首页 > 最新文献

Computer Law & Security Review最新文献

英文 中文
A systematic literature review on dark patterns for the legal community: definitional clarity-and a legal classification based on the Unfair Commercial Practices Directive 法律界对黑暗模式的系统文献回顾:定义的清晰度-以及基于不公平商业惯例指令的法律分类
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2025-09-01 Epub Date: 2025-07-21 DOI: 10.1016/j.clsr.2025.106169
Cecilia Isola , Fabrizio Esposito
This article offers a clear definition of dark patterns and a comprehensive classification thereof using the framework provided by Directive 2005/29 on unfair commercial practices. The analysis builds on a systematic literature review that analyses how dark patterns are defined and the types of dark patterns discussed in 116 articles, conference papers and regulatory documents. Accordingly, 'dark pattern' can be defined as 'the design of a digital choice environment that is capable of distorting user behaviour'. We point out that the following elements should not be included in the definition of dark pattern: intentionality of the designer and exploitation of heuristics or cognitive bias. We identify 42 types of dark patterns. All of them can be classified as: misleading omission; misleading action; harassment; undue influence; coercion. This classification is based on legal categories and helps bridge the gap between research and legal practice, thereby increasing the expected social impact of research on dark patterns.
这篇文章提供了一个明确的黑暗模式的定义,并使用指令2005/29关于不公平的商业行为提供的框架进行了全面的分类。该分析基于系统的文献综述,分析了黑暗模式的定义,以及116篇文章、会议论文和监管文件中讨论的黑暗模式的类型。因此,“暗模式”可以定义为“能够扭曲用户行为的数字选择环境的设计”。我们指出,以下因素不应包括在暗模式的定义中:设计者的意向性和启发式或认知偏见的利用。我们确定了42种黑色图案。所有这些都可以归类为:误导性遗漏;误导行动;骚扰;不正当影响;强制转换。这种分类以法律类别为基础,有助于弥合研究与法律实践之间的差距,从而增加对黑暗模式研究的预期社会影响。
{"title":"A systematic literature review on dark patterns for the legal community: definitional clarity-and a legal classification based on the Unfair Commercial Practices Directive","authors":"Cecilia Isola ,&nbsp;Fabrizio Esposito","doi":"10.1016/j.clsr.2025.106169","DOIUrl":"10.1016/j.clsr.2025.106169","url":null,"abstract":"<div><div>This article offers a clear definition of dark patterns and a comprehensive classification thereof using the framework provided by Directive 2005/29 on unfair commercial practices. The analysis builds on a systematic literature review that analyses how dark patterns are defined and the types of dark patterns discussed in 116 articles, conference papers and regulatory documents. Accordingly, 'dark pattern' can be defined as 'the design of a digital choice environment that is capable of distorting user behaviour'. We point out that the following elements should not be included in the definition of dark pattern: intentionality of the designer and exploitation of heuristics or cognitive bias. We identify 42 types of dark patterns. All of them can be classified as: misleading omission; misleading action; harassment; undue influence; coercion. This classification is based on legal categories and helps bridge the gap between research and legal practice, thereby increasing the expected social impact of research on dark patterns.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"58 ","pages":"Article 106169"},"PeriodicalIF":3.3,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144670443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital borders and beyond: Establishing normative grounds for cybersecurity and sovereignty in international law 数字边界及其以外:在国际法中建立网络安全和主权的规范基础
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-09-01 Epub Date: 2025-08-12 DOI: 10.1016/j.clsr.2025.106180
Kasim Balarabe
In the rapidly evolving digital age, the confluence of cybersecurity threats and the assertion of digital sovereignty by states has created a complex, multi-dimensional challenge for international law. The existing legal regimes governing state behavior in cyberspace are fragmented, outdated, and ill-equipped to address the novel, intangible, and interconnected nature of the digital domain. This article examines the gaps and limitations in the current international legal frameworks and proposes a dynamic, adaptable approach to establishing a normative foundation for cybersecurity and digital sovereignty. The article highlights the urgent need for clear definitions and categories of cybercrimes and cyberwarfare under international law, as well as the development of appropriate legal responses and enforcement mechanisms. It also explores the tensions between state sovereignty and global Internet governance, proposing a balanced framework that upholds both the legitimate security interests of states and the fundamental principles of human rights, transparency, and multistakeholder collaboration. Central to the article's argument is the call for a flexible, evolutionary architecture of international cybersecurity law, capable of keeping pace with rapid technological advancements and the ever-changing threat landscape. This framework should incorporate mechanisms for continuous improvement, effective attribution and accountability, and the active engagement of international organizations and multistakeholder initiatives. The article further emphasizes the critical role of geopolitical challenges in shaping the development of international cybersecurity norms. It advocates for a nuanced, pragmatic approach that acknowledges the competing interests and values of different state actors while striving to find common ground and build trust through dialogue and cooperation. In an era of increasing digital interconnectedness and the erosion of traditional borders, this article presents a compelling case for the adaptation of international law to address the complex realities of the digital age. It offers valuable insights and recommendations for policymakers, legal experts, and scholars seeking to navigate the uncharted territories of cybersecurity and digital sovereignty in the 21st century.
