Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (1938)
- Science and Technology Law (1525)
- Privacy Law (1412)
- Intellectual Property Law (956)
- Physical Sciences and Mathematics (542)
-
- Computer Sciences (541)
- Information Security (530)
- International Law (335)
- Engineering (329)
- Social and Behavioral Sciences (329)
- Computer Engineering (321)
- Criminal Law (306)
- Legal Studies (297)
- Constitutional Law (294)
- Electrical and Computer Engineering (294)
- Forensic Science and Technology (293)
- Business Organizations Law (283)
- Legislation (277)
- Banking and Finance Law (272)
- Administrative Law (267)
- Contracts (267)
- Other Law (260)
- State and Local Government Law (257)
- Civil Law (251)
- Torts (250)
- Marketing Law (247)
- Organizations Law (244)
- Human Rights Law (243)
- Institution
-
- UIC School of Law (886)
- Embry-Riddle Aeronautical University (526)
- Schulich School of Law, Dalhousie University (250)
- Seattle University School of Law (155)
- Universitas Indonesia (128)
-
- University of Richmond (113)
- DePaul University (95)
- University of Washington School of Law (81)
- Southern Methodist University (76)
- University of Michigan Law School (61)
- Duke Law (48)
- Vanderbilt University Law School (47)
- Maurer School of Law: Indiana University (42)
- Washington and Lee University School of Law (39)
- Villanova University Charles Widger School of Law (35)
- Brooklyn Law School (34)
- University of Georgia School of Law (30)
- Fordham Law School (25)
- The Catholic University of America, Columbus School of Law (24)
- Chicago-Kent College of Law (23)
- Cleveland State University (23)
- Pepperdine University (23)
- University of Cincinnati College of Law (23)
- Brigham Young University Law School (19)
- University of Maryland Francis King Carey School of Law (19)
- Northwestern Pritzker School of Law (18)
- Georgia State University College of Law (17)
- New York Law School (17)
- University of Oklahoma College of Law (16)
- Loyola University Chicago, School of Law (12)
- Keyword
-
- Internet (93)
- Privacy (77)
- Technology (73)
- Copyright (56)
- Software (48)
-
- Digital forensics (42)
- Intellectual property (34)
- Cybersecurity (31)
- Social media (31)
- AI (30)
- Artificial intelligence (29)
- Data (27)
- Cyberspace (26)
- Regulation (26)
- Law (24)
- Computers (22)
- Data security (22)
- Cybercrime (20)
- CyberCrime (19)
- First Amendment (19)
- Information (19)
- Computer forensics (18)
- Digital Forensics (18)
- Digital evidence (18)
- Fourth Amendment (18)
- UCITA (18)
- Copyright law (17)
- Bitcoin (16)
- Blockchain (16)
- Facebook (16)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (794)
- Journal of Digital Forensics, Security and Law (526)
- Canadian Journal of Law and Technology (246)
- Seattle University Law Review (139)
- "Dharmasisya” Jurnal Program Magister Hukum FHUI (122)
-
- Richmond Journal of Law & Technology (105)
- SMU Science and Technology Law Review (75)
- DePaul Journal of Art, Technology & Intellectual Property Law (72)
- UIC Law Review (62)
- Washington Journal of Law, Technology & Arts (58)
- Duke Law & Technology Review (48)
- Villanova Law Review (34)
- Vanderbilt Journal of Entertainment & Technology Law (31)
- UIC Review of Intellectual Property Law (30)
- Washington and Lee Law Review (29)
- Chicago-Kent Law Review (23)
- Fordham Law Review (23)
- DePaul Business & Commercial Law Journal (22)
- Michigan Law Review (22)
- Catholic University Journal of Law and Technology (21)
- Michigan Telecommunications & Technology Law Review (21)
- Cleveland State Law Review (19)
- The University of Cincinnati Intellectual Property and Computer Law Journal (19)
- Washington Law Review (18)
- Georgia State University Law Review (17)
- NYLS Law Review (17)
- BYU Law Review (16)
- Pepperdine Law Review (16)
- Georgia Law Review (15)
- Indiana Journal of Global Legal Studies (15)
Articles 1 - 30 of 3132
Full-Text Articles in Computer Law
Assessing Smart Nation Singapore As An International Model For Ai Responsibility, Philip L. Frana
Assessing Smart Nation Singapore As An International Model For Ai Responsibility, Philip L. Frana
International Journal on Responsibility
