Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Maurer School of Law: Indiana University (37)
- Singapore Management University (32)
- University of Pittsburgh School of Law (31)
- University of Pennsylvania Carey Law School (27)
- University of Michigan Law School (13)
-
- University of Nebraska - Lincoln (8)
- Western University (8)
- William & Mary Law School (8)
- University of New Hampshire (6)
- City University of New York (CUNY) (5)
- Chicago-Kent College of Law (4)
- Duke Law (4)
- Edith Cowan University (4)
- Roger Williams University (4)
- Columbia Law School (3)
- University of Windsor (3)
- Ateneo de Manila University (2)
- Emory University School of Law (2)
- Old Dominion University (2)
- Penn State Dickinson Law (2)
- Purdue University (2)
- SIT Graduate Institute/SIT Study Abroad (2)
- University of Washington School of Law (2)
- Boston University School of Law (1)
- Calvin University (1)
- Georgetown University Law Center (1)
- Georgia Southern University (1)
- Loyola University Chicago (1)
- Minnesota State University, Mankato (1)
- Olivet Nazarene University (1)
- Keyword
-
- Artificial intelligence (36)
- Data protection (29)
- Data privacy (26)
- Cybersecurity (23)
- Machine learning (23)
-
- Privacy (18)
- AI (17)
- Technology (14)
- Copyright (13)
- International privacy law (12)
- Law (12)
- Regulation (11)
- Artificial Intelligence (10)
- Public administration (9)
- Big data (8)
- Information (8)
- Surveillance (8)
- Administrative law (7)
- Algorithms (7)
- Governance (7)
- Intellectual property (7)
- E-Lert (6)
- Electronic Databases (6)
- Indiana University Electronic Resources Newsletter (6)
- Internet (6)
- Legal Research (6)
- Singapore (6)
- Software (6)
- Yolanda Jones (6)
- COVID-19 (5)
- Publication Year
- Publication
-
- All Faculty Scholarship (32)
- Articles by Maurer Faculty (31)
- Articles (30)
- Research Collection Yong Pung How School Of Law (17)
- Book Chapters (12)
-
- Research Collection School Of Computing and Information Systems (10)
- Copyright, Fair Use, Scholarly Communication, etc. (7)
- Faculty Scholarship (7)
- Computer Science Publications (6)
- E-lert (6)
- Faculty Publications (6)
- Law Faculty Scholarship (6)
- Publications and Research (5)
- Law Library Newsletters/Blog (4)
- Law Publications (3)
- Other Publications (3)
- CRRAR Publications (2)
- Centre for AI & Data Governance (2)
- Faculty Articles (2)
- Faculty Scholarly Works (2)
- Independent Study Project (ISP) Collection (2)
- Popular Media (2)
- All ECSTATIC Materials (1)
- Asian Management Insights (1)
- Ateneo School of Law Publications (1)
- Australian Digital Forensics Conference (1)
- Australian Information Security Management Conference (1)
- Australian Security and Intelligence Conference (1)
- Center for the Advancement of Public Integrity (Inactive) (1)
- Centre for Computational Law (1)
Articles 181 - 210 of 228
Full-Text Articles in Law
The Intricacies Of Independence, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantession
The Intricacies Of Independence, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantession
Articles by Maurer Faculty
No abstract provided.
Systematic Government Access To Private-Sector Data, Fred H. Cate, James X. Dempsey, Ira S. Rubenstein
Systematic Government Access To Private-Sector Data, Fred H. Cate, James X. Dempsey, Ira S. Rubenstein
Articles by Maurer Faculty
No abstract provided.
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo
All Faculty Scholarship
Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …
Developing A Master Data Sharing Agreement: Seeking Student-Level Evidence To Support A Collaborative Community Effort In Education, Neil E. Carlson, Edwin Hernández, Chaná Edmond-Verley, Gustavo Rotondaro
Developing A Master Data Sharing Agreement: Seeking Student-Level Evidence To Support A Collaborative Community Effort In Education, Neil E. Carlson, Edwin Hernández, Chaná Edmond-Verley, Gustavo Rotondaro
University Faculty Publications and Creative Works
The authors, who represent a family foundation, a college, a university, and a public school system, describe the process of developing an agreement that allows student-level data to be shared for research and evaluation purposes. Keys to reaching the agreement included clear distinctions among roles and access to data, strict adherence to consent and confidentiality agreements, and a shared commitment to using data to improve student outcomes.
