Duke law and technology review最新文献

筛选
英文 中文
A Political Economy of Utopia 乌托邦的政治经济学
Duke law and technology review Pub Date : 2019-01-01 DOI: 10.4324/9780203469682.ch7
Y. Benkler
{"title":"A Political Economy of Utopia","authors":"Y. Benkler","doi":"10.4324/9780203469682.ch7","DOIUrl":"https://doi.org/10.4324/9780203469682.ch7","url":null,"abstract":"John Perry Barlow’s two essays capture a yearning to escape the oppressive clutches of the two most important institutional forms in modernity: the state and market society. A Declaration of the Independence of Cyberspace is explicitly against the modern state. One might say, “All right, but apart from the sanitation, the medicine, education, wine, public order, irrigation, roads, a fresh water system, and public health, what have the Romans ever done for us?”1 The Declaration reflected not only a libertarian utopia that assumed that if only the state were to back off markets will take care of it all, but also a left-anchored critique of the state as a critical site of protecting the power and privilege of elites, insistence that individual self-actualization demanded a state contained within narrow boundaries, and a deep skepticism of all forms of authority, as Fred Turner showed in From Counterculture to Cyberculture.2 Selling Wine Without Bottles is not against markets or payment as such, but rather a resistance to the totalizing vision of commodity exchange as all there is. In this, for me a telling passage was:","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"1 1","pages":"78-84"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77373033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hacking the Internet of Things: Vulnerabilities, Dangers, and Legal Responses 黑客入侵物联网:漏洞、危险和法律应对
Duke law and technology review Pub Date : 2018-02-15 DOI: 10.5771/9783845289304-21
Sara Sun Beale, Peter G. Berris
{"title":"Hacking the Internet of Things: Vulnerabilities, Dangers, and Legal Responses","authors":"Sara Sun Beale, Peter G. Berris","doi":"10.5771/9783845289304-21","DOIUrl":"https://doi.org/10.5771/9783845289304-21","url":null,"abstract":"The Internet of Things (IoT) is here and growing rapidly as consumers eagerly adopt internet-enabled devices for their utility, features, and convenience. But this dramatic expansion also exacerbates two underlying dangers in the IoT. First, hackers in the IoT may attempt to gain control of internet-enabled devices, causing negative consequences in the physical world. Given that objects with internet connectivity range from household appliances and automobiles to major infrastructure components, this danger is potentially severe. Indeed, in the last few years, hackers have gained control of cars, trains, and dams, and some experts think that even commercial airplanes could be at risk. Second, IoT devices pose an enormous risk to the stability of the internet itself, as they are vulnerable to being hacked and recruited into botnets used for attacks on the digital world. Recent attacks on major websites including Netflix and Twitter exemplify this danger. This article surveys these dangers, summarizes some of their main causes, and then analyzes the extent to which current laws like the Computer Fraud and Abuse Act punish hacking in the IoT. The article finds that although hacking in the IoT is likely illegal, the current legal regime punishes hacking after the fact and therefore lacks the prospective force needed to fully temper the risks posed by the IoT. Therefore, other solutions are needed to address the perilousness of the IoT in its current form. After a discussion of the practical and legal barriers to investigating and prosecuting hacking, we turn to the merits and pitfalls of hacking back from legal, practical, and ethical perspectives. We then discuss the advantages and disadvantages of two possible solutions — regulation and the standards approach.","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"6 1","pages":"161-204"},"PeriodicalIF":0.0,"publicationDate":"2018-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78846662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Slave to the Algorithm? Why a 'Right to an Explanation' Is Probably Not the Remedy You Are Looking For 算法的奴隶?为什么“获得解释的权利”可能不是你想要的补救措施
Duke law and technology review Pub Date : 2017-05-23 DOI: 10.2139/SSRN.2972855
L. Edwards, Michael Veale
{"title":"Slave to the Algorithm? Why a 'Right to an Explanation' Is Probably Not the Remedy You Are Looking For","authors":"L. Edwards, Michael Veale","doi":"10.2139/SSRN.2972855","DOIUrl":"https://doi.org/10.2139/SSRN.2972855","url":null,"abstract":"Algorithms, particularly of the machine learning (ML) variety, are increasingly important to individuals' lives, but have caused a range of concerns evolving mainly around unfairness, discrimination and opacity. Transparency in the form of a \"right to an explanation\" has emerged as a compellingly attractive remedy since it intuitively presents as a means to \"open the black box\", hence allowing individual challenge and redress, as well as potential to instil accountability to the public in ML systems. In the general furore over algorithmic bias and other issues laid out in section 2, any remedy in a storm has looked attractive. However, we argue that a right to an explanation in