Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law

Exploring The Interfaces Between Big Data And Intellectual Property Law, Daniel J. Gervais Oct 2019

Exploring The Interfaces Between Big Data And Intellectual Property Law, Daniel J. Gervais

Daniel J Gervais

This article reviews the application of several IP rights (copyright, patent, sui generis database right, data exclusivity and trade secret) to Big Data. Beyond the protection of software used to collect and process Big Data corpora, copyright’s traditional role is challenged by the relatively unstructured nature of the non-relational (noSQL) databases typical of Big Data corpora. This also impacts the application of the EU sui generis right in databases. Misappropriation (tort-based) or anti-parasitic behaviour protection might apply, where available, to data generated by AI systems that has high but short-lived value. Copyright in material contained in Big Data corpora must …


W(H)Ither Warranty: The B(L)Oom Of Products Liability Theory In Cases Of Deficient Software Design, Peter A. Alces Sep 2019

W(H)Ither Warranty: The B(L)Oom Of Products Liability Theory In Cases Of Deficient Software Design, Peter A. Alces

Peter A. Alces

No abstract provided.


When Y2k Causes "Economic Loss" To "Other Property", Peter A. Alces, Aaron S. Book Sep 2019

When Y2k Causes "Economic Loss" To "Other Property", Peter A. Alces, Aaron S. Book

Peter A. Alces

No abstract provided.


The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans Jul 2019

The Role Of Satellites And Smart Devices: Data Surprises And Security, Privacy, And Regulatory Challenges, Anne T. Mckenna, Amy C. Gaudion, Jenni L. Evans

Amy C. Gaudion

Strava, a popular social media platform and mobile app like Facebook but specifically designed for athletes, posts a “heatmap” with consensually-obtained details about users’ workouts and geolocation. Strava’s heatmap depicts aggregated data of user location and movement by synthesizing GPS satellite data points and movement data from users’ smart devices together with satellite imagery. In January of 2018, a 20-year-old student tweeted that Strava’s heatmap revealed U.S. forward operating bases. The tweet revealed a significant national security issue and flagged substantial privacy and civil liberty concerns.

Smart devices, software applications, and social media platforms aggregate consumer data from multiple data …


Data Devolution: Corporate Information Security, Consumers, And Future Of Regulation, Andrea M. Matwyshyn Jul 2019

Data Devolution: Corporate Information Security, Consumers, And Future Of Regulation, Andrea M. Matwyshyn

Andrea Matwyshyn

No abstract provided.


Cyber!, Andrea M. Matwyshyn Jul 2019

Cyber!, Andrea M. Matwyshyn

Andrea Matwyshyn

This Article challenges the basic assumptions of the emerging legal area of “cyber” or “cybersecurity.” It argues that the two dominant “cybersecurity” paradigms—information sharing and deterrence—fail to recognize that corporate information security and national “cybersecurity” concerns are inextricable. This problem of “reciprocal security vulnerability” means that in practice our current legal paradigms channel us in suboptimal directions. Drawing insights from the work of philosopher of science Michael Polanyi, this Article identifies three flaws that pervade the academic and policy analysis of security, exacerbating the problem of reciprocal security vulnerability—privacy conflation, incommensurability, and internet exceptionalism. It then offers a new paradigm—reciprocal …


The Human Element: The Under-Theorized And Underutilized Component Vital To Fostering Blockchain Development, Joshua A.T. Fairfield Jul 2019

The Human Element: The Under-Theorized And Underutilized Component Vital To Fostering Blockchain Development, Joshua A.T. Fairfield

Joshua A.T. Fairfield

This Article constitutes a lightly edited transcription of Joshua Fairfield's oral remarks at the April 6, 2018 Cleveland State Law Review Symposium on Blockchain Law and Technology.

