Social Sciences
Legislation
100%
Courts
83%
Tuition Fee
66%
Democracy
50%
Intellectual Property
29%
Conferences
29%
Labour Standards
25%
Deliberative Democracy
25%
Public Law
25%
China
25%
Crime
25%
Freedom of Speech
25%
Patent Law
25%
Precedent
25%
Federalism
25%
State Government
25%
Iran
25%
Intention
25%
Value Judgment
25%
Sales
25%
Morality
25%
Public Choice
12%
Decision Maker
12%
Outsourcing
12%
Cognitive Bias
8%
Disaggregation
8%
Interest Groups
8%
Computer System
8%
Central Government
8%
Information Asymmetry
8%
Political Doctrines
8%
Market Failure
8%
Ideologies
8%
Collective Action
8%
Web Site
6%
Access to Justice
6%
Interactivity
6%
Keyphrases
Internet Censorship
50%
Repressive Regimes
25%
Democracy
25%
Australia
25%
Personal Jurisdiction
25%
GPT-4
25%
Version 2.0
25%
Information Extraction
25%
Criminal Enforcement
25%
Live Trade
25%
Tissue Plasminogen Activator (t-PA)
25%
Acute Stroke
25%
Privacy-preserving Cloud
25%
Use Technology
25%
Cabin
25%
Cybersecurity
25%
Ghosts
25%
Evaluation Results
16%
Testator
14%
Natural Experiment
13%
Cyberespionage
12%
World Wide Web
12%
Switchblade
12%
Use-alteration
12%
Cyberwar
12%
Cyber-attacks
12%
Zero-day Attacks
12%
Complex System Design
12%
Information Asymmetry
12%
Lanyard
12%
Market Failure
12%
Failed Attacks
12%
Nylon
12%
Disaggregation
12%
Federal Government
12%
Rectangular Object
12%
Pearl
12%
Legal Mandate
12%
Cyberthreats
12%
Market Information
12%
Article Analysis
12%
Normal Accident Theory
12%
Uncertain Threat
12%
Computer System
12%
Access to Markets
12%
Virus
12%
Western Democracies
10%
Contextual Learning
8%
Tissue Plasminogen Activator Therapy
8%
Legal Liability
8%
Computer Science
Evaluation Measure
25%
Positive Example
25%
Trade Secret
25%
Privacy Preserving
25%
Inference Model
25%
Generative Pre-Trained Transformer 4
25%
Information Storage
25%
Internet Censorship
25%
Negative Example
25%
Text Segment
25%
Information Extraction
25%
Cybersecurity
25%
Evaluation Result
16%
Normal Accident
12%
cloud provider
12%
Legal Scholarship
12%
Zero-Day Attack
12%
Computer System
12%
Information Asymmetry
12%
Successful Attack
12%
Cyberwar
12%
Cyberattack
12%
Disaggregation
12%
Binary Relation
8%
Extract Information
8%
Use Case
8%
Freedom of Speech
8%
Large Language Model
8%
Data Security
6%
Hash Function
6%
Anonymization
6%
Privacy Concern
6%
Financial Sector
6%