Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pittsburgh School of Law (19)
- Maurer School of Law: Indiana University (7)
- University of Pennsylvania Carey Law School (5)
- Singapore Management University (4)
- University of Nebraska - Lincoln (4)
-
- Ateneo de Manila University (1)
- Calvin University (1)
- Chicago-Kent College of Law (1)
- City University of New York (CUNY) (1)
- Duke Law (1)
- Georgetown University Law Center (1)
- Loyola University Chicago (1)
- Roger Williams University (1)
- Technological University Dublin (1)
- University of Connecticut (1)
- University of Washington School of Law (1)
- Keyword
-
- Privacy (8)
- Governance (7)
- E-Lert (6)
- Electronic Databases (6)
- Indiana University Electronic Resources Newsletter (6)
-
- Information (6)
- Legal Research (6)
- Yolanda Jones (6)
- Indiana University Law Library (5)
- Indiana University School of Law (5)
- Intellectual property (5)
- Commons (4)
- Copyright (4)
- Cybersecurity (4)
- Surveillance (4)
- Knowledge (3)
- Knowledge commons (3)
- AI (2)
- Access (2)
- Artificial intelligence (2)
- Big Data (2)
- Big data (2)
- Common pools (2)
- Data breach (2)
- Data security (2)
- Data-intensive science (2)
- Facebook (2)
- Healthcare (2)
- Internet (2)
- Law and technology (2)
- Publication Year
- Publication
-
- Articles (14)
- All Faculty Scholarship (6)
- Book Chapters (6)
- E-lert (6)
- Copyright, Fair Use, Scholarly Communication, etc. (4)
-
- Research Collection School Of Computing and Information Systems (3)
- Articles by Maurer Faculty (1)
- Conference papers (1)
- Faculty Scholarship (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Graduate School of Business Publications (1)
- Law Library Newsletters/Blog (1)
- Publications and Research (1)
- Published Works (1)
- Research Collection Yong Pung How School Of Law (1)
- School of Business: Faculty Publications and Other Works (1)
- University Faculty Publications and Creative Works (1)
Articles 1 - 30 of 50
Full-Text Articles in Law
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Book Chapters
Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …
Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander
Creating Data From Unstructured Text With Context Rule Assisted Machine Learning (Craml), Stephen Meisenbacher, Peter Norlander
School of Business: Faculty Publications and Other Works
Popular approaches to building data from unstructured text come with limitations, such as scalability, interpretability, replicability, and real-world applicability. These can be overcome with Context Rule Assisted Machine Learning (CRAML), a method and no-code suite of software tools that builds structured, labeled datasets which are accurate and reproducible. CRAML enables domain experts to access uncommon constructs within a document corpus in a low-resource, transparent, and flexible manner. CRAML produces document-level datasets for quantitative research and makes qualitative classification schemes scalable over large volumes of text. We demonstrate that the method is useful for bibliographic analysis, transparent analysis of proprietary data, …
Clinical Interactions In Electronic Medical Records Towards The Development Of A Token-Economy Model, Nicole Allison S. Co, Jason Limcaco, Hans Calvin L. Tan, Ma. Regina Justina E. Estuar, Christian E. Pulmano, Dennis Andrew Villamor, Quirino Sugon Jr, Maria Cristina G. Bautista, Paulyn Jean Acacio-Claro
Clinical Interactions In Electronic Medical Records Towards The Development Of A Token-Economy Model, Nicole Allison S. Co, Jason Limcaco, Hans Calvin L. Tan, Ma. Regina Justina E. Estuar, Christian E. Pulmano, Dennis Andrew Villamor, Quirino Sugon Jr, Maria Cristina G. Bautista, Paulyn Jean Acacio-Claro
Graduate School of Business Publications
The use of electronic medical records (EMRs) plays a crucial role in the successful implementation of the Universal Healthcare Law which promises quality and affordable healthcare to all Filipinos. Consequently, the current adoption of EMRs should be studied from the perspective of the healthcare provider. As most studies look into use of EMRs by doctors or patients, there are very few that extend studies to look at possible interaction of doctor and patient in the same EMR environment. Understanding this interaction paves the way for possible incentives that will increase the use and adoption of the EMR. This study uses …
Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Spurring Digital Transformation In Singapore's Legal Industry, Xin Juan Chua, Steven M. Miller
Spurring Digital Transformation In Singapore's Legal Industry, Xin Juan Chua, Steven M. Miller
Research Collection School Of Computing and Information Systems
COVID-19 has transformed the way we live and work. It has caused the processes and operations of businesses and organisations to be restructured, as well as transformed business models. A 2020 McKinsey Global survey reported that companies all over the world claim they have accelerated the digitalisation of their customer and supply-chain interactions, as well as their internal operations, by three to four years. They also said they thought the share of digital or digitally enabled products in their portfolios has advanced by seven years. While technology transformation is not new to the legal profession, COVID-19 has cemented the importance …
Building Legal Datasets, Jerrold Soh
Building Legal Datasets, Jerrold Soh
Research Collection Yong Pung How School Of Law
Data-centric AI calls for better, not just bigger, datasets. As data protection laws with extra-territorial reach proliferate worldwide, ensuring datasets are legal is an increasingly crucial yet overlooked component of “better”. To help dataset builders become more willing and able to navigate this complex legal space, this paper reviews key legal obligations surrounding ML datasets, examines the practical impact of data laws on ML pipelines, and offers a framework for building legal datasets.