While AI and other smart technologies greatly contribute to material aspects of well-being, there are concerns that they threaten quality of life in Singapore. Smart technologies and digital governance have freed up labor for activities where human empathy and understanding are unique and indispensable, but also threaten to undermine human dignity and accountability. This paper undertakes a comprehensive assessment of Singapore as an international model for AI responsibility from the perspective of the history and philosophy of technological governance. It examines the evolution of regulatory frameworks, ethical considerations, and key legal documents and social initiatives shaping the nation’s approach to …
When Ai Remembers Too Much: Reinventing The Right To Be Forgotten For The Generative Age, Cheng-Chi Chang
When Ai Remembers Too Much: Reinventing The Right To Be Forgotten For The Generative Age, Cheng-Chi Chang
Washington Journal of Law, Technology & Arts
The emergence of generative artificial intelligence (AI) systems poses novel challenges for the right to be forgotten. While this right gained prominence following the 2014 Google Spain v. Gonzalez case, generative AI’s limitless memory and ability to reproduce identifiable data from fragments threaten traditional conceptions of forgetting. This Article traces the evolution of the right to be forgotten from its privacy law origins towards an independent entitlement grounded in self-determination for personal information. However, it contends the inherent limitations of using current anonymization, deletion, and geographical blocking mechanisms to prevent AI models from retaining personal data render forgetting infeasible. Moreover, …
Google Searching For The Truth: Examining The Admissibility Of Internet Search History, Chisup Kim
Google Searching For The Truth: Examining The Admissibility Of Internet Search History, Chisup Kim
Washington Journal of Law, Technology & Arts
The internet has become more ubiquitously available than ever before, with search engines serving as the portals to an unparalleled amount of information. As a byproduct of this phenomenon, a vast amount of internet search history has also begun to enter legal proceedings as evidence. The most intimate questions that defendants have asked their search engines have begun to be examined under the scope of the Federal Rules of Evidence or a state equivalent. This Comment examines the admissibility of internet search history and provides a general legal framework based on the Federal Rules of Evidence. Drawing upon six cases, …
Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper
Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper
Washington Journal of Law, Technology & Arts
Some 130 central banks around the world are experimenting with various levels of a central bank digital currency (“CBDC”), a digitized form of a sovereign-backed, national currency that is a liability of that country’s central bank. Unlike fiat currency, CBDCs are trackable and potentially subject to interference and even freezing by government authorities. CBDCs will affect citizens’ control over commerce, payments, and savings, and impact their privacy rights. The Chinese government has piloted, refined, and rolled out its own CBDC called the Digital Currency/Electronic Payment initiative (“DC/EP”), also known as the digital yuan or e-CNY. The Chinese government is far …
The Need For An International Ai Research Initiative: How To Create And Sustain A Virtuous Research-Regulation Cycle To Govern Ai, Kevin Frazier
The Need For An International Ai Research Initiative: How To Create And Sustain A Virtuous Research-Regulation Cycle To Govern Ai, Kevin Frazier
Washington Journal of Law, Technology & Arts
This paper explains the need for an international AI research initiative. The current focus of lawmakers at the subnational, national, and international level on regulation over research has created an imbalance, neglecting the critical role of continuous, informed research in developing laws that keep pace with rapid technological advancements in AI.
The proposed international AI research initiative would serve as a central hub for comprehensive AI risk analysis, modeled on successful precedents like CERN and the IPCC. CERN exemplifies a collaborative research environment with pooled resources from member states, leading to significant advancements in particle physics. Similarly, the IPCC has …
Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber
Dol Fiduciary Rule 3.0 Strikeout, Base Knock, Or Home Run?, Antolin Reiber
DePaul Business & Commercial Law Journal
No abstract provided.