When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong
When Machines Are Watching: How Warrantless Use Of Gps Surveillance Technology Violates The Fourth Amendment Right Against Unreasonable Searches, David Thaw, Priscilla Smith, Nabiha Syed, Albert Wong
Articles
Federal and state law enforcement officials throughout the nation are currently using Global Positioning System (GPS) technology for automated, prolonged surveillance without obtaining warrants. As a result, cases are proliferating in which criminal defendants are challenging law enforcement’s warrantless uses of GPS surveillance technology, and courts are looking for direction from the Supreme Court. Most recently, a split has emerged between the Ninth and D.C. Circuit Courts of Appeal on the issue. In United States v. Pineda-Moreno, the Ninth Circuit relied on United States v. Knotts — which approved the limited use of beeper technology without a warrant — to …
Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle
Authentication Of Biometric Features Using Texture Coding For Id Cards, Jonathan Blackledge, Eugene Coyle
Conference papers
The use of image based information exchange has grown rapidly over the years in terms of both e-to-e image storage and transmission and in terms of maintaining paper documents in electronic form. Further, with the dramatic improvements in the quality of COTS (Commercial-Off-The-Shelf) printing and scanning devices, the ability to counterfeit electronic and printed documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying of their content and, in the case of printed …
Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton
Digital Multi-Media And The Limits Of Privacy Law, Jacqueline D. Lipton
Articles
While digital video and multi-media technologies are becoming increasingly prevalent, existing privacy laws tend to focus on text-based personal records. Individuals have little recourse when concerned about infringements of their privacy interests in audio, video, and multi-media files. Often people are simply unaware that video or audio records have been made. Even if they are aware of the existence of the records, they may be unaware of potential legal remedies, or unable to afford legal recourse. This paper concentrates on the ability of individuals to obtain legal redress for unauthorized use of audio, video and multi-media content that infringes their …
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Wikipedia And The European Union Database Directive, Jacqueline D. Lipton
Articles
“Web 2.0" and "User Generated Content (UGC)" are the new buzzwords in cyberspace. In recent years, law and policy makers have struggled to keep pace with the needs of digital natives in terms of online content control in the new participatory web culture. Much of the discourse about intellectual property rights in this context revolves around copyright law: for example, who owns copyright in works generated by multiple people, and what happens when these joint authored works borrow from existing copyright works in terms of derivative works rights and the fair use defense. Many works compiled by groups are subject …
Questioning Cultural Commons, Lawrence B. Solum
Questioning Cultural Commons, Lawrence B. Solum
Georgetown Law Faculty Publications and Other Works
In Constructing Commons in the Cultural Environment, Michael J. Madison, Brett M. Frischmann, and Katherine J. Strandburg offer an innovative and attractive vision of the future of cultural and scientific knowledge through the construction of “cultural commons,” which they define as “environments for developing and distributing cultural and scientific knowledge through institutions that support pooling and sharing that knowledge in a managed way.” The kind of “commons” they have in mind is modeled on the complex arrangement of social norms that allocate lobstering rights among fishermen in Maine and extends to arrangements such as patent pools, open-source software development …
Case Study On An Investigation Of Information Security Management Among Law Firms, Sameera Mubarak, Elena Sitnikova
Case Study On An Investigation Of Information Security Management Among Law Firms, Sameera Mubarak, Elena Sitnikova
Australian Information Security Management Conference
The integrity of lawyers trust accounts as come under scrutiny in the last few years. There have been many incidents of trust account fraud reported internationally, including a case in Australia, where an employee of a law firm stole $4,500,000 from the trust funds of forty-two clients. Our study involved interviewing principles of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. An overall finding highlights that law firms were not current with technology to combat computer crime, and inadequate access control was a major concern in safeguarding account …
Corporate Voting, Paul H. Edelman, Robert B. Thompson
Corporate Voting, Paul H. Edelman, Robert B. Thompson
Vanderbilt Law School Faculty Publications
Discussion of shareholder voting frequently begins against a background of the democratic expectations and justifications present in decision-making in the public sphere. Directors are assumed to be agents of the shareholders in much the same way that public officers are representatives of citizens. Recent debates about majority voting and shareholder nomination of directors illustrate this pattern. Yet the corporate process differs in significant ways, partly because the market for shares permits a form of intensity voting and lets markets mediate the outcome in a way that would be foreign to the public setting and partly because the shareholders' role is …
