To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Even though Sub-Saharan Africa (SSA) is lagging in digital technology adoption among the global average, there is substantial progress in terms of Information and Communication Technology (ICT) access and use, where it plays a crucial role in increasing the quality of life in the regions. However, digital gaps still exist within the continents, even though technology adoption across African nations has shown an increase in progress. This paper aims to explore factors that contribute to different adoption rates among three digital technologies in SSA, specifically mobile phones, fixed broadband, and fixed telephones. The methodology utilizes panel regression analysis to examine data sourced from the World Bank, which consists of 48 SSA countries from 2006 to 2022. The findings show a consistent growth in mobile phone subscriptions, different from fixed telephone and broadband internet that shows stagnant progress. Furthermore, infrastructure, and human capital are the most significant factors in addition to other influencing factors. The results of this study provide the African governments with insightful advice on addressing the digital divide and accelerating their digital transformation.
A more intuitive appreciation of spatial compliant behavior can be obtained through analysis and description of the behavior in terms of its centers, specifically the center of stiffness, the center of compliance, and the center of elasticity. This paper investigates the properties of each of these centers. Necessary and sufficient conditions for the coincidence of these centers are identified. A physical appreciation of those compliant behaviors that have coincident centers is obtained in terms of restrictions on the geometry of topologically simple mechanisms that realize those behaviors. The results can be used in the design of compliant mechanisms for robotic manipulation, especially when the compliance is characterized by the location of its center.
This chapter examines the extent to which e-commerce platforms may be held liable for problematic goods sold by third-party sellers on their websites. Several courts have hesitated to find e-commerce platforms liable under products liability and warranty law for products sold on their marketplaces by third-party sellers. This chapter argues that the increasing shift from in-person sales of goods to online sales necessitates a shift in current interpretations of key principles under state products liability and warranty law under Article 2 of the Uniform Commercial Code to better protect consumer interests. E-commerce platforms should, upon meeting certain criteria, be viewed as sellers and merchants for purposes of Article 2 warranties and products liability law. This chapter also highlights the role of state consumer law mandating product warnings and the federal Communications Decency Act, which, in some cases, may pose a hurdle to successful consumer claims against e-commerce platforms. The chapter concludes by offering a path forward.
3D printing, or additive manufacturing, has consequences for intellectual property (IP) law and for business models. The mechanical and digital technology of 3D printing enables the creations of a three-dimensional object from a digital 3D software model in a Computer-aided Design (CAD) file. The 3D printing platforms for creating, modifying, and transferring CAD files can take place in digital form easily and quickly, which presents opportunities for copying and raises new IP law protection considerations. 3D printing’s proliferating use by hobbyists and in new industries transforms traditional methods of creation, distribution, and sale of goods through the use of CAD files, and, in so doing, raises questions about the scope of IP legal protection and necessitates reevaluation of IP statutes. 3D printing’s technological advancement may require IP laws to evolve and respond to the nature of the technology. In addition, 3D printing raises new considerations for business models and for the supply chain due to the technology’s ability to provide complexity, customization, efficiency, expansive range of applications, and modularization. Moreover, the digital nature of CAD files, which embody physical objects in digital form, transforms design, modification, and transfer of objects and parts, reallocating production of objects to be more nimble and more flexible. As such, 3D printing can enable a new way to mass customize and can replace mass production in ways that allow new business entities to capture a new way of creating value.
Quantum technologies are promising to become one of the most impactful emerging technologies of the century. As governments and the private sector race to achieve quantum supremacy, it is crucial for the legal community to understand and analyze how these technologies will influence societies and shape consumer experiences. This essay offers an overview of the potential impacts of Quantum Information Science and Technology (QIST) on privacy as we know it today. It reviews quantum computers, quantum internet, quantum encryptions, and quantum sensing to offer a brief introduction of these fields for the legal community. This essay then proposes a novel analytical framework for future scholarly work on QIST privacy impacts. It concludes that QIST could have primary and secondary effects on privacy that would both improve and undermine privacy. Understanding the challenges that privacy scholars may soon face and having a robust framework to work with is a crucial step for future research in this emerging area of study.
