SlideShare a Scribd company logo
1 of 24
Download to read offline
TOWARDS RESEARCH-DRIVEN
CURRICULA FOR LAW AND
COMPUTER SCIENCE
Dr AdamWyner
Department of Computing Science
University of Aberdeen
Dr Roy Partain
Law School
University of Aberdeen
BILETA Conference
University of Aberdeen
April 10, 2018
PROBLEM
• How can we develop curricula to equip law school/computer science students
with the skills to understand, critique, use, and develop legal technologies?
• The parameters for new curricula are broad and demanding:
• Various users for legal technologies, each with motivations and requirements
• Abundant legal information and powerful computational tools
• Novel roles to fill in the legal technologies sphere
• AI and Law research literature to design curricula and develop legal technologies.
• Is there a ‘line’ between professional training and training for research?
2
CONTEXT
• AI/Technology and Law
• Solicitors Regulation Authority and Bar Standards Board
• Dynamic context for government, judiciary, firms, law schools, public
• Intensive business development
3
SCOPE
• Law applied to ComputingTechnologies
• What the law says about: online privacy, autonomous vehicles, intellectual
property,…
• Computing technologies applied to law
• How can we apply computational tools to : case-based reasoning,
information extraction, argumentation, legal process management, contract
construction, …
4
5
ROLES
• Knowledge engineer – represent, process, and reason with legal knowledge
• Technologist – working with available tools (OPA, contracts, ODR, etc.)
• Process analyst – broker for subprocesses of a legal action
• Project manager – sees a complex process thorough
• Data scientist – mines and interprets data
• Risk manager – identifies and manages risk for contracts and compliance
• Others
(from Susskind, 2017)
6
COMPUTER SCIENCE BSC
• Computer programming and principles
• Computer architecture
• Web technology and application
development
• Object-oriented programming
• Mathematics for computing science
• Data management
• Human computer interaction
• Algorithmic problem solving
• Modern programming languages
• Operating systems
• Principles of software engineering
• Languages and computability
• Knowledge-based systems
• Robotics
• Distributed systems and security
7
WITHIN A TOPIC AREA - AI
• Problem-solving by search
• Multi-agent systems
• Logic
• Set theory
• Knowledge representation and reasoning
• Perception
• Planning
• Uncertainty – probabilistic,
argumentation
• Learning – observations, statistical,
reinforcement
• Natural language processing and
generation
8
COMPUTER SCIENCE CAREERS
• Software application developer
• Computer systems analyst
• Software systems developer
• Web developer
• Network systems administrator
• Database administrator
9
LLB
• Criminal law
• Legal system
• Legal method
• Legal theory
• Contract
• Public law and human rights
• Delict and unjustified enrichment
• EU Institutions and law
• The law of property
• Family law
• Succession and trusts
• Evidence
• Commercial and consumer contracts
10
Lots of articulation
within a topic area
LAW CAREERS
• Advice worker
• Barrister
• Barrister’s clerk
• Chartered accountant
• Chaterted legal executive
• Civil service
• Company secretary
• Lecturer
• Licensed conveyancer
• Paralegal
• Patent attorney
• Police
• Researcher
• Solicitor
• Stockbroker
• Trading standards officer
11
MASH UP
• How to mix and match?
• How to do so without being too superficial in any one (or all) thing(s)?
12
LAW WITH COMPUTING SCIENCE
UNIV. OF ABERDEEN
• Year 1: 8 year one law + 2 level one computer science
• Year 2: 7 year two law + 2 level two computer science
• Year 3: 2 year three law + 3 level three computer science
• Year 4: dissertation
https://www.abdn.ac.uk/study/undergraduate/degree-programmes/1146/M1G1/bachelor-of-laws-
with-computing-science/
13
LLM LEGALTECH
SWANSEA UNIVERSITY
• AI and law
• Automating legal services
• Computational thinking for lawyers
• Quantitative analysis and big data
• Blockchain/distributed ledger technology
• Rights and accountability in the digital
economy
• Legal services in a digital world
• LegalTech entrepreneurship
• Digital intellectual property
http://www.swansea.ac.uk/postgraduate/taught/coming-soon/#legaltech-llm=is-expanded
14
OTHERS
• Python programming with some legal examples
• Georgetown
• Harvard
• Getting at the law or computer science?
• What can be done with this amount of programming?
15
PATCH
• Asking students to
• figure out the connections
• envision analyses and implementations
• implement
16
17
WHAT DO WE GET AT THE LEVELS?
• L1: Knowledge, comprehension, application
• Understand what a tool does and why
• Use/apply a tool
• Critique the strengths and weaknesses of a tool (needs information on possibilities)
• L2: Analysis, synthesis, evaluation
• Analyse given problems, systems, and tools
• Create novel computational tools and systems
• Determine the adequacy or appropriateness of a tool
18
LEGALTECH USE (L1) V.
COMPUTATIONAL ANALYSIS (L2)
• Analysing a problem from a computational point of view
• Algorithms – explicit sequence of processes from input to output
• Developing an algorithm leads one to decompose a large, complex
problem/task into smaller, implementable component parts.Then recompose
them into a larger solution.
• Prior to an implementation
• More generic, long-lasting, substantive than any implementation
• May lead to discoveries and a deeper understanding of a problem/issue
• Future proof intellectual skills
19
CAN V. OUGHT
• The problem, context, and spectrum of knowledge/skills require that
• while L1 can be done (teaching specific and practical knowledge/skills)
• L2 ought to be done (generic analysis skills for ongoing development)
• Distinction is already in legal and computer science training
• teach principles and topic areas
• not specific practices/techniques/tools
20
COLLABORATIONS IN SOFTWARE
ENGINEERING CYCLE
Requirements
analysis
Design
ImplementationEvaluation/testing
Evolution
What are the concepts,
problems, or issues?
How is something practiced?
What/where is the data?
What are the goals?
What is the reasoning?
What are the elements,
relations, and properties?
What are the actions?
What are the outcomes?
What is the algorithm or
logic?
Is the system working as
intended (right output)?
Are there errors/confusions?
How should it be changed?
What should be added?
21
LAW FROM A ‘SCIENTIFIC’ ANGLE
• The cycle applies a scientific method to legal information and practice
22
DYNAMIC CURRICULA
• Introductory level: programming, logic/math, algorithms, analysis, law, language
• Higher levels:
• project-based – pick a topic/problem to address
• collaborative work in teams – analysis and implementation are often larger
than one person.
• interdisciplinary – work/communicate across disciplines.
• modular – ongoing training/courses are sprints for understanding and skills.
Some ‘trails’ and some independent.
• Computer science practice
23
THANKS
• Adam Wyner – azwyner@abdn.ac.uk
• Roy Partain – roy.partain@abdn.ac.uk
24

