Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- American University Washington College of Law (4)
- City University of New York (CUNY) (3)
- Schulich School of Law, Dalhousie University (3)
- University of Pennsylvania Carey Law School (3)
- California Western School of Law (2)
-
- Osgoode Hall Law School of York University (2)
- Singapore Management University (2)
- Texas A&M University School of Law (2)
- University of Georgia School of Law (2)
- Vanderbilt University Law School (2)
- Columbia Law School (1)
- Cornell University Law School (1)
- Georgetown University Law Center (1)
- Purdue University (1)
- Seattle University School of Law (1)
- Southern Methodist University (1)
- Technological University Dublin (1)
- University of Massachusetts School of Law (1)
- University of Pittsburgh School of Law (1)
- Utah State University (1)
- William & Mary Law School (1)
- Keyword
-
- Artificial intelligence (8)
- Privacy (5)
- AI (4)
- Copyright (4)
- Artificial Intelligence (3)
-
- Machine Learning (3)
- Security (3)
- Software (3)
- Technology (3)
- Adversarial Machine Learning (2)
- Algorithms (2)
- Congressional oversight (2)
- Contracts (2)
- Ethics (2)
- Human Rights (2)
- Machine learning (2)
- Tech policy (2)
- ADA (1)
- API (1)
- Abstraction (1)
- Accessible Websites (1)
- Advertising (1)
- Americans with Disabilities Act (1)
- And International Economic Law (1)
- Antitrust (1)
- Author (1)
- Autonomous weapons (1)
- Black box (1)
- Blockchain (1)
- Blockchains (1)
- Publication
-
- Faculty Scholarship (5)
- All Faculty Scholarship (3)
- Articles, Book Chapters, & Popular Press (3)
- Joint PIJIP/TLS Research Paper Series (3)
- Articles (2)
-
- Articles & Book Chapters (2)
- Faculty Publications (2)
- Open Educational Resources (2)
- Research Collection Yong Pung How School Of Law (2)
- Scholarly Works (2)
- Vanderbilt Law School Faculty Publications (2)
- All ECSTATIC Materials (1)
- Articles in Law Reviews & Other Academic Journals (1)
- Cornell Law Faculty Publications (1)
- Faculty Journal Articles and Book Chapters (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Libraries Faculty and Staff Scholarship and Research (1)
- Publications and Research (1)
- Seattle University Law Review SUpra (1)
Articles 1 - 30 of 36
Full-Text Articles in Law
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon W. Penney, Afsaneh Rigot, Ram Shankar Siva Kumar
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon W. Penney, Afsaneh Rigot, Ram Shankar Siva Kumar
Articles & Book Chapters
This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …
Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran
Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran
Articles
This article presents an in-depth analysis of the latent methodological issues that are as much a cause of U.S. federal court avoidance of foreign law as are judicial difficulties in obtaining foreign legal materials and difficulties in understanding foreign legal orders and languages. It explores Rule 44.1’s inadvertent introduction of a civil-law method into a common-law framework, and the results that have ensued, including an incomplete transition of foreign law from being an issue of fact to becoming an issue of law. It addresses the ways in which courts obtain information about foreign law today, suggesting among others the methodological …
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Good Health And Good Privacy Go Hand-In-Hand (Originally Published By Jnslp), Jennifer Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Accessible Websites And Mobile Applications Under The Ada: The Lack Of Legal Guidelines And What This Means For Businesses And Their Customers, Josephine Meyer
Accessible Websites And Mobile Applications Under The Ada: The Lack Of Legal Guidelines And What This Means For Businesses And Their Customers, Josephine Meyer
Seattle University Law Review SUpra
No abstract provided.
The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood
The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood
Publications and Research
Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations …
Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn
Joint PIJIP/TLS Research Paper Series
No abstract provided.
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.