An Ontology For Autonomic License Management, Qian Zhao, Mark Perry
An Ontology For Autonomic License Management, Qian Zhao, Mark Perry
Computer Science Publications
The license agreement can be seen as the knowledge source for a license management system. As such, it may be referenced by the system each time a new process is initiated. To facilitate access, a machine readable representation of the license agreement is highly desirable, but at the same time we do not want to sacrifice too much readability of such agreements by human beings. Creating an ontology as a formal knowledge representation of licensing not only meets the representation requirements, but also offers improvements to knowledge reusability owing to the inherent sharing nature of such representations. Furthermore, the XML-based …
A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry
A Framework For Automatic Sla Creation, Halina Kaminski, Mark Perry
Computer Science Publications
Negotiation is fundamental to business. Increased automation of business to business or business to customer interaction is demanding efficient but flexible systems that can manage the negotiation process with minimal direct human intervention. Industries that provide online services rely on Service Level Agreements as the basis for their contractual relationship. Here we look at a means for generating these with a negotiating tool (SLA Negotiation Manager) that complies with e-negotiation rules and creates the agreements from existing business objectives.
The State Of Public Access To Federal Government Databases Detailed In Recommended New Book, Jennifer L. Behrens
The State Of Public Access To Federal Government Databases Detailed In Recommended New Book, Jennifer L. Behrens
Faculty Scholarship
No abstract provided.
Viewing Virtual Property Ownership Through The Lens Of Innovation, Ryan G. Vacca
Viewing Virtual Property Ownership Through The Lens Of Innovation, Ryan G. Vacca
Law Faculty Scholarship
Over the past several years scholars have wrestled with how property rights in items created in virtual worlds should be conceptualized. Regardless of how the property is conceptualized and what property theory best fits, most agree the law ought to recognize virtual property as property and vest someone with those rights.
Agent Design Of Smart License Management System Using Gaia Methodology, Qian Zhao, Yu Zhou, Mark Perry
Agent Design Of Smart License Management System Using Gaia Methodology, Qian Zhao, Yu Zhou, Mark Perry
Computer Science Publications
Modern software services and data centers require a license management system to regulate the agreements that have been reached between subscriber and provider. License management helps to track usage and protect service from abuse. License agreements provide the basis for enforcement and regulation. The automation of license agreements is desired by providers and subscribers to improve transaction efficiency, give flexibility, and minimize unwanted cost.
We have proposed a framework, called SmArt (Semantic Agreement) system, that enables agreement automation in the autonomic computing context using ontology and agent technologies. This paper applies the SmArt system to the domain of license management …
Open Source Software Licensing Patterns, Halina Kaminski, Mark Perry
Open Source Software Licensing Patterns, Halina Kaminski, Mark Perry
Computer Science Publications
No abstract provided.
Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow
Law Faculty Scholarship
In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …
Performance Rights For Software, Mark Perry, Stephen M. Watt
Performance Rights For Software, Mark Perry, Stephen M. Watt
Law Publications
As we use software in increasingly varied contexts, the concept of a software license has become progressively more complex. Software is embedded in devices that do not obviously resemble computers. Web services make software on one computer available to anyone with internet access. An individual may use several computers over the course of the day so the concept of a node locked or individual license is no longer clear. How should time based and single use and consumptive licenses be governed and interact? This paper examines how these and other issues in software licensing can be seen as instances of …
Verifiable Electronic Voting System: An Open Source Solution, Halina Kaminski, Mark Perry
Verifiable Electronic Voting System: An Open Source Solution, Halina Kaminski, Mark Perry
Computer Science Publications
Elections, referenda and polls are vital processes for the operation of a modern democracy. They form the mechanism for transferring power from citizens to their representatives. Although some commentators claim that the pencil-and-paper systems used in countries such as Canada and UK are still the best method of avoiding voterigging, recent election problems, and the need for faster, better, cheaper vote counting, have stimulated great interest in managing the election process through the use of electronic voting systems. While computer scientists, for the most part, have been warning of the possible perils of such action, vendors have forged ahead with …
Floss As Democratic Principle, Mark Perry, Brian Fitzgerald
Floss As Democratic Principle, Mark Perry, Brian Fitzgerald
Law Publications
No abstract provided.
