Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 21 of 21

Full-Text Articles in Law

Machines Like Me: A Proposal On The Admissibility Of Artificially Intelligent Expert Testimony, Andrew W. Jurs, Scott Devito Apr 2024

Machines Like Me: A Proposal On The Admissibility Of Artificially Intelligent Expert Testimony, Andrew W. Jurs, Scott Devito

Pepperdine Law Review

With the rapidly expanding sophistication of artificial intelligence systems, their reliability, and cost-effectiveness for solving problems, the current trend of admitting testimony based on artificially intelligent (AI) systems is only likely to grow. In that context, it is imperative for us to ask what rules of evidence judges today should use relating to such evidence. To answer that question, we provide an in-depth review of expert systems, machine learning systems, and neural networks. Based on that analysis, we contend that evidence from only certain types of AI systems meet the requirements for admissibility, while other systems do not. The break …


The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar Apr 2023

The Evidentiary Implications Of Interpreting Black-Box Algorithms, Varun Bhatnagar

Northwestern Journal of Technology and Intellectual Property

Biased black-box algorithms have drawn increasing levels of scrutiny from the public. This is especially true for those black-box algorithms with the potential to negatively affect protected or vulnerable populations.1 One type of these black-box algorithms, a neural network, is both opaque and capable of high accuracy. However, neural networks do not provide insights into the relative importance, underlying relationships, structures of the predictors or covariates with the modelled outcomes.2 There are methods to combat a neural network’s lack of transparency: globally or locally interpretable post-hoc explanatory models.3 However, the threat of such measures usually does not bar an actor …


The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter S. Menell Jan 2021

The Use Of Technical Experts In Software Copyright Cases: Rectifying The Ninth Circuit’S “Nutty” Rule, Shyamkrishna Balganesh, Peter S. Menell

Faculty Scholarship

Courts have long been skeptical about the use of expert witnesses in copyright cases. More than four decades ago, and before Congress extended copyright law to protect computer software, the Ninth Circuit in Krofft Television Productions, Inc. v. McDonald’s Corp. ruled that expert testimony was inadmissible to determine whether Mayor McCheese and the merry band of McDonald’s characters infringed copyright protection for Wilhelmina W. Witchiepoo and the other imaginative H.R. Pufnstuf costumed characters. Since the emergence of software copyright infringement cases in the 1980s, substantially all software copyright cases have permitted expert witnesses to aid juries in understanding software code. …


The Past, Present, And Future Of Predictive Coding, Matthew G. Kenney Jan 2016

The Past, Present, And Future Of Predictive Coding, Matthew G. Kenney

Florida A & M University Law Review

Electronic discovery, or e-discovery, refers to the discovery of electronically stored documents and images.' Examples of e-discovery related documentation would include email, digital versions of paper documents (e.g. MS Word, PDF, Excel, and PowerPoint), social media postings, digital photos, Global Positioning System data, and content within computerized databases, etc. Digital data stored on computers, smartphones, tape drives, hard-drives, portable digital storage devices and the like would fall under the domain of e-discovery. Collecting and sorting massive amounts of electronically stored data presents both opportunities and challenges for lawyers.

For context: In 2015, electronic discovery was a $10.2 billion global industry. …


Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Recent Development: Sublet V. State: Authentication Of Evidence From Social Networking Websites Requires A Trial Judge To Find Sufficient Proof From Which A Reasonable Juror Could Conclude That The Evidence Is What The Proponent Claims It To Be, Denise A. Blake Jan 2015

Recent Development: Sublet V. State: Authentication Of Evidence From Social Networking Websites Requires A Trial Judge To Find Sufficient Proof From Which A Reasonable Juror Could Conclude That The Evidence Is What The Proponent Claims It To Be, Denise A. Blake

University of Baltimore Law Forum

The Court of Appeals of Maryland, in three consolidated cases, held that a trial judge must determine that evidence from a social networking website meets the “reasonable juror” standard of authentication as a condition precedent to admissibility. Sublet v. State, 442 Md. 632, 678, 113 A.3d 695, 722 (2015). This standard requires a preliminary determination by the trial judge that a reasonable juror could find the evidence is what the proponent claims it to be.


Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman Mar 2014

Finding The Foregone Conclusions Of Encryption, Timothy A. Wiseman

Timothy A Wiseman

Encryption is commonly used to protect private information, for both legitimate and illegitimate reasons. Courts have been struggling to determine when, within the bounds of the Fourth and Fifth Amendments, the Courts may compel a defendant in a criminal case to decrypt their data.

