Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Internet (33)
- Privacy (29)
- SSRN (15)
- Technology (12)
- Copyright (10)
-
- First Amendment (10)
- Data (9)
- Artificial intelligence (8)
- Cyberlaw (8)
- Section 230 (7)
- Surveillance (7)
- Telecommunications (7)
- Information privacy (6)
- Regulation (6)
- Cybersecurity (5)
- Cyberspace (5)
- Discrimination (5)
- Free expression (5)
- Free speech (5)
- Internet law (5)
- Law (5)
- Network neutrality (5)
- Social media (5)
- Automation (4)
- Broadband (4)
- Copyright law (4)
- Data mining (4)
- Google (4)
- Intellectual property (4)
- Torts (4)
- Publication Year
Articles 1 - 30 of 237
Full-Text Articles in Law
Mass E-Carceration: Electronic Monitoring As A Bail Condition, Sara Zampierin
Mass E-Carceration: Electronic Monitoring As A Bail Condition, Sara Zampierin
Faculty Scholarship
Over the past decade, the immigration and criminal legal systems have increasingly relied on electronic monitoring as a bail condition; hundreds of thousands of people live under this monitoring on any given day. Decisionmakers purport to impose these conditions to release more individuals from detention and to maintain control over individuals they perceive to pose some risk of flight or to public safety. But the data do not show that electronic monitoring successfully mitigates these risks or that it leads to fewer individuals in detention. Electronic monitoring also comes with severe restrictions on individual liberty and leads to harmful effects …
The Failure Of Market Efficiency, William Magnuson
The Failure Of Market Efficiency, William Magnuson
Faculty Scholarship
Recent years have witnessed the near total triumph of market efficiency as a regulatory goal. Policymakers regularly proclaim their devotion to ensuring efficient capital markets. Courts use market efficiency as a guiding light for crafting legal doctrine. And scholars have explored in great depth the mechanisms of market efficiency and the role of law in promoting it. There is strong evidence that, at least on some metrics, our capital markets are indeed more efficient than they have ever been. But the pursuit of efficiency has come at a cost. By focusing our attention narrowly on economic efficiency concerns—such as competition, …
Data Property, Christina Mulligan, James Grimmelmann
Data Property, Christina Mulligan, James Grimmelmann
Faculty Scholarship
No abstract provided.
The New Pornography Wars, Julie A. Dahlstrom
The New Pornography Wars, Julie A. Dahlstrom
Faculty Scholarship
The world’s largest online pornography conglomerate, MindGeek, has come under fire for the publishing of “rape videos,” child pornography, and nonconsensual pornography on its website, Pornhub. As in the “pornography wars” of the 1970s and 1980s, lawyers and activists have now turned to civil remedies and filed creative anti-trafficking lawsuits against MindGeek and third parties, like payment processing company, Visa. These lawsuits seek not only to achieve legal accountability for online sex trafficking but also to reframe a broader array of online harms as sex trafficking.
This Article explores what these new trafficking lawsuits mean for the future regulation of …
Comments Of The Cordell Institute For Policy In Medicine & Law At Washington University In St. Louis, Neil Richards, Woodrow Hartzog, Jordan Francis
Comments Of The Cordell Institute For Policy In Medicine & Law At Washington University In St. Louis, Neil Richards, Woodrow Hartzog, Jordan Francis
Faculty Scholarship
The Federal Trade Commission—with its broad, independent grant of authority and statutory mandate to identify and prevent unfair and deceptive trade practices—is uniquely situated to prevent and remedy unfair and deceptive data privacy and data security practices. In an increasingly digitized world, data collection, processing, and transfer have become integral to market interactions. Our personal and commercial experiences are now mediated by powerful, information-intensive firms who hold the power to shape what consumers see, how they interact, which options are available to them, and how they make decisions. That power imbalance exposes consumers and leaves them all vulnerable. We all …
Algorithmic Governance From The Bottom Up, Hannah Bloch-Wehba
Algorithmic Governance From The Bottom Up, Hannah Bloch-Wehba
Faculty Scholarship
Artificial intelligence and machine learning are both a blessing and a curse for governance. In theory, algorithmic governance makes government more efficient, more accurate, and more fair. But the emergence of automation in governance also rests on public-private collaborations that expand both public and private power, aggravate transparency and accountability gaps, and create significant obstacles for those seeking algorithmic justice. In response, a nascent body of law proposes technocratic policy changes to foster algorithmic accountability, ethics, and transparency.
This Article examines an alternative vision of algorithmic governance, one advanced primarily by social and labor movements instead of technocrats and firms. …
Content Moderation As Surveillance, Hannah Bloch-Wehba
Content Moderation As Surveillance, Hannah Bloch-Wehba
Faculty Scholarship
Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …
New Media Rights' Internet & Media Law Clinic: California Western School Of Law, Art Neill
New Media Rights' Internet & Media Law Clinic: California Western School Of Law, Art Neill
Faculty Scholarship
This article looks at the critical need for legal services addressing new media rights and the types of cases that benefit from the New Media Rights’ Internet & Media Law Clinic at California Western School of Law (New Media Rights) in San Diego.