在快速发展的数字时代,网络安全威胁和国家对数字主权的主张交织在一起,给国际法带来了复杂的、多方面的挑战。管理网络空间国家行为的现有法律制度支离破碎、过时,无法应对数字领域的新颖性、无形性和互联性。本文考察了当前国际法律框架中的差距和局限性,并提出了一种动态的、适应性强的方法来建立网络安全和数字主权的规范基础。文章强调,迫切需要在国际法下明确网络犯罪和网络战的定义和类别,以及制定适当的法律回应和执法机制。它还探讨了国家主权与全球互联网治理之间的紧张关系,提出了一个平衡的框架,既维护国家的合法安全利益,又维护人权、透明度和多利益攸关方合作的基本原则。文章的核心论点是呼吁建立一个灵活、渐进的国际网络安全法律架构,能够跟上快速的技术进步和不断变化的威胁形势。这一框架应包括持续改进、有效归因和问责机制,以及国际组织和多利益攸关方倡议的积极参与。文章进一步强调了地缘政治挑战在塑造国际网络安全规范发展中的关键作用。它主张采取细致、务实的方式,承认不同国家行为体相互竞争的利益和价值观,同时努力通过对话与合作找到共同点,建立信任。在一个数字互联性日益增强、传统边界受到侵蚀的时代,本文提出了一个令人信服的案例,即修改国际法以应对数字时代的复杂现实。它为决策者、法律专家和学者在21世纪探索网络安全和数字主权的未知领域提供了宝贵的见解和建议。
{"title":"Digital borders and beyond: Establishing normative grounds for cybersecurity and sovereignty in international law","authors":"Kasim Balarabe","doi":"10.1016/j.clsr.2025.106180","DOIUrl":"10.1016/j.clsr.2025.106180","url":null,"abstract":"<div><div>In the rapidly evolving digital age, the confluence of cybersecurity threats and the assertion of digital sovereignty by states has created a complex, multi-dimensional challenge for international law. The existing legal regimes governing state behavior in cyberspace are fragmented, outdated, and ill-equipped to address the novel, intangible, and interconnected nature of the digital domain. This article examines the gaps and limitations in the current international legal frameworks and proposes a dynamic, adaptable approach to establishing a normative foundation for cybersecurity and digital sovereignty. The article highlights the urgent need for clear definitions and categories of cybercrimes and cyberwarfare under international law, as well as the development of appropriate legal responses and enforcement mechanisms. It also explores the tensions between state sovereignty and global Internet governance, proposing a balanced framework that upholds both the legitimate security interests of states and the fundamental principles of human rights, transparency, and multistakeholder collaboration. Central to the article's argument is the call for a flexible, evolutionary architecture of international cybersecurity law, capable of keeping pace with rapid technological advancements and the ever-changing threat landscape. This framework should incorporate mechanisms for continuous improvement, effective attribution and accountability, and the active engagement of international organizations and multistakeholder initiatives. The article further emphasizes the critical role of geopolitical challenges in shaping the development of international cybersecurity norms. It advocates for a nuanced, pragmatic approach that acknowledges the competing interests and values of different state actors while striving to find common ground and build trust through dialogue and cooperation. In an era of increasing digital interconnectedness and the erosion of traditional borders, this article presents a compelling case for the adaptation of international law to address the complex realities of the digital age. It offers valuable insights and recommendations for policymakers, legal experts, and scholars seeking to navigate the uncharted territories of cybersecurity and digital sovereignty in the 21st century.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"58 ","pages":"Article 106180"},"PeriodicalIF":3.2,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144826844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint and several liability between Europol and a Member State for damages from unlawful disclosure of personal data (comment on European Court of Justice, 5 March 2024, C‑755/21 P) 欧洲刑警组织与成员国就非法披露个人数据造成的损害承担的连带责任(对欧洲法院的评论,2024年3月5日,C - 755/ 21p)
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2025-09-01 Epub Date: 2025-06-07 DOI: 10.1016/j.clsr.2025.106161
Andrea Parziale
This case note examines a judgment by the Court of Justice on Europol's civil liability for unlawful disclosure of personal data during cross-border cooperation with Member State authorities. The Court overturned the General Court's decision, establishing that joint and several liability between Europol and Member States can arise under Article 50 of Regulation 2016/794 (Europol Regulation), informed by Recital 57. While this ruling facilitates compensation for injured parties when the exact source of data disclosure cannot be identified, the Court awarded only €2000 in damages to the appellant, a modest sum that may undermine Article 50′s effectiveness as a data protection mechanism. The case note analyzes both the joint liability determination and the damages quantification, arguing that while the recognition of joint liability strengthens data subject protection in principle, the symbolic damages awarded significantly limit its practical impact as an accountability tool for ensuring responsible data handling in cross-border criminal investigations.
