SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
AI and Legal Tech in Context:
Governing Privacy and Security Commons
How effective privacy and information security depend on
formal and informal institutions that encourage sharing
knowledge, information, and data.
Michael Madison
University of Pittsburgh School of Law & Pitt Cyber
ACBA February 2018
@profmadison
& knowledge-commons.net
Artificial intelligence / algorithms / cognitive
computing raise numerous non-technical public
policy questions in legal settings as well as
elsewhere
Privacy concerns ● security concerns ● transparency concerns ●
accountability concerns ● accessibility concerns ● monopoly &
competition concerns ● cooperation & exclusivity concerns ● “nature
of humanity” concerns
Normative / conceptual / theoretical questions: What role{s} should AI /
algorithms play?
Descriptive / research-based questions: How do systems for
generating, distributing, accessing, and managing information operate
in practice?
The research question
How is effective privacy / security accomplished?
The hypothesis: governance
Privacy and security are grounded in commons
institutions (i.e., they depend on formal and informal
group-based patterns of practice and belief) and
require more than technical solutions (e.g.,
authentication techniques) or legal rules (e.g.,
criminal enforcement).
@profmadison
& knowledge-commons.net
The research strategy
We study information and knowledge commons,
institutions that generate and protect information by
sharing it in the context of rule-based systems.
Commons are
Institutionalized sharing of resources among
members of some group or community, solving some
social dilemma.
Not a place. Not a thing. Not “the commons.”
@profmadison
& knowledge-commons.net
5
The research to date
• Defined the Knowledge Commons Research
Framework (Madison et al. 2010) (building on
Ostrom 1990)
• Governing Knowledge Commons (Frischmann et
al. Oxford UP 2014)
• Governing Medical Knowledge Commons
(Strandburg et al. Cambridge UP 2017)
• Governing Privacy Commons (forthcoming
Cambridge UP)
• Governing University Commons (forthcoming
Cambridge UP)
@profmadison
& knowledge-commons.net
Privacy and security commons research in progress
In case study context, identify the informational dilemma(s) to be solved; the
resources to be managed; the group or community; the formal and informal rules by
which information in the group or community is governed (internal and external);
the outcomes – good or bad.
Privacy/security examples implicate (i) mix of privacy & collaboration rules
governing information resources (ii) in order to promote valuable practices:
• Anonymous, private, secure voting systems encourage democratic
participation and lead to aggregating political preferences in fair ways
• Financial institutions’ secure collection & management of customer data
encourages participation in financial markets
• Secure sharing of private information in social networks (both close-knit &
loose-knit) can promote healthy community and society
• Chatham House Rule for confidential meetings encourages productive
collaboration
@profmadison
& knowledge-commons.net
Strengths and weaknesses
• Contextual approach leads to learning more about variance in communities,
obstacles/dilemmas, objectives, and institutions beyond tech firms, beyond
markets, beyond governments
• Overlaps and intersections among commons institutions can be explored
• Bottom up learning about normative values
• Possibility of improving institutional design via design principles
BUT
• The approach doesn’t work at the extremes: privacy with n=1; privacy with
n=everyone
• The approach is complicated by working with physical / material resources
• Sidelines normative debate and values
• Essentially ethnographic; needs dedicated research community
@profmadison
& knowledge-commons.net
Payoffs: Artificial intelligence, algorithms, and
cognitive computing in context
• Commons governance – sharing information resources to generate productive
outcomes – is historical, traditional, and effective.
• Distinguish between information system as infrastructure (single resource,
multiple uses & users) and system as proprietary service (an exclusive thing).
Commons is more likely to be effective as governance for infrastructure.
• Payoff 1: Exclusivity matters most when AI is used in consulting one-to-one with
clients and delivering services to clients. Example: predictive analytics.
• Payoff 2: Commons may matter more, and may trump exclusivity, where legal
tech / AI operates as infrastructure – e.g., resource in advocacy and/or judicial
administration. Example: DNA testing, election security. Similar: case text
databases.
• Payoff 3: Governance cannot be divorced from hard values questions.
Capabilities of AI may challenge distinctions between humans and tech in
framing big “what is justice?” questions. If AI can write briefs (as Westlaw can,
or will soon), and if AI can adjudicate disputes (as insurance carriers may soon
do, with simple claims), then why have lawyers? That’s not a rhetorical question.
Thank you! @profmadison
& knowledge-commons.net