The right to repair not only has important consumer value by preserving the useful life of existing products, but it also has additional and important social value by conserving natural resources and reducing pollution. However, the consumer right to repair in recent years has come under threat through the overextension by intellectual property (IP) doctrines that avoid current limits on antitrust liability by leasing or licensing rather than selling products to avoid “exhausting” IP rights and by applying IP rights to smaller portions of overall sold products, thereby treating parts rehabilitation or parts supply as prohibited acts of making or importation. Constitutional conflicts preemption might address some of these concerns, but federal legislation also is needed to protect consumers’ right to repair their purchased products.
Novel methods of data collection and analysis can enhance traditional risk management practices that rely on expert engineering judgment and established safety records, specifically when key conditions are met: Analysis is linked to the decisions it is intended to support, standards and competencies remain up to date, and assurance and verification activities are performed. This article elaborates on these conditions. The reason engineers are required to perform calculations is to support decision-making. Since humans are famously weak natural statisticians, rather than ask stakeholders to implicitly assimilate data, and arrive at a decision, we can instead rely on subject matter experts to explicitly define risk management decision problems. The results of engineering calculation can then also communicate which interventions (if any) are considered to be risk-optimal. It is also proposed that the next generation of engineering standards should learn from the success of open source software development in community building. Interacting with open datasets and code can promote engagement, identification (and resolution) of errors, training and ultimately competence. Finally, the profession’s tradition of independent verification should also be applied to the complex models that will increasingly contribute to the safety of the built environment. Model assurance will be required to keep pace with model development to identify suitable use cases as adequately safe. These are considered to be increasingly important components in ensuring that methods of data-centric engineering can be safely and appropriately adopted in industry.
This chapter explores the intersection of property law and consumer protection in the digital age, particularly in the context of purchasing technological or digital goods. The unique nature of transactions involving autonomous vehicles, drones, robot-chefs, smart appliances, and eBooks raises questions about the traditional understanding of property rights. While existing critiques often rely on contract law and consumer protection regulations, this chapter argues for the affirmative use of property law in addressing the challenges posed by the restricted usability and alienability of digital products. The prevailing assumption that property law is unsuitable for such issues is challenged, and the chapter advocates for a theoretical and normative shift. By analyzing the regulation and management of technological property through a property law lens, the chapter proposes a new perspective and outlines a roadmap for understanding and addressing the property challenges inherent in the digital consumer landscape.
The EU is attempting to indirectly regulate the Internet of Things by improving access to data through a cross-sectoral data governance framework. On the face of it, recent EU data governance laws – Data Governance Act, Digital Markets Act, Digital Services Act, AI Act – go in the direction of more open, accessible, and reusable data. However, they tend to balance that ethos with provisions that IoT big tech can use to retain and strengthen data enclosures. This chapter aims to critically assess whether the attempt to balance openness and IP results in the prevalence of closed IoT systems, thus ultimately preventing smart data from reuse that would otherwise benefit society at large.
The auction of Bored Ape #8817 for $3.4 million in October 2021 marked a watershed moment in the escalating trend of non-fungible tokens (NFTs). This chapter ventures into the core of the tokenization phenomenon, scrutinizing the legal implications of creating digital representations (tokens) of diverse assets. Amid the burgeoning NFT market, a pivotal question emerges: What precisely are the property rights conferred upon those acquiring these tokens? Beyond the staggering sales figures, the chapter dissects the tokenization process, emphasizing the NFT minting process and blockchain technology. It explores claims that NFTs herald the future of digital property, challenging traditional governmental powers. Anticipating legal challenges, the chapter navigates critical inquiries about token holders’ rights, the tethering (or not) of tokens to underlying assets, and the impact of the 2022 Uniform Commercial Code revisions. This chapter seeks to provide a nuanced perspective, unraveling legal realities from the fervor surrounding tokenization’s transformative potential in the digital era.
Large Language Models can be used to summarize and simplify complex texts. In this study, we investigate the extent to which state-of-the-art models can reliably operate as “smart readers”: applications that empower consumers to tackle lengthy, difficult-to-read, and inaccessible standard form contracts and privacy policies.
