Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Law

Orthogonalizing Inputs, Talia B. Gillis Jan 2024

Orthogonalizing Inputs, Talia B. Gillis

Faculty Scholarship

This paper examines an approach to algorithmic discrimination that seeks to blind predictions to protected characteristics by orthogonalizing inputs. The approach uses protected characteristics (such as race or sex) during the training phase of a model but masks these during deployment. The approach posits that including these characteristics in training prevents correlated features from acting as proxies, while assigning uniform values to them at deployment ensures decisions do not vary by group status.

Using a prediction exercise of loan defaults basedon mortgage HMDA data and German credit data, the paper highlights the limitations of this orthogonalization strategy. Applying a lasso …


The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter S. Menell Jan 2021

The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter S. Menell

Faculty Scholarship

Courts have long been skeptical about the use of expert witnesses in copyright cases. More than four decades ago, and before Congress extended copyright law to protect computer software, the Ninth Circuit in Krofft Television Productions, Inc. v. McDonald’s Corp. ruled that expert testimony was inadmissible to determine whether Mayor McCheese and the merry band of McDonald’s characters infringed copyright protection for Wilhelmina W. Witchiepoo and the other imaginative H.R. Pufnstuf costumed characters. Since the emergence of software copyright infringement cases in the 1980s, substantially all software copyright cases have permitted expert witnesses to aid juries in understanding software code. …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


Authors And Machines, Jane C. Ginsburg, Luke Ali Budiardjo Jan 2019

Authors And Machines, Jane C. Ginsburg, Luke Ali Budiardjo

Faculty Scholarship

Machines, by providing the means of mass production of works of authorship, engendered copyright law. Throughout history, the emergence of new technologies tested the concept of authorship, and courts in response endeavored to clarify copyright’s foundational principles. Today, developments in computer science have created a new form of machine, the “artificially intelligent” (AI) system apparently endowed with “computational creativity.” AI systems introduce challenging variations on the perennial question of what makes one an “author” in copyright law: Is the creator of a generative program automatically the author of the works her process begets, even if she cannot anticipate the contents …


A Skeptical View Of Information Fiduciaries, Lina M. Khan, David E. Pozen Jan 2019

A Skeptical View Of Information Fiduciaries, Lina M. Khan, David E. Pozen

Faculty Scholarship

The concept of “information fiduciaries” has surged to the forefront of debates on online-platform regulation. Developed by Professor Jack Balkin, the concept is meant to rebalance the relationship between ordinary individuals and the digital companies that accumulate, analyze, and sell their personal data for profit. Just as the law imposes special duties of care, confidentiality, and loyalty on doctors, lawyers, and accountants vis-à-vis their patients and clients, Balkin argues, so too should it impose special duties on corporations such as Facebook, Google, and Twitter vis-à-vis their end users. Over the past several years, this argument has garnered remarkably broad support …


Will Artificial Intelligence Eat The Law? The Rise Of Hybrid Social-Ordering Systems, Tim Wu Jan 2019

Will Artificial Intelligence Eat The Law? The Rise Of Hybrid Social-Ordering Systems, Tim Wu

Faculty Scholarship

Software has partially or fully displaced many former human activities, such as catching speeders or flying airplanes, and proven itself able to surpass humans in certain contests, like Chess and Jeopardy. What are the prospects for the displacement of human courts as the centerpiece of legal decision-making? Based on the case study of hate speech control on major tech platforms, particularly on Twitter and Facebook, this Essay suggests displacement of human courts remains a distant prospect, but suggests that hybrid machine – human systems are the predictable future of legal adjudication, and that there lies some hope in that combination, …


Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman Jan 2018

Promoting International Cybersecurity Cooperation: Lessons From The Proliferation Security Initiative, Duncan B. Hollis, Matthew C. Waxman

Faculty Scholarship

Global efforts by states to cooperate through international rules in combating cyber threats have generated mixed results, at best. In this paper, we examine the architecture of the Proliferation Security Initiative (PSI) as a possible model for future cybersecurity cooperation among interested states. We identify several features of PSI’s architecture (rather than its substantive focus on non-proliferation) for further analysis, including PSI’s low entry costs, tiered structure, and flexibility, as well as its leveraging of both territorial jurisdiction and state consent. We conclude that, despite several hurdles visible in the scope of its membership and its legal framework, PSI still …


Whither (Not Wither) Copyleft, Eben Moglen Jan 2017

Whither (Not Wither) Copyleft, Eben Moglen

Faculty Scholarship

This article contains an edited version of Professor Eben Moglen’s speech at the SFLC Fall Conference 2016. It explores the topic of Copyleft, enforcement and community engagement from the perspective of one of the key individuals in the rise of Free and Open Source Software from interesting idea to a central pillar of the global technology industry.