Is Data Localization A Solution For Schrems Ii?, Anupam Chander
Is Data Localization A Solution For Schrems Ii?, Anupam Chander
Georgetown Law Faculty Publications and Other Works
For the second time this decade, the Court of Justice of the European Union has struck a blow against the principal mechanisms for personal data transfer to the United States. In Data Protection Commissioner v Facebook Ireland, Maximillian Schrems, the Court declared the EU-US Privacy Shield invalid and placed significant hurdles to the process of transferring personal data from the European Union to the United States via the mechanism of Standard Contractual Clauses. Many have begun to suggest data localization as the solution to the problem of data transfer; that is, don’t transfer the data at all. I argue …
Busting Myths And Dispelling Doubts About Covid-19, Mark Findlay
Busting Myths And Dispelling Doubts About Covid-19, Mark Findlay
Research Collection Yong Pung How School Of Law
The Centre for AI and Data Governance (CAIDG) at Singapore Management University (SMU) has embarked over past months on a programme of research designed to confront concerns about the pandemic and its control. Our interest is primarily directed to the ways in which AI-assisted technologies and mass data sharing have become a feature of pandemic control strategies. We want to know what impact these developments are having on community confidence and health safety. In developing this work, we have come across many myths that need busting.
Artificial Financial Intelligence, William Magnuson
Artificial Financial Intelligence, William Magnuson
Faculty Scholarship
Recent advances in the field of artificial intelligence have revived long-standing debates about what happens when robots become smarter than humans. Will they destroy us? Will they put us all out of work? Will they lead to a world of techno-savvy haves and techno-ignorant have-nots? These debates have found particular resonance in finance, where computers already play a dominant role. High-frequency traders, quant hedge funds, and robo-advisors all represent, to a greater or lesser degree, real-world instantiations of the impact that artificial intelligence is having on the field. This Article will argue that the primary danger of artificial intelligence in …
The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter Menell
The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter Menell
All Faculty Scholarship
Courts have long been skeptical about the use of expert witnesses in copyright cases. More than four decades ago, and before Congress extended copyright law to protect computer software, the Ninth Circuit in Krofft Television Prods., Inc. v. McDonald’s Corp., ruled that expert testimony was inadmissible to determine whether Mayor McCheese and the merry band of McDonaldland characters infringed copyright protection for Wilhelmina W. Witchiepoo and the other imaginative H.R. Pufnstuf costumed characters. Since the emergence of software copyright infringement cases in the 1980s, substantially all software copyright cases have permitted expert witnesses to aid juries in understanding software …
Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman
Libraries Faculty and Staff Scholarship and Research
This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..
Developing Open Source Software Using Version Control Systems: An Introduction To The Git Language For Documenting Your Computational Research, Jared D. Smith, Jonathan D. Herman
Developing Open Source Software Using Version Control Systems: An Introduction To The Git Language For Documenting Your Computational Research, Jared D. Smith, Jonathan D. Herman
All ECSTATIC Materials
Version control systems track the history of code as it is committed (saved) by any number of developers. Have you made a coding error and cannot debug it? Version control systems allow for resetting code back to when it worked, and show what code has changed since previous commits.
The contents of this lecture provide an introduction to the git version control language, GitHub for cloud hosting open source code repositories, and tutorials that demonstrate common and useful git and GitHub practices. This lecture is intended to be coupled with a discussion on creating reproducible computational research.
The zipped folder …
Payment In Virtual Currency, Benjamin Geva
Payment In Virtual Currency, Benjamin Geva
Articles & Book Chapters
By reference to an analysis of the operation of payment in traditional forms of money, this essay explores the meaning of ‘virtual currency’ and the mechanism for payment in it. Endeavoring to identify directions in which events will unfold, the essay sets the stage for a future detailed analysis of pertaining legal aspects.
