Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Computer Law

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 623

Full-Text Articles in Law

Computational Complexity And Tort Deterrence, Joshua C. Teitelbaum May 2021

Computational Complexity And Tort Deterrence, Joshua C. Teitelbaum

Georgetown Law Faculty Publications and Other Works

Standard formulations of the economic model of tort deterrence constitute the injurer as the unboundedly rational bad man. Unbounded rationality implies that the injurer can always compute the solution to his care-taking problem. This in turn implies that optimal liability rules can provide robust deterrence, for they can always induce the injurer to take socially optimal care. In this paper I examine the computational complexity of the injurer's care-taking problem. I show that the injurer's problem is computationally tractable when the precaution set is unidimensional or convex, but that it is computationally intractable when the precaution set is ...


Administrative Law In The Automated State, Cary Coglianese Apr 2021

Administrative Law In The Automated State, Cary Coglianese

Faculty Scholarship at Penn Law

In the future, administrative agencies will rely increasingly on digital automation powered by machine learning algorithms. Can U.S. administrative law accommodate such a future? Not only might a highly automated state readily meet longstanding administrative law principles, but the responsible use of machine learning algorithms might perform even better than the status quo in terms of fulfilling administrative law’s core values of expert decision-making and democratic accountability. Algorithmic governance clearly promises more accurate, data-driven decisions. Moreover, due to their mathematical properties, algorithms might well prove to be more faithful agents of democratic institutions. Yet even if an automated ...


Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina Apr 2021

Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina

Library Philosophy and Practice (e-journal)

This study aims to discuss digital government and regulation, analyzed through the bibliometric approach with the Scopus database for the last 20 years and visualized through the VOSviewer software version 1.6.16. The results indicate that the topic of e-government has become essentially prominent and has been the most discussed in the past two decades. Approximately 41.1% of digital government and regulation articles are classified under the subject area of 'Computer Science', continued by Social Sciences (18.3%), and Business, Management and Accounting (10.2%), with the majority of being 'All Open Access' (46%). The trend of publication ...


A Unified Theory Of Data, William Magnuson Feb 2021

A Unified Theory Of Data, William Magnuson

Faculty Scholarship

How does the proliferation of data in our modern economy affect our legal system? Scholars that have addressed the question have nearly universally agreed that the dramatic increases in the amount of data available to companies, as well as the new uses to which that data is being put, raise fundamental problems for our regulatory structures. But just what those problems might be remains an area of deep disagreement. Some argue that the problem with data is that current uses lead to discriminatory results that harm minority groups. Some argue that the problem with data is that it impinges on ...


Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai Jan 2021

Clearing Opacity Through Machine Learning, W. Nicholson Price Ii, Arti K. Rai

Articles

Artificial intelligence and machine learning represent powerful tools in many fields, ranging from criminal justice to human biology to climate change. Part of the power of these tools arises from their ability to make predictions and glean useful information about complex real-world systems without the need to understand the workings of those systems.


Beyond Algorithms: Toward A Normative Theory Of Automated Regulation, Felix Mormann Jan 2021

Beyond Algorithms: Toward A Normative Theory Of Automated Regulation, Felix Mormann

Faculty Scholarship

The proliferation of artificial intelligence in our daily lives has spawned a burgeoning literature on the dawn of dehumanized, algorithmic governance. Remarkably, the scholarly discourse overwhelmingly fails to acknowledge that automated, non-human governance has long been a reality. For more than a century, policymakers have relied on regulations that automatically adjust to changing circumstances, without the need for human intervention. This article surveys the track record of self-adjusting governance mechanisms to propose a normative theory of automated regulation.

Effective policymaking frequently requires anticipation of future developments, from technology innovation to geopolitical change. Self-adjusting regulation offers an insurance policy against the ...


Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison Jan 2021

Fair Play: Notes On The Algorithmic Soccer Referee, Michael J. Madison

Articles

The soccer referee stands in for a judge. Soccer’s Video Assistant Referee (“VAR”) system stands in for algorithms that augment human deciders. Fair play stands in for justice. They are combined and set in a polycentric system of governance, with implications for designing, administering, and assessing human-machine combinations.


Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran Nov 2020

Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran

Articles

This article presents an in-depth analysis of the latent methodological issues that are as much a cause of U.S. federal court avoidance of foreign law as are judicial difficulties in obtaining foreign legal materials and difficulties in understanding foreign legal orders and languages. It explores Rule 44.1’s inadvertent introduction of a civil-law method into a common-law framework, and the results that have ensued, including an incomplete transition of foreign law from being an issue of fact to becoming an issue of law. It addresses the ways in which courts obtain information about foreign law today, suggesting among ...


Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal Oct 2020

Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Accessible Websites And Mobile Applications Under The Ada: The Lack Of Legal Guidelines And What This Means For Businesses And Their Customers, Josephine Meyer Oct 2020

Accessible Websites And Mobile Applications Under The Ada: The Lack Of Legal Guidelines And What This Means For Businesses And Their Customers, Josephine Meyer

Seattle University Law Review SUpra

No abstract provided.