The author posits that there is a tendency to think that technology will emerge triumphant in resolving physical problems, including banking and transactional recording; that there is sort of a "tech-bro utopianism," epitomized by Mark Zuckerberg, suggesting that what we need is a technological, not a human, solution. He states that one major problem is that social technologists, psychologists, historians, linguists, and cultural anthropologists are not on the development teams that are building …


Legal Personhood For Artificial Intelligence, Tyler Jaynes Jun 2019

Legal Personhood For Artificial Intelligence, Tyler Jaynes

Tyler Jaynes

The concept of artificial intelligence is not new nor is the notion that it should be granted legal protections given its influence on human activity. What is new, on a relative scale, is the notion that artificial intelligence can possess citizenship—a concept reserved only for humans, as it presupposes the idea of possessing civil duties and protections. Where there are several decades’ worth of writing on the concept of the legal status of computational artificial artefacts in the USA and elsewhere, it is surprising that law makers internationally have come to a standstill to protect our silicon brainchildren. In this …


Workplace Privacy And Monitoring: The Quest For Balanced Interests , Ariana R. Levinson Jun 2019

Workplace Privacy And Monitoring: The Quest For Balanced Interests , Ariana R. Levinson

Ariana R. Levinson

We can see in 2001 that 77 percent of employers were engaged in monitoring. This may have increased slightly or decreased slightly, but whatever has happened, we know that this is a significant amount of employers--much greater than a majority--that are engaging in monitoring of their employees. We can also see the great rise in monitoring of computers and electronic files in a ten-year period between 1997 and 2007. Finally, we can see some of the newer technologies. In 2007, twelve percent of the reporting employers were monitoring the blogosphere, eight percent were monitoring GPS vehicle tracking, and ten percent …


Trademark Issues Relating To Digitalized Flavor, John T. Cross Apr 2019

Trademark Issues Relating To Digitalized Flavor, John T. Cross

John Cross

Over the past three decades, most people have become accustomed to dealing with music, film, photography, and other expressive media stored in digital format. However, while great strides have been made in digitalizing what we see and hear, there has been far less progress in digitalizing the other senses. This lack of progress is especially evident for the chemical senses of smell and taste. However, all this may soon change. Recently, several groups of researchers have commenced various projects that could store odors and flavors in a digital format, and replicate them for humans.


Dead Ends And Dirty Secrets: Legal Treatment Of Negative Information, 25 J. Marshall J. Computer & Info. L. 619 (2008), John T. Cross Apr 2019

Dead Ends And Dirty Secrets: Legal Treatment Of Negative Information, 25 J. Marshall J. Computer & Info. L. 619 (2008), John T. Cross

John Cross

This article discusses the process of innovation and releasing so-called negative information to help others in the process to innovate. The article focuses on patent law and asks the questions: Why do people innovate? Does the legal system really reflect how the process of innovation actually occurs?


Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross Apr 2019

Age Verification In The 21st Century: Swiping Away Your Privacy, 23 J. Marshall J. Computer & Info. L. 363 (2005), John T. Cross

John Cross

Today a lot of private businesses have adopted the practice of driver's license swiping where proof of age or security issues arise. This practice has beneficial uses for both private entities, in identifying underage persons and those with fake identification, and law enforcement. However, the problem arise when the private sector, businesses are not using the information to merely identify underage customers or those with fake identification but store the information encoded on the barcode in a computer database. No federal laws and very few state laws regulate the collection and use of this information while the private sector is …


Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan Mar 2019

Topic Modeling The President: Conventional And Computational Methods, J.B. Ruhl, John Nay, Jonathan Gilligan

J.B. Ruhl

Legal and policy scholars modeling direct actions into substantive topic classifications thus far have not employed computational methods. To compare the results of their conventional modeling methods with the computational method, we generated computational topic models of all direct actions over time periods other scholars have studied using conventional methods, and did the same for a case study of environmental-policy direct actions. Our computational model of all direct actions closely matched one of the two comprehensive empirical models developed using conventional methods. By contrast, our environmental-case-study model differed markedly from the only empirical topic model of environmental-policy direct actions using …