Computer Models For Legal Prediction, Kevin D. Ashley, Stephanie Bruninghaus
Computer Models For Legal Prediction, Kevin D. Ashley, Stephanie Bruninghaus
Articles
Computerized algorithms for predicting the outcomes of legal problems can extract and present information from particular databases of cases to guide the legal analysis of new problems. They can have practical value despite the limitations that make reliance on predictions risky for other real-world purposes such as estimating settlement values. An algorithm's ability to generate reasonable legal arguments also is important. In this article, computerized prediction algorithms are compared not only in terms of accuracy, but also in terms of their ability to explain predictions and to integrate predictions and arguments. Our approach, the Issue-Based Prediction algorithm, is a program …
Ip's Problem Child: Shifting The Paradigms For Software Protection, Jacqueline D. Lipton
Ip's Problem Child: Shifting The Paradigms For Software Protection, Jacqueline D. Lipton
Articles
Computer software is somewhat of a problem child for intellectual property law. Courts and legislatures have struggled to encourage innovations in software development while, at the same time, attempting to avoid undesirable digital information monopolies. Neither the patent nor the copyright system has provided a particularly satisfactory paradigm for software protection. Although patents have received greater attention than copyrights in the software context (consider, for example, the recent BlackBerry case), copyright law arguably creates more insidious undercurrents in today's marketplace. This is partly because we have not yet appreciated the potential impact of recent developments in programming methodology and digital …
Examination Dialogue: An Argumentation Framework For Critically Questioning An Expert Opinion, Douglas Walton
Examination Dialogue: An Argumentation Framework For Critically Questioning An Expert Opinion, Douglas Walton
CRRAR Publications
Recent work in argumentation theory (Walton and Krabbe, 1995; Walton, 2005) and artificial intelligence (Bench-Capon, 1992, 2003; Cawsey, 1992; McBurney and Parsons, 2002; Bench-Capon and Prakken, 2005) uses types of dialogue as contexts of argument use. This paper provides an analysis of a special type called examination dialogue, in which one party questions another party, sometimes critically or even antagonistically, to try to find out what that party knows about something. This type of dialogue is most prominent in law and in both legal and non-legal arguments based on expert opinion. It is also central to dialogue systems for questioning …
Who Counts Your Votes?, Halina Kaminski, Lila Kari, Mark Perry
Who Counts Your Votes?, Halina Kaminski, Lila Kari, Mark Perry
Computer Science Publications
Open and fair elections are paramount to modern democracy. Although some people claim that the penciland- paper systems used in countries such as Canada and UK are still the best method of avoiding vote rigging, recent election problems have sparked great interest in managing the election process through the use of electronic voting systems. It is a goal of this paper to describe a voting system that is secret and secure as well as verifiable and useable over an existing computer network. We have designed and implemented an electronic voting system – Verifiable E-Voting (VEV) – with an underlying protocol …
Critical Questions In Computational Models Of Legal Argument, Douglas Walton, Thomas F. Gordon
Critical Questions In Computational Models Of Legal Argument, Douglas Walton, Thomas F. Gordon
CRRAR Publications
Two recent computational models of legal argumentation, by Verheij and Gordon respectively, have interpreted critical questions as premises of arguments that can be defeated using Pollock’s concepts of undercutters and rebuttals. Using the scheme for arguments from expert opinion as an example, this paper evaluates and compares these two models of critical questions from the perspective of argumentation theory and competing legal theories about proof standardsfor defeating presumptions. The applicable proof standard is found to be a legal issue subject to argument. Verheij’smodel is shown to have problems because the proof stan-dards it applies to different kinds of premises are …