Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Internet Law

2022

Institution
Keyword
Publication

Articles 1 - 30 of 57

Full-Text Articles in Law

Algorithmic Management And Collective Bargaining, Valerio De Stefano, Simon Taes Dec 2022

Algorithmic Management And Collective Bargaining, Valerio De Stefano, Simon Taes

Articles & Book Chapters

This article addresses the challenges raised by the introduction of algorithmic management and artificial intelligence in the world of work, focusing on the risks that new managerial technologies present for fundamental rights and principles, such as non-discrimination, freedom of association and the right to privacy. The article argues that collective bargaining is the most suitable regulatory instrument for responding to these challenges, and that current EU legislative initiatives do not adequately recognise the role of collective bargaining in this area. It also maps current initiatives undertaken by national trade union movements in Europe to govern algorithmic management.


Insurance And Enterprise: Cyber Insurance For Ransomware, Tom Baker, Anja Shortland Dec 2022

Insurance And Enterprise: Cyber Insurance For Ransomware, Tom Baker, Anja Shortland

All Faculty Scholarship

Selling insurance gives insurers an incentive to manage insured risks. The “insurance as governance” literature demonstrates that insurers often make insurance conditional on ex ante risk reduction or mitigation. But insurance governs in support of enterprise, not security for its own sake. Tight underwriting inhibits enterprise – not only for insured businesses but also the business of insurance. This paper highlights ex post loss reduction as a form of insurance-based governance. Drawing on interviews with industry insiders, we explore how insurers addressed the evolving problems of moral hazard, uncertainty, and correlated losses since the 1990s. We find that cyber insurance …


Brief For Petitioners, Gonzalez V. Google, 143 S.Ct. 1191 (2023) (No. 21-1333), Eric Schnapper, Robert J. Tolchin, Keith L. Altman Nov 2022

Brief For Petitioners, Gonzalez V. Google, 143 S.Ct. 1191 (2023) (No. 21-1333), Eric Schnapper, Robert J. Tolchin, Keith L. Altman

Court Briefs

QUESTION PRESENTED: Section 203(c)(1) of the Communications Decency Act immunizes an “interactive computer service” (such as YouTube, Google, Facebook and Twitter) for “publish[ ing] ... information provided by another” “information content provider” (such as someone who posts a video on YouTube or a statement on Facebook). This is the most recent of three court of appeals’ decisions regarding whether section 230(c)(1) immunizes an interactive computer service when it makes targeted recommendations of information provided by such another party. Five courts of appeals judges have concluded that section 230(c)(1) creates such immunity. Three court of appeals judges have rejected such immunity. …


Comments Of The Cordell Institute For Policy In Medicine & Law At Washington University In St. Louis, Neil Richards, Woodrow Hartzog, Jordan Francis Nov 2022

Comments Of The Cordell Institute For Policy In Medicine & Law At Washington University In St. Louis, Neil Richards, Woodrow Hartzog, Jordan Francis

Faculty Scholarship

The Federal Trade Commission—with its broad, independent grant of authority and statutory mandate to identify and prevent unfair and deceptive trade practices—is uniquely situated to prevent and remedy unfair and deceptive data privacy and data security practices. In an increasingly digitized world, data collection, processing, and transfer have become integral to market interactions. Our personal and commercial experiences are now mediated by powerful, information-intensive firms who hold the power to shape what consumers see, how they interact, which options are available to them, and how they make decisions. That power imbalance exposes consumers and leaves them all vulnerable. We all …


The Government Behind Insurance Governance: Lessons For Ransomware, Tom Baker, Anja Shortland Nov 2022

The Government Behind Insurance Governance: Lessons For Ransomware, Tom Baker, Anja Shortland

All Faculty Scholarship

The insurance as governance literature focuses on the ability of private enterprises to collectively regulate, pool, and distribute risks. This paper analyzes how governments support insurance markets to maintain insurability and limit risks to society. We propose a new conceptual framework grouping government interventions into three dimensions: regulation of risky activity, public investment in risk reduction, and co-insurance. We apply this framework to six case studies, describing insurance markets’ reliance on public support in more analytically precise terms. We analyze how mature insurance markets overcame insurability challenges akin to those currently presented by extortive cybercrime. Private governance struggled when markets …


Algorithmic Governance From The Bottom Up, Hannah Bloch-Wehba Nov 2022

Algorithmic Governance From The Bottom Up, Hannah Bloch-Wehba

Faculty Scholarship

Artificial intelligence and machine learning are both a blessing and a curse for governance. In theory, algorithmic governance makes government more efficient, more accurate, and more fair. But the emergence of automation in governance also rests on public-private collaborations that expand both public and private power, aggravate transparency and accountability gaps, and create significant obstacles for those seeking algorithmic justice. In response, a nascent body of law proposes technocratic policy changes to foster algorithmic accountability, ethics, and transparency.