More Related Content

What's hot

Machine learning and the challenges of digital transformation in the law
Machine learning and the challenges of digital transformation in the lawMachine learning and the challenges of digital transformation in the law
Machine learning and the challenges of digital transformation in the lawSebastian Ko
 
Machine-consumable legislation - Waddington
Machine-consumable legislation - WaddingtonMachine-consumable legislation - Waddington
Machine-consumable legislation - WaddingtonMatthewWaddington3
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)wtidwell
 
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...Robert Ambrogi
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeRobert Ambrogi
 
Legal tech Alliance Workshop 20191029
Legal tech Alliance Workshop 20191029Legal tech Alliance Workshop 20191029
Legal tech Alliance Workshop 20191029jcscholtes
 
What is open data
What is open dataWhat is open data
What is open dataScott Sosna
 
Ai and applications in the legal domain studium generale maastricht 20191101
Ai and applications in the legal domain studium generale maastricht 20191101Ai and applications in the legal domain studium generale maastricht 20191101
Ai and applications in the legal domain studium generale maastricht 20191101jcscholtes
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB
 
2017 aals clinical_final
2017 aals clinical_final2017 aals clinical_final
2017 aals clinical_finalJohn Mayer
 
Technology, Inside the Black Box
Technology, Inside the Black BoxTechnology, Inside the Black Box
Technology, Inside the Black BoxFujitsu UK
 
On Understanding Data Scientists
On Understanding  Data ScientistsOn Understanding  Data Scientists
On Understanding Data ScientistsJácome Cunha
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellowsJohn Mayer
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 

What's hot (20)

PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
Chapter 3_dp-pertemuan 4&5
 Chapter 3_dp-pertemuan 4&5 Chapter 3_dp-pertemuan 4&5
Chapter 3_dp-pertemuan 4&5
 