Mais conteúdo relacionado

Mais procurados

ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information SpringESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
eswcsummerschool
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
Harshitha Reddy
 
CFP-Word
CFP-WordCFP-Word
CFP-Word
butest
 

Mais procurados (20)

Philosophical Aspects of Big Data
Philosophical Aspects of Big DataPhilosophical Aspects of Big Data
Philosophical Aspects of Big Data
 
Advisory Board
Advisory BoardAdvisory Board
Advisory Board
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital Rules
 
e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018
 
Student vulnerability, agency and learning analytics: an exploration
Student vulnerability, agency and learning analytics: an explorationStudent vulnerability, agency and learning analytics: an exploration
Student vulnerability, agency and learning analytics: an exploration
 
Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...
 
Presentation #2:Open/Big Urban Data
Presentation #2:Open/Big Urban DataPresentation #2:Open/Big Urban Data
Presentation #2:Open/Big Urban Data
 
Howard Back,Ppt
Howard Back,PptHoward Back,Ppt
Howard Back,Ppt
 
hackivism
hackivismhackivism
hackivism
 
Cybertech
CybertechCybertech
Cybertech
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Information Governance: accentuating the positive, eliminating the negative
Information Governance: accentuating the positive, eliminating the negativeInformation Governance: accentuating the positive, eliminating the negative
Information Governance: accentuating the positive, eliminating the negative
 
ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information SpringESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
2015.12.22 teri open research
2015.12.22 teri open research2015.12.22 teri open research
2015.12.22 teri open research
 
CFP-Word
CFP-WordCFP-Word
CFP-Word
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behavior
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 

Semelhante a AI and Legal Tech in Context: Privacy and Security Commons

Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docxResponses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
ronak56
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
Pranav Godse
 

Semelhante a AI and Legal Tech in Context: Privacy and Security Commons (20)

A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docx
 
DATAIA & TransAlgo
DATAIA & TransAlgoDATAIA & TransAlgo
DATAIA & TransAlgo
 
Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docxResponses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
ERN-Data-Ethics.pptx
ERN-Data-Ethics.pptxERN-Data-Ethics.pptx
ERN-Data-Ethics.pptx
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challenge
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
 
Health information professionals and Artificial Intelligence
Health information professionals and Artificial IntelligenceHealth information professionals and Artificial Intelligence
Health information professionals and Artificial Intelligence
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
6-Ch04-Ethics regarding IS _15Ed.pptx
6-Ch04-Ethics regarding IS _15Ed.pptx6-Ch04-Ethics regarding IS _15Ed.pptx
6-Ch04-Ethics regarding IS _15Ed.pptx
 

Mais de professormadison

Mais de professormadison (16)

AI and the Future of Communities - 2024 Human Futures Conference
AI and the Future of Communities - 2024 Human Futures ConferenceAI and the Future of Communities - 2024 Human Futures Conference
AI and the Future of Communities - 2024 Human Futures Conference
 
US Academic Finance 101, for Legal Education and Universities
US Academic Finance 101, for Legal Education and UniversitiesUS Academic Finance 101, for Legal Education and Universities
US Academic Finance 101, for Legal Education and Universities
 
2023 - CMU - Smart Cities lunch and learn.pdf
2023 - CMU - Smart Cities lunch and learn.pdf2023 - CMU - Smart Cities lunch and learn.pdf
2023 - CMU - Smart Cities lunch and learn.pdf
 
