Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,587 Full-Text Articles 4,393 Authors 3,320,199 Downloads 132 Institutions

All Articles in Computer Law

Faceted Search

4,587 full-text articles. Page 110 of 144.

The Asbca's Path To The Mega Adr In Computer Sciences Corporation, Paul Williams, Reba Ann Page 2013 American University Washington College of Law

The Asbca's Path To The Mega Adr In Computer Sciences Corporation, Paul Williams, Reba Ann Page

Articles in Law Reviews & Other Academic Journals

No abstract provided.


Teaching Law And Digital Age Legal Practice With An Ai And Law Seminar: Justice, Lawyering And Legal Education In The Digital Age, Kevin D. Ashley 2013 University of Pittsburgh School of Law

Teaching Law And Digital Age Legal Practice With An Ai And Law Seminar: Justice, Lawyering And Legal Education In The Digital Age, Kevin D. Ashley

Articles

A seminar on Artificial Intelligence ("Al") and Law can teach law students lessons about legal reasoning and legal practice in the digital age. Al and Law is a subfield of Al/computer science research that focuses on designing computer programs—computational models—that perform legal reasoning. These computational models are used in building tools to assist in legal practice and pedagogy and in studying legal reasoning in order to contribute to cognitive science and jurisprudence. Today, subject to a number of qualifications, computer programs can reason with legal rules, apply legal precedents, and even argue like a legal advocate.

This article provides a …


Google And Search-Engine Market Power, Mark R. Patterson 2013 Fordham University School of Law

Google And Search-Engine Market Power, Mark R. Patterson

Faculty Scholarship

A significant and growing body of commentary considers whether possible manipulation of search results by Google could give rise to antitrust liability. Surprisingly, though, little serious attention has been paid to whether Google has market power. Those who favor antitrust scrutiny of Google generally cite its large market share, from which they infer or assume its dominance. Those who are skeptical of competition law’s role in regulating search, on the other hand, usually cite Google’s 'competition is only a click away' mantra to suggest that Google’s market position is precarious. In fact, the issue of Google’s power is more complicated …


Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw 2013 University of Pittsburgh School of Law

Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw

Articles

Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.

At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …


Putting A Price On Friendship: Examining The Ownership Battle Between A Business' Social Media Networks, And The Humans That Operate Them, 47 J. Marshall L. Rev. 745 (2013), Michael Furlong 2013 UIC School of Law

Putting A Price On Friendship: Examining The Ownership Battle Between A Business' Social Media Networks, And The Humans That Operate Them, 47 J. Marshall L. Rev. 745 (2013), Michael Furlong

UIC Law Review

No abstract provided.


Is There A Role For Common Carriage In An Internet-Based World?, Christopher S. Yoo 2013 University of Pennsylvania Carey Law School

Is There A Role For Common Carriage In An Internet-Based World?, Christopher S. Yoo

All Faculty Scholarship

During the course of the network neutrality debate, advocates have proposed extending common carriage regulation to broadband Internet access services. Others have endorsed extending common carriage to a wide range of other Internet-based services, including search engines, cloud computing, Apple devices, online maps, and social networks. All too often, however, those who focus exclusively on the Internet era pay too little attention to the lessons of the legacy of regulated industries, which has long struggled to develop a coherent rationale for determining which industries should be subject to common carriage. Of the four rationales for determining the scope of common …


Privacy And Publicly Available Personal Information, Teresa Scassa 2013 University of Ottawa

Privacy And Publicly Available Personal Information, Teresa Scassa

Canadian Journal of Law and Technology

This article begins with a review of the structure of PIPEDA in order to situate the exception within its statutory context. This is followed by a detailed consideration of the exception for publicly available information. The article then offers a discussion of whether the scope of this exception should be expanded, and offers an alternative.


The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander 2013 Georgetown University Law Center

The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander

Georgetown Law Faculty Publications and Other Works

On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?

In this accessible book, cyber-law expert Anupam Chander provides the first thorough …


Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong 2013 Indiana University Maurer School of Law

Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong

Articles by Maurer Faculty

No abstract provided.


Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson 2013 Indiana University Maurer School of Law

Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson 2013 Indiana University Maurer School of Law

The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme 2013 Indiana University Maurer School of Law

Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme

Articles by Maurer Faculty

Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …


Machine Speech, Tim Wu 2013 Columbia Law School

Machine Speech, Tim Wu

Faculty Scholarship

Computers are making an increasing number of important decisions in our lives. They fly airplanes, navigate traffic, and even recommend books. In the process, computers reason through automated algorithms and constantly send and receive information, sometimes in ways that mimic human expression. When can such communications, called here “algorithmic outputs,” claim First Amendment protection?


