SlideShare una empresa de Scribd logo
1 de 9
Descargar para leer sin conexión
AI and Legal Tech in Context:
Governing Privacy and Security Commons
How effective privacy and information security depend on
formal and informal institutions that encourage sharing
knowledge, information, and data.
Michael Madison
University of Pittsburgh School of Law & Pitt Cyber
ACBA February 2018
@profmadison
& knowledge-commons.net
Artificial intelligence / algorithms / cognitive
computing raise numerous non-technical public
policy questions in legal settings as well as
elsewhere
Privacy concerns ● security concerns ● transparency concerns ●
accountability concerns ● accessibility concerns ● monopoly &
competition concerns ● cooperation & exclusivity concerns ● “nature
of humanity” concerns
Normative / conceptual / theoretical questions: What role{s} should AI /
algorithms play?
Descriptive / research-based questions: How do systems for
generating, distributing, accessing, and managing information operate
in practice?
The research question
How is effective privacy / security accomplished?
The hypothesis: governance
Privacy and security are grounded in commons
institutions (i.e., they depend on formal and informal
group-based patterns of practice and belief) and
require more than technical solutions (e.g.,
authentication techniques) or legal rules (e.g.,
criminal enforcement).
@profmadison
& knowledge-commons.net
The research strategy
We study information and knowledge commons,
institutions that generate and protect information by
sharing it in the context of rule-based systems.
Commons are
Institutionalized sharing of resources among
members of some group or community, solving some
social dilemma.
Not a place. Not a thing. Not “the commons.”
@profmadison
& knowledge-commons.net
5
The research to date
• Defined the Knowledge Commons Research
Framework (Madison et al. 2010) (building on
Ostrom 1990)
• Governing Knowledge Commons (Frischmann et
al. Oxford UP 2014)
• Governing Medical Knowledge Commons
(Strandburg et al. Cambridge UP 2017)
• Governing Privacy Commons (forthcoming
Cambridge UP)
• Governing University Commons (forthcoming
Cambridge UP)
@profmadison
& knowledge-commons.net
Privacy and security commons research in progress
In case study context, identify the informational dilemma(s) to be solved; the
resources to be managed; the group or community; the formal and informal rules by
which information in the group or community is governed (internal and external);
the outcomes – good or bad.
Privacy/security examples implicate (i) mix of privacy & collaboration rules
governing information resources (ii) in order to promote valuable practices:
• Anonymous, private, secure voting systems encourage democratic
participation and lead to aggregating political preferences in fair ways
• Financial institutions’ secure collection & management of customer data
encourages participation in financial markets
• Secure sharing of private information in social networks (both close-knit &
loose-knit) can promote healthy community and society
• Chatham House Rule for confidential meetings encourages productive
collaboration
@profmadison
& knowledge-commons.net
Strengths and weaknesses
• Contextual approach leads to learning more about variance in communities,
obstacles/dilemmas, objectives, and institutions beyond tech firms, beyond
markets, beyond governments
• Overlaps and intersections among commons institutions can be explored
• Bottom up learning about normative values
• Possibility of improving institutional design via design principles
BUT
• The approach doesn’t work at the extremes: privacy with n=1; privacy with
n=everyone
• The approach is complicated by working with physical / material resources
• Sidelines normative debate and values
• Essentially ethnographic; needs dedicated research community
@profmadison
& knowledge-commons.net
Payoffs: Artificial intelligence, algorithms, and
cognitive computing in context
• Commons governance – sharing information resources to generate productive
outcomes – is historical, traditional, and effective.
• Distinguish between information system as infrastructure (single resource,
multiple uses & users) and system as proprietary service (an exclusive thing).
Commons is more likely to be effective as governance for infrastructure.
• Payoff 1: Exclusivity matters most when AI is used in consulting one-to-one with
clients and delivering services to clients. Example: predictive analytics.
• Payoff 2: Commons may matter more, and may trump exclusivity, where legal
tech / AI operates as infrastructure – e.g., resource in advocacy and/or judicial
administration. Example: DNA testing, election security. Similar: case text
databases.
• Payoff 3: Governance cannot be divorced from hard values questions.
Capabilities of AI may challenge distinctions between humans and tech in
framing big “what is justice?” questions. If AI can write briefs (as Westlaw can,
or will soon), and if AI can adjudicate disputes (as insurance carriers may soon
do, with simple claims), then why have lawyers? That’s not a rhetorical question.
Thank you! @profmadison
& knowledge-commons.net

Más contenido relacionado

La actualidad más candente

ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information SpringESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
eswcsummerschool
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
Harshitha Reddy
 