2022 - Other Internet.pptx
2022 - Other Internet.pptx2022 - Other Internet.pptx
2022 - Other Internet.pptx
 
2022 - European Humanities University presentation
2022 - European Humanities University presentation2022 - European Humanities University presentation
2022 - European Humanities University presentation
 
Intellectual Property Overview.pdf
Intellectual Property Overview.pdfIntellectual Property Overview.pdf
Intellectual Property Overview.pdf
 
Knowledge Commons - Project Status - Spring 2022.pdf
Knowledge Commons - Project Status - Spring 2022.pdfKnowledge Commons - Project Status - Spring 2022.pdf
Knowledge Commons - Project Status - Spring 2022.pdf
 
Smart Cities and Pittsburgh - Spring 2022.pdf
Smart Cities and Pittsburgh - Spring 2022.pdfSmart Cities and Pittsburgh - Spring 2022.pdf
Smart Cities and Pittsburgh - Spring 2022.pdf
 
Future.Law.Fall.2021.pdf
Future.Law.Fall.2021.pdfFuture.Law.Fall.2021.pdf
Future.Law.Fall.2021.pdf
 
Policy and Piracy
Policy and PiracyPolicy and Piracy
Policy and Piracy
 
Governing knowledge commons a short history and update
Governing knowledge commons   a short history and updateGoverning knowledge commons   a short history and update
Governing knowledge commons a short history and update
 
Origins of knowledge commons - open science in historical perspective
Origins of knowledge commons - open science in historical perspectiveOrigins of knowledge commons - open science in historical perspective
Origins of knowledge commons - open science in historical perspective
 
Madison - TAU IP and Institutions - May 2018
Madison - TAU IP and Institutions - May 2018Madison - TAU IP and Institutions - May 2018
Madison - TAU IP and Institutions - May 2018
 
Innovation at Pitt Law Spring 2018
Innovation at Pitt Law Spring 2018Innovation at Pitt Law Spring 2018
Innovation at Pitt Law Spring 2018
 
Data Models and the DMCA
Data Models and the DMCAData Models and the DMCA
Data Models and the DMCA
 
Biobanks as Knowledge Institutions
Biobanks as Knowledge InstitutionsBiobanks as Knowledge Institutions
Biobanks as Knowledge Institutions
 

Último

一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
F La
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
Airst S
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
e9733fc35af6
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
irst
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
Airst S
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
e9733fc35af6
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
e9733fc35af6
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
A AA
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
Airst S
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
Airst S
 
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptCorporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
RRR Chambers
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
bd2c5966a56d
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
ss
 

Último (20)

一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
一比一原版(Cranfield毕业证书)克兰菲尔德大学毕业证如何办理
 
一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理一比一原版曼彻斯特城市大学毕业证如何办理
一比一原版曼彻斯特城市大学毕业证如何办理
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书一比一原版(USC毕业证书)南加州大学毕业证学位证书
一比一原版(USC毕业证书)南加州大学毕业证学位证书
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam TakersPhilippine FIRE CODE REVIEWER for Architecture Board Exam Takers
Philippine FIRE CODE REVIEWER for Architecture Board Exam Takers
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理一比一原版伦敦南岸大学毕业证如何办理
一比一原版伦敦南岸大学毕业证如何办理
 
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.pptCorporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
Corporate Governance (Indian Scenario, Legal frame work in India ) - PPT.ppt
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 