This article will discuss New Media Rights in four parts: 1. Why do we have IP, arts, and technology clinics like New Media Rights? 2. What is New Media Rights, and how do we benefit the students and the community? 3. What is the structure and pedagogy of the clinic? 4. What are our hopes looking forward?
Ships Passing In The Night: The Communications Act And The Convergence On Broadband, Stuart Minor Benjamin
Ships Passing In The Night: The Communications Act And The Convergence On Broadband, Stuart Minor Benjamin
Faculty Scholarship
The Communications Act of 1934 and its amendments (the “Act”), and the regulations implementing them, have been enormously important to traditional telephony, broadcasting, and multichannel video. Meanwhile, the internet is barely mentioned in the Act. It thus might seem reasonable to conclude that the Act stands as a colossus and that the argument for overhauling it has grown much stronger as the Telecommunications Act of 1996 (the “1996 Act”) becomes ever more outdated. In this Article I suggest otherwise. Specifically, I make three claims—one descriptive, one a bit speculative, and one normative. The descriptive claim is that significant portions of …
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Legislating Data Loyalty, Woodrow Hartzog, Neil Richards
Faculty Scholarship
Lawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.
In this short Essay, we propose a model for legislating data loyalty. Our …
Securities Law: Overview And Contemporary Issues, Neal Newman, Lawrence J. Trautman
Securities Law: Overview And Contemporary Issues, Neal Newman, Lawrence J. Trautman
Faculty Scholarship
This is not your grandfather’s SEC anymore. Rapid technological change has resulted in novel regulatory issues and challenges, as law and policy struggles to keep pace. The U.S. Securities and Exchange Commission (SEC) reports that “the U.S. capital markets are the deepest, most dynamic, and most liquid in the world. They also have evolved to become increasingly fast and extraordinarily complex. It is our job to be responsive and innovative in the face of significant market developments and trends.” With global markets increasingly interdependent and interconnected and, “as technological advancements and commercial developments have changed how our securities markets operate, …
Data Autonomy, Cesare Fracassi, William Magnuson
Data Autonomy, Cesare Fracassi, William Magnuson
Faculty Scholarship
In recent years, “data privacy” has vaulted to the forefront of public attention. Scholars, policymakers, and the media have, nearly in unison, decried the lack of data privacy in the modern world. In response, they have put forth various proposals to remedy the situation, from the imposition of fiduciary obligations on technology platforms to the creation of rights to be forgotten for individuals. All these proposals, however, share one essential assumption: we must raise greater protective barriers around data. As a scholar of corporate finance and a scholar of corporate law, respectively, we find this assumption problematic. Data, after all, …
A Unified Theory Of Data, William Magnuson
A Unified Theory Of Data, William Magnuson
Faculty Scholarship
How does the proliferation of data in our modern economy affect our legal system? Scholars that have addressed the question have nearly universally agreed that the dramatic increases in the amount of data available to companies, as well as the new uses to which that data is being put, raise fundamental problems for our regulatory structures. But just what those problems might be remains an area of deep disagreement. Some argue that the problem with data is that current uses lead to discriminatory results that harm minority groups. Some argue that the problem with data is that it impinges on …
Three Deft Kicks To The Problem Of Cyberbullying, Anita Bernstein
Three Deft Kicks To The Problem Of Cyberbullying, Anita Bernstein
Faculty Scholarship
No abstract provided.
Beyond Transparency And Accountability: Three Additional Features Algorithm Designers Should Build Into Intelligent Platforms, Peter K. Yu
Faculty Scholarship
In the age of artificial intelligence, innovative businesses are eager to deploy intelligent platforms to detect and recognize patterns, predict customer choices and shape user preferences. Yet such deployment has brought along the widely documented problems of automated systems, including coding errors, corrupt data, algorithmic biases, accountability deficits and dehumanizing tendencies. In response to these problems, policymakers, commentators and consumer advocates have increasingly called on businesses seeking to ride the artificial intelligence wave to build transparency and accountability into algorithmic designs.