A Machine Learning Classifier For Corporate Opportunity Waivers, Gabriel V. Rauterberg, Eric L. Talley Jan 2016

A Machine Learning Classifier For Corporate Opportunity Waivers, Gabriel V. Rauterberg, Eric L. Talley

Faculty Scholarship

Rauterberg & Talley (2017) develop a data set of “corporate opportunity waivers” (COWs) – significant contractual modifications of fiduciary duties – sampled from SEC filings. Part of their analysis utilizes a machine learning (ML) classifier to extend their data set beyond the hand-coded sample. Because the ML approach is likely unfamiliar to some readers, and in the light of its great potential across other areas of law and finance research, this note explains the basic components using a simple example, and it demonstrates strategies for calibrating and evaluating the classifier.


Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt Jan 2014

Governing, Exchanging, Securing: Big Data And The Production Of Digital Knowledge, Bernard E. Harcourt

Faculty Scholarship

The emergence of Big Data challenges the conventional boundaries between governing, exchange, and security. It ambiguates the lines between commerce and surveillance, between governing and exchanging, between democracy and the police state. The new digital knowledge reproduces consuming subjects who wittingly or unwittingly allow themselves to be watched, tracked, linked and predicted in a blurred amalgam of commercial and governmental projects. Linking back and forth from consumer data to government information to social media, these new webs of information become available to anyone who can purchase the information. How is it that governmental, commercial and security interests have converged, coincided, …


Machine Speech, Tim Wu Jan 2013

Machine Speech, Tim Wu

Faculty Scholarship

Computers are making an increasing number of important decisions in our lives. They fly airplanes, navigate traffic, and even recommend books. In the process, computers reason through automated algorithms and constantly send and receive information, sometimes in ways that mimic human expression. When can such communications, called here “algorithmic outputs,” claim First Amendment protection?


Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman Jan 2011

Cyber Attacks As "Force" Under Un Charter Article 2(4), Matthew C. Waxman

Faculty Scholarship

In a 2010 article in Foreign Affairs, Deputy Secretary of Defense William Lynn revealed that in 2008 the Department of Defense suffered "the most significant breach of U.S. military computers ever" when a flash drive inserted into a US military laptop surreptitiously introduced malicious software into US Central Command's classified and unclassified computer systems. Lynn explains that the US government is developing defensive systems to protect military and civilian electronic infrastructure from intrusions and, potentially worse, disruptions and destruction, and it is developing its own cyber-strategy "to defend the United States in the digital age."

To what extent is …


The Disputed Quality Of Software Patents, John R. Allison, Ronald J. Mann Jan 2007

The Disputed Quality Of Software Patents, John R. Allison, Ronald J. Mann

Faculty Scholarship

We analyze the characteristics of the patents held by firms in the software industry. Unlike prior researchers, we rely on the examination of individual patents to determine which patents involve software inventions. This method of identifying the relevant patents is more laborious than the methods that previous scholars have used, but it produces a data set from which we can learn more about the role of patents in the software industry. In general, we find that patents the computer technology firms obtain on software inventions have more prior art references, claims, and forward citations than the patents that the same …


Software Patents, Incumbents, And Entry, John R. Allison, Abe Dunn, Ronald J. Mann Jan 2007

Software Patents, Incumbents, And Entry, John R. Allison, Abe Dunn, Ronald J. Mann

Faculty Scholarship

Software patents have been controversial since the days when "software" referred to the crude programs that came free with an IBM mainframe. Different perspectives have been presented in judicial, legislative, and administrative fora over the years, and the press has paid as much attention to this issue as it has to any other intellectual property topic during this time. Meanwhile, a software industry developed and has grown to a remarkable size, whether measured by revenues or profitability, number of firms or employees, or research expenditures. The scope of software innovation has become even broader, as an increasing number of devices …


A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg Jan 2007

A Marriage Of Convenience? A Comment On The Protection Of Databases, Jane C. Ginsburg

Faculty Scholarship

Daniel Gervais concluded his analysis of the protection of databases with three options for the future. I would like to examine a fourth. Let us assume no future flurry of national or supranational legislative activity because the content of databases is in fact already being protected. Not through copyright or sui generis rights, but through other means. Databases are an object of economic value, and they will conveniently wed whatever legal theory or theories will achieve the practical objective of preventing unauthorized exploitation of the works' contents. To beat the marriage metaphor into the ground, I'd like to suggest that, …


Commercializing Open Source Software: Do Property Rights Still Matter?, Ronald J. Mann Jan 2006

Commercializing Open Source Software: Do Property Rights Still Matter?, Ronald J. Mann

Faculty Scholarship

For several years now, open source software products have been gaining prominence and market share. Yet the products themselves are not as provocative as the way in which they are developed and distributed. Two related features of the open source model are distinctive: the use of collaborative development structures that extend beyond the boundaries of a single firm, and the lack of reliance on intellectual property ("IP") rights as a means of appropriating the value of the underlying technologies. Firm-level control of intellectual property is replaced by a complex set of relations, both informal and sometimes contractual, among strategic partners …


Do Patents Facilitate Financing In The Software Industry?, Ronald J. Mann Jan 2005

Do Patents Facilitate Financing In The Software Industry?, Ronald J. Mann

Faculty Scholarship

This Article is the first part of a wide study of the role of intellectual property in the software industry. Unlike previous papers that focus primarily on software patents – which generally are held by firms that are not software firms – this Article provides a thorough and contextually grounded description of the role that patents play in the software industry itself.