Smart Contracts: Will Fintech Be The Catalyst For The Next Global Financial Crisis?, Randall Duran, Paul Griffin
Smart Contracts: Will Fintech Be The Catalyst For The Next Global Financial Crisis?, Randall Duran, Paul Griffin
Research Collection School Of Computing and Information Systems
Purpose: This paper aims to examine the risks associated with smart contracts, a disruptive financial technology (FinTech) innovation, and assesses how in the future they could threaten the integrity of the global financial system. Design/methodology/approach: A qualitative approach is used to identify risk factors related to the use of new financial innovations, by examining how over-the-counter (OTC) derivatives contributed to the Global Financial Crisis (GFC) which occurred during 2007 and 2008. Based on this analysis, the potential for similar concerns with smart contracts are evaluated, drawing on the failure of The DAO on the Ethereum blockchain, which involved the loss …
Scraping Bepress: Downloading Dissertations For Preservation, Stephen Zweibel
Scraping Bepress: Downloading Dissertations For Preservation, Stephen Zweibel
Copyright, Fair Use, Scholarly Communication, etc.
This article will describe our process developing a script to automate downloading of documents and secondary materials from our library’s BePress repository. Our objective was to collect the full archive of dissertations and associated files from our repository into a local disk for potential future applications and to build out a preservation system.
Unlike at some institutions, our students submit directly into BePress, so we did not have a separate repository of the files; and the backup of BePress content that we had access to was not in an ideal format (for example, it included “withdrawn” items and did not …
Data Governance And The Emerging University, Michael J. Madison
Data Governance And The Emerging University, Michael J. Madison
Book Chapters
Knowledge and information governance questions are tractable primarily in institutional terms, rather than in terms of abstractions such as knowledge itself or individual or social interests. This chapter offers the modern research university as an example. Practices of data-intensive research by university-based researchers, sometimes reduced to the popular phrase “Big Data,” pose governance challenges for the university. The chapter situates those challenges in the traditional understanding of the university as an institution for understanding forms and flows of knowledge. At a broad level, the chapter argues that the new salience of data exposes emerging shifts in the social, cultural, and …
The Trust Principles For Digital Repositories, Dawei Lin, Jonathan Crabtree, Ingrid Dillo, Robert R. Downs, Rorie Edmunds, David Giaretta, Marisa De Giusti, Hervé L'Hours, Wim Hugo, Reyna Jenkyns, Varsha Khodiyar, Maryann E. Martone, Mustapha Mokrane, Vivek Navale, Jonathan Petters, Barbara Sierman, Dina V. Sokolova, Martina Stockhause, John Westbrook
The Trust Principles For Digital Repositories, Dawei Lin, Jonathan Crabtree, Ingrid Dillo, Robert R. Downs, Rorie Edmunds, David Giaretta, Marisa De Giusti, Hervé L'Hours, Wim Hugo, Reyna Jenkyns, Varsha Khodiyar, Maryann E. Martone, Mustapha Mokrane, Vivek Navale, Jonathan Petters, Barbara Sierman, Dina V. Sokolova, Martina Stockhause, John Westbrook
Copyright, Fair Use, Scholarly Communication, etc.
As information and communication technology has become pervasive in our society, we are increasingly dependent on both digital data and repositories that provide access to and enable the use of such resources. Repositories must earn the trust of the communities they intend to serve and demonstrate that they are reliable and capable of appropriately managing the data they hold.
Following a year-long public discussion and building on existing community consensus , several stakeholders, representing various segments of the digital repository community, have collaboratively developed and endorsed a set of guiding principles to demonstrate digital repository trustworthiness. Transparency, Responsibility, User focus, …
The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard
The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard
Copyright, Fair Use, Scholarly Communication, etc.