Rules As Code: Seven Levels Of Digitisation, Meng Weng Wong
Rules As Code: Seven Levels Of Digitisation, Meng Weng Wong
Research Collection Yong Pung How School Of Law
A guide intended to accelerate sensemaking in discussions involving Rules as Code. Without a common frame of reference, project stakeholders risk talking at cross purposes. Stakeholders contemplating a “digital transformation” project in the legal domain, such as a “Rules as Code” exercise or a RegTech / SupTech proof-of-concept, may find this document useful to agree on a common vocabulary to facilitate discussion and planning. To that end, this document classifies “digital transformation” of legal rules into a hierarchy of levels which can be included as terms of reference in planning discussions. While this document is informed by academic discourse, it …
The Algorithmic Divide And Equality In The Age Of Artificial Intelligence, Peter K. Yu
The Algorithmic Divide And Equality In The Age Of Artificial Intelligence, Peter K. Yu
Faculty Scholarship
In the age of artificial intelligence, highly sophisticated algorithms have been deployed to provide analysis, detect patterns, optimize solutions, accelerate operations, facilitate self-learning, minimize human errors and biases and foster improvements in technological products and services. Notwithstanding these tremendous benefits, algorithms and intelligent machines do not provide equal benefits to all. Just as the digital divide has separated those with access to the Internet, information technology and digital content from those without, an emerging and ever-widening algorithmic divide now threatens to take away the many political, social, economic, cultural, educational and career opportunities provided by machine learning and artificial intelligence. …
Google V. Oracle Amicus Merits Stage Brief: Vindicating Ip’S Channeling Principle And Restoring Jurisdictional Balance To Software Copyright Protection, Peter Menell, David Nimmer, Shyamkrishna Balganesh
Google V. Oracle Amicus Merits Stage Brief: Vindicating Ip’S Channeling Principle And Restoring Jurisdictional Balance To Software Copyright Protection, Peter Menell, David Nimmer, Shyamkrishna Balganesh
All Faculty Scholarship
The Federal Circuit’s decisions in Oracle v. Google conflict with this Court’s seminal decision in Baker v. Selden, 101 U.S. 99 (1879), misinterpret Congress’s codification of this Court’s fundamental channeling principle and related limiting doctrines, and upend nearly three decades of sound, well-settled, and critically important decisions of multiple regional circuits on the scope of copyright protection for computer software. Based on the fundamental channeling principle enunciated in Baker v. Selden, as reflected in § 102(b) of the Copyright Act, the functional requirements of APIs for computer systems and devices, like the internal workings of other machines, are …
A Critical Evaluation Of The Effectiveness And Legitimacy Of Webblocking Injunctions, Mark Hyland
A Critical Evaluation Of The Effectiveness And Legitimacy Of Webblocking Injunctions, Mark Hyland
Articles
Relative to the dual criteria of effectiveness and legitimacy, this article evaluates webblocking injunctions in the context of intellectual property law and with a particular focus on the vanguard role played by the English Courts. With regard to the first criterion, it is argued that there is reason to think that webblocking injunctions are viewed by IP owners as well as by legislators and courts as a relatively effective instrument in the protection of IP assets. Moreover, the extension of webblocking orders to trade marks together with their adoption in a number of legal systems, is further evidence that these …
Spyware Vs. Spyware: Software Conflicts And User Autonomy, James Grimmelmann
Spyware Vs. Spyware: Software Conflicts And User Autonomy, James Grimmelmann
Cornell Law Faculty Publications
No abstract provided.
Brief Of Amicus Curiae Interdisciplinary Research Team On Programmer Creativity In Support Of Respondent, Ralph D. Clifford, Firas Khatib, Trina Kershaw, Kavitha Chandra, Jay Mccarthy
Brief Of Amicus Curiae Interdisciplinary Research Team On Programmer Creativity In Support Of Respondent, Ralph D. Clifford, Firas Khatib, Trina Kershaw, Kavitha Chandra, Jay Mccarthy
Faculty Publications
This brief answers the two primary issues that are associated with the first question before the Court. First, the programmers’ expression of the Java-based application programmer interfaces (“APIs”) are sufficiently creative to satisfy that requirement of copyright law. Second, the idea expression limitation codified in Section 102(b) of Copyright Act does not establish that the APIs are ideas. Both of these assertions are supported by the empirical research undertaken by the Research Team. This brief expresses no opinion on the resolution of the fair use question that is also before the Court.
The Machine As Author, Daniel J. Gervais
The Machine As Author, Daniel J. Gervais
Vanderbilt Law School Faculty Publications
Machines are increasingly good at emulating humans and laying siege to what has been a strictly human outpost: intellectual creativity.