CFP-Word
CFP-WordCFP-Word
CFP-Word
butest
 

La actualidad más candente (20)

Philosophical Aspects of Big Data
Philosophical Aspects of Big DataPhilosophical Aspects of Big Data
Philosophical Aspects of Big Data
 
Advisory Board
Advisory BoardAdvisory Board
Advisory Board
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital Rules
 
e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018e-SIDES presentation at NordSteva Conference, 11/12/2018
e-SIDES presentation at NordSteva Conference, 11/12/2018
 
Student vulnerability, agency and learning analytics: an exploration
Student vulnerability, agency and learning analytics: an explorationStudent vulnerability, agency and learning analytics: an exploration
Student vulnerability, agency and learning analytics: an exploration
 
Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...Privacy-driven design of Learning Analytics applications – exploring the desi...
Privacy-driven design of Learning Analytics applications – exploring the desi...
 
Presentation #2:Open/Big Urban Data
Presentation #2:Open/Big Urban DataPresentation #2:Open/Big Urban Data
Presentation #2:Open/Big Urban Data
 
Howard Back,Ppt
Howard Back,PptHoward Back,Ppt
Howard Back,Ppt
 
hackivism
hackivismhackivism
hackivism
 
Cybertech
CybertechCybertech
Cybertech
 
E. Bryan - E-Governance and Personal Privacy
E. Bryan -  E-Governance and Personal PrivacyE. Bryan -  E-Governance and Personal Privacy
E. Bryan - E-Governance and Personal Privacy
 
Information Governance: accentuating the positive, eliminating the negative
Information Governance: accentuating the positive, eliminating the negativeInformation Governance: accentuating the positive, eliminating the negative
Information Governance: accentuating the positive, eliminating the negative
 
ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information SpringESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
ESWC SS 2013 - Wednesday Keynote Kieron O'hara: The Information Spring
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
2015.12.22 teri open research
2015.12.22 teri open research2015.12.22 teri open research
2015.12.22 teri open research
 
CFP-Word
CFP-WordCFP-Word
CFP-Word
 
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
RESEARCH ETHICS AND PUBLIC TRUST, PRECONDITIONS FOR CONTINUED GROWTH OF INTER...
 
Issues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human BehaviorIssues: What the Web Can Tell us About Human Behavior
Issues: What the Web Can Tell us About Human Behavior
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 

Similar a AI and Legal Tech in Context: Privacy and Security Commons

Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docxResponses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
ronak56
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
Pranav Godse
 

Similar a AI and Legal Tech in Context: Privacy and Security Commons (20)

A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docx
 
DATAIA & TransAlgo
DATAIA & TransAlgoDATAIA & TransAlgo
DATAIA & TransAlgo
 
Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docxResponses to Questions Posed by Ms. Melissa Hathaway During He.docx
Responses to Questions Posed by Ms. Melissa Hathaway During He.docx
 
Privacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen CullyerPrivacy in the Digital Age, Helen Cullyer
Privacy in the Digital Age, Helen Cullyer
 
Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...Blurring the Boundaries? Ethical challenges in using social media for social...
Blurring the Boundaries? Ethical challenges in using social media for social...
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
ERN-Data-Ethics.pptx
ERN-Data-Ethics.pptxERN-Data-Ethics.pptx
ERN-Data-Ethics.pptx
 
Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61Emerging Technologies in Data Sharing and Analytics at Data61
Emerging Technologies in Data Sharing and Analytics at Data61
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
INFORMATION WANTS SOMEONE ELSE TO PAY FOR IT : AS SCIENCE AND SCHOLARSHIP EVO...
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
UKSG 2018 Plenary - Privacy and the library patron: an ongoing ethical challe...
 
Privacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challengePrivacy and the library patron: an ongoing ethical challenge
Privacy and the library patron: an ongoing ethical challenge
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015Sparc Funders Publishers Workshop 071015
Sparc Funders Publishers Workshop 071015
 
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
e-SIDES workshop at ICE-IEEE Conference, Madeira 28/06/2017
 
Health information professionals and Artificial Intelligence
Health information professionals and Artificial IntelligenceHealth information professionals and Artificial Intelligence
Health information professionals and Artificial Intelligence
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
6-Ch04-Ethics regarding IS _15Ed.pptx
6-Ch04-Ethics regarding IS _15Ed.pptx6-Ch04-Ethics regarding IS _15Ed.pptx
6-Ch04-Ethics regarding IS _15Ed.pptx
 

Más de professormadison

Más de professormadison (16)

AI and the Future of Communities - 2024 Human Futures Conference
AI and the Future of Communities - 2024 Human Futures ConferenceAI and the Future of Communities - 2024 Human Futures Conference
AI and the Future of Communities - 2024 Human Futures Conference
 