While acknowledging these calls for action and appreciating the benefits and urgency of building transparency and accountability into algorithmic …
Algorithms In Business, Merchant-Consumer Interactions, & Regulation, Tabrez Y. Ebrahim
Algorithms In Business, Merchant-Consumer Interactions, & Regulation, Tabrez Y. Ebrahim
Faculty Scholarship
The shift towards the use of algorithms in business has transformed merchant–consumer interactions. Products and services are increasingly tailored for consumers through algorithms that collect and analyze vast amounts of data from interconnected devices, digital platforms, and social networks. While traditionally merchants and marketeers have utilized market segmentation, customer demographic profiles, and statistical approaches, the exponential increase in consumer data and computing power enables them to develop and implement algorithmic techniques that change consumer markets and society as a whole. Algorithms enable targeting of consumers more effectively, in real-time, and with high predictive accuracy in pricing and profiling strategies. In …
Beyond Algorithms: Toward A Normative Theory Of Automated Regulation, Felix Mormann
Beyond Algorithms: Toward A Normative Theory Of Automated Regulation, Felix Mormann
Faculty Scholarship
The proliferation of artificial intelligence in our daily lives has spawned a burgeoning literature on the dawn of dehumanized, algorithmic governance. Remarkably, the scholarly discourse overwhelmingly fails to acknowledge that automated, non-human governance has long been a reality. For more than a century, policymakers have relied on regulations that automatically adjust to changing circumstances, without the need for human intervention. This article surveys the track record of self-adjusting governance mechanisms to propose a normative theory of automated regulation.
Effective policymaking frequently requires anticipation of future developments, from technology innovation to geopolitical change. Self-adjusting regulation offers an insurance policy against the …
The Easterbrook Theorem: An Application To Digital Markets, Joshua D. Wright, Murat C. Mungan
The Easterbrook Theorem: An Application To Digital Markets, Joshua D. Wright, Murat C. Mungan
Faculty Scholarship
The rise of large firms in the digital economy, including Amazon, Apple, Facebook, and Google, has rekindled the debate about monopolization law. There are proposals to make finding liability easier against alleged digital monopolists by relaxing substantive standards; to flip burdens of proof; and to overturn broad swaths of existing Supreme Court precedent, and even to condemn a law review article. Frank Easterbrook’s seminal 1984 article, The Limits of Antitrust, theorizes that Type I error costs are greater than Type II error costs in the antitrust context, a proposition that has been woven deeply into antitrust law by the Supreme …
Conundra Of The Berne Convention Concept Of The Country Of Origin, Jane C. Ginsburg
Conundra Of The Berne Convention Concept Of The Country Of Origin, Jane C. Ginsburg
Faculty Scholarship
This essay explores one of the most important, but occasionally intractable, issues under the Berne Convention, the concept of Country of Origin. Article 5(4) of that treaty defines a work’s country of origin, but leaves out several situations, leaving those who interpret and apply the treaty without guidance in ascertaining the country of origin. I will call those situations the “Conundra of the country of origin,” and will explore two of them here. First, what is the country of origin of an unpublished work whose authors are nationals of different countries? Second, what is the country of origin of a …
Artificial Financial Intelligence, William Magnuson
Artificial Financial Intelligence, William Magnuson
Faculty Scholarship
Recent advances in the field of artificial intelligence have revived long-standing debates about what happens when robots become smarter than humans. Will they destroy us? Will they put us all out of work? Will they lead to a world of techno-savvy haves and techno-ignorant have-nots? These debates have found particular resonance in finance, where computers already play a dominant role. High-frequency traders, quant hedge funds, and robo-advisors all represent, to a greater or lesser degree, real-world instantiations of the impact that artificial intelligence is having on the field. This Article will argue that the primary danger of artificial intelligence in …
A Third-Party Doctrine For Digital Metadata, H. Brian Holland
A Third-Party Doctrine For Digital Metadata, H. Brian Holland
Faculty Scholarship
For more than four decades, the third-party doctrine was understood as a bright-line, categorical rule: there is no legitimate privacy interest in any data that is voluntarily disclosed or conveyed to a third party. But this simple rule has dramatic effects in a world of ubiquitous networked computing, mobile technologies, and the commodification of information. The digital devices that facilitate our daily participation in modern society are connected through automated infrastructures that are designed to generate vast quantities of data, nearly all of which is captured, utilized, and stored by third-party service providers. Under a plain reading of the third-party …
Access To Algorithms, Hannah Bloch-Wehba
Access To Algorithms, Hannah Bloch-Wehba
Faculty Scholarship
Federal, state, and local governments increasingly depend on automated systems — often procured from the private sector — to make key decisions about civil rights and civil liberties. When individuals affected by these decisions seek access to information about the algorithmic methodologies that produced them, governments frequently assert that this information is proprietary and cannot be disclosed.
Recognizing that opaque algorithmic governance poses a threat to civil rights and liberties, scholars have called for a renewed focus on transparency and accountability for automated decision making. But scholars have neglected a critical avenue for promoting public accountability and transparency for automated …
Can Algorithms Promote Fair Use?, Peter K. Yu
Can Algorithms Promote Fair Use?, Peter K. Yu
Faculty Scholarship
In the past few years, advances in big data, machine learning and artificial intelligence have generated many questions in the intellectual property field. One question that has attracted growing attention concerns whether algorithms can be better deployed to promote fair use in copyright law. The debate on the feasibility of developing automated fair use systems is not new; it can be traced back to more than a decade ago. Nevertheless, recent technological advances have invited policymakers and commentators to revisit this earlier debate.