Machine learning and the challenges of digital transformation in the law
Machine learning and the challenges of digital transformation in the lawMachine learning and the challenges of digital transformation in the law
Machine learning and the challenges of digital transformation in the law
 
Machine-consumable legislation - Waddington
Machine-consumable legislation - WaddingtonMachine-consumable legislation - Waddington
Machine-consumable legislation - Waddington
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
Ethical perspectives (it focus)
Ethical perspectives (it focus)Ethical perspectives (it focus)
Ethical perspectives (it focus)
 
Introduction to IP Research Tools & Strategies
Introduction to IP Research Tools & StrategiesIntroduction to IP Research Tools & Strategies
Introduction to IP Research Tools & Strategies
 
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
The Innovation Gap: Why the Justice System Has Failed to Keep Pace with Techn...
 
Career Resources to Help Find Jobs in the Intellectual Property Area of Law
Career Resources to Help Find Jobs in the Intellectual Property Area of LawCareer Resources to Help Find Jobs in the Intellectual Property Area of Law
Career Resources to Help Find Jobs in the Intellectual Property Area of Law
 
Ethical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law PracticeEthical Dangers of Technology in the Law Practice
Ethical Dangers of Technology in the Law Practice
 
Legal tech Alliance Workshop 20191029
Legal tech Alliance Workshop 20191029Legal tech Alliance Workshop 20191029
Legal tech Alliance Workshop 20191029
 
What is open data
What is open dataWhat is open data
What is open data
 
Ai and applications in the legal domain studium generale maastricht 20191101
Ai and applications in the legal domain studium generale maastricht 20191101Ai and applications in the legal domain studium generale maastricht 20191101
Ai and applications in the legal domain studium generale maastricht 20191101
 
PECB Webinar: The Internet of Things
PECB Webinar: The Internet of ThingsPECB Webinar: The Internet of Things
PECB Webinar: The Internet of Things
 
2017 aals clinical_final
2017 aals clinical_final2017 aals clinical_final
2017 aals clinical_final
 
Technology, Inside the Black Box
Technology, Inside the Black BoxTechnology, Inside the Black Box
Technology, Inside the Black Box
 
On Understanding Data Scientists
On Understanding  Data ScientistsOn Understanding  Data Scientists
On Understanding Data Scientists
 
2017 atj fellows
2017 atj fellows2017 atj fellows
2017 atj fellows
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 

Similar to Research-Driven Curricula for Law and Computer Science

Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draftDamir Delija
 
Interoperability: How legislation and running code should be connected, Erlen...
Interoperability: How legislation and running code should be connected, Erlen...Interoperability: How legislation and running code should be connected, Erlen...
Interoperability: How legislation and running code should be connected, Erlen...The Research Council of Norway, IKTPLUSS
 
Legal education of the future is information and technology
Legal education of the future is information and technologyLegal education of the future is information and technology
Legal education of the future is information and technologyOmar Ha-Redeye
 
Technologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal SectorTechnologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal SectorSatya Pal
 
20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics experts20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics expertsDamir Delija
 
AI legislation and smart governance
AI legislation and smart governanceAI legislation and smart governance
AI legislation and smart governanceDr. Fotios Fitsilis
 
Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...Tore Hoel
 
Digital ready policymaking and the digital screening process(1)
Digital ready policymaking and the digital screening process(1)Digital ready policymaking and the digital screening process(1)
Digital ready policymaking and the digital screening process(1)PanagiotisKeramidis
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Data science in 10 steps
Data science in 10 stepsData science in 10 steps
Data science in 10 stepsQuantUniversity
 
Systemising advice
Systemising adviceSystemising advice
Systemising adviceDavid Harvey
 
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation Platform
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation PlatformTaming Feral Systems With APIs in Region Östergötland’s Digitalisation Platform
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation PlatformNordic APIs
 
What is Computer Science
What is Computer ScienceWhat is Computer Science
What is Computer ScienceMarlouPadua1
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Ansgar Koene
 

Similar to Research-Driven Curricula for Law and Computer Science (20)

Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
 
Data-X-Sparse-v2
Data-X-Sparse-v2Data-X-Sparse-v2
Data-X-Sparse-v2
 
Data-X-v3.1
Data-X-v3.1Data-X-v3.1
Data-X-v3.1
 
Interoperability: How legislation and running code should be connected, Erlen...
Interoperability: How legislation and running code should be connected, Erlen...Interoperability: How legislation and running code should be connected, Erlen...
Interoperability: How legislation and running code should be connected, Erlen...
 