This Article examines an alternative vision of algorithmic governance, one advanced primarily by social and labor movements instead of technocrats and firms. …


Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer Oct 2022

Social Media Harms And The Common Law, Leslie Y. Garfield Tenzer

Elisabeth Haub School of Law Faculty Publications

This article finds fault with the judiciaries' failure to create a set of common law norms for social media wrongs. In cases concerning social media harms, the Supreme Court and lower courts have consistently adhered to traditional pre-social media principles, failing to use the power of the common law to create a kind of Internet Justice.

Part I of this article reviews social media history and explores how judicial decisions created a fertile bed for social media harm to blossom. Part II illustrates social media harms across several doctrinal disciplines and highlights judicial reluctance to embrace the realities of social …


Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius Oct 2022

Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius

Homeland Security Publications

No abstract provided.


Content Moderation As Surveillance, Hannah Bloch-Wehba Oct 2022

Content Moderation As Surveillance, Hannah Bloch-Wehba

Faculty Scholarship

Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …


The Law And Politics Of Ransomware, Asaf Lubin Oct 2022

The Law And Politics Of Ransomware, Asaf Lubin

Articles by Maurer Faculty

What do Lady Gaga, the Royal Zoological Society of Scotland, the city of Valdez in Alaska, and the court system of the Brazilian state of Rio Grande do Sul all have in common? They have all been victims of ransomware attacks, which are growing both in number and severity. In 2016, hackers perpetrated roughly four thousand ransomware attacks a day worldwide, a figure which was already alarming. By 2020, however, ransomware attacks reached a staggering number, between 20,000 and 30,000 per day in the United States alone. That is a ransomware attack every eleven seconds, each of which cost victims …


Brief In Opposition, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Daniel W. Weininger Aug 2022

Brief In Opposition, Twitter, Inc. V. Taamneh, 143 S.Ct. 1206 (2023) (No. 21.1496), Eric Schnapper, Keith L. Altman, Daniel W. Weininger

Court Briefs

No abstract provided.


Blockchain Land Transfers: Technology, Promises, And Perils, Vincent Ooi, Kian Peng Soh, Jerrold Soh Jul 2022

Blockchain Land Transfers: Technology, Promises, And Perils, Vincent Ooi, Kian Peng Soh, Jerrold Soh

Research Collection Yong Pung How School Of Law

The blockchain’s apparent immutability has attracted significant interest on whether it may be relied on for registering and transferring land. Proponents of blockchain-based land systems point toward data security, automated transacting, and improved accessibility as key benefits; critics raise concerns over structural vulnerabilities, such as majority attacks, and inconsistencies with existing legal frameworks. The literature, however, tends to conceptualise blockchain as one monolithic data structure invariably built on the same mechanisms powering Bitcoin. This paper seeks to situate the debate on a closer understanding of the range of blockchain implementations possible. To this end, we provide a detailed technological survey …


Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg Jul 2022

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg

Articles

The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …


Race And Regulation Podcast Episode 5 - Racial Equity And Data Privacy, Anita L. Allen Jun 2022

Race And Regulation Podcast Episode 5 - Racial Equity And Data Privacy, Anita L. Allen

Penn Program on Regulation Podcasts

In this episode, Anita Allen, an internationally renowned expert on the philosophical dimensions of privacy and data protection law, reveals how race-neutral privacy laws in the U.S. have failed to address the unequal burdens faced online by Black Americans, whose personal data are used in racially discriminatory ways. Professor Allen articulates what she terms an African American Online Equity Agenda to guide the development of race-conscious privacy regulations that can better promote racial justice in the modern digital economy.


Submission Of The Citizen Lab (Munk School Of Global Affairs, University Of Toronto) To The United Nations Working Group On Enforced Or Involuntary Disappearances, Siena Anstis, Ronald J. Deibert, Émilie Laflèche, Jonathon W. Penney Jun 2022

Submission Of The Citizen Lab (Munk School Of Global Affairs, University Of Toronto) To The United Nations Working Group On Enforced Or Involuntary Disappearances, Siena Anstis, Ronald J. Deibert, Émilie Laflèche, Jonathon W. Penney

Commissioned Reports, Studies and Public Policy Documents

No abstract provided.


