they doing with their digital profiles of us?

Leaks, whistleblowers, and legal disputes have shed new light on corporate surveillance and the automated judgments it enables. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only …


The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello Jan 2014

The New Territorialism In The Not-So-New Frontier Of Cyberspace, William L. Reynolds, Juliet M. Moringiello

Faculty Scholarship

This Essay addresses the following questions: What jurisdictions should govern cyberspace problems? Are cyberspace problems different from those in the tangible world? If so, what are the implications for governance? We conclude that the judicial response to cyberspace governance has been mostly correct. After some adaptation problems (an early learning curve), courts have generally followed common law analogs to cyberspace problems. In other words, those problems are not treated as unique unless there is something special about the internet that suggests different resolutions are needed. There certainly is nothing to suggest that American courts or legislatures are trying to occupy …


Privacy, Antitrust, And Power, Frank Pasquale Jan 2013

Privacy, Antitrust, And Power, Frank Pasquale

Faculty Scholarship

When a dominant internet service collects information about its users, the situation is so far from the usual arm’s-length market transaction that neoclassical economic analysis is misleading. “Lack of surveillance” is not a product that individuals have varying preferences for and purchase accordingly. Rather, surveillance is an inevitable concomitant of life online. We need to tame the power that surveillance entails, rather than continuing to pursue illusory, surveillance-free alternatives on the platform level.

To the extent a company creates profiles of individuals and collects data on them, a third party ought to be collecting reports from the company on how …


Misogynistic Cyber Hate Speech, Danielle Keats Citron Oct 2011

Misogynistic Cyber Hate Speech, Danielle Keats Citron

Faculty Scholarship

In her testimony, Professor Citron provided a picture of misogynistic cyber hate, from the very worst abuses involving the harassment of individuals to less virulent forms of misogyny.


Restoring Transparency To Automated Authority, Frank Pasquale Jan 2011

Restoring Transparency To Automated Authority, Frank Pasquale

Faculty Scholarship

Leading finance, health care, and internet firms shroud key operations in secrecy. Our markets, research, and life online are increasingly mediated by institutions that suffer serious transparency deficits. When a private entity grows important enough, it should be subject to transparency requirements that reflect its centrality. The increasing intertwining of governmental, business, and academic entities should provide some leverage for public-spirited appropriators and policymakers to insist on more general openness.

However well an "invisible hand" coordinates economic activity generally, markets depend on reliable information about the practices of core firms that finance, rank, and rate entities in the rest of …


Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale Jan 2008

Federal Search Commission? Access, Fairness, And Accountability In The Law Of Search, Oren Bracha, Frank Pasquale

Faculty Scholarship

Should search engines be subject to the types of regulation now applied to personal data collectors, cable networks, or phone books? In this article, we make the case for some regulation of the ability of search engines to manipulate and structure their results. We demonstrate that the First Amendment, properly understood, does not prohibit such regulation. Nor will such interventions inevitably lead to the disclosure of important trade secrets.

After setting forth normative foundations for evaluating search engine manipulation, we explain how neither market discipline nor technological advance is likely to stop it. Though savvy users and personalized search may …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Jan 2006

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.


Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky Jan 2003

Tolls On The Information Superhighway: Entitlement Defaults For Clickstream Data, Lee B. Kovarsky

Faculty Scholarship

This paper addresses the collection of "clickstream data," and sets forth a theory about the legal rules that should govern it. At the outset, I propose a typology for categorizing privacy invasions. A given state of informational privacy may be represented by: the observed behavior, the collecting agent, and the searching agent. Using this typology, I identify the specific sources of concern about collection of clickstream data. Then, based on expected levels of utility and expected transaction costs of "flipping" to a different rule, I argue for a particular set of privacy defaults for data mining.