Legal education of the future is information and technology
Legal education of the future is information and technologyLegal education of the future is information and technology
Legal education of the future is information and technology
 
Technologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal SectorTechnologies for Lawyers - Legal Sector
Technologies for Lawyers - Legal Sector
 
20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics experts20120911 delija kukina - education of digital forensics experts
20120911 delija kukina - education of digital forensics experts
 
AI legislation and smart governance
AI legislation and smart governanceAI legislation and smart governance
AI legislation and smart governance
 
Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...Data protection and privacy framework in the design of learning analytics sys...
Data protection and privacy framework in the design of learning analytics sys...
 
Digital ready policymaking and the digital screening process(1)
Digital ready policymaking and the digital screening process(1)Digital ready policymaking and the digital screening process(1)
Digital ready policymaking and the digital screening process(1)
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
DATAIA & TransAlgo
DATAIA & TransAlgoDATAIA & TransAlgo
DATAIA & TransAlgo
 
Data science in 10 steps
Data science in 10 stepsData science in 10 steps
Data science in 10 steps
 
01 computing
01 computing01 computing
01 computing
 
Systemising advice
Systemising adviceSystemising advice
Systemising advice
 
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation Platform
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation PlatformTaming Feral Systems With APIs in Region Östergötland’s Digitalisation Platform
Taming Feral Systems With APIs in Region Östergötland’s Digitalisation Platform
 
What is Computer Science
What is Computer ScienceWhat is Computer Science
What is Computer Science
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
Bias in algorithmic decision-making: Standards, Algorithmic Literacy and Gove...
 

Recently uploaded

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Recently uploaded (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Research-Driven Curricula for Law and Computer Science

