Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 24 of 24

Full-Text Articles in Law

Leveraging Technology To Promote Access To Justice, Amy Emerson Oct 2023

Leveraging Technology To Promote Access To Justice, Amy Emerson

Faculty Publications

No abstract provided.


Naïve Realism, Cognitive Bias, And The Benefits And Risks Of Ai, Harry Surden Jan 2023

Naïve Realism, Cognitive Bias, And The Benefits And Risks Of Ai, Harry Surden

Publications

In this short piece I comment on Orly Lobel's book on artificial intelligence (AI) and society "The Equality Machine." Here, I reflect on the complex topic of aI and its impact on society, and the importance of acknowledging both its positive and negative aspects. More broadly, I discuss the various cognitive biases, such as naïve realism, epistemic bubbles, negativity bias, extremity bias, and the availability heuristic, that influence individuals' perceptions of AI, often leading to polarized viewpoints. Technology can both exacerbate and ameliorate these biases, and I commend Lobel's balanced approach to AI analysis as an example to emulate.

Although …


Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart Feb 2021

Chinese Technology Platforms Operating In The United States: Assessing The Threat (Originally Published As A Joint Report Of The National Security, Technology, And Law Working Group At The Hoover Institution At Stanford University And The Tech, Law & Security Program At American University Washington College Of Law), Gary Corn, Jennifer Daskal, Jack Goldsmith, Chris Inglis, Paul Rosenzweig, Samm Sacks, Bruce Schneier, Alex Stamos, Vincent Stewart

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Conundra Of The Berne Convention Concept Of The Country Of Origin, Jane C. Ginsburg Jan 2021

Conundra Of The Berne Convention Concept Of The Country Of Origin, Jane C. Ginsburg

Faculty Scholarship

This essay explores one of the most important, but occasionally intractable, issues under the Berne Convention, the concept of Country of Origin. Article 5(4) of that treaty defines a work’s country of origin, but leaves out several situations, leaving those who interpret and apply the treaty without guidance in ascertaining the country of origin. I will call those situations the “Conundra of the country of origin,” and will explore two of them here. First, what is the country of origin of an unpublished work whose authors are nationals of different countries? Second, what is the country of origin of a …


Cyberattacks And The Constitution, Matthew C. Waxman Jan 2020

Cyberattacks And The Constitution, Matthew C. Waxman

Faculty Scholarship

Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.


Speech Across Borders, Jennifer Daskal Jan 2019

Speech Across Borders, Jennifer Daskal

Articles in Law Reviews & Other Academic Journals

As both governments and tech companies seek to regulate speech online, these efforts raise critical, and contested, questions about how far those regulations can and should extend. Is it enough to take down or delink material in a geographically segmented way? Or can and should tech companies be ordered to takedown or delink unsavory content across their entire platforms—no matter who is posting the material or where the unwanted content is viewed? How do we deal with conflicting speech norms across borders? And how do we protect against the most censor-prone nation effectively setting global speech rules? These questions were …


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


Planet Netsweeper, Jakub Dalek, Lex Gill, Bill Marczak, Sarah Mckune, Naser Noor, Joshua Oliver, Jonathon Penney, Adam Senft, Ronald Deibert Jan 2018

Planet Netsweeper, Jakub Dalek, Lex Gill, Bill Marczak, Sarah Mckune, Naser Noor, Joshua Oliver, Jonathon Penney, Adam Senft, Ronald Deibert

Reports & Public Policy Documents

Internet filtering technologies play a critical role in shaping access to information online. Whether we are connecting to the Internet from our homes, coffee shops, libraries, or places of work, software that inspects, manages, and/or blocks our communications has become commonplace. When used at the level of large, consumer-facing Internet Service Providers (ISPs), Internet filtering technologies can have significant human rights impacts. A growing number of governments employ Internet filtering systems at this scale in order to undertake national-level censorship of the Internet. Filtered content ranges from pornography, hate speech, and speech promoting or inciting violence, to political opposition websites, …


Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski Jan 2016

Making Civilian Drones Safe: Performance Standards, Self-Certification, And Post-Sale Data Collection, Henry Perritt, Albert Plawinski

All Faculty Scholarship

With millions of small drones in private hands, the FAA continues its struggle to develop an effective regulatory regime to comply with Congress’s mandate to integrate them into the national airspace system. Thousands of individuals and small businesses have obtained authorization from the FAA—"section 333 exemptions"—allowing them to fly their drones commercially. Farmers, TV stations, surveyors, construction-site supervisors, real estate agents, people selling their properties, and managers seeking cheaper and safer ways to inspect their facilities, want to hire the exemption holders, but many are holding back until the FAA clarifies the groundrules.The FAA understands that its traditional approach for …


Modularity Theory And Internet Regulation, Christopher S. Yoo Jan 2016

Modularity Theory And Internet Regulation, Christopher S. Yoo

All Faculty Scholarship

Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.