Recent years have seen new technologies disrupt many established industries and institutions, continually testing our imaginations and expectations. Accordingly, it is no surprise that technology is disrupting the law. Moreover, the COVID-19 pandemic generated new disputes and a need for expanded access to online means for resolving those disputes, especially for consumers. As a result, lawyers, judges, software developers, and policymakers have been exploring ways to utilize technology in expanding access to the courts and dispute resolution. With this in mind, scholars and policymakers have argued for “online dispute resolution” (ODR) to expand access to justice (A2J). This chapter discusses the evolution of ODR in recent years, as well as emerging issues in ODR that deserve attention in order to craft ODR that lives up to the promise in advancing A2J.
The past decade has seen a plethora of new product lines in “smart” consumer goods and systems thanks to technological developments that have allowed for the computerization and internet connectivity of many previously “dumb” objects, buildings, and environments. These new products will inevitably develop defects that require resolutions, and add to the ever-growing problem of e-waste. This chapter examines the recommendations of the recent Productivity Commission (PC) Inquiry regarding the “right to repair” (R2R) through the lens of cyber-physical devices and systems, such as the Internet of Things. A stronger R2R for independent repairers (individual, community, or commercial), particularly in the context of these new products, would assist in achieving several of the United Nations’ sustainable development goals. The PC Inquiry has produced some recommendations that will strengthen the R2R in Australia. However, these recommendations, while welcome, also contain some significant gaps in relation to promoting sustainable consumption by consumers.
The transformative impact of artificial intelligence (AI) across various sectors, with recent advancements, such as the release of the generative AI model GPT-4, raises critical legal and policy concerns. These concerns include important societal and potentially existential impacts: Threats to democracy, workforce displacement, copyright challenges, environmental effects, new and more lethal cybersecurity threat vectors, and the potential for AI advanced to become uncontrollable or be used for malicious purposes if it falls into the wrong hands. Human rights concerns are also implicated, including the potential for biased and discriminatory decision-making, unreasonable privacy impacts, inaccurate and unfair outcomes, and lack of transparency and due process. The unveiling of GPT-4 emphasizes the need for legislation to address these issues. The European Union (EU) has taken a global lead by enacting the Artificial Intelligence Act (AIA) to regulate AI development, placement, and use, and by proposing the AI Liability Directive (AILD), which aims to facilitate civil claims for damages arising from AI products and services. The AIA takes a comprehensive, risk-based approach to regulating AI across sectors. Significant differences had to be negotiated among the EU co-legislators to reach a consensus on the final text of the AIA, such as defining AI systems, regulating foundation models, determining bans on specific AI systems, and establishing redress rights for consumers and fundamental rights violations. The chapter explores the global context, the EU legislative approach, the key issues that had to be resolved, and the interaction of the AIA with other EU laws, particularly with the General Data Protection Regulation (GDPR).
From a distance, smart contracts seem exciting: Unlike humans, who might opportunistically decide to deviate from the agreed terms, their code will execute “no-matter-what,” ensuring the terms are adhered to and the contract is performed. Smart contracts would thus seem like a valuable addition to conventional contracts. A perfect transaction technology, indeed! A closer analysis of the smart contract narrative and the relevant technical scholarship reveals a peculiar dissonance between how smart contracts are described and what smart contracts really are. Taking the unfortunate terminology at face value and analyzing smart contracts as if they were contracts in the legal sense might constitute a waste of academic time. Even if they constituted an improvement over existing transacting practices, would – or could – smart contracts still be contracts? Would they even belong to the same category of legal phenomena? Maybe the fundamental question is: what are smart contracts? To many, these questions may seem like unnecessary hairsplitting, typical of haughty academics. In practice, however, how something is defined and categorized has immediate practical implications. Sidestepping the overly optimistic narrative of “unstoppable legal innovation,” this chapter deconstructs the concept of smart contracts and aims to provide a more commonsensical and factual grounding for future legal analyses of this phenomenon.
Credit card processing relies deeply on technology, so it is no surprise that technological forces are responsible for some of the problems with opaque pricing in this market. Technology made modern credit card processing possible by speeding up the transactions and making transactions less expensive. But this same technology made pricing harder for merchants to understand and compare among different credit card processors. Academic scholarship has failed to address nontransparent pricing for merchant card processing, and laws in various countries are focused on interchange fees, not merchant fees. This chapter argues that legal academics should study credit card processing fees and that regulators should use Canadian laws as an example of how to foster transparency.