Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Science, Technology, Society, And Law, Paolo Davide Farah, Justo Corti Varela Jan 2023

Science, Technology, Society, And Law, Paolo Davide Farah, Justo Corti Varela

Book Chapters

Traditionally, science and technology have been granted as sources of knowledge and objective truth. However, much more recently, they are also seen as human activities, conducted in a social environment. This new approach focuses on the intersections between science, technology and society, and particularly their regulation by the law. Concerns on how to best regulate the interaction come up in modern societies, and when either their use or their impacts are global, international law and international organizations become involved. The impact of the fourfold relation is so high that science and technology are seen as one of the reasons for …


The Interlinkages Science-Technology-Law: Information And Communication Society, Knowledge-Based Economy And The Rule Of Law, Giovanni Bombelli, Paolo Davide Farah Jan 2023

The Interlinkages Science-Technology-Law: Information And Communication Society, Knowledge-Based Economy And The Rule Of Law, Giovanni Bombelli, Paolo Davide Farah

Book Chapters

This chapter focuses on the circular and complex relationship between science, technology, society, and law. The technology/society connection focuses on the democratic deficit issue. The democratic deficit would be a consequence of the lack of adaptability of western democracy to complex (information) societies, where technology (and the increasing access to data that it permits) is separating the connection between information and knowledge (as well as the classical legitimacy couple of democracy-truth) moving these societies towards a technocracy. On one hand, the technology-law circle deals with the progressive reduction of law to a normative technique (since the law is always late …


The Intersections Among Science, Technology, Policy And Law: In Between Truth And Justice, Paolo Davide Farah, Justo Corti Varela Jan 2023

The Intersections Among Science, Technology, Policy And Law: In Between Truth And Justice, Paolo Davide Farah, Justo Corti Varela

Book Chapters

Different visions on the interaction between science, technology, policy and law have been presented. As common axe, we can detect the continuous search for truth and justice. Science and Law as social constructs, the distinction between truths and opinions through procedural method based on evidence and rationality, or how natural science “things” became facts, and consequently “truth”, are examples of this search. The evidence-gathering process that integrates scientific evidence into trial (sometimes by procedure and other times by a more substantive approach) is another possible approach. Of course, that the game of mutual influence among the four elements creates contradictions …


User Guided Abductive Proof Generation For Answer Set Programming Queries, Avishkar Mahajan, Martin Strecker, Meng Weng (Huang Mingrong) Wong Sep 2022

User Guided Abductive Proof Generation For Answer Set Programming Queries, Avishkar Mahajan, Martin Strecker, Meng Weng (Huang Mingrong) Wong

Research Collection Yong Pung How School Of Law

We present a method for generating possible proofs of a query with respect to a given Answer Set Programming (ASP) rule set using an abductive process where the space of abducibles is automatically constructed just from the input rules alone. Given a (possibly empty) set of user provided facts, our method infers any additional facts that may be needed for the entailment of a query and then outputs these extra facts, without the user needing to explicitly specify the space of all abducibles. We also present a method to generate a set of directed edges corresponding to the justification graph …


The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen Sep 2021

The Promise And Limits Of Lawfulness: Inequality, Law, And The Techlash, Salomé Viljoen

Articles

In response to widespread skepticism about the recent rise of “tech ethics”, many critics have called for legal reform instead. In contrast with the “ethics response”, critics consider the “lawfulness response” more capable of disciplining the excesses of the technology industry. In fact, both are simultaneously vulnerable to industry capture and capable of advancing a more democratic egalitarian agenda for the information economy. Both ethics and law offer a terrain of contestation, rather than a predetermined set of commitments by which to achieve more democratic and egalitarian technological production. In advancing this argument, the essay focuses on two misunderstandings common …


Law's Halo And The Moral Machine, Bert I. Huang Jan 2019

Law's Halo And The Moral Machine, Bert I. Huang

Faculty Scholarship

How will we assess the morality of decisions made by artificial intelli­gence – and will our judgments be swayed by what the law says? Focusing on a moral dilemma in which a driverless car chooses to sacrifice its passenger to save more people, this study offers evidence that our moral intuitions can be influenced by the presence of the law.


Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond Jan 2018

Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond

All Faculty Scholarship

No abstract provided.


How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan Jan 2018

How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan

All Faculty Scholarship

A cost/benefit approach to privacy confronts two tradeoff issues. One is making appropriate tradeoffs between privacy and many goals served by the collection, distribution, and use of information. The other is making tradeoffs between investments in preventing unauthorized access to information and the variety of other goals that also make money, time, and effort demands. Much has been written about the first tradeoff. We focus on the second. The issue is critical. Data breaches occur at the rate of over three a day, and the aggregate social cost is extremely high. The puzzle is that security experts have long explained …


Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito Mar 2017

Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito

All Faculty Scholarship

No abstract provided.


I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone Jan 2014

I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone

Australian Security and Intelligence Conference

Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Critical Questions In Computational Models Of Legal Argument, Douglas Walton, Thomas F. Gordon Jan 2005

Critical Questions In Computational Models Of Legal Argument, Douglas Walton, Thomas F. Gordon

CRRAR Publications

Two recent computational models of legal argumentation, by Verheij and Gordon respectively, have interpreted critical questions as premises of arguments that can be defeated using Pollock’s concepts of undercutters and rebuttals. Using the scheme for arguments from expert opinion as an example, this paper evaluates and compares these two models of critical questions from the perspective of argumentation theory and competing legal theories about proof standardsfor defeating presumptions. The applicable proof standard is found to be a legal issue subject to argument. Verheij’smodel is shown to have problems because the proof stan-dards it applies to different kinds of premises are …