本案件说明审查了法院关于欧洲刑警组织在与成员国当局跨境合作期间非法披露个人数据的民事责任的判决。法院推翻了普通法院的决定,确定欧洲刑警组织和成员国之间的连带责任可以根据2016/794号条例(欧洲刑警组织条例)第50条产生。当无法确定数据披露的确切来源时,这一裁决有利于受害方的赔偿,但法院只判给上诉人2000欧元的损害赔偿,这一数额不大的赔偿可能会削弱第50条作为数据保护机制的有效性。案例说明分析了共同责任的确定和损害赔偿的量化,认为虽然承认共同责任在原则上加强了对数据主体的保护,但象征性损害赔偿的裁决大大限制了其作为确保跨境刑事调查中负责任的数据处理的问责工具的实际影响。
{"title":"Joint and several liability between Europol and a Member State for damages from unlawful disclosure of personal data (comment on European Court of Justice, 5 March 2024, C‑755/21 P)","authors":"Andrea Parziale","doi":"10.1016/j.clsr.2025.106161","DOIUrl":"10.1016/j.clsr.2025.106161","url":null,"abstract":"<div><div>This case note examines a judgment by the Court of Justice on Europol's civil liability for unlawful disclosure of personal data during cross-border cooperation with Member State authorities. The Court overturned the General Court's decision, establishing that joint and several liability between Europol and Member States can arise under Article 50 of Regulation 2016/794 (Europol Regulation), informed by Recital 57. While this ruling facilitates compensation for injured parties when the exact source of data disclosure cannot be identified, the Court awarded only €2000 in damages to the appellant, a modest sum that may undermine Article 50′s effectiveness as a data protection mechanism. The case note analyzes both the joint liability determination and the damages quantification, arguing that while the recognition of joint liability strengthens data subject protection in principle, the symbolic damages awarded significantly limit its practical impact as an accountability tool for ensuring responsible data handling in cross-border criminal investigations.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"58 ","pages":"Article 106161"},"PeriodicalIF":3.3,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144240726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond the AI-copyright wars: towards European dataset law? 超越人工智能版权战争:走向欧洲数据集法?
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-09-01 DOI: 10.1016/j.clsr.2025.106190
Stina Teilmann-Lock, Andrej Savin
The advent of generative AI raises profound questions about the ownership not only of data but also of data sets. European law has, in the main, sought to address these questions through the lens of copyright law in an attempt to address what the creative sector sees as a blatant theft of its work. While this approach has its merits, this paper suggests that key issues might be better dealt with using the AI Act of 2024. The Act has created an outline of a conceptual approach which we tentatively call “dataset law”. This is a more effective tool for dealing with violations at scale than copyright as it accents the inherent (economic and non-economic) value of data sets rather than on individual damage. Unfolding our argument in the article we also reflect on the fact that while this ex ante approach may appear novel in magnitude, it follows a pattern of innovative EU legal solutions in copyright and other areas.