Executive Summary
Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.
1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.
2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
Lowering Legal Barriers To Rpki Adoption, Christopher S. Yoo, David A. Wishnick
All Faculty Scholarship
Across the Internet, mistaken and malicious routing announcements impose significant costs on users and network operators. To make routing announcements more reliable and secure, Internet coordination bodies have encouraged network operators to adopt the Resource Public Key Infrastructure (“RPKI”) framework. Despite this encouragement, RPKI’s adoption rates are low, especially in North America.
This report presents the results of a year-long investigation into the hypothesis—widespread within the network operator community—that legal issues pose barriers to RPKI adoption and are one cause of the disparities between North America and other regions of the world. On the basis of interviews and analysis of …
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
All Faculty Scholarship
No abstract provided.
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …
Copyright Law And The Supply Of Creative Work: Evidence From The Movies, Ivan Paak Liang Png, Qiu-Hong Wang
Copyright Law And The Supply Of Creative Work: Evidence From The Movies, Ivan Paak Liang Png, Qiu-Hong Wang
Research Collection School Of Computing and Information Systems
There is almost no empirical evidence on the extent to whichcopyright law works in the sense of increasing the production of creative work.Here, we study the impact of two major changes in copyright law – the extensionof copyright term and the European Rental Directive – on the production ofmovies. In a panel of 23 OECD countries, among which 19 extendedcopyright term at various times between 1991–2005, we found no statisticallyrobust evidence that copyright term extension was associated with higher movie production.In a panel of 17 European countries between 1991–2005, wefound no statistically robust evidence that compliance with the RentalDirective was …
Information Abundance And Knowledge Commons, Michael J. Madison
Information Abundance And Knowledge Commons, Michael J. Madison
Book Chapters
Standard accounts of IP law describe systems of legal exclusion intended to prompt the production and distribution of intellectual resources, or information and knowledge, by making those things artificially scarce. The argument presented here frames IP law instead as one of several possible institutional responses to the need to coordinate the use of intellectual resources given their natural abundance, and not necessarily useful or effective responses at that. The chapter aims to shift analytic and empirical frameworks from those grounded in law to those grounded in governance, and from IP law in isolation to IP law as part of resource …
Understanding Access To Things: A Knowledge Commons Perspective, Michael J. Madison
Understanding Access To Things: A Knowledge Commons Perspective, Michael J. Madison
Book Chapters
This chapter explores the related ideas of access to knowledge resources and shared governance of those resources, often known as commons. Knowledge resources consist of many types and forms. Some are tangible, and some are intangible. Some are singular; some are reproduced in copies. Some are singular or unique; some are collected or pooled. Some are viewed, used, or consumed only by a single person; for some resources, collective or social consumption is the norm. Any given resource often has multiple attributes along these dimensions, depending on whether one examines the resource’s physical properties, its creative or inventive properties, or …
The Other Side Of Garcia:The Right Of Publicity And Copyright Preemption, Jennifer E. Rothman
The Other Side Of Garcia:The Right Of Publicity And Copyright Preemption, Jennifer E. Rothman
All Faculty Scholarship
This essay is adapted from a talk that I gave on October 2, 2015 at Columbia Law School’s annual Kernochan Center Symposium. The all-day conference focused on Copyright Outside the Box. The essay considers the aftermath of Garcia v. Google, Inc., and the Ninth Circuit’s suggestion in that case that Garcia might have a right of publicity claim against the filmmakers, even though her copyright claim failed.
The essay provides a partial update of my prior work, Copyright Preemption and the Right of Publicity, 36 U.C. Davis L. Rev. 199 (2002), and suggests that despite numerous cases over …
Big Data And The Fourth Estate: Protecting The Development Of News Media Monitoring Databases, Joseph A. Tomain
Big Data And The Fourth Estate: Protecting The Development Of News Media Monitoring Databases, Joseph A. Tomain
Articles by Maurer Faculty
No abstract provided.
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp
Push, Pull, And Spill: A Transdisciplinary Case Study In Municipal Open Government, Jan Whittington, Ryan Calo, Mike Simon, Jesse Woo, Meg Young, Perter Schmiedeskamp
Articles
Municipal open data raises hopes and concerns. The activities of cities produce a wide array of data, data that is vastly enriched by ubiquitous computing. Municipal data is opened as it is pushed to, pulled by, and spilled to the public through online portals, requests for public records, and releases by cities and their vendors, contractors, and partners. By opening data, cities hope to raise public trust and prompt innovation. Municipal data, however, is often about the people who live, work, and travel in the city. By opening data, cities raise concern for privacy and social justice.