Municipal Fiber In The United States: A Financial Assessment, Christopher S. Yoo, Jesse Lambert, Timothy P. Pfenninger Jun 2022

Municipal Fiber In The United States: A Financial Assessment, Christopher S. Yoo, Jesse Lambert, Timothy P. Pfenninger

All Faculty Scholarship

Despite growing interest in broadband provided by municipally owned and operated fiber-to-the-home networks, the academic literature has yet to undertake a systematic assessment of these projects’ financial performance. To fill this gap, we utilize municipalities’ official reports to offer an empirical evaluation of the financial performance of every municipal fiber project in the U.S. operating in 2010 through 2019. An analysis of the actual performance of the resulting fifteen-project panel dataset reveals that none of the projects generated sufficient nominal cash flow in the short run to maintain solvency without infusions of additional cash from outside sources or debt relief. …


Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur Jun 2022

Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur

Publications and Research

What if people had the ability to assert their own legally binding permissions for data collection, use, sharing, and retention by the technologies they use? The IEEE P7012 has been working on an interoperability specification for machine-readable personal privacy terms to support this ability since 2018. The premise behind the work of IEEE P7012 is that people need technology that works on their behalf—i.e. software agents that assert the individual’s permissions and preferences in a machine-readable format.

Thanks to a grant from the IEEE Technical Activities Board Committee on Standards (TAB CoS), we were able to explore the attitudes of …


Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss Jun 2022

Government By Code? Blockchain Applications To Public Sector Governance, Pedro Bustamante, Meina Cai, Marcela Gomez, Colin Harris, Prashabnt Krishnamurthy, Wilson Law, Michael J. Madison, Ilia Murtazashvili, Jennifer Brick Murtazashvili, Tymofiy Mylovanov, Nataliia Shapoval, Annette Vee, Martin B. H. Weiss

Articles

Studies of blockchain governance can be divided into analyses of the governance of blockchains (such as rules and power dynamics within a given network) and governance by blockchains (such as how blockchains can be implemented to improve self-governance of community-based peer production networks). Less emphasis has been placed on applications of distributed ledgers to public sector governance. Our review clarifies that the decentralization and distributive features that enable blockchains to link up loosely connected private organizations and public agencies to improve efficiency and transparency of government transactions. However, most blockchain applications lack clear advantages over the conventional digital recording of …


The Relational Robot: A Normative Lens For Ai Legal Neutrality — Commentary On Ryan Abbott, The Reasonable Robot, Carys Craig Jun 2022

The Relational Robot: A Normative Lens For Ai Legal Neutrality — Commentary On Ryan Abbott, The Reasonable Robot, Carys Craig

Articles & Book Chapters

Artificial Intelligence (AI), we are told, is poised to disrupt almost every facet of our lives and society. From industrial labor markets to daily commutes, and from policing tactics to personal assistants, AI brings with it the usual promise and perils of change. How that change will unfold, however, and whether it will ultimately bestow upon us more benefits than harms, remains to be determined. A significant factor in setting the course for AI’s inevitable integration into society will be the legal framework within which it is developed and operationalized. Who will AI displace? What will it replace? What improvements …


Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane S. Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence Apr 2022

Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane S. Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence

Articles & Book Chapters

This special issue of the Canadian Journal of Law and Technology focuses on the growing problem of technology-facilitated gender-based violence (TFGBV): an expansive, dynamic, and rapidly evolving phenomenon that Jane Bailey and Carissima Mathen have defined as “a spectrum of behaviours carried out at least in some part through digital communications technologies, including actions that cause physical or psychological harm.” The collection of articles in this issue offers multi-disciplinary insights on TFGBV by bringing together the work of emerging scholars in information and media studies, communications, and law. This approach reflects our firm belief that in order to be meaningful …


Rules Of Engagement: Copyright And Automated Gatekeepers' Influence On Creative Expression, Michael W. Carroll Apr 2022

Rules Of Engagement: Copyright And Automated Gatekeepers' Influence On Creative Expression, Michael W. Carroll

Articles in Law Reviews & Other Academic Journals

This Essay turns questions about artificial intelligence and copyright law around. Rather than focus on algorithms as potential authors, this Essay argues for more attention to the role of algorithms as gatekeepers on social media and how creators adapt their creative choices to meet the demands of these automated tastemakers. Using TikTok’s “For You” algorithm and its role in breaking Lil Nas X’s hit song “Old Town Road” as a case study, this Essay poses the question whether algorithmic gatekeeping is simply a difference in degree or a difference in kind from an artist’s perspective. While tentative, this Essay concludes …


Petition For A Writ Of Certiorari, Gonzalez V. Google, 143 S.Ct. 1191 (2023) (No. 21-1333), Eric Schnapper, Robert J. Tolchin, Keith L. Altman, Daniel Weininger Apr 2022

Petition For A Writ Of Certiorari, Gonzalez V. Google, 143 S.Ct. 1191 (2023) (No. 21-1333), Eric Schnapper, Robert J. Tolchin, Keith L. Altman, Daniel Weininger

Court Briefs

QUESTION PRESENTED: Section 203(c)(1) of the Communications Decency Act immunizes an “interactive computer service” (such as YouTube, Google, Facebook and Twitter) for “publish[ ing] ... information provided by another” “information content provider” (such as someone who posts a video on YouTube or a statement on Facebook). This is the most recent of three court of appeals’ decisions regarding whether section 230(c)(1) immunizes an interactive computer service when it makes targeted recommendations of information provided by such another party. Five courts of appeals judges have concluded that section 230(c)(1) creates such immunity. Three court of appeals judges have rejected such immunity. …


Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara Apr 2022

Free Speech On Social Media: Unrestricted Or Regulated?, Alessandra Garcia Guevara

Student Writing

Social media has evolved into an essential mode of communication in recent years, allowing people to express their thoughts with the audience of their choice by sending private messages, posting their thoughts, or sharing their opinions. Such audiences can come from all over the world because this online technology breaks down geographic, linguistic, and cultural barriers. As a result, social media has evolved into a powerful tool for self-expression, allowing anyone with an Internet connection to participate in global debates. However, its misuse has had disastrous consequences in the real world, such as the attack on the Capitol that occurred …


Understanding Chilling Effects, Jonathon W. Penney Apr 2022

Understanding Chilling Effects, Jonathon W. Penney

Articles & Book Chapters

With digital surveillance and censorship on the rise, the amount of data available unprecedented, and corporate and governmental actors increasingly employing emerging technologies like artificial intelligence and facial recognition technology for surveillance and data analytics, concerns about “chilling effects,” that is, the capacity for these activities to “chill” or deter people from exercising their rights and freedoms, have taken on greater urgency and importance. Yet, there remains a clear dearth in systematic theoretical and empirical work points. This has left significant gaps in understanding. This Article has attempted to fill that void, synthesizing theoretical and empirical insights from law, privacy, …


The Political Dynamics Of Legislative Reform: Potential Drivers Of The Next Communications Statute, Christopher S. Yoo, Tiffany Keung Mar 2022

The Political Dynamics Of Legislative Reform: Potential Drivers Of The Next Communications Statute, Christopher S. Yoo, Tiffany Keung

All Faculty Scholarship

Although most studies of major communications reform legislation focus on the merits of their substantive provisions, analyzing the political dynamics that led to the enactment of such legislation can yield important insights. An examination of the tradeoffs that led the major industry segments to support the Telecommunications Act of 1996 provides a useful illustration of the political bargain that it embodies. Application of a similar analysis to the current context identifies seven components that could form the basis for the next communications statute: universal service, pole attachments, privacy, intermediary immunity, net neutrality, spectrum policy, and antitrust reform. Determining how these …


Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier Mar 2022

Platforms, Encryption, And The Cfaa: The Case Of Whatsapp V Nso Group, Jonathon W. Penney, Bruce Schneier

Articles & Book Chapters

End-to-end encryption technology has gone mainstream. But this wider use has led hackers, cybercriminals, foreign governments, and other threat actors to employ creative and novel attacks to compromise or workaround these protections, raising important questions as to how the Computer Fraud and Abuse Act (CFAA), the primary federal anti-hacking statute, is best applied to these new encryption implementations. Now, after the Supreme Court recently narrowed the CFAA’s scope in Van Buren and suggested it favors a code-based approach to liability under the statute, understanding how best to theorize sophisticated code-based access barriers like end-to-end encryption, and their circumvention, is now …


Ai And Digital Tools In Workplace Management And Evaluation: An Assessment Of The Eu's Legal Framework, Valerio De Stefano, Mathias Wouters Mar 2022

Ai And Digital Tools In Workplace Management And Evaluation: An Assessment Of The Eu's Legal Framework, Valerio De Stefano, Mathias Wouters

Commissioned Reports, Studies and Public Policy Documents

This study focuses on options for regulating the use of AI enabled and algorithmic management systems in the world of work under EU law. The first part describes how these technologies are already being deployed, particularly in recruitment, staff appraisal, task distribution and disciplinary procedures. It discusses some near-term potential development prospects and presents an impact assessment, highlighting some of these technologies' most significant implications.

The second part addresses the regulatory field. It examines the different EU regulations and directives that are already relevant to regulating the use of AI in employment. Subsequently, it analyses the potential labour and employment …


Nft: The Next Big Thing?, Golden Gate University School Of Law Feb 2022

Nft: The Next Big Thing?, Golden Gate University School Of Law

GGU Law Review Blog

In 2021, Non-Fungible Tokens (“NFTs”) have taken the world of digital art to new heights. Artists are beginning to “tokenize” their art and sell them in NFT marketplaces for highly lucrative prices where bids can be made only with cryptocurrency. The “hype” surrounding NFTs grows by the day, thousands of new NFTs are being “minted” everyday. Even celebrities are getting involved in this digital movement. It seems however, that we have seen only the infancy of the blockchain based technology and that it may soon venture off beyond the world of digital art. For those in the legal profession, it …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel Feb 2022

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen Feb 2022

Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen

All Faculty Scholarship

African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …