This book proposes a regulatory system for ensuring that AI makes fair decisions.
No one wants to be the subject of an unfair decision made by an AI, and fairness is so important to society that we are likely to want to regulate to demand it. But how? This book attempts to answer that question. The aim of regulation must be for an AI's decisions to match the human conception of fairness. To understand what that is, the book proposes a holistic understanding of fairness, which tells us what regulation must try to achieve. However, regulation is not an abstract activity - it regulates how humans behave, and the humans in question are those who develop and use AI for decision-making. Thus the book investigates how those humans are attempting to achieve AI fairness. It finds that there is a serious mismatch between how technologists conceptualise fairness, compared to other humans. How can AI regulation bridge this gap? Traditional models of regulation cannot solve this problem. Fairness is too nuanced, too contextual, and is ultimately a human emotional response. Instead the book proposes to place the responsibility on the AI community to explain and justify their efforts to achieve fairness, basing regulatory and legal responses on how well that explanation deals with the risks that particular AI presents, and whether the AI operates in accordance with the explanation in use. The book concludes by examining how far this regulatory model might be useful for some of the other social problems which AI generates. An original and significant contribution to the literature on AI regulation, this book is a must-read for those working in the areas of law, regulation, and technology.This resource provides an understanding of software licensing and cloud computing agreements. It examines the fundamental issues that both licensors and licensees confront in the negotiation of a software license and, where appropriate, looks at relevant ancillary issues such as software development, cloud computing, professional services, and maintenance and support. Also discussed are software development kits (SDKs), application program interfaces (APIs), service level agreements (SLAs), and escrow agreements. The book focuses primarily on non-mass-market production licenses, as most retail or mass-market off-the-shelf software is governed by nonnegotiable shrink-wrap, browse-wrap, and click-wrap licenses.
Written in practical, user-friendly language, this book is cross-referenced to a model agreement, written from the perspective of both the licensor and the licensee. Customizable and easy-to-use model forms with alternative clauses to fit many perspectives and agreements are included in an online website.
New in the Eighth Edition:
In The United States of Anonymous, Jeff Kosseff explores how the right to anonymity has shaped American values, politics, business, security, and discourse, particularly as technology has enabled people to separate their identities from their communications.
Legal and political debates surrounding online privacy often focus on the Fourth Amendment's protection against unreasonable searches and seizures, overlooking the history and future of an equally powerful privacy right: the First Amendment's protection of anonymity. The United States of Anonymous features extensive and engaging interviews with people involved in the highest profile anonymity cases, as well as with those who have benefited from, and been harmed by, anonymous communications. Through these interviews, Kosseff explores how courts have protected anonymity for decades and, likewise, how law and technology have allowed individuals to control how much, if any, identifying information is associated with their communications. From blocking laws that prevent Ku Klux Klan members from wearing masks to restraining Alabama officials from forcing the NAACP to disclose its membership lists, and to refusing companies' requests to unmask online critics, courts have recognized that anonymity is a vital part of our free speech protections.
The United States of Anonymous weighs the tradeoffs between the right to hide identity and the harms of anonymity, concluding that we must maintain a strong, if not absolute, right to anonymous speech.
Every day, corporations are connecting the dots about our personal behavior--silently scrutinizing clues left behind by our work habits and Internet use. The data compiled and portraits created are incredibly detailed, to the point of being invasive. But who connects the dots about what firms are doing with this information? The Black Box Society argues that we all need to be able to do so--and to set limits on how big data affects our lives.
Hidden algorithms can make (or ruin) reputations, decide the destiny of entrepreneurs, or even devastate an entire economy. Shrouded in secrecy and complexity, decisions at major Silicon Valley and Wall Street firms were long assumed to be neutral and technical. But leaks, whistleblowers, and legal disputes have shed new light on automated judgment. Self-serving and reckless behavior is surprisingly common, and easy to hide in code protected by legal and real secrecy. Even after billions of dollars of fines have been levied, underfunded regulators may have only scratched the surface of this troubling behavior. Frank Pasquale exposes how powerful interests abuse secrecy for profit and explains ways to rein them in. Demanding transparency is only the first step. An intelligible society would assure that key decisions of its most important firms are fair, nondiscriminatory, and open to criticism. Silicon Valley and Wall Street need to accept as much accountability as they impose on others.Most Internet users are familiar with trolling--aggressive, foul-mouthed posts designed to elicit angry responses in a site's comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the startling extent of personal cyber-attacks and proposes practical, lawful ways to prevent and punish online harassment. A refutation of those who claim that these attacks are legal, or at least impossible to stop, Hate Crimes in Cyberspace reveals the serious emotional, professional, and financial harms incurred by victims.
Persistent online attacks disproportionately target women and frequently include detailed fantasies of rape as well as reputation-ruining lies and sexually explicit photographs. And if dealing with a single attacker's revenge porn were not enough, harassing posts that make their way onto social media sites often feed on one another, turning lone instigators into cyber-mobs. Hate Crimes in Cyberspace rejects the view of the Internet as an anarchic Wild West, where those who venture online must be thick-skinned enough to endure all manner of verbal assault in the name of free speech protection, no matter how distasteful or abusive. Cyber-harassment is a matter of civil rights law, Citron contends, and legal precedents as well as social norms of decency and civility must be leveraged to stop it.Experts predict that in 5 years' time, more than 90% of all digital content will be wholly or partially AI generated. In a synthetic society, it may no longer be possible to establish what is real and what is not. Central to this open access book are 4 technologies on the frontline of this trend: humanoid robots, deepfakes, augmented reality, and virtual reality.
Although they are only in their relative infancy, these technologies can already produce content that is indistinguishable from authentic material. The impact of this new reality on democracy, the judicial system, the functioning of the press, as well as on personal relationships will be unprecedented. Van der Sloot describes the technological fundaments of each of those technologies and maps their positive uses for educational purposes as well as for the treatment of patients, for the entertainment and creative industries, and the retail and financial sectors. The book also conceptualises their negative uses for fraud, deception, exploitation, identity-theft and exploitation, and shows their deeper effects on the post-truth society, the privatisation of the public sphere, and the loss of individual autonomy and societal trust. The book evaluates how the current European legal paradigm applies to these technologies, focussing on the right to privacy and data protection, freedom of expression, procedural law, tort law, and the regulation of AI. It discusses regulatory alternatives to solve existing regulatory gaps and shows that there are no easy answers. The ebook editions of this book are available open access under a CC BY-NC-ND 4.0 licence on bloomsburycollections.com.With cyber security law being increasingly contentious, organisations require expert assistance to operationalise matters and uphold a necessarily robust security framework.
Invaluable for legal practitioners and organisations, this comprehensive text covers both the law and its practical application, helping to ensure that advisers and organisations have effective policies and procedures in place to deal with cyber security. Topics covered range from privacy and security in the workplace and built environment, to social media and cyber security, and international law and interaction between states. Revised and updated, the Second Edition also benefits readers with coverage of new topics including: - The legal risks of generative AI