The Nebula Future Internet Architecture, Christopher S. Yoo, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freed, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert van Renesse, Michael Walfish, Hakim Weatherspoon 2013 University of Pennsylvania Law School

The Nebula Future Internet Architecture, Christopher S. Yoo, Ken Birman, Robert Broberg, Matthew Caesar, Douglas Comer, Chase Cotton, Michael J. Freed, Andreas Haeberlen, Zachary G. Ives, Arvind Krishnamurthy, William Lehr, Boon Thau Loo, David Mazieres, Antonio Nicolosi, Jonathan M. Smith, Ion Stoica, Robbert Van Renesse, Michael Walfish, Hakim Weatherspoon

All Faculty Scholarship

NEBULA is a proposal for a Future Internet Architecture. It is based on the assumptions that: (1) cloud computing will comprise an increasing fraction of the application workload offered to an Internet, and (2) that access to cloud computing resources will demand new architectural features from a network. Features that we have identified include dependability, security, flexibility and extensibility, the entirety of which constitute resilience. NEBULA provides resilient networking services using ultrareliable routers, an extensible control plane and use of multiple paths upon which arbitrary policies may be enforced. We report on a prototype system, Zodiac, that incorporates these latter …


Streaming While Teaching: The Legality Of Using Person Streaming Video Accounts For The Classroom, Jonathan I. Ezor 2013 Touro Law Center

Streaming While Teaching: The Legality Of Using Person Streaming Video Accounts For The Classroom, Jonathan I. Ezor

Scholarly Works

Educators are constantly seeking new sources of relevant material to illustrate doctrinal and practice topics. With the growing understanding of students’ different learning styles, as well as the expansion of high-speed network connections and large displays in the classroom, streaming video has begun gaining popularity as an educational tool. Films, television programs, and real-time and archived legislative and court sessions may provide examples (both positive and negative) to enhance pedagogy. One increasingly common source for streaming content is a commercial video provider such as Netflix, Amazon, and Hulu. Even where such providers do not offer educational or institutional services, educators …


Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach 2012 Lund University, Faculty of Law

Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach

Ulf Maunsbach

During recent years the European Court of Justice (ECJ) has proven to be increasingly active in relation to cross-border intellectual property disputes. The relevant cases cover a wide range of issues, from advertisement through use of keywords, to copyright-related issues involved in making protected material available through the Internet. All in all, it might be said that the Internet era has finally reached the Court of Justice. A similar development is visible in Swedish courts. This provides for an unlimited amount of material for further discussion. In this paper I would like to provide a short summary of the recent …


Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke 2012 University of Wollongong

Location And Tracking Of Mobile Devices: Überveillance Stalks The Streets, Katina Michael, Roger Clarke

Professor Katina Michael

During the last decade, location-tracking and monitoring applications have proliferated, in mobile cellular and wireless data networks, and through self-reporting by applications running in smartphones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smartphone-user's location not merely to a cell, but to a small area within it. Innovators have been quick to capitalise on these location-based technologies for commercial purposes, and have gained access to a great deal of sensitive personal data in the process. In addition, law enforcement utilise these technologies, can do so inexpensively and hence can track many …


Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael 2012 University of Wollongong

Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael

Professor Katina Michael

This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …


Jurisdiction In Relation To Online Cross-Border Infringements: The Code And The Law, Ulf Maunsbach 2012 Lund University, Faculty of Law

Jurisdiction In Relation To Online Cross-Border Infringements: The Code And The Law, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael 2012 University of Wollongong

The Future Prospects Of Embedded Microchips In Humans As Unique Identifiers: The Risks Versus The Rewards, Katina Michael, M.G. Michael

Professor Katina Michael

Microchip implants for humans are not new. Placing heart pacemakers in humans for prosthesis is now considered a straightforward procedure. In more recent times we have begun to use brain pacemakers for therapeutic purposes to combat illnesses such as epilepsy, Parkinson’s Disease, and severe depression. Microchips are even being placed inside prosthetic knees and hips during restorative procedures to help in the gathering of post-operative analytics that can aid rehabilitation further. While medical innovations that utilise microchips abound, over the last decade we have begun to see the potential use of microchip implants for non-medical devices in humans, namely for …


Digital Commons powered by bepress