Law-and-Algorithms

Law and Algorithms

Spring 2024 Reading List

Thursdays, 2:10–4:10pm, BU Law Tower, Room 203

Please note that the readings in this course are highly likely to change over the course of the semester, though we try to avoid any changes to the readings less than a week before each class.

For the full syllabus, see here.

  1. Modeling and Automation
  2. Embodying Algorithms in Software
  3. Layering in Secrecy
  4. What Changes with Size?
  5. Law & Algorithms

Modeling and Automation

1. Intro to Modeling and Automation (Jan. 18)

Intro to Algorithms
Intro to Law
The Social Construction of Data and Classification
What is Gained and What is Lost as Law Becomes Computational
Who is Centered
Optional Reading

2. Automation Bias vs. Non-Automation Bias (Jan. 25)

Law’s Trouble with Numbers
To Model or Not To Model: The Case of Sentencing Guidelines
“Automation Bias”
“Automation Bias” in the Other Direction
Where to Put the Humans

3. Fairness in Automated Systems (Feb. 1)

Defining Fairness
Case Study: The COMPAS Algorithm
The Optimization Paradox
Deeper Rethinking
Optional Reading

Embodying Algorithms in Software

4. How Software is Constructed, Protected, and Examined (Feb. 8)

How Software is Built, How Software Breaks
How Should We Interpret Software?
How Software is Protected in Law
What Follows from Trade Secrecy

5. Putting Software On Trial (Feb. 15)

How Software is Examined in Litigation
Case Study: TrueAllele

As a reminder, if you’re new to readling legal opinoins you might want to review Orin Kerr, How to Read a Legal Opinion, 11 Green Bag 2d 51 (2007).

The Limits of Transparency Through Adversarial Litigation
Optional

6. Creating an Ecosystem of Trustworthy Software (Feb. 22)

Note: joining us this week is Prof. Moon Duchin, who will discuss her own experience as an expert witness in a case that reached all the way to the Supreme Court.

Background on Racial Gerrymandering
Case Study: South Carolina NAACP v. Alexander (D.S.C. 2023)
Optional:

Layering in Secrecy

7. Anonymization, Identification, and Formalized Notions of Privacy (Feb. 29)

Encryption Fundamentals
What do lawyers mean when we say “privacy?”
Input privacy techniques in data science
Output privacy techniques in data science
Optional

8. Bringing Formal Privacy to Public Administration (March 7)

Note: joining us this week is Shlomi Hod, who will discuss a recent project involving use of differential privacy in government data.

Utility and Privacy in the Census
Why did the Census adopt differential privacy?
What happened when the Census adopted differential privacy?

9. The Weaponization of Privacy (March 21)

Who is Centered in Cryptography Policy?
What Gets Hidden in Robust Privacy?
Case Study: NYU Ad Observatory and Meta

What Changes with Size?

10. Data Access as a Measurement of Power (March 28)

Note: joining us for part of the class this week is Prof. Allison McDonald, who will discusss some of her work addressing certain harmful outputs of generative AI.

Intro to Machine Learning
How Data Informs AI
Optional

11. Harms in Machine Learning (April 4)

How Bias Enters AI
Intro to Anti-Discrimination Law
Applicaiton to Algorithmic Systems
Optional

12. Correcting Harms in Machine Learning (April 11)

Tensions in Disparate Impact and Disparate Treatment
Technical Adjustments to Models
New Ways Forward
Optional

Law and Algorithms

13. Law and Algorithms (April 18)

Note: joining us this week is Prof. Ngozi Okidegbe, the Moorman-Simon Interdisciplinary Career Development Associate Professor of Law and Assistant Professor of Computing & Data Sciences at Boston University. Prof. Okidegbe will be discussing the draft of a new article, which will be circulated via Teams as this week’s required reading.