The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood Oct 2020

The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood

Publications and Research

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents ...


Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn Sep 2020

Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Is Data Localization A Solution For Schrems Ii?, Anupam Chander Jul 2020

Is Data Localization A Solution For Schrems Ii?, Anupam Chander

Georgetown Law Faculty Publications and Other Works

For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue ...


Artificial Financial Intelligence, William Magnuson Jul 2020

Artificial Financial Intelligence, William Magnuson

Faculty Scholarship

Recent advances in the field of artificial intelligence have revived long-standing debates about what happens when robots become smarter than humans. Will they destroy us? Will they put us all out of work? Will they lead to a world of techno-savvy haves and techno-ignorant have-nots? These debates have found particular resonance in finance, where computers already play a dominant role. High-frequency traders, quant hedge funds, and robo-advisors all represent, to a greater or lesser degree, real-world instantiations of the impact that artificial intelligence is having on the field. This Article will argue that the primary danger of artificial intelligence in ...


Busting Myths And Dispelling Doubts About Covid-19, Mark Findlay Jul 2020

Busting Myths And Dispelling Doubts About Covid-19, Mark Findlay

Research Collection School Of Law

The Centre for AI and Data Governance (CAIDG) at Singapore Management University (SMU) has embarked over past months on a programme of research designed to confront concerns about the pandemic and its control. Our interest is primarily directed to the ways in which AI-assisted technologies and mass data sharing have become a feature of pandemic control strategies. We want to know what impact these developments are having on community confidence and health safety. In developing this work, we have come across many myths that need busting.


The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter Menell Jun 2020

The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter Menell

Faculty Scholarship at Penn Law

Courts have long been skeptical about the use of expert witnesses in copyright cases. More than four decades ago, and before Congress extended copyright law to protect computer software, the Ninth Circuit in Krofft Television Prods., Inc. v. McDonald’s Corp., ruled that expert testimony was inadmissible to determine whether Mayor McCheese and the merry band of McDonaldland characters infringed copyright protection for Wilhelmina W. Witchiepoo and the other imaginative H.R. Pufnstuf costumed characters. Since the emergence of software copyright infringement cases in the 1980s, substantially all software copyright cases have permitted expert witnesses to aid juries in understanding ...


Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman Jun 2020

Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..


Developing Open Source Software Using Version Control Systems: An Introduction To The Git Language For Documenting Your Computational Research, Jared D. Smith, Jonathan D. Herman Jun 2020

Developing Open Source Software Using Version Control Systems: An Introduction To The Git Language For Documenting Your Computational Research, Jared D. Smith, Jonathan D. Herman

All ECSTATIC Materials

Version control systems track the history of code as it is committed (saved) by any number of developers. Have you made a coding error and cannot debug it? Version control systems allow for resetting code back to when it worked, and show what code has changed since previous commits.

The contents of this lecture provide an introduction to the git version control language, GitHub for cloud hosting open source code repositories, and tutorials that demonstrate common and useful git and GitHub practices. This lecture is intended to be coupled with a discussion on creating reproducible computational research.

The zipped folder ...


Payment In Virtual Currency, Benjamin Geva Apr 2020

Payment In Virtual Currency, Benjamin Geva

Articles & Book Chapters

By reference to an analysis of the operation of payment in traditional forms of money, this essay explores the meaning of ‘virtual currency’ and the mechanism for payment in it. Endeavoring to identify directions in which events will unfold, the essay sets the stage for a future detailed analysis of pertaining legal aspects.


The Algorithmic Divide And Equality In The Age Of Artificial Intelligence, Peter K. Yu Mar 2020

The Algorithmic Divide And Equality In The Age Of Artificial Intelligence, Peter K. Yu

Faculty Scholarship

In the age of artificial intelligence, highly sophisticated algorithms have been deployed to provide analysis, detect patterns, optimize solutions, accelerate operations, facilitate self-learning, minimize human errors and biases and foster improvements in technological products and services. Notwithstanding these tremendous benefits, algorithms and intelligent machines do not provide equal benefits to all. Just as the digital divide has separated those with access to the Internet, information technology and digital content from those without, an emerging and ever-widening algorithmic divide now threatens to take away the many political, social, economic, cultural, educational and career opportunities provided by machine learning and artificial intelligence ...