This article presents …
Data Breach (Regulatory) Effects, David Thaw
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Reasonable Expectations Of Privacy Settings: Social Media And The Stored Communications Act, David Thaw, Christopher Borchert, Fernando Pinguelo
Articles
In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private …
Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp
Competition Policy And The Technologies Of Information, Herbert J. Hovenkamp
All Faculty Scholarship
When we speak about information and competition policy we are usually thinking about oral or written communications that have an anticompetitive potential, and mainly in the context of collusion of exclusionary threats. These are important topics. Indeed, among the most difficult problems that competition policy has had to confront over the years is understanding communications that can be construed as either threats to exclude or as offers to collude or facilitators of collusion.
My topic here, however, is the relationship between information technologies and competition policy. Technological change can both induce and undermine the use of information to facilitate anticompetitive …
Commons At The Intersection Of Peer Production, Citizen Science, And Big Data: Galaxy Zoo, Michael J. Madison
Commons At The Intersection Of Peer Production, Citizen Science, And Big Data: Galaxy Zoo, Michael J. Madison
Book Chapters
The knowledge commons research framework is applied to a case of commons governance grounded in research in modern astronomy. The case, Galaxy Zoo, is a leading example of at least three different contemporary phenomena. In the first place Galaxy Zoo is a global citizen science project, in which volunteer non-scientists have been recruited to participate in large-scale data analysis via the Internet. In the second place Galaxy Zoo is a highly successful example of peer production, sometimes known colloquially as crowdsourcing, by which data are gathered, supplied, and/or analyzed by very large numbers of anonymous and pseudonymous contributors to an …
Governing Knowledge Commons -- Introduction & Chapter 1, Brett M. Frischmann, Michael J. Madison, Katherine J. Strandburg
Governing Knowledge Commons -- Introduction & Chapter 1, Brett M. Frischmann, Michael J. Madison, Katherine J. Strandburg
Book Chapters
“Knowledge commons” describes the institutionalized community governance of the sharing and, in some cases, creation, of information, science, knowledge, data, and other types of intellectual and cultural resources. It is the subject of enormous recent interest and enthusiasm with respect to policymaking about innovation, creative production, and intellectual property. Taking that enthusiasm as its starting point, Governing Knowledge Commons argues that policymaking should be based on evidence and a deeper understanding of what makes commons institutions work. It offers a systematic way to study knowledge commons, borrowing and building on Elinor Ostrom’s Nobel Prize-winning research on natural resource commons. It …
Surveillance At The Source, David Thaw
Surveillance At The Source, David Thaw
Articles
Contemporary discussion concerning surveillance focuses predominantly on government activity. These discussions are important for a variety of reasons, but generally ignore a critical aspect of the surveillance-harm calculus – the source from which government entities derive the information they use. The source of surveillance data is the information "gathering" activity itself, which is where harms like "chilling" of speech and behavior begin.
Unlike the days where satellite imaging, communications intercepts, and other forms of information gathering were limited to advanced law enforcement, military, and intelligence activities, private corporations now play a dominant role in the collection of information about individuals' …
Enlightened Regulatory Capture, David Thaw
Enlightened Regulatory Capture, David Thaw
Articles
Regulatory capture generally evokes negative images of private interests exerting excessive influence on government action to advance their own agendas at the expense of the public interest. There are some cases, however, where this conventional wisdom is exactly backwards. This Article explores the first verifiable case, taken from healthcare cybersecurity, where regulatory capture enabled regulators to harness private expertise to advance exclusively public goals. Comparing this example to other attempts at harnessing industry expertise reveals a set of characteristics under which regulatory capture can be used in the public interest. These include: 1) legislatively-mandated adoption of recommendations by an advisory …
Biodiversity Heritage Library, Smithsonian Institution Libraries, Deanna Marcum
Biodiversity Heritage Library, Smithsonian Institution Libraries, Deanna Marcum
Copyright, Fair Use, Scholarly Communication, etc.
The Biodiversity Heritage Library (BHL), created in 2006, is the result of a collaboration of ten natural history museum and botanical garden libraries seeking to digitize core taxonomic literature and to make it free and openly available throughout the world. Today, the BHL includes fifteen member institutions whose efforts have shaped a collection of over 60,000 titles. It is supported through a combination of membership dues, in-kind support from member institutions, contributions from the user community, and direct support from the Smithsonian Institution Libraries, and it reaches tens of thousands of users each year. While managing the complex partnership has …