US Academic Finance 101, for Legal Education and Universities
US Academic Finance 101, for Legal Education and UniversitiesUS Academic Finance 101, for Legal Education and Universities
US Academic Finance 101, for Legal Education and Universities
 
2023 - CMU - Smart Cities lunch and learn.pdf
2023 - CMU - Smart Cities lunch and learn.pdf2023 - CMU - Smart Cities lunch and learn.pdf
2023 - CMU - Smart Cities lunch and learn.pdf
 
2022 - Other Internet.pptx
2022 - Other Internet.pptx2022 - Other Internet.pptx
2022 - Other Internet.pptx
 
2022 - European Humanities University presentation
2022 - European Humanities University presentation2022 - European Humanities University presentation
2022 - European Humanities University presentation
 
Intellectual Property Overview.pdf
Intellectual Property Overview.pdfIntellectual Property Overview.pdf
Intellectual Property Overview.pdf
 
Knowledge Commons - Project Status - Spring 2022.pdf
Knowledge Commons - Project Status - Spring 2022.pdfKnowledge Commons - Project Status - Spring 2022.pdf
Knowledge Commons - Project Status - Spring 2022.pdf
 
Smart Cities and Pittsburgh - Spring 2022.pdf
Smart Cities and Pittsburgh - Spring 2022.pdfSmart Cities and Pittsburgh - Spring 2022.pdf
Smart Cities and Pittsburgh - Spring 2022.pdf
 
Future.Law.Fall.2021.pdf
Future.Law.Fall.2021.pdfFuture.Law.Fall.2021.pdf
Future.Law.Fall.2021.pdf
 
Policy and Piracy
Policy and PiracyPolicy and Piracy
Policy and Piracy
 
Governing knowledge commons a short history and update
Governing knowledge commons   a short history and updateGoverning knowledge commons   a short history and update
Governing knowledge commons a short history and update
 
Origins of knowledge commons - open science in historical perspective
Origins of knowledge commons - open science in historical perspectiveOrigins of knowledge commons - open science in historical perspective
Origins of knowledge commons - open science in historical perspective
 
Madison - TAU IP and Institutions - May 2018
Madison - TAU IP and Institutions - May 2018Madison - TAU IP and Institutions - May 2018
Madison - TAU IP and Institutions - May 2018
 
Innovation at Pitt Law Spring 2018
Innovation at Pitt Law Spring 2018Innovation at Pitt Law Spring 2018
Innovation at Pitt Law Spring 2018
 
Data Models and the DMCA
Data Models and the DMCAData Models and the DMCA
Data Models and the DMCA
 
Biobanks as Knowledge Institutions
Biobanks as Knowledge InstitutionsBiobanks as Knowledge Institutions
Biobanks as Knowledge Institutions
 

Último

一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
bd2c5966a56d
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
nyabatejosphat1
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
ShashankKumar441258
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
bd2c5966a56d
 

Último (20)

589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf589308994-interpretation-of-statutes-notes-law-college.pdf
589308994-interpretation-of-statutes-notes-law-college.pdf
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
Clarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo forClarifying Land Donation Issues Memo for
Clarifying Land Donation Issues Memo for
 
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdfBPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
BPA GROUP 7 - DARIO VS. MISON REPORTING.pdf
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
$ Love Spells^ 💎 (310) 882-6330 in Utah, UT | Psychic Reading Best Black Magi...
 
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
Independent Call Girls Pune | 8005736733 Independent Escorts & Dating Escorts...
 
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
Sensual Moments: +91 9999965857 Independent Call Girls Vasundhara Delhi {{ Mo...
 
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Nangli Wazidpur Sector 135 ( Noida)
 
Transferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptxTransferable and Non-Transferable Property.pptx
Transferable and Non-Transferable Property.pptx
 
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top BoutiqueAndrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
Andrea Hill Featured in Canadian Lawyer as SkyLaw Recognized as a Top Boutique
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptxMOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
MOCK GENERAL MEETINGS (SS-2)- PPT- Part 2.pptx
 
Human Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptxHuman Rights_FilippoLuciani diritti umani.pptx
Human Rights_FilippoLuciani diritti umani.pptx
 
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptxKEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
KEY NOTE- IBC(INSOLVENCY & BANKRUPTCY CODE) DESIGN- PPT.pptx
 
INVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptxINVOLUNTARY TRANSFERS Kenya school of law.pptx
INVOLUNTARY TRANSFERS Kenya school of law.pptx
 
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
6th sem cpc notes for 6th semester students samjhe. Padhlo bhai
 