Google V. Oracle Amicus Merits Stage Brief: Vindicating Ip’S Channeling Principle And Restoring Jurisdictional Balance To Software Copyright Protection, Peter Menell, David Nimmer, Shyamkrishna Balganesh Jan 2020

Google V. Oracle Amicus Merits Stage Brief: Vindicating Ip’S Channeling Principle And Restoring Jurisdictional Balance To Software Copyright Protection, Peter Menell, David Nimmer, Shyamkrishna Balganesh

Faculty Scholarship at Penn Law

The Federal Circuit’s decisions in Oracle v. Google conflict with this Court’s seminal decision in Baker v. Selden, 101 U.S. 99 (1879), misinterpret Congress’s codification of this Court’s fundamental channeling principle and related limiting doctrines, and upend nearly three decades of sound, well-settled, and critically important decisions of multiple regional circuits on the scope of copyright protection for computer software. Based on the fundamental channeling principle enunciated in Baker v. Selden, as reflected in § 102(b) of the Copyright Act, the functional requirements of APIs for computer systems and devices, like the internal workings of ...


Brief Of Amicus Curiae Interdisciplinary Research Team On Programmer Creativity In Support Of Respondent, Ralph D. Clifford, Firas Khatib, Trina Kershaw, Kavitha Chandra, Jay Mccarthy Jan 2020

Brief Of Amicus Curiae Interdisciplinary Research Team On Programmer Creativity In Support Of Respondent, Ralph D. Clifford, Firas Khatib, Trina Kershaw, Kavitha Chandra, Jay Mccarthy

Faculty Publications

This brief answers the two primary issues that are associated with the first question before the Court. First, the programmers’ expression of the Java-based application programmer interfaces (“APIs”) are sufficiently creative to satisfy that requirement of copyright law. Second, the idea expression limitation codified in Section 102(b) of Copyright Act does not establish that the APIs are ideas. Both of these assertions are supported by the empirical research undertaken by the Research Team. This brief expresses no opinion on the resolution of the fair use question that is also before the Court.


Fintech And International Financial Regulation, Yesha Yadav Jan 2020

Fintech And International Financial Regulation, Yesha Yadav

Vanderbilt Law School Faculty Publications

This Article shows that fintech exacerbates the difficulties of standard setting in international financial regulation. Earlier work introduced the "Innovation Trilemma" (the Trilemma). When seeking to balance the goals of achieving market integrity and innovation through clear and simple rulemaking, regulators can-at best-achieve only two out of these three objectives. Fintech's unique characteristics- a reliance on automation and artificial intelligence, novel types of big data, as well as the use of disintermediating financial supply chains comprising a mix of traditional firms as well as technology specialists and newcomers-complicates the application of the Trilemma. Rulemaking struggles to achieve needed clarity ...


The Machine As Author, Daniel J. Gervais Jan 2020

The Machine As Author, Daniel J. Gervais

Vanderbilt Law School Faculty Publications

Machines are increasingly good at emulating humans and laying siege to what has been a strictly human outpost: intellectual creativity.

At this juncture, we cannot know with certainty how high machines will reach on the creativity ladder when compared to, or measured against, their human counterparts, but we do know this. They are far enough already to force us to ask a genuinely hard and complex question, one that intellectual property (“IP”) scholars and courts will need to answer soon; namely, whether copyrights should be granted to productions made not by humans but by machines.

This Article’s specific objective ...


Transactional Scripts In Contract Stacks, Shaanan Cohney, David A. Hoffman Jan 2020

Transactional Scripts In Contract Stacks, Shaanan Cohney, David A. Hoffman

Faculty Scholarship at Penn Law

Deals accomplished through software persistently residing on computer networks—sometimes called smart contracts, but better termed transactional scripts—embody a potentially revolutionary contracting innovation. Ours is the first precise account in the legal literature of how such scripts are created, and when they produce errors of legal significance.

Scripts’ most celebrated use case is for transactions operating exclusively on public, permissionless, blockchains: such exchanges eliminate the need for trusted intermediaries and seem to permit parties to commit ex ante to automated performance. But public transactional scripts are costly both to develop and execute, with significant fees imposed for data storage ...


Transnational Government Hacking, Jennifer C. Daskal Jan 2020

Transnational Government Hacking, Jennifer C. Daskal

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Spyware Vs. Spyware: Software Conflicts And User Autonomy, James Grimmelmann Jan 2020

Spyware Vs. Spyware: Software Conflicts And User Autonomy, James Grimmelmann

Cornell Law Faculty Publications

No abstract provided.


Secret Algorithms, Ip Rights, And The Public Interest, Meghan J. Ryan Jan 2020

Secret Algorithms, Ip Rights, And The Public Interest, Meghan J. Ryan

Faculty Journal Articles and Book Chapters

The secrecy surrounding the algorithms that play a central role in American life today is proving to have alarming effects. Judges and juries are convicting defendants based on secret evidence. Major advertisers like Facebook are discriminating against minorities seeking housing. And Russians may very well be hacking our voting machines to change election outcomes. The algorithm secrecy underlying these results obscures whether such legal outcomes are actually accurate and fair or whether they were based on faulty evidence, affected by bias, or manipulated by outside influences. These are just a handful of the public-interest perils of algorithm secrecy. This Article ...