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
DePaul Business & Commercial Law Journal
No abstract provided.
Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu
Survey Evidence In Trademark Actions, Ioana Vasiu And Lucian Vasiu
DePaul Business & Commercial Law Journal
No abstract provided.
Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani
Corporate Governance And Compelled Speech: Do State-Imposed Board Diversity Mandates Violate Free Speech?, Salar Ghahramani
DePaul Business & Commercial Law Journal
No abstract provided.
The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin
The Real Persons Are The Corporations We Made Along The Way, Leonard Brahin
DePaul Business & Commercial Law Journal
No abstract provided.
Governing The Metaverse, Jesse Valente
Governing The Metaverse, Jesse Valente
The University of Cincinnati Intellectual Property and Computer Law Journal
No abstract provided.
Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley
Computationally Assessing Suspicion, Wesley M. Oliver, Morgan A. Gray, Jaromir Savelka, Kevin D. Ashley
University of Cincinnati Law Review
Law enforcement officers performing drug interdiction on interstate highways have to decide nearly every day whether there is reasonable suspicion to detain motorists until a trained dog can sniff for the presence of drugs. The officers’ assessments are often wrong, however, and lead to unnecessary detentions of innocent persons and the suppression of drugs found on guilty ones. We propose a computational method of evaluating suspicion in these encounters and offer experimental results from early efforts demonstrating its feasibility. With the assistance of large language and predictive machine learning models, it appears that judges, advocates, and even police officers could …
The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson
The Missing Links: Why Hyperlinks Must Be Treated As Attachments In Electronic Discovery, Lea Malani Bays, Stuart A. Davidson
University of Cincinnati Law Review
This Article sheds light on a unique but centrally important “twenty-first century” issue involving electronic discovery in federal civil litigation that is just beginning to percolate in federal district courts. Historically, courts have held that a document attached to or enclosed with another document must be produced together when produced in response to a discovery request, as that is how the document was “kept in the usual course of business” and how it is “ordinarily maintained or in a reasonably usable form,” as the Federal Rules of Civil Procedure have required for decades. Today, parties are pushing back on whether …
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter
Aiming For Fairness: An Exploration Into Getty Images V. Stability Ai And Its Importance In The Landscape Of Modern Copyright Law, Matthew Coulter
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
A Timeless Principle: Copyright Before The Statute Of Anne, Victoria Lieberman
A Timeless Principle: Copyright Before The Statute Of Anne, Victoria Lieberman
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Innovation At A Crossroads: The Supreme Court's Influence On Pharmaceuticals, Trade Policies, And Public Health, Beau Reeves
Innovation At A Crossroads: The Supreme Court's Influence On Pharmaceuticals, Trade Policies, And Public Health, Beau Reeves
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Beautifying The Human Experience: The Road To Knocking Out The Knockoff Industry Through Adaptions To Copyright & Design Patent Protections For Clothing, Moira Mccabe
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Machines Like Me: A Proposal On The Admissibility Of Artificially Intelligent Expert Testimony, Andrew W. Jurs, Scott Devito
Machines Like Me: A Proposal On The Admissibility Of Artificially Intelligent Expert Testimony, Andrew W. Jurs, Scott Devito
Pepperdine Law Review
With the rapidly expanding sophistication of artificial intelligence systems, their reliability, and cost-effectiveness for solving problems, the current trend of admitting testimony based on artificially intelligent (AI) systems is only likely to grow. In that context, it is imperative for us to ask what rules of evidence judges today should use relating to such evidence. To answer that question, we provide an in-depth review of expert systems, machine learning systems, and neural networks. Based on that analysis, we contend that evidence from only certain types of AI systems meet the requirements for admissibility, while other systems do not. The break …
All Eyez On Rap & Hip-Hop: Analyzing How Black Expression Is Criminalized And The Language Of The Rap Act Of 2022, Maia Young
