Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,490 Full-Text Articles 4,260 Authors 3,320,199 Downloads 129 Institutions

All Articles in Computer Law

Faceted Search

4,490 full-text articles. Page 1 of 139.

The Gptjudge: Justice In A Generative Ai World, Maura R. Grossman, Paul W. Grimm, Daniel G. Brown, Molly (Yiming) Xu 2023 Duke Law School

The Gptjudge: Justice In A Generative Ai World, Maura R. Grossman, Paul W. Grimm, Daniel G. Brown, Molly (Yiming) Xu

Duke Law & Technology Review

Generative AI (“GenAI”) systems such as ChatGPT recently have developed to the point where they can produce computer-generated text and images that are difficult to differentiate from human-generated text and images. Similarly, evidentiary materials such as documents, videos, and audio recordings that are AI-generated are becoming increasingly difficult to differentiate from those that are not AI-generated. These technological advancements present significant challenges to parties, their counsel, and the courts in determining whether evidence is authentic or fake. Moreover, the explosive proliferation and use of GenAI applications raises concerns about whether litigation costs will dramatically increase as parties are forced to …


Full Issue: Fall 2023, 2023 DePaul University

Full Issue: Fall 2023

DePaul Magazine

In DePaul Magazine's fall 2023, President Robert L. Manuel unveils his Designing DePaul road map to position the university for monumental impact. We also highlight an innovative program that merges law and tech, an initiative centering humanities in collaborative, community-based interactions, and the ascendance of soprano Janai Brugger (SOM '05) on the international opera stage.


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim 2023 University of the Free State

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Table Of Contents, Seattle University Law Review 2023 Seattle University School of Law

Table Of Contents, Seattle University Law Review

Seattle University Law Review

Table of Contents


Deontic Meta-Rules, Francesco OLIVIERI, Guido GOVERNATORI, Matteo CRISTANI, Antonino ROTOLO, Abdul SATTAR 2023 Griffith University

Deontic Meta-Rules, Francesco Olivieri, Guido Governatori, Matteo Cristani, Antonino Rotolo, Abdul Sattar

Centre for Computational Law

The use of meta-rules in logic, i.e., rules whose content includes other rules, has recently gained attention in the setting of non-monotonic reasoning: a first logical formalisation and efficient algorithms to compute the (meta)-extensions of such theories were proposed in Olivieri et al. (2021, Computing defeasible meta-logic. In JELIA 2021, LNCS, vol. 12678, pp. 69-84. Springer.). This work extends such a logical framework by considering the deontic aspect. The resulting logic will not just be able to model policies but also tackle well-known aspects that occur in numerous legal systems. The use of Defeasible Logic to model meta-rules in the …


How To Understand China's Approach To Central Bank Digital Currency?, Heng WANG 2023 Singapore Management University

How To Understand China's Approach To Central Bank Digital Currency?, Heng Wang

Research Collection Yong Pung How School Of Law

China's central bank digital currency (CBDC), digital yuan or e-CNY, is likely to profoundly affect the international financial system. China's CBDC is fast evolving. Understanding the influencing factors of China's CBDC will likely be crucial to explore its future direction. Major influencing factors include (i) China's perception and conception of regulation and technology, (ii) complementarity between China's preferences and CBDC development, (iii) domestic and international legitimacy, and (iv) institutional development. This paper argues that these influencing factors contribute to China's likely approach of selectively reshaping the international financial system. Given the potential wide-ranging implications of the introduction of CBDC globally, …


The Strategic Use Of Ransomware Operations As A Method Of Warfare, Jeffrey Biller 2023 U.S. Naval War College

The Strategic Use Of Ransomware Operations As A Method Of Warfare, Jeffrey Biller

International Law Studies

This article examines the potential use and legal limitations of ransomware to achieve strategic effects in armed conflicts. Ransomware is defined here as the temporary encryption of data until some pre-condition is met to release the encryption. The article focuses on international law as applicable to a State’s use of ransomware against another State, where both are parties to an existing international armed conflict. The author finds that international humanitarian law does not currently prohibit most uses of ransomware against non-military related targets in armed conflicts. While the encryption of data may be a legal violation when it inhibits the …


Federal Data Privacy Regulation: Do Not Expect An American Gdpr, Matt Buckley 2023 DePaul University College of Law

Federal Data Privacy Regulation: Do Not Expect An American Gdpr, Matt Buckley

DePaul Business & Commercial Law Journal

No abstract provided.


Legal Representation And The Metaverse: The Ethics Of Practicing In Multiple Realities, Madeline Brom 2023 DePaul University College of Law

Legal Representation And The Metaverse: The Ethics Of Practicing In Multiple Realities, Madeline Brom

DePaul Business & Commercial Law Journal

No abstract provided.


Badges Of Honor: Professional Conduct, Consumer Protection, And Accolades In Lawyer Advertising, Kiren Dosanjh Zucker, Bruce Zucker 2023 California State University, Northridge

Badges Of Honor: Professional Conduct, Consumer Protection, And Accolades In Lawyer Advertising, Kiren Dosanjh Zucker, Bruce Zucker

DePaul Business & Commercial Law Journal

No abstract provided.