This article argues that a broad use of the Forgone Conclusion doctrine would permit the Courts to order a defendant to decrypt their data when the prosecution can show with reasonable particularity the existence and location of the encrypted documents, that they are likely to be incriminating, and that the government can authenticate them without the …


The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long Jan 2013

The Discovery And Use Of Computerized Information: An Examination Of Current Approaches, Richard M. Long

Pepperdine Law Review

In recent years, the legal profession has run head on into the increasing use of computers and computerized information. Discovery and evidentiary rules developed to deal with written documentation may not be flexible enough to adequately cover this relatively new method of storing information. This comment examines various methods by which courts have attempted to deal with discovery and evidentiary problems involving computerized information, and suggests certain areas that should be explored in supporting or attacking the credibility of such information.


Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle Jan 2013

Technology Corner Visualising Forensic Data: Evidence (Part 1), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example: network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle Jan 2013

Technology Corner: Visualising Forensic Data: Evidence Guidelines (Part 2), Damian Schofield, Ken Fowle

Journal of Digital Forensics, Security and Law

Visualisation is becoming increasingly important for understanding information, such as investigative data (for example: computing, medical and crime scene evidence) and analysis (for example, network capability assessment, data file reconstruction and planning scenarios). Investigative data visualisation is used to reconstruct a scene or item and is used to assist the viewer (who may well be a member of the general public with little or no understanding of the subject matter) to understand what is being presented. Analysis visualisations, on the other hand, are usually developed to review data, information and assess competing scenario hypotheses for those who usually have an …


Giving Purpose To Your Life As A Legal Writer, David Spratt Jan 2013

Giving Purpose To Your Life As A Legal Writer, David Spratt

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott Jan 2012

Applying The Acpo Principles In Public Cloud Forensic Investigations, Harjinder S. Lallie, Lee Pimlott

Journal of Digital Forensics, Security and Law

The numerous advantages offered by cloud computing has fuelled its growth and has made it one of the most significant of current computing trends. The same advantages have created complex issues for those conducting digital forensic investigations. Digital forensic investigators rely on the ACPO (Association of Chief Police Officers) or similar guidelines when conducting an investigation, however the guidelines make no reference to some of the issues presented by cloud investigations. This study investigates the impact of cloud computing on ACPO’s core principles and asks whether these principles can still be applied in a cloud investigation and the challenges presented …


Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky Jan 2012

Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky

Journal of Digital Forensics, Security and Law

An examination of State of Connecticut v. Julie Amero provides insight into how a general lack of understanding of digital evidence can cause an innocent defendant to be wrongfully convicted. By contrast, the 101-page opinion in Lorraine v. Markel American Insurance Co. provides legal precedence and a detailed consideration for the admission of digital evidence. An analysis of both cases leads the authors to recommend additions to Law School curricula designed to raise the awareness of the legal community to ensure such travesties of justice, as in the Amero case, don’t occur in the future. Work underway at the University …


Social Media And Legal Ethics, Jonathan I. Ezor Nov 2011

Social Media And Legal Ethics, Jonathan I. Ezor

Jonathan I. Ezor

A presentation on the legal issues arising out of attorney use of social media services, including for electronic discovery


Admissibility Of Electronic Documents, Curtis E.A. Karnow Jan 2011

Admissibility Of Electronic Documents, Curtis E.A. Karnow

Curtis E.A. Karnow

A comprehensive inventory of issues involved in the introduction of electronic evidence, including practical alerts


The Admissibility Of Electronic Business Records, Ken Chasse Oct 2010

The Admissibility Of Electronic Business Records, Ken Chasse

Canadian Journal of Law and Technology

The business record provisions of the Evidence Acts determine a record’s admissibility by evidence of its history, which must be the product of “the usual and ordinary course of business” (or comparable “business activity” wording). The electronic record provisions determine a record’s admissibility by the, “integrity of the electronic records system in which it is recorded or stored.” The difference is, records management (RM) based on “paper records concepts” versus “electronic records systems concepts.” The former is subjective — each business determines its own “usual and ordinary course of business”; the latter, objective — in accor- dance with authoritative standards …


Vol. Ix, Tab 43 - Google Memorandum In Support Of Its Motion To Exclude Expert Report And Opinion Of Dr. Kent Van Liere, Google Apr 2009

Vol. Ix, Tab 43 - Google Memorandum In Support Of Its Motion To Exclude Expert Report And Opinion Of Dr. Kent Van Liere, Google

Rosetta Stone v. Google (Joint Appendix)

Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


United States V. Irving, Jared Spitalnick Jan 2004

United States V. Irving, Jared Spitalnick

NYLS Law Review

No abstract provided.