How secure is code generated by chatgpt?

R Khoury, AR Avila, J Brunelle… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
In recent years, large language models have been responsible for great advances in the
field of artificial intelligence (AI). ChatGPT in particular, an AI chatbot developed and recently …

Transparent predictions

TZ Zarsky - U. Ill. L. Rev., 2013 - HeinOnline
Can human behavior be predicted? A broad variety of governmental initiatives are using
computerized processes to try. Vast datasets of personal information enhance the ability to …

[HTML][HTML] Ethics in cybersecurity research and practice

K Macnish, J Van der Ham - Technology in society, 2020 - Elsevier
This paper critiques existing governance in cyber-security ethics through providing an
overview of some of the ethical issues facing researchers in the cybersecurity community …

Identity theft: Making the known unknowns known

CJ Hoofnagle - Harv. JL & Tech., 2007 - HeinOnline
There is widespread agreement that identity theft causes financial damage to consumers,
creditors, retail establishments, and the economy as a whole. 2 The Federal Trade …

E-Commerce, cyber, and electronic payment system risks: lessons from PayPal

LJ Trautman - UC Davis Bus. LJ, 2015 - HeinOnline
By now, almost without exception, every business has an internet presence, and is likely
engaged in e-commerce. What are the major risks perceived by those engaged in e …

Crime-facilitating speech

E Volokh - Stan. L. Rev., 2004 - HeinOnline
(a) A textbook, 1 magazine, Web site, or seminar describes how people can make bombs
(conventional 2 or nuclear3), make guns, 4 make drugs, 5 commit contract murder, 6 engage …

Information disclosure and the diffusion of information security attacks

S Mitra, S Ransbotham - Information Systems Research, 2015 - pubsonline.informs.org
With the nearly instantaneous dissemination of information in the modern era, policies
regarding the disclosure of sensitive information have become the focus of significant …

Cybersecurity: What about US policy?

LJ Trautman - U. Ill. JL Tech. & Pol'y, 2015 - HeinOnline
During December 2014, just hours before the holiday recess, the US Congress passed five
major legislative proposals designed to enhance US cybersecurity. Following signature by …

Encryption and globalization

P Swire, K Ahmad - Colum. Sci. & Tech. L. Rev., 2011 - HeinOnline
During the explosive growth of the Internet in the 1990s, encryption was quite likely the
single most passionate area of legal and policy debate. Broadly speaking, law enforcement …

Is cyberattack the next Pearl Harbor

LJ Trautman - NCJL & Tech., 2016 - HeinOnline
Central Intelligence Agency Director, Leon Panetta, states in his Secretary of Defense
confirmation testimony before the Senate Armed Services Committee that,"[t] he next Pearl …