生成式人工智能的出现不仅对数据的所有权,而且对数据集的所有权提出了深刻的问题。总的来说,欧洲法律试图通过版权法的视角来解决这些问题,试图解决创意部门所认为的公然盗窃其作品的问题。虽然这种方法有其优点,但本文认为,使用2024年的《人工智能法案》可能会更好地处理关键问题。该法案创建了一个概念性方法的大纲,我们暂时称之为“数据集法”。这是处理大规模侵权行为比版权更有效的工具,因为它强调数据集的内在(经济和非经济)价值,而不是单个损害。在文章中展开我们的论点时,我们也反思了这样一个事实,即虽然这种事前方法在规模上可能显得新颖,但它遵循了欧盟在版权和其他领域的创新法律解决方案的模式。
{"title":"Beyond the AI-copyright wars: towards European dataset law?","authors":"Stina Teilmann-Lock,&nbsp;Andrej Savin","doi":"10.1016/j.clsr.2025.106190","DOIUrl":"10.1016/j.clsr.2025.106190","url":null,"abstract":"<div><div>The advent of generative AI raises profound questions about the ownership not only of data but also of data sets. European law has, in the main, sought to address these questions through the lens of copyright law in an attempt to address what the creative sector sees as a blatant theft of its work. While this approach has its merits, this paper suggests that key issues might be better dealt with using the AI Act of 2024. The Act has created an outline of a conceptual approach which we tentatively call “dataset law”. This is a more effective tool for dealing with violations at scale than copyright as it accents the inherent (economic and non-economic) value of data sets rather than on individual damage. Unfolding our argument in the article we also reflect on the fact that while this <em>ex ante</em> approach may appear novel in magnitude, it follows a pattern of innovative EU legal solutions in copyright and other areas.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"58 ","pages":"Article 106190"},"PeriodicalIF":3.2,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144921685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personal data propertisation in China: A difficult road under the 20 Key Measures on Data 中国个人数据产权化:20项数据重点措施下的艰难之路
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2025-09-01 Epub Date: 2025-06-20 DOI: 10.1016/j.clsr.2025.106153
Qifan Yang
The Opinions on Building Basic Systems for Data to Better Exploit the Value of Data Factors (the 20 Key Measures on Data) in China has significantly influenced the discourse around propertising personal data, leading to a distinct approach to personal data protection from the EU and the US. The ownership-usufruct system and conditional personal data property system are raised as two representative property systems in China. In the ownership-usufruct system, the ownership of personal data belongs to the original subject, and the data processors (the data controllers in the GDPR) obtain their usufructuary right through “obtaining consent + consideration”. In the conditional personal data property system, the data processors originally acquired the data property right based on legitimate data collection behaviour. The data property right is limited by pre-existing rights, the proportionality principle, and the fair use principle. Rather than idealising the propertisation of personal data, this paper offers a nuanced critique of its limitations, including conceptual ambiguities, the failure of the consent mechanism, and unbalanced digital market structures. These challenges reveal that the propertisation of personal data is a socio-technical issue that requires legal frameworks and technical infrastructures.
中国《关于建立数据基本制度,更好发挥数据要素价值的意见》(《数据20项关键措施》)对个人数据产权的论述产生了重大影响,导致欧盟和美国在个人数据保护方面的做法截然不同。提出了所有权用益制度和有条件个人资料财产制度作为中国两种具有代表性的财产制度。在所有权-用益物权制度下,个人数据的所有权属于原始主体,数据处理方(GDPR中的数据控制者)通过“征得同意+对价”的方式获得用益物权。在有条件个人数据产权制度中,数据处理者最初是基于合法的数据收集行为获得数据产权的。数据产权受到先存权、比例原则和合理使用原则的限制。本文没有将个人数据的财产化理想化,而是对其局限性进行了细致的批评,包括概念上的模糊性、同意机制的失败以及数字市场结构的不平衡。这些挑战表明,个人数据的财产化是一个社会技术问题,需要法律框架和技术基础设施。
{"title":"Personal data propertisation in China: A difficult road under the 20 Key Measures on Data","authors":"Qifan Yang","doi":"10.1016/j.clsr.2025.106153","DOIUrl":"10.1016/j.clsr.2025.106153","url":null,"abstract":"<div><div>The Opinions on Building Basic Systems for Data to Better Exploit the Value of Data Factors (the 20 Key Measures on Data) in China has significantly influenced the discourse around propertising personal data, leading to a distinct approach to personal data protection from the EU and the US. The ownership-usufruct system and conditional personal data property system are raised as two representative property systems in China. In the ownership-usufruct system, the ownership of personal data belongs to the original subject, and the data processors (the data controllers in the GDPR) obtain their usufructuary right through “obtaining consent + consideration”. In the conditional personal data property system, the data processors originally acquired the data property right based on legitimate data collection behaviour. The data property right is limited by pre-existing rights, the proportionality principle, and the fair use principle. Rather than idealising the propertisation of personal data, this paper offers a nuanced critique of its limitations, including conceptual ambiguities, the failure of the consent mechanism, and unbalanced digital market structures. These challenges reveal that the propertisation of personal data is a socio-technical issue that requires legal frameworks and technical infrastructures.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"58 ","pages":"Article 106153"},"PeriodicalIF":3.3,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144322509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
European national news 欧洲国家新闻
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-09-01 Epub Date: 2025-09-04 DOI: 10.1016/j.clsr.2025.106193
Nick Pantlin
This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills Kramer LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.