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
8. SECURITY GUARD CREED, CODE OF CONDUCT, COPE.pptx
 
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
一比一原版(UC毕业证书)堪培拉大学毕业证如何办理
 
PPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptxPPT- Voluntary Liquidation (Under section 59).pptx
PPT- Voluntary Liquidation (Under section 59).pptx
 

AI and Legal Tech in Context: Privacy and Security Commons

  • 1. AI and Legal Tech in Context: Governing Privacy and Security Commons How effective privacy and information security depend on formal and informal institutions that encourage sharing knowledge, information, and data. Michael Madison University of Pittsburgh School of Law & Pitt Cyber ACBA February 2018 @profmadison & knowledge-commons.net
  • 2. Artificial intelligence / algorithms / cognitive computing raise numerous non-technical public policy questions in legal settings as well as elsewhere Privacy concerns ● security concerns ● transparency concerns ● accountability concerns ● accessibility concerns ● monopoly & competition concerns ● cooperation & exclusivity concerns ● “nature of humanity” concerns Normative / conceptual / theoretical questions: What role{s} should AI / algorithms play? Descriptive / research-based questions: How do systems for generating, distributing, accessing, and managing information operate in practice?
  • 3. The research question How is effective privacy / security accomplished? The hypothesis: governance Privacy and security are grounded in commons institutions (i.e., they depend on formal and informal group-based patterns of practice and belief) and require more than technical solutions (e.g., authentication techniques) or legal rules (e.g., criminal enforcement). @profmadison & knowledge-commons.net
  • 4. The research strategy We study information and knowledge commons, institutions that generate and protect information by sharing it in the context of rule-based systems. Commons are Institutionalized sharing of resources among members of some group or community, solving some social dilemma. Not a place. Not a thing. Not “the commons.” @profmadison & knowledge-commons.net
  • 5. 5 The research to date • Defined the Knowledge Commons Research Framework (Madison et al. 2010) (building on Ostrom 1990) • Governing Knowledge Commons (Frischmann et al. Oxford UP 2014) • Governing Medical Knowledge Commons (Strandburg et al. Cambridge UP 2017) • Governing Privacy Commons (forthcoming Cambridge UP) • Governing University Commons (forthcoming Cambridge UP) @profmadison & knowledge-commons.net
  • 6. Privacy and security commons research in progress In case study context, identify the informational dilemma(s) to be solved; the resources to be managed; the group or community; the formal and informal rules by which information in the group or community is governed (internal and external); the outcomes – good or bad. Privacy/security examples implicate (i) mix of privacy & collaboration rules governing information resources (ii) in order to promote valuable practices: • Anonymous, private, secure voting systems encourage democratic participation and lead to aggregating political preferences in fair ways • Financial institutions’ secure collection & management of customer data encourages participation in financial markets • Secure sharing of private information in social networks (both close-knit & loose-knit) can promote healthy community and society • Chatham House Rule for confidential meetings encourages productive collaboration @profmadison & knowledge-commons.net
  • 7. Strengths and weaknesses • Contextual approach leads to learning more about variance in communities, obstacles/dilemmas, objectives, and institutions beyond tech firms, beyond markets, beyond governments • Overlaps and intersections among commons institutions can be explored • Bottom up learning about normative values • Possibility of improving institutional design via design principles BUT • The approach doesn’t work at the extremes: privacy with n=1; privacy with n=everyone • The approach is complicated by working with physical / material resources • Sidelines normative debate and values • Essentially ethnographic; needs dedicated research community @profmadison & knowledge-commons.net
  • 8. Payoffs: Artificial intelligence, algorithms, and cognitive computing in context • Commons governance – sharing information resources to generate productive outcomes – is historical, traditional, and effective. • Distinguish between information system as infrastructure (single resource, multiple uses & users) and system as proprietary service (an exclusive thing). Commons is more likely to be effective as governance for infrastructure. • Payoff 1: Exclusivity matters most when AI is used in consulting one-to-one with clients and delivering services to clients. Example: predictive analytics. • Payoff 2: Commons may matter more, and may trump exclusivity, where legal tech / AI operates as infrastructure – e.g., resource in advocacy and/or judicial administration. Example: DNA testing, election security. Similar: case text databases. • Payoff 3: Governance cannot be divorced from hard values questions. Capabilities of AI may challenge distinctions between humans and tech in framing big “what is justice?” questions. If AI can write briefs (as Westlaw can, or will soon), and if AI can adjudicate disputes (as insurance carriers may soon do, with simple claims), then why have lawyers? That’s not a rhetorical question.
  • 9. Thank you! @profmadison & knowledge-commons.net