The literature on innovation indicates that modules should be determined by the nature of …


Leveraging Mining Demand For Internet And Telecommunications Infrastructure For Broad Economic Development: Models, Opportunities And Challenges, Perrine Toledano, Clara Roorda Jun 2014

Leveraging Mining Demand For Internet And Telecommunications Infrastructure For Broad Economic Development: Models, Opportunities And Challenges, Perrine Toledano, Clara Roorda

Columbia Center on Sustainable Investment Staff Publications

The initial phase of the Leveraging Mining-Related Infrastructure Investments for Development project consisted of a worldwide survey of regulatory, commercial and operating case studies of shared use of mining-related infrastructure. This Policy Paper delivers the findings for internet and telecommunications.


Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski Jan 2013

Real Masks And Real Name Policies: Applying Anti-Mask Case Law To Anonymous Online Speech, Margot E. Kaminski

Publications

The First Amendment protects anonymous speech, but the scope of that protection has been the subject of much debate. This Article adds to the discussion of anonymous speech by examining anti-mask statutes and cases as an analogue for the regulation of anonymous speech online. Anti-mask case law answers a number of questions left open by the Supreme Court. It shows that courts have used the First Amendment to protect anonymity beyond core political speech, when mask-wearing is expressive conduct or shows a nexus with free expression. This Article explores what the anti-mask cases teach us about anonymity online, including proposed …


Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino Oct 2012

Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino

FIMS Presentations

No abstract provided.


The Benefit Of Adopting Comprehensive Standards Of Monitoring Employee Technology Use In The Workplace, Karin M. Mika Sep 2012

The Benefit Of Adopting Comprehensive Standards Of Monitoring Employee Technology Use In The Workplace, Karin M. Mika

Law Faculty Articles and Essays

This article will examine issues as they relate to the privacy of employees’ lives given that nearly everything can be discovered by some form of electronic monitoring. It will posit that most laws as they exist today do little to apprise either the employer or the employee as to what type of electronic monitoring of personal communications is acceptable. It will further propose that most employer policies related to scrutinizing employee electronic communications are vague and unsuitable. The article will conclude that, given the leeway employers tend to be given (often justifiably so) in monitoring employees there is little chance …


The Evolution Of Copyright Law In The Arts, Kevin Liftig Dec 2009

The Evolution Of Copyright Law In The Arts, Kevin Liftig

Honors Scholar Theses

As digital storage of intellectual goods such as literature and music has become widespread, the duplication and unlicensed distribution of these goods has become a frequent source of legal contention. When technology for production and replication of intellectual goods advanced, there were disputes concerning the rights to produce and duplicate these works. As new technologies have made copies of intellectual goods more accessible, legal institutions have largely moved to protect the rights of ownership of ideas through copyright laws. This paper will examine key changes in the technology that affect intellectual property, and the responses that legal institutions have made …


The Networked Electorate: The Internet And The Quiet Democratic Revolution In Malaysia And Singapore, Hang Wu Tang Sep 2009

The Networked Electorate: The Internet And The Quiet Democratic Revolution In Malaysia And Singapore, Hang Wu Tang

Research Collection Yong Pung How School Of Law

This paper is intended to be a contribution to the literature on claims of the democratising effect of the Internet. The paper begins by setting out the arguments and also critiques of claims of the democratising power of the Internet. In order to test the validity of these arguments, the author will undertake a comparative study of the impact of the Internet on recent general elections in Malaysia and Singapore. The study will demonstrate that in the case of Singapore, the Internet has merely exerted some pressure on the pre-existing laws and state-imposed norms governing free speech; in contrast, in …


Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher Jan 2008

Just One Click: The Reality Of Internet Retail Contracting, Ronald J. Mann, Travis Siebeneicher

Faculty Scholarship

This Essay explores the enforceability and presence of pro-seller contract terms in internet retail contracts. Analyzing case law on internet contract enforceability and a survey of 500 firms'websites, it demonstrates that even the enforceability of many internet contracts is questionable. It then presents new data that suggest that the prevalence of pro-seller contract terms is far less than usually assumed. It suggests that the benefit of making these terms enforceable is outweighed by the loss of user friendliness required for the necessary interface changes. Finally, it uses fresh statistical analyses to determine what relationship, if any, exists between enforceability, pro-seller …


Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow Jan 2007

Some Peer-To-Peer, Democratically And Voluntarily Produced Thoughts About 'The Wealth Of Networks: How Social Production Transforms Markets And Freedom,' By Yochai Benkler, Ann Bartow

Law Faculty Scholarship

In this review essay, Bartow concludes that The Wealth of Networks: How Social Production Transforms Markets and Freedom by Yochai Benkler is a book well worth reading, but that Benkler still has a bit more work to do before his Grand Unifying Theory of Life, The Internet, and Everything is satisfactorily complete. It isn't enough to concede that the Internet won't benefit everyone. He needs to more thoroughly consider the ways in which the lives of poor people actually worsen when previously accessible information, goods and services are rendered less convenient or completely unattainable by their migration online. Additionally, the …


Creative Sanctions For Online Investment Fraud, Jayne W. Barnard Jan 2007

Creative Sanctions For Online Investment Fraud, Jayne W. Barnard

Faculty Publications

No abstract provided.


Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh Apr 2006

Common Law Property Metaphors On The Internet: The Real Problem With The Doctrine Of Cybertrespass, Shyamkrishna Balganesh

All Faculty Scholarship

The doctrine of cybertrespass represents one of the most recent attempts by courts to apply concepts and principles from the real world to the virtual world of the Internet. A creation of state common law, the doctrine essentially involved extending the tort of trespass to chattels to the electronic world. Consequently, unauthorized electronic interferences are deemed trespassory intrusions and rendered actionable. The present paper aims to undertake a conceptual study of the evolution of the doctrine, examining the doctrinal modifications courts were required to make to mould the doctrine to meet the specificities of cyberspace. It then uses cybertrespass to …


Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh Jan 2004

Copyright And Free Expression: The Convergence Of Conflicting Normative Frameworks, Shyamkrishna Balganesh

All Faculty Scholarship

Recent attempts to expand the domain of copyright law in different parts of the world have necessitated renewed efforts to evaluate the philosophical justifications that are advocated for its existence as an independent institution. Copyright, conceived of as a proprietary institution, reveals an interesting philosophical interaction with other libertarian interests, most notably the right to free expression. This paper seeks to understand the nature of this interaction and the resulting normative decisions. The paper seeks to analyze copyright law and its recent expansions, specifically from the perspective of the human rights discourse. It looks at the historical origins of modern …


The International Privacy Regime, Tim Wu Jan 2004

The International Privacy Regime, Tim Wu

Faculty Scholarship

Privacy has joined one of many areas of law understandable only by reference to the results of overlapping and conflicting national agendas. What has emerged as the de facto international regime is complex. Yet based on a few simplifying principles, we can nonetheless do much to understand it and predict its operation.

First, the idea that self-regulation by the internet community will be the driving force in privacy protection must be laid to rest. The experience of the last decade shows that nation-states, powerful nation-states in particular, drive the system of international privacy. The final mix of privacy protection that …


Annotating The News: Mitigating The Effects Of Media Convergence And Consolidation, Eric Easton Oct 2000

Annotating The News: Mitigating The Effects Of Media Convergence And Consolidation, Eric Easton

All Faculty Scholarship

This essay is a personal inquiry into the nature of media technology, law, and ethics in an era marked by the convergence of media that have been largely separate-print, broadcast, cable, satellite, and the Internet-and by the consolidation of ownership in all of these media. What inventions, practices, and norms must emerge to enable us to take advantage of this vast new information-based world, while preserving such important professional values as diversity, objectivity, reliability, and independence?

The right to know belongs not only to individuals, but to the public at large, it can (or, perhaps, must) be vindicated by government …


Sovereign Indignity? Values, Borders And The Internet: A Case Study, Eric Easton Jan 1998

Sovereign Indignity? Values, Borders And The Internet: A Case Study, Eric Easton

All Faculty Scholarship

This article focuses on the publication ban issued by a Canadian court in a notorious murder trial, and the popular reaction to the publication ban, as a case study of the new global communications environment. Part I reconstructs the factual circumstances that provoked the ban, as well as the responses of the media, the legal establishment, and the public. Part II examines the ban itself, the constitutional challenge mounted by the media, and the landmark Dagenais decision. Part III reflects on the meaning of the entire episode for law, journalism, and national sovereignty.

The Dagenais decision demonstrates the continued independence …