© 2025 Herbert Smith Freehills Kramer LLP. Published by Elsevier Ltd. All rights reserved.
本文跟踪了欧洲主要国家在信息技术和通信领域的国家一级的发展,并提供了重要的国家发展的简明警报服务。它由赫伯特·史密斯·弗里希尔斯·克莱默律师事务所协调,并由欧洲各地的公司提供资金。本专栏为欧洲主要国家的重要国家发展提供简明的预警服务。它的部分目的是补充《华尔街日报》的专题文章和简报,让读者了解当前在国家层面上实施欧盟立法和国际公约和条约的“实地”情况。如果某项欧洲国家新闻具有特别重要的意义,CLSR也可能在当前或以后的版本中对其进行更详细的报道。©2025 Herbert Smith Freehills Kramer LLP。Elsevier Ltd.出版。版权所有。
{"title":"European national news","authors":"Nick Pantlin","doi":"10.1016/j.clsr.2025.106193","DOIUrl":"10.1016/j.clsr.2025.106193","url":null,"abstract":"<div><div>This article tracks developments at the national level in key European countries in the area of IT and communications and provides a concise alerting service of important national developments. It is co-ordinated by Herbert Smith Freehills Kramer LLP and contributed to by firms across Europe. This column provides a concise alerting service of important national developments in key European countries. Part of its purpose is to complement the Journal's feature articles and briefing notes by keeping readers abreast of what is currently happening “on the ground” at a national level in implementing EU level legislation and international conventions and treaties. Where an item of European National News is of particular significance, CLSR may also cover it in more detail in the current or a subsequent edition.</div><div>© 2025 Herbert Smith Freehills Kramer LLP. Published by Elsevier Ltd. All rights reserved.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"58 ","pages":"Article 106193"},"PeriodicalIF":3.2,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144988128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LLMs for legal reasoning: A unified framework and future perspectives 法学硕士的法律推理:一个统一的框架和未来的前景
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-09-01 Epub Date: 2025-07-30 DOI: 10.1016/j.clsr.2025.106165
Ha Thanh Nguyen , Wachara Fungwacharakorn , May Myo Zin , Randy Goebel , Francesca Toni , Kostas Stathis , Ken Satoh
Large Language Models (LLMs) have recently demonstrated remarkable ease of application to numerous natural language processing tasks, however the question of how well they perform is in serious question. In the case of their use in application domains where precision and accuracy are paramount (e.g., law, medicine), the assessment of their performance is erratic. In particular, the application of these models to legal reasoning presents both unique challenges and substantial opportunities because of the inherently complex and multi-faceted nature of legal decision-making. To begin to harness the potential of LLMs in legal reasoning, we propose a framework for unified legal reasoning that combines rule-based, abductive, and case-based approaches, and then investigate possible methods for their integration with LLMs. The ultimate goal, which we take steps toward, is to provide comprehensive, accurate, and adaptable legal decision analysis.
We critically examine this combination of reasoning methods, their formalizations, and their relevance to the legal domain, including the consideration of calibration methods to assess their performance. Moreover, we discuss current research and challenges in applying LLMs to legal reasoning tasks, highlight the importance of reconciling different reasoning paradigms, analyze cultural notions of justice, and address issues of uncertainty, vagueness, and ambiguity. Our study offers insights into the benefits and complexities of integrating LLMs within a proposed unified reasoning framework, with the hope of addressing some of the diverse legal challenges, and to advance the capabilities of AI-driven legal analysis.