AI and Legal Tech in Context: Privacy and Security Commons

  • 1. AI and Legal Tech in Context: Governing Privacy and Security Commons How effective privacy and information security depend on formal and informal institutions that encourage sharing knowledge, information, and data. Michael Madison University of Pittsburgh School of Law & Pitt Cyber ACBA February 2018 @profmadison & knowledge-commons.net
  • 2. Artificial intelligence / algorithms / cognitive computing raise numerous non-technical public policy questions in legal settings as well as elsewhere Privacy concerns ● security concerns ● transparency concerns ● accountability concerns ● accessibility concerns ● monopoly & competition concerns ● cooperation & exclusivity concerns ● “nature of humanity” concerns Normative / conceptual / theoretical questions: What role{s} should AI / algorithms play? Descriptive / research-based questions: How do systems for generating, distributing, accessing, and managing information operate in practice?
  • 3. The research question How is effective privacy / security accomplished? The hypothesis: governance Privacy and security are grounded in commons institutions (i.e., they depend on formal and informal group-based patterns of practice and belief) and require more than technical solutions (e.g., authentication techniques) or legal rules (e.g., criminal enforcement). @profmadison & knowledge-commons.net
  • 4. The research strategy We study information and knowledge commons, institutions that generate and protect information by sharing it in the context of rule-based systems. Commons are Institutionalized sharing of resources among members of some group or community, solving some social dilemma. Not a place. Not a thing. Not “the commons.” @profmadison & knowledge-commons.net
  • 5. 5 The research to date • Defined the Knowledge Commons Research Framework (Madison et al. 2010) (building on Ostrom 1990) • Governing Knowledge Commons (Frischmann et al. Oxford UP 2014) • Governing Medical Knowledge Commons (Strandburg et al. Cambridge UP 2017) • Governing Privacy Commons (forthcoming Cambridge UP) • Governing University Commons (forthcoming Cambridge UP) @profmadison & knowledge-commons.net
  • 6. Privacy and security commons research in progress In case study context, identify the informational dilemma(s) to be solved; the resources to be managed; the group or community; the formal and informal rules by which information in the group or community is governed (internal and external); the outcomes – good or bad. Privacy/security examples implicate (i) mix of privacy & collaboration rules governing information resources (ii) in order to promote valuable practices: • Anonymous, private, secure voting systems encourage democratic participation and lead to aggregating political preferences in fair ways • Financial institutions’ secure collection & management of customer data encourages participation in financial markets • Secure sharing of private information in social networks (both close-knit & loose-knit) can promote healthy community and society • Chatham House Rule for confidential meetings encourages productive collaboration @profmadison & knowledge-commons.net
  • 7. Strengths and weaknesses • Contextual approach leads to learning more about variance in communities, obstacles/dilemmas, objectives, and institutions beyond tech firms, beyond markets, beyond governments • Overlaps and intersections among commons institutions can be explored • Bottom up learning about normative values • Possibility of improving institutional design via design principles BUT • The approach doesn’t work at the extremes: privacy with n=1; privacy with n=everyone • The approach is complicated by working with physical / material resources • Sidelines normative debate and values • Essentially ethnographic; needs dedicated research community @profmadison & knowledge-commons.net
  • 8. Payoffs: Artificial intelligence, algorithms, and cognitive computing in context • Commons governance – sharing information resources to generate productive outcomes – is historical, traditional, and effective. • Distinguish between information system as infrastructure (single resource, multiple uses & users) and system as proprietary service (an exclusive thing). Commons is more likely to be effective as governance for infrastructure. • Payoff 1: Exclusivity matters most when AI is used in consulting one-to-one with clients and delivering services to clients. Example: predictive analytics. • Payoff 2: Commons may matter more, and may trump exclusivity, where legal tech / AI operates as infrastructure – e.g., resource in advocacy and/or judicial administration. Example: DNA testing, election security. Similar: case text databases. • Payoff 3: Governance cannot be divorced from hard values questions. Capabilities of AI may challenge distinctions between humans and tech in framing big “what is justice?” questions. If AI can write briefs (as Westlaw can, or will soon), and if AI can adjudicate disputes (as insurance carriers may soon do, with simple claims), then why have lawyers? That’s not a rhetorical question.
  • 9. Thank you! @profmadison & knowledge-commons.net