Washington Journal of Law, Technology & Arts
The Black existence, in the United States of America, has always been regarded as a conditional right. Conventionally, Blackness must always be nonviolent and non-disruptive to safely exist. Because of this, Blackness cannot be confined to restraints and disrupts these conventions with acts of joy and creative expression. Black creativity is both unconventional and sacred. Black creative expression documents, preserves, and unifies cultural lived experiences, from a first-hand lens of those oppressed. Creative and artistic expression celebrates the myriad of stories that are a part of the collective Black experience. Yet, Black creative expression is now being weaponized by prosecutors …
Constitutional Rights Of Artificial Intelligence, Mizuki Hashiguchi
Constitutional Rights Of Artificial Intelligence, Mizuki Hashiguchi
Washington Journal of Law, Technology & Arts
On February 8, 2022, the Italian Parliament approved constitutional amendments to protect the environment. A member of Parliament stated that the environment is an element of Italy, and that safeguarding the environment means safeguarding humans. The need to protect the environment seems to have become a critical component of public conscience. Likewise, if society perceives that artificial intelligence is vitally important for humanity, does constitutional law allow constitutional rights for artificial intelligence to be created?
Extending constitutional rights to artificial intelligence may be consistent with the jurisprudential history of rights. Constitutional rights have undergone metamorphosis over time to protect new …
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Washington Journal of Law, Technology & Arts
This article discusses contemporary problems related to Artificial Intelligence (AI), law and the visual arts. It suggests that the fallacies of copyright law are already visible in legal conundrums raised by AI in the creative sector. These include, for instance, the lack of uniformity in relation to creations’ copyrightability, the massive scale of copyright infringement affecting visual artists and the creative industry, and the difficulties in implementing media regulation and cyber-regulation. The deeply cherished ‘human authorship’ criterion that was sustained recently by a US Federal Appeals Court in Thaler, in particular, is a short-term solution to the legal challenges …
Ai, Algorithms, And Awful Humans, Daniel J. Solove, Hideyuki Matsumi
Ai, Algorithms, And Awful Humans, Daniel J. Solove, Hideyuki Matsumi
Fordham Law Review
A profound shift is occurring in the way many decisions are made, with machines taking greater roles in the decision-making process. Two arguments are often advanced to justify the increasing use of automation and algorithms in decisions. The “Awful Human Argument” asserts that human decision-making is often awful and that machines can decide better than humans. Another argument, the “Better Together Argument,” posits that machines can augment and improve human decision-making. These arguments exert a powerful influence on law and policy.
In this Essay, we contend that in the context of making decisions about humans, these arguments are far too …
Chatgpt, Large Language Models, And Law, Harry Surden
Chatgpt, Large Language Models, And Law, Harry Surden
Fordham Law Review
This Essay explores Artificial Intelligence (AI) Large Language Models (LLMs) like ChatGPT/GPT-4, detailing the advances and challenges in applying AI to law. It first explains how these AI technologies work at an understandable level. It then examines the significant evolution of LLMs since 2022 and their improved capabilities in understanding and generating complex documents, such as legal texts. Finally, this Essay discusses the limitations of these technologies, offering a balanced view of their potential role in legal work.
Slavery.Ai, Emile Loza De Siles
Slavery.Ai, Emile Loza De Siles
Washington and Lee Journal of Civil Rights and Social Justice
The artificial intelligence market is swarming. Supercharged start-ups, global tech giants, and increasingly algorithmic governments target diverse use cases with new and stunningly innovative AI applications coming online every day. Where people are the computational subjects of those algorithmic machinations, however, there is no law, present or effective, to protect them against great and propagating harms. Consequently, people become data production units, the commoditized of the Data Industrial Complex and unfree, unpaid inputs to AI production.
This Article shares a new and provocative vision. It theorizes that unregulated AI systems and uses are giving rise to an emergent form of …