大型语言模型(llm)最近在许多自然语言处理任务中表现出了非凡的易用性,然而,它们的表现如何是一个严重的问题。在精度和准确性至关重要的应用领域(例如,法律,医学)中使用它们的情况下,对它们的性能的评估是不稳定的。特别是,由于法律决策固有的复杂性和多面性,这些模型在法律推理中的应用既提出了独特的挑战,也带来了大量的机会。为了开始利用法学硕士在法律推理中的潜力,我们提出了一个统一的法律推理框架,该框架结合了基于规则的、溯因的和基于案例的方法,然后研究将它们与法学硕士集成的可能方法。我们采取措施的最终目标是提供全面、准确和适应性强的法律决策分析。我们严格检查推理方法的组合,它们的形式化,以及它们与法律领域的相关性,包括考虑校准方法来评估它们的性能。此外,我们还讨论了将法学硕士应用于法律推理任务的当前研究和挑战,强调了调和不同推理范式的重要性,分析了正义的文化概念,并解决了不确定性,模糊性和模糊性的问题。我们的研究提供了将法学硕士整合到拟议的统一推理框架中的好处和复杂性的见解,希望解决一些不同的法律挑战,并提高人工智能驱动的法律分析的能力。
{"title":"LLMs for legal reasoning: A unified framework and future perspectives","authors":"Ha Thanh Nguyen ,&nbsp;Wachara Fungwacharakorn ,&nbsp;May Myo Zin ,&nbsp;Randy Goebel ,&nbsp;Francesca Toni ,&nbsp;Kostas Stathis ,&nbsp;Ken Satoh","doi":"10.1016/j.clsr.2025.106165","DOIUrl":"10.1016/j.clsr.2025.106165","url":null,"abstract":"<div><div>Large Language Models (LLMs) have recently demonstrated remarkable ease of application to numerous natural language processing tasks, however the question of how well they perform is in serious question. In the case of their use in application domains where precision and accuracy are paramount (e.g., law, medicine), the assessment of their performance is erratic. In particular, the application of these models to legal reasoning presents both unique challenges and substantial opportunities because of the inherently complex and multi-faceted nature of legal decision-making. To begin to harness the potential of LLMs in legal reasoning, we propose a framework for unified legal reasoning that combines rule-based, abductive, and case-based approaches, and then investigate possible methods for their integration with LLMs. The ultimate goal, which we take steps toward, is to provide comprehensive, accurate, and adaptable legal decision analysis.</div><div>We critically examine this combination of reasoning methods, their formalizations, and their relevance to the legal domain, including the consideration of calibration methods to assess their performance. Moreover, we discuss current research and challenges in applying LLMs to legal reasoning tasks, highlight the importance of reconciling different reasoning paradigms, analyze cultural notions of justice, and address issues of uncertainty, vagueness, and ambiguity. Our study offers insights into the benefits and complexities of integrating LLMs within a proposed unified reasoning framework, with the hope of addressing some of the diverse legal challenges, and to advance the capabilities of AI-driven legal analysis.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"58 ","pages":"Article 106165"},"PeriodicalIF":3.2,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144724670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unpacking copyright infringement issues in the GenAI development lifecycle and a peek into the future 解析GenAI开发生命周期中的版权侵权问题,并展望未来
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2025-09-01 Epub Date: 2025-06-23 DOI: 10.1016/j.clsr.2025.106163
Cheng L. SAW, Bryan Zhi Yang TAN
Generative AI (“GAI”) refers to deep learning models that ingest input data and “learn” to produce output that mimics such data when duly prompted. This feature, however, has given rise to numerous claims of infringement by the owners of copyright in the training material. Relevantly, three questions have emerged for the law of copyright: (1) whether prima facie acts of infringement are disclosed at each stage of the GAI development lifecycle; (2) whether such acts fall within the scope of the text and data mining (“TDM”) exceptions; and (3) whether (and, if so, how successfully) the fair use exception may be invoked by GAI developers as a defence to infringement claims. This paper critically examines these questions in turn and considers, in particular, their interplay with the so-called “memorisation” phenomenon. It is argued that although infringing acts might occur in the process of downloading in-copyright training material and training the GAI model in question, TDM and fair use exceptions (where available) may yet exonerate developers from copyright liability under the right conditions.