Ethics At The Speed Of Business, James A. Doppke Jr. 2023 Robinson, Stewart, Montgomery & Doppke, LLC (RSMD, LLC)

Ethics At The Speed Of Business, James A. Doppke Jr.

DePaul Business & Commercial Law Journal

This paper discusses several ways in which the Illinois Rules of Professional Conduct, and the Illinois Supreme Court Rules, construct barriers that prevent lawyers and businesses from accomplishing reasonable commercial goals. Often, those barriers arise from outdated concepts, or terminology that does not reflect current business realities. The paper argues for the amendment of specific Rules to enhance lawyers’ and businesses’ respective abilities to conduct their affairs more efficiently, without sacrificing public protection in the process.


Welcome Address, Lauren McKenzie 2023 DePaul University

Welcome Address, Lauren Mckenzie

DePaul Business & Commercial Law Journal

No abstract provided.


Front Matter, 2023 DePaul University

Front Matter

DePaul Business & Commercial Law Journal

No abstract provided.


Mechanisms To Reduce Cyber Threats And Risks, Saad alsuwaileh 2023 Journal of Police and Legal Sciences

Mechanisms To Reduce Cyber Threats And Risks, Saad Alsuwaileh

Journal of Police and Legal Sciences

Addressing the mechanisms of reducing cyber threats and risks Research Because cyberspace is an important arena for various international interactions, especially in recent times in light of the increase in cyber-attacks between some countries, which affects their national security. In this context, many countries are trying to make an effort to develop their capabilities to be used in any cyber-attack, or to take adequate preventive measures to protect them from any possible cyberattacks, especially in light of the impact of these attacks on vital places and institutions such as banks and ministries or on important facilities such as water and …


Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin 2023 Maurer School of Law - Indiana University

Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin

Articles by Maurer Faculty

The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …


Confidentiality Clauses In Settlement Agreements After The Consumer Review Fairness Act, Wayne Barnes 2023 Texas A&M University School of Law

Confidentiality Clauses In Settlement Agreements After The Consumer Review Fairness Act, Wayne Barnes

Faculty Scholarship

Online commerce has skyrocketed in recent years, and shoppers are purchasing goods or services online in greater numbers every year. The COVID-19 pandemic has only hastened the trend. One significant aspect of online shopping is the presence of consumer reviews posted by prior purchasers of goods or services, describing their experience with the products, the services and/or the selling merchant. A vast majority of online shoppers say that they rely on these reviews to help inform their purchasing decisions. Positive reviews can be tremendously beneficial to a business’ profitability, whereas negative reviews can be equally detrimental. Users of the internet …


An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani 2023 National Forensic Sciences University

An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani

Journal of Digital Forensics, Security and Law

Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …


Digital Property Cycles, Joshua Fairfield 2023 Washington and Lee University School of Law

Digital Property Cycles, Joshua Fairfield

Washington and Lee Law Review

The present downturn in non-fungible token (“NFT”) markets is no cause for immediate alarm. There have been multiple cycles in both the legal and media focus on digital intangible property, and these cycles will recur. The cycles are easily explainable: demand for intangible property is constant, even increasing. The legal regimes governing ownership of these assets are unstable and poorly suited to satisfying the preferences of buyers and sellers. The combination of demand and poor legal regulation gives rise to the climate of fraud that has come to characterize NFTs, but it has nothing to do with the value of …


The Internet, Personal Jurisdiction, And Daos, Matthew R. McGuire 2023 DeFi Labs, GmbH

The Internet, Personal Jurisdiction, And Daos, Matthew R. Mcguire

Washington and Lee Law Review

Global connectivity is at an all-time high, and sovereign state law has not fully caught up with the technological innovations enabling that connectivity. TCP/IP—the communications protocol allowing computers on different networks to speak with each other—wasn’t adopted by ARPANET and the Defense Data Network until January 1983. That’s only forty years ago. And the World Wide Web wasn’t released to the general public until August 1991, less than thirty-five years ago. The first Bitcoin block was mined on January 3, 2009, less than fifteen years ago.

Legal doctrine doesn’t develop that fast, especially in legal systems heavily based around judicial …


Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim 2023 Benjamin N. Cardozo School of Law, Yeshiva University

Tax Reporting As Regulation Of Digital Financial Markets, Young Ran (Christine) Kim

Washington and Lee Law Review

FTX’s recent collapse highlights the overall instability that blockchain assets and digital financial markets face. While the use of blockchain technology and crypto assets is widely prevalent, the associated market is still largely unregulated, and the future of digital asset regulation is also unclear. The lack of clarity and regulation has led to public distrust and has called for more dedicated regulation of digital assets. Among those regulatory efforts, tax policy plays an important role. This Essay introduces comprehensive regulatory frameworks for blockchain-based assets that have been introduced globally and domestically, and it shows that tax reporting is the key …


Digital Commons powered by bepress