  • 1. TOWARDS RESEARCH-DRIVEN CURRICULA FOR LAW AND COMPUTER SCIENCE Dr AdamWyner Department of Computing Science University of Aberdeen Dr Roy Partain Law School University of Aberdeen BILETA Conference University of Aberdeen April 10, 2018
  • 2. PROBLEM • How can we develop curricula to equip law school/computer science students with the skills to understand, critique, use, and develop legal technologies? • The parameters for new curricula are broad and demanding: • Various users for legal technologies, each with motivations and requirements • Abundant legal information and powerful computational tools • Novel roles to fill in the legal technologies sphere • AI and Law research literature to design curricula and develop legal technologies. • Is there a ‘line’ between professional training and training for research? 2
  • 3. CONTEXT • AI/Technology and Law • Solicitors Regulation Authority and Bar Standards Board • Dynamic context for government, judiciary, firms, law schools, public • Intensive business development 3
  • 4. SCOPE • Law applied to ComputingTechnologies • What the law says about: online privacy, autonomous vehicles, intellectual property,… • Computing technologies applied to law • How can we apply computational tools to : case-based reasoning, information extraction, argumentation, legal process management, contract construction, … 4
  • 5. 5
  • 6. ROLES • Knowledge engineer – represent, process, and reason with legal knowledge • Technologist – working with available tools (OPA, contracts, ODR, etc.) • Process analyst – broker for subprocesses of a legal action • Project manager – sees a complex process thorough • Data scientist – mines and interprets data • Risk manager – identifies and manages risk for contracts and compliance • Others (from Susskind, 2017) 6
  • 7. COMPUTER SCIENCE BSC • Computer programming and principles • Computer architecture • Web technology and application development • Object-oriented programming • Mathematics for computing science • Data management • Human computer interaction • Algorithmic problem solving • Modern programming languages • Operating systems • Principles of software engineering • Languages and computability • Knowledge-based systems • Robotics • Distributed systems and security 7
  • 8. WITHIN A TOPIC AREA - AI • Problem-solving by search • Multi-agent systems • Logic • Set theory • Knowledge representation and reasoning • Perception • Planning • Uncertainty – probabilistic, argumentation • Learning – observations, statistical, reinforcement • Natural language processing and generation 8
  • 9. COMPUTER SCIENCE CAREERS • Software application developer • Computer systems analyst • Software systems developer • Web developer • Network systems administrator • Database administrator 9
  • 10. LLB • Criminal law • Legal system • Legal method • Legal theory • Contract • Public law and human rights • Delict and unjustified enrichment • EU Institutions and law • The law of property • Family law • Succession and trusts • Evidence • Commercial and consumer contracts 10 Lots of articulation within a topic area
  • 11. LAW CAREERS • Advice worker • Barrister • Barrister’s clerk • Chartered accountant • Chaterted legal executive • Civil service • Company secretary • Lecturer • Licensed conveyancer • Paralegal • Patent attorney • Police • Researcher • Solicitor • Stockbroker • Trading standards officer 11
  • 12. MASH UP • How to mix and match? • How to do so without being too superficial in any one (or all) thing(s)? 12
  • 13. LAW WITH COMPUTING SCIENCE UNIV. OF ABERDEEN • Year 1: 8 year one law + 2 level one computer science • Year 2: 7 year two law + 2 level two computer science • Year 3: 2 year three law + 3 level three computer science • Year 4: dissertation https://www.abdn.ac.uk/study/undergraduate/degree-programmes/1146/M1G1/bachelor-of-laws- with-computing-science/ 13
  • 14. LLM LEGALTECH SWANSEA UNIVERSITY • AI and law • Automating legal services • Computational thinking for lawyers • Quantitative analysis and big data • Blockchain/distributed ledger technology • Rights and accountability in the digital economy • Legal services in a digital world • LegalTech entrepreneurship • Digital intellectual property http://www.swansea.ac.uk/postgraduate/taught/coming-soon/#legaltech-llm=is-expanded 14
  • 15. OTHERS • Python programming with some legal examples • Georgetown • Harvard • Getting at the law or computer science? • What can be done with this amount of programming? 15
  • 16. PATCH • Asking students to • figure out the connections • envision analyses and implementations • implement 16
  • 17. 17
  • 18. WHAT DO WE GET AT THE LEVELS? • L1: Knowledge, comprehension, application • Understand what a tool does and why • Use/apply a tool • Critique the strengths and weaknesses of a tool (needs information on possibilities) • L2: Analysis, synthesis, evaluation • Analyse given problems, systems, and tools • Create novel computational tools and systems • Determine the adequacy or appropriateness of a tool 18
  • 19. LEGALTECH USE (L1) V. COMPUTATIONAL ANALYSIS (L2) • Analysing a problem from a computational point of view • Algorithms – explicit sequence of processes from input to output • Developing an algorithm leads one to decompose a large, complex problem/task into smaller, implementable component parts.Then recompose them into a larger solution. • Prior to an implementation • More generic, long-lasting, substantive than any implementation • May lead to discoveries and a deeper understanding of a problem/issue • Future proof intellectual skills 19
  • 20. CAN V. OUGHT • The problem, context, and spectrum of knowledge/skills require that • while L1 can be done (teaching specific and practical knowledge/skills) • L2 ought to be done (generic analysis skills for ongoing development) • Distinction is already in legal and computer science training • teach principles and topic areas • not specific practices/techniques/tools 20
  • 21. COLLABORATIONS IN SOFTWARE ENGINEERING CYCLE Requirements analysis Design ImplementationEvaluation/testing Evolution What are the concepts, problems, or issues? How is something practiced? What/where is the data? What are the goals? What is the reasoning? What are the elements, relations, and properties? What are the actions? What are the outcomes? What is the algorithm or logic? Is the system working as intended (right output)? Are there errors/confusions? How should it be changed? What should be added? 21
  • 22. LAW FROM A ‘SCIENTIFIC’ ANGLE • The cycle applies a scientific method to legal information and practice 22
  • 23. DYNAMIC CURRICULA • Introductory level: programming, logic/math, algorithms, analysis, law, language • Higher levels: • project-based – pick a topic/problem to address • collaborative work in teams – analysis and implementation are often larger than one person. • interdisciplinary – work/communicate across disciplines. • modular – ongoing training/courses are sprints for understanding and skills. Some ‘trails’ and some independent. • Computer science practice 23
  • 24. THANKS • Adam Wyner – azwyner@abdn.ac.uk • Roy Partain – roy.partain@abdn.ac.uk 24