生成式人工智能(“GAI”)指的是深度学习模型,它摄取输入数据,并在适当提示时“学习”产生模仿这些数据的输出。然而,这一特点引起了培训材料版权所有人提出的许多侵权索赔。与此相关,著作权法出现了三个问题:(1)是否在GAI开发生命周期的每个阶段都披露了初步侵权行为;(2)这些行为是否属于文本和数据挖掘(“TDM”)例外的范围;(3) GAI开发者是否(以及,如果是,如何成功地)援引合理使用例外作为侵权索赔的辩护。本文依次批判性地考察了这些问题,并特别考虑了它们与所谓的“记忆”现象的相互作用。有人认为,尽管侵权行为可能发生在下载有版权的培训材料和培训GAI模型的过程中,但在适当的条件下,TDM和合理使用例外(如果有的话)可能会免除开发者的版权责任。
{"title":"Unpacking copyright infringement issues in the GenAI development lifecycle and a peek into the future","authors":"Cheng L. SAW,&nbsp;Bryan Zhi Yang TAN","doi":"10.1016/j.clsr.2025.106163","DOIUrl":"10.1016/j.clsr.2025.106163","url":null,"abstract":"<div><div>Generative AI (“GAI”) refers to deep learning models that ingest input data and “learn” to produce output that mimics such data when duly prompted. This feature, however, has given rise to numerous claims of infringement by the owners of copyright in the training material. Relevantly, three questions have emerged for the law of copyright: (1) whether <em>prima facie</em> acts of infringement are disclosed at each stage of the GAI development lifecycle; (2) whether such acts fall within the scope of the text and data mining (“TDM”) exceptions; and (3) whether (and, if so, how successfully) the fair use exception may be invoked by GAI developers as a defence to infringement claims. This paper critically examines these questions in turn and considers, in particular, their interplay with the so-called “memorisation” phenomenon. It is argued that although infringing acts might occur in the process of downloading in-copyright training material and training the GAI model in question, TDM and fair use exceptions (where available) may yet exonerate developers from copyright liability under the right conditions.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"58 ","pages":"Article 106163"},"PeriodicalIF":3.3,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144338751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the use of LLMs in the Italian legal domain: A survey on recent applications 探索法学硕士在意大利法律领域的使用:对最近的应用调查
IF 3.3 3区 社会学 Q1 LAW Pub Date : 2025-09-01 Epub Date: 2025-07-10 DOI: 10.1016/j.clsr.2025.106164
Marco Siino
This article delves into recent applications of Transformers (also, Large Language Models or LLMs) in the context of the Italian legal language. The impressive speed at which the literature in this domain has recently grown (i.e., in 2022 and 2023) is proved by the number of related works that we collected in this study. The focus of this work is on exploring how LLMs are being utilized within the framework of Italian law. In detail, we first introduce the tasks that have been addressed in the Italian legal domain. When introducing the tasks, to motivate and to provide the most relevant works, we reference worldwide literature. After introducing the tasks, we report and discuss all the existent applications to these tasks, specifically in the Italian legal domain. Through this work, we intend to deliver the state of the art in LLM applications in the Italian legal domain to researchers as well as practising attorneys.