The bulk of the Article considers the pros and cons of patents in the software industry. The Article starts by emphasizing the difficulties that prerevenue startups face in obtaining any value from patents. Litigation to enforce patents is …


Making Sense Of Payments Policy In The Information Age, Ronald J. Mann Jan 2005

Making Sense Of Payments Policy In The Information Age, Ronald J. Mann

Faculty Scholarship

Although I had been mulling over the ideas in this Essay for quite some time, I finally was driven to put the ideas on paper by a call from a colleague one Friday afternoon. He recently had purchased something on the Internet. Regrettably, the Internet merchant had never shipped the goods; apparently the merchant had failed. My colleague had given the merchant the number from his Visa card to pay for the transaction. Being well educated, my colleague assumed that he could have the charge removed from his credit card statement.

When he called the toll-free service line for the …


Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen Jan 2004

Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen

Faculty Scholarship

The subject matter we are going to talk about is variously named and thewords have some resonances of importance. I am going to use the phrase "Free Software" to describe this material, and I am going to suggest to you that the choice of words is relevant. We are talking not merely about a form of production or a system of industrial relations, but also about the beginning of a social movement with specific political goals, which will characterize not only the production of software in the twenty-first century, but the production and distribution of culture generally.

My purpose this …


Harnessing Information Technology To Improve The Environmental Impact Review Process, Michael B. Gerrard, Michael Herz Jan 2003

Harnessing Information Technology To Improve The Environmental Impact Review Process, Michael B. Gerrard, Michael Herz

Faculty Scholarship

In 1970, when the National Environmental Policy Act (NEPA) was enacted, the new and exciting information management technologies were the handheld four-function calculator and the eight-track tape cassette. Three decades later, after the personal computer, the digital revolution, and the World Wide Web, the implementation of NEPA is still stuck in the world of 1970. Other aspects of the bureaucracy have seen reform-the E-Government Strategy, an E-Government Act, the creation of a new Office of Electronic Government within the Office of Management and Budget (OMB), and, to focus on the environmental arena, the breathtaking success of the web-based Toxic Release …


Copyright And Control Over New Technologies Of Dissemination, Jane C. Ginsburg Jan 2001

Copyright And Control Over New Technologies Of Dissemination, Jane C. Ginsburg

Faculty Scholarship

The relationship of copyright to new technologies that exploit copyrighted works is often perceived to pit copyright against progress. Historically, when copyright owners seek to eliminate a new kind of dissemination, and when courts do not deem that dissemination harmful to copyright owners, courts decline to find infringement. However, when owners seek instead to participate in and be paid for the new modes of exploitation, the courts, and Congress, appear more favorable to copyright control over that new market. Today, the courts and Congress regard the unlicensed distribution of works over the Internet as impairing copyright owners' ability to avail …


Authors As "Licensors" Of "Informational Rights" Under U.C.C. Article 2b, Jane C. Ginsburg Jan 1998

Authors As "Licensors" Of "Informational Rights" Under U.C.C. Article 2b, Jane C. Ginsburg

Faculty Scholarship

U.C.C. Articles 2B of the Uniform Commercial Code was designed primarily to regulate online and mass market transactions, particularly the licensing of computer software. Its effects, however, will extend to authors of works other than computer software. This Article considers the effects Article 2B would have on dealings between those authors and the exploiters of the authors' works. By reducing procedural barriers to the formation of licenses, Article 2B would make it all too easy for an author to assent to contract terms that may heavily favor an exploiter of the author's work. On the other hand, default contract terms …


Four Reasons And A Paradox: The Manifest Superiority Of Copyright Over Sui Generis Protection Of Computer Software, Jane C. Ginsburg Jan 1994

Four Reasons And A Paradox: The Manifest Superiority Of Copyright Over Sui Generis Protection Of Computer Software, Jane C. Ginsburg

Faculty Scholarship

The "Manifesto Concerning the Legal Protection of Computer Programs" offers an extensive and challenging critique of current intellectual property protection of software. The authors argue strongly that the law should focus on the value of the know-how embodied in programs and the importance of protecting it, rather than on the particular means which might be used to appropriate it. The authors seek to compel reconceptualization of the place of computer programs, and of software authors' creativity, within the domain of intellectual property. However, their brief for change manifests several flaws. Paradoxically, it comes at once both too soon and too …


Computer Programs In Europe: A Comparative Analysis Of The 1991 Ec Software Directive, Jerome Huet, Jane C. Ginsburg Jan 1992

Computer Programs In Europe: A Comparative Analysis Of The 1991 Ec Software Directive, Jerome Huet, Jane C. Ginsburg

Faculty Scholarship

Long awaited – if not feared – in the computer industry, where its elaboration had evoked heated debate, the European Council Directive of May 14, 1991 on the Legal Protection of Computer Programs (the "Directive" or "Software Directive")has imposed common principles of copyright protection on the twelve Member States of the European Community (the "EC", the "Community"). As it declares in its preamble, the Directive responds to the need to ensure the proper functioning of a single marketand, to that end, to eliminate man), of the current differences among the Member States' legal systems.

In the domain of European copyright …