the GDPR is unlikely to be a complete remedy to algorithmic harms, particularly in some of the core \"algorithmic war stories\" that have shaped recent attitudes in this domain. We present several reasons for this conclusion. First (section 3), the law is restrictive on when any explanation-related right can be triggered, and in many places is unclear, or even seems paradoxical. Second (section 4), even were some of these restrictions to be navigated, the way that explanations are conceived of legally — as \"meaningful information about the logic of processing\" — is unlikely to be provided by the kind of ML \"explanations\" computer scientists have been developing. ML explanations are restricted both by the type of explanation sought, the multi-dimensionality of the domain and the type of user seeking an explanation. However “subject-centric\" explanations (SCEs), which restrict explanations to particular regions of a model around a query, show promise for interactive exploration, as do pedagogical rather than decompositional explanations in dodging developers' worries of IP or trade secrets disclosure. As an interim conclusion then, while convinced that recent research in ML explanations shows promise, we fear that the search for a \"right to an explanation\" in the GDPR may be at best distracting, and at worst nurture a new kind of \"transparency fallacy\". However, in our final sections, we argue that other parts of the GDPR related (i) to other individual rights including the right to erasure (\"right to be forgotten\") and the right to data portability and (ii) to privacy by design, Data Protection Impact Assessments and certification and privacy seals, may have the seeds we can use to build a more responsible, explicable and user-friendly algorithmic society.","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"59 1","pages":"18-84"},"PeriodicalIF":0.0,"publicationDate":"2017-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89052420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 80
Legal Nature of Emails: A Comparative Perspective 电子邮件的法律性质:比较视角
Duke law and technology review Pub Date : 2016-02-21 DOI: 10.2139/SSRN.2742231
Edina Harbinja
{"title":"Legal Nature of Emails: A Comparative Perspective","authors":"Edina Harbinja","doi":"10.2139/SSRN.2742231","DOIUrl":"https://doi.org/10.2139/SSRN.2742231","url":null,"abstract":"There is currently a conflict between laws and the market in their treatment of email. Laws mandate that emails are not protected as property unless copyrightable or protected by another legal mechanism. But the market suggests that emails are user-owned property without further qualification. Moreover, the nature of email is treated slightly differently between the U.S. and U.K. legal regimes. While the current legal regimes applicable to email in the U.K. and U.S. are reasonable, legal harmonization within these systems, and with the service provider market, should be achieved.","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"2015 1","pages":"227-255"},"PeriodicalIF":0.0,"publicationDate":"2016-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87843905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Reasonable Expectations of Privacy Settings: Social Media and the Stored Communications Act 隐私设置的合理期望:社交媒体和存储通信法案
Duke law and technology review Pub Date : 2015-01-08 DOI: 10.2139/SSRN.2306839
Christopher J. Borchert, Fernando M. Pinguelo, D. Thaw
{"title":"Reasonable Expectations of Privacy Settings: Social Media and the Stored Communications Act","authors":"Christopher J. Borchert, Fernando M. Pinguelo, D. Thaw","doi":"10.2139/SSRN.2306839","DOIUrl":"https://doi.org/10.2139/SSRN.2306839","url":null,"abstract":"In 1986, Congress passed the Stored Communications Act (“SCA”) to provide additional protections for individuals’ private communications content held in electronic storage by third parties. Acting out of direct concern for the implications of the Third-Party Records Doctrine — a judicially created doctrine that generally eliminates Fourth Amendment protections for information entrusted to third parties — Congress sought to tailor the SCA to electronic communications sent via and stored by third parties. Yet, because Congress crafted the SCA with language specific to the technology of 1986, courts today have struggled to apply the SCA consistently with regard to similar private content sent using different technologies. This Article argues that Congress should revisit the SCA and adopt a single, technology-neutral standard of protection for private communications content held by third-party service providers. Furthermore, it suggests that Congress specifically intended to limit the scope of the Third-Party Records Doctrine by creating greater protections via the SCA, and thus courts interpreting existing law should afford protection to new technologies such as social media communications consistent with that intent based on individuals’ expressed privacy preferences.","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"44 1","pages":"36-65"},"PeriodicalIF":0.0,"publicationDate":"2015-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83237239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
After Prometheus, Are Human Genes Patentable Subject Matter? 继普罗米修斯之后,人类基因是否可以申请专利?
Duke law and technology review Pub Date : 2012-12-19 DOI: 10.2139/SSRN.2191523
Douglas L. Rogers
{"title":"After Prometheus, Are Human Genes Patentable Subject Matter?","authors":"Douglas L. Rogers","doi":"10.2139/SSRN.2191523","DOIUrl":"https://doi.org/10.2139/SSRN.2191523","url":null,"abstract":"On November 30, 2012, the U.S. Supreme Court granted certiorari in Association for Molecular Pathology v. Myriad Genetics, Inc. on the question, “Are human genes patentable?” For over 150 years Supreme Court decisions have excluded from the federal patent power laws of nature and physical phenomena. The words \"invention,\" \"new\" and \"useful\" in §101 are consistent with these exclusions from the federal patent power, so they are not the result of a judicially active court limiting the will of Congress. The conclusions of Judges Lourie and Moore in Myriad Genetics that the isolated DNA segments of claim 1 constitute patentable subject matter disregard the Supreme Court's decisions in Chakrabarty and Funk Brothers on products derived from nature. “Isolation” is not an inventive step to change an unpatentable physical phenomenon into patentable subject matter. Turning to claim 2, even if the isolated cDNA segments do not under Chakrabarty and Funk Brother constitute a patentable product, under Prometheus the isolated cDNA segments capture an unpatentable law of nature - the genetic code. Since no inventive step has been added to the genetic code in claim 2, the cDNA of claim 2 constitutes unpatentable subject matter under Prometheus. The Federal Circuit’s disregard in Myriad Genetics of the laws of nature threatens to eviscerate the public domain of basic scientific knowledge.","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"40 1","pages":"434-508"},"PeriodicalIF":0.0,"publicationDate":"2012-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73252384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Open Source Innovation, Patent Injunctions, and the Public Interest 开源创新、专利禁令和公共利益
Duke law and technology review Pub Date : 2012-01-01 DOI: 10.2139/SSRN.3084088
J. Boyle
{"title":"Open Source Innovation, Patent Injunctions, and the Public Interest","authors":"J. Boyle","doi":"10.2139/SSRN.3084088","DOIUrl":"https://doi.org/10.2139/SSRN.3084088","url":null,"abstract":"","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":"51 1","pages":"30-64"},"PeriodicalIF":0.0,"publicationDate":"2012-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90533288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Reviving informed consent: using risk perception in clinical trials. 恢复知情同意:在临床试验中使用风险感知。
Duke law and technology review Pub Date : 2003-06-09
Dana Ziker
{"title":"Reviving informed consent: using risk perception in clinical trials.","authors":"Dana Ziker","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>The current doctrine of informed consent falls far short of its potential to serve as a valuable safeguard for human research subjects. Instead of providing a channel of communication between physician and subject, informed consent is a lifeless entity responsible for a large portion of the misunderstanding existing between these parties. Acknowledging risk perception principles may help transform the informed consent process into an effective communication of health risks.</p>","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":" ","pages":"E1"},"PeriodicalIF":0.0,"publicationDate":"2003-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"24955623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The case for national DNA identification cards. 国家DNA识别卡的案例。
Duke law and technology review Pub Date : 2003-01-01
Ben Quarmby
{"title":"The case for national DNA identification cards.","authors":"Ben Quarmby","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>Foes of the United States have demonstrated their ability to strike at the heart of this country. Fear of renewed attacks and a desire for greater national security have now prompted many to call for improvements in the national personal identification system. In particular, the possibility of a national identification card containing the carrier's DNA information is being seriously considered. However, this raises difficult questions. Would such a card system, and the extraction of individuals' DNA it entails, violate the 4th Amendment of the Constitution? This article will shows that such a card system could in fact be found to be constitutional under the law of privacy as it stands today.</p>","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":" ","pages":"E1"},"PeriodicalIF":0.0,"publicationDate":"2003-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"24955619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defining a new ethical standard for human in vitro embryos in the context of stem cell research. 在干细胞研究的背景下定义人类体外胚胎的新伦理标准。
Duke law and technology review Pub Date : 2002-12-10
Sina A Muscati
{"title":"Defining a new ethical standard for human in vitro embryos in the context of stem cell research.","authors":"Sina A Muscati","doi":"","DOIUrl":"","url":null,"abstract":"<p><p>This iBrief discusses some of the social, ethical and legal considerations surrounding the use of unimplanted, in vitro embryos in stem cell research. It proposes that a new ethical standard be elucidated for these embryos. The iBrief gives an overview of two proposals for such a standard at opposite ends of the spectrum: treating the in vitro embryo as a legal person versus treating it as mere property. It argues against both approaches. The former can have undesirable social implications including undue interference with female reproductive autonomy, while the latter would objectify potential human life and reproductive potential. The iBrief proposes an intermediate approach that treats the embryo as a special entity. It warns against a model whereby the respect accorded to embryos is made dependent on the attainment of various qualitative or developmental criteria. The complexities surrounding human life, it argues, are too uncertain. What is certain is the embryo's unique potential for human life, at any developmental stage. This, the iBrief proposes, should be the sole criterion for an embryo's special status, a status that should be confined within constitutional limits.</p>","PeriodicalId":87176,"journal":{"name":"Duke law and technology review","volume":" ","pages":"E1"},"PeriodicalIF":0.0,"publicationDate":"2002-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"24955618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信