As part of the Symposium on "Intelligent Entertainment: Algorithmic Generation and Regulation of Creative Works," this Article …
Automation In Moderation, Hannah Bloch-Wehba
Automation In Moderation, Hannah Bloch-Wehba
Faculty Scholarship
This Article assesses recent efforts to encourage online platforms to use automated means to prevent the dissemination of unlawful online content before it is ever seen or distributed. As lawmakers in Europe and around the world closely scrutinize platforms’ “content moderation” practices, automation and artificial intelligence appear increasingly attractive options for ridding the Internet of many kinds of harmful online content, including defamation, copyright infringement, and terrorist speech. Proponents of these initiatives suggest that requiring platforms to screen user content using automation will promote healthier online discourse and will aid efforts to limit Big Tech’s power.
In fact, however, the …
Transparency After Carpenter, Hannah Bloch-Wehba
Transparency After Carpenter, Hannah Bloch-Wehba
Faculty Scholarship
This brief invited response to Professor Matthew Tokson’s Foulston-Siefkin lecture on the Supreme Court's decision in Carpenter v. United States makes two contributions. First, I highlight the social, political, and economic factors at play in the Carpenter decision. The Carpenter Court recognized, in particular, that digital surveillance implicates the rights of more than just criminal suspects: it poses unique and unappreciated threats to public governance of policing. The decision, I argue, reflects longstanding preoccupations in Fourth Amendment decisions with protecting the “public” — particularly innocent third parties — from intrusive and baseless investigations. In so doing, I situate Professor Tokson’s …
National Cybersecurity Innovation, Tabrez Y. Ebrahim
National Cybersecurity Innovation, Tabrez Y. Ebrahim
Faculty Scholarship
National cybersecurity plays a crucial role in protecting our critical infrastructure, such as telecommunication networks, the electricity grid, and even financial transactions. Most discussions about promoting national cybersecurity focus on governance structures, international relations, and political science. In contrast, this Article proposes a different agenda and one that promotes the use of innovation mechanisms for technological advancement. By promoting inducements for technological developments, such innovation mechanisms encourage the advancement of national cybersecurity solutions. In exploring possible solutions, this Article asks whether the government or markets can provide national cybersecurity innovation. This inquiry is a fragment of a much larger literature …
Nascent Competitors, C. Scott Hemphill, Tim Wu
Nascent Competitors, C. Scott Hemphill, Tim Wu
Faculty Scholarship
A nascent competitor is a firm whose prospective innovation represents a serious threat to an incumbent. Protecting such competition is a critical mission for antitrust law, given the outsized role of unproven outsiders as innovators and the uniquely potent threat they often pose to powerful entrenched firms. In this Article, we identify nascent competition as a distinct analytical category and outline a program of antitrust enforcement to protect it. We make the case for enforcement even where the ultimate competitive significance of the target is uncertain, and explain why a contrary view is mistaken as a matter of policy and …
Cyberattacks And The Constitution, Matthew C. Waxman
Cyberattacks And The Constitution, Matthew C. Waxman
Faculty Scholarship
Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.
A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg
A United States Perspective On Digital Single Market Directive Art. 17, Jane C. Ginsburg
Faculty Scholarship
To a US appraiser, article 17 of the Digital Single Market Directive suggests the EU has learned from American mistakes (and from its own) in the allocation of internet intermediaries’ liability for hosting and communicating user-posted content. Before the DSM Directive, art. 14 of the 2000 eCommerce Directive set out a notice-and-takedown system very similar to the regime provided in 17 U.S.C. section 512(c). Both regimes replaced the normal copyright default, which requires authorization to exploit works, with a limitation on the liability of service providers who complied with statutory prerequisites. Because the limitation ensured that service providers would not …
The Promise And Limits Of Cyber Power In International Law: Remarks, Monica Hakimi, Ann Väljataga, Zhixiong Huang, Charles Allen, Sue Robertson, Doug Wilson
The Promise And Limits Of Cyber Power In International Law: Remarks, Monica Hakimi, Ann Väljataga, Zhixiong Huang, Charles Allen, Sue Robertson, Doug Wilson
Faculty Scholarship
Hi, everyone. I am Monica Hakimi from the University of Michigan Law School, and I would like to welcome you to our panel on cyber power and its limits. The topic almost does not need an introduction. We all know just from reading the news that our collective dependence on cyberspace is also a huge vulnerability, and state and non-state actors exploit this vulnerability to do one another harm. They use cyber technologies not just to spy on one another, but also, for example, to interfere in national elections, to steal trade secrets or other valuable information, to disrupt the …