At this juncture, we cannot know with certainty how high machines will reach on the creativity ladder when compared to, or measured against, their human counterparts, but we do know this. They are far enough already to force us to ask a genuinely hard and complex question, one that intellectual property (“IP”) scholars and courts will need to answer soon; namely, whether copyrights should be granted to productions made not by humans but by machines.
This Article’s specific objective is …
Speech, Innovation, And Competition, Greg Day
Speech, Innovation, And Competition, Greg Day
Scholarly Works
Critics contend that concentrated power in digital markets has generated threats to free speech. For a variety of reasons, market power is naturally thought to concentrate in digital markets. The consequence is that “big tech” is said to face little competition; Facebook controls 72 percent of the social media market while the parent of YouTube (72 percent of the video market) is Google (92 percent of the search market). This landscape has potentially vested private companies with unprecedented power over the flow of information. If Facebook, for example, decides to ban certain types of speech or ideas, it would potentially …
Nonexcludable Surgical Method Patents, Jonas Anderson
Nonexcludable Surgical Method Patents, Jonas Anderson
Articles in Law Reviews & Other Academic Journals
A patent consists of only one right: the right to exclude others from practicing the patented invention. However, one class of patents statutorily lacks the right to exclude direct infringers: surgical method patents are not enforceable against medical practitioners or health care facilities, which are the only realistic potential direct infringers of such patents. Despite this, inventors regularly file for (and receive) surgical method patents. Why would anyone incur the expense (more than $20,000 on average) of acquiring a patent on a surgical method if that patent cannot be used to keep people from using the patent?
The traditional answer …
Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert
Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert
Articles, Book Chapters, & Popular Press
Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.
Now, research on adversarial …
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …
Secret Algorithms, Ip Rights, And The Public Interest, Meghan J. Ryan
Secret Algorithms, Ip Rights, And The Public Interest, Meghan J. Ryan
Faculty Journal Articles and Book Chapters
The secrecy surrounding the algorithms that play a central role in American life today is proving to have alarming effects. Judges and juries are convicting defendants based on secret evidence. Major advertisers like Facebook are discriminating against minorities seeking housing. And Russians may very well be hacking our voting machines to change election outcomes. The algorithm secrecy underlying these results obscures whether such legal outcomes are actually accurate and fair or whether they were based on faulty evidence, affected by bias, or manipulated by outside influences. These are just a handful of the public-interest perils of algorithm secrecy. This Article …
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Ethical Testing In The Real World: Evaluating Physical Testing Of Adversarial Machine Learning, Kendra Albert, Maggie Delano, Jonathon Penney, Afsaneh Ragot, Ram Shankar Siva Kumar
Articles, Book Chapters, & Popular Press
This paper critically assesses the adequacy and representativeness of physical domain testing for various adversarial machine learning (ML) attacks against computer vision systems involving human subjects. Many papers that deploy such attacks characterize themselves as “real world.” Despite this framing, however, we found the physical or real-world testing conducted was minimal, provided few details about testing subjects and was often conducted as an afterthought or demonstration. Adversarial ML research without representative trials or testing is an ethical, scientific, and health/safety issue that can cause real harms. We introduce the problem and our methodology, and then critique the physical domain testing …
Transactional Scripts In Contract Stacks, Shaanan Cohney, David A. Hoffman
Transactional Scripts In Contract Stacks, Shaanan Cohney, David A. Hoffman
All Faculty Scholarship
Deals accomplished through software persistently residing on computer networks—sometimes called smart contracts, but better termed transactional scripts—embody a potentially revolutionary contracting innovation. Ours is the first precise account in the legal literature of how such scripts are created, and when they produce errors of legal significance.
Scripts’ most celebrated use case is for transactions operating exclusively on public, permissionless, blockchains: such exchanges eliminate the need for trusted intermediaries and seem to permit parties to commit ex ante to automated performance. But public transactional scripts are costly both to develop and execute, with significant fees imposed for data storage. Worse, bugs …
Transnational Government Hacking, Jennifer C. Daskal
Transnational Government Hacking, Jennifer C. Daskal
Joint PIJIP/TLS Research Paper Series
No abstract provided.