本文深入研究了transformer(也称为大型语言模型或llm)在意大利法律语言上下文中的最新应用。我们在本研究中收集的相关作品的数量证明了该领域的文献最近(即2022年和2023年)增长的惊人速度。这项工作的重点是探索法学硕士如何在意大利法律的框架内被利用。详细地说,我们首先介绍在意大利法律领域所处理的任务。在介绍任务时,为了激励和提供最相关的作品,我们参考了世界各地的文献。在介绍了这些任务之后,我们报告并讨论了这些任务的所有现有申请,特别是在意大利法律领域。通过这项工作,我们打算为研究人员和执业律师提供意大利法律领域法学硕士应用的最新技术。
{"title":"Exploring the use of LLMs in the Italian legal domain: A survey on recent applications","authors":"Marco Siino","doi":"10.1016/j.clsr.2025.106164","DOIUrl":"10.1016/j.clsr.2025.106164","url":null,"abstract":"<div><div>This article delves into recent applications of Transformers (also, <em>Large Language Models</em> or <em>LLMs</em>) in the context of the Italian legal language. The impressive speed at which the literature in this domain has recently grown (i.e., in 2022 and 2023) is proved by the number of related works that we collected in this study. The focus of this work is on exploring how LLMs are being utilized within the framework of Italian law. In detail, we first introduce the tasks that have been addressed in the Italian legal domain. When introducing the tasks, to motivate and to provide the most relevant works, we reference worldwide literature. After introducing the tasks, we report and discuss all the existent applications to these tasks, specifically in the Italian legal domain. Through this work, we intend to deliver the state of the art in LLM applications in the Italian legal domain to researchers as well as practising attorneys.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"58 ","pages":"Article 106164"},"PeriodicalIF":3.3,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144588726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A game changer or jurisdictional arbitrage? De-risking global capital markets amid cross-border data governance resilience 游戏规则改变者还是管辖权套利?在跨境数据治理弹性背景下,降低全球资本市场风险
IF 3.2 3区 社会学 Q1 LAW Pub Date : 2025-09-01 Epub Date: 2025-08-01 DOI: 10.1016/j.clsr.2025.106175
Dr Qingxiu Bu (Fellow)
The rivalry between the U.S. and China remains intense, driven by their competition for technological dominance and geopolitical influence. Both powers are escalating efforts to secure data, aiming to strengthen domestic control and expand international reach. This creates significant challenges for companies like DiDi and TikTok, which must navigate an increasingly polarised and complex environment. DiDi's delisting from the U.S. underscores how big data has become a critical battleground in this rivalry, with far-reaching implications for the global economy. The ongoing TikTok controversy goes beyond security concerns, framing China’s technological advancement as a direct challenge to U.S. dominance in shaping global discourse and public opinion. This confrontation raises crucial questions: Is the focus on accounting oversight, or do deeper conflicts over sovereignty and ideology drive the tension? Does controlling data flow represent a game changer or merely a tool for regulatory arbitrage? From a game theory perspective, addressing this challenge requires a delicate balance—regulating tech giants, safeguarding data security, and sustaining economic growth.
由于两国在技术主导地位和地缘政治影响力方面的竞争,美国和中国之间的竞争仍然很激烈。这两个大国都在加大保护数据的力度,旨在加强国内控制,扩大国际影响力。这给滴滴和抖音等公司带来了重大挑战,它们必须应对日益两极分化和复杂的环境。滴滴从美国退市凸显出,大数据已成为这场竞争的关键战场,并对全球经济产生深远影响。正在进行的TikTok争议超越了安全问题,将中国的技术进步视为对美国在塑造全球话语和公众舆论方面的主导地位的直接挑战。这种对抗提出了一个关键问题:是对会计监管的关注,还是对主权和意识形态的更深层次的冲突导致了这种紧张关系?控制数据流是改变游戏规则还是仅仅是监管套利的工具?从博弈论的角度来看,应对这一挑战需要一个微妙的平衡——监管科技巨头、保护数据安全和维持经济增长。
{"title":"A game changer or jurisdictional arbitrage? De-risking global capital markets amid cross-border data governance resilience","authors":"Dr Qingxiu Bu (Fellow)","doi":"10.1016/j.clsr.2025.106175","DOIUrl":"10.1016/j.clsr.2025.106175","url":null,"abstract":"<div><div>The rivalry between the U.S. and China remains intense, driven by their competition for technological dominance and geopolitical influence. Both powers are escalating efforts to secure data, aiming to strengthen domestic control and expand international reach. This creates significant challenges for companies like DiDi and TikTok, which must navigate an increasingly polarised and complex environment. DiDi's delisting from the U.S. underscores how big data has become a critical battleground in this rivalry, with far-reaching implications for the global economy. The ongoing TikTok controversy goes beyond security concerns, framing China’s technological advancement as a direct challenge to U.S. dominance in shaping global discourse and public opinion. This confrontation raises crucial questions: Is the focus on accounting oversight, or do deeper conflicts over sovereignty and ideology drive the tension? Does controlling data flow represent a game changer or merely a tool for regulatory arbitrage? From a game theory perspective, addressing this challenge requires a delicate balance—regulating tech giants, safeguarding data security, and sustaining economic growth.</div></div>","PeriodicalId":51516,"journal":{"name":"Computer Law & Security Review","volume":"58 ","pages":"Article 106175"},"PeriodicalIF":3.2,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144750304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Law & Security Review
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1