Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

Journal

2019

Data

Discipline
Institution
Publication

Articles 1 - 28 of 28

Full-Text Articles in Entire DC Network

Writing Documentarity, Arthur Perret Dec 2019

Writing Documentarity, Arthur Perret

Proceedings from the Document Academy

European pioneers of documentation have inspired us to adopt a functional approach to documents. This has led to works on documentality, which is related to the agency and use of documents, and now on documentarity. We define documentarity as a “quantifiable quality”: not what is a document, but how something can seem documentary. This requires input from writing theories and the study of markup (architext, scripturation) and a comparison between interfaces and the underlying processes (documentarisation, editorialisation).


A Data Analysis Of The World Happiness Index And Its Relation To The North-South Divide, Charles Alba Dec 2019

A Data Analysis Of The World Happiness Index And Its Relation To The North-South Divide, Charles Alba

Undergraduate Economic Review

In this document, we perform a detailed data analysis on the World Happiness Report with its relation to the socio-economic North-South Divide. In order to do so, we perform some extensive data cleaning and analysis before querying on the World Happiness Report. Our results based on Hypothesis Testing determines the happiness of the Global North is greater than that of the Global South. Furthermore, our queries show that the mean happiness score for the Global North significantly outweighing that of the South. Likewise, the 10 'Happiest' nations all belong to the Global North whereas the 10 'least happy' nations belong …


Privacy Law Issues In Public Blockchains: An Analysis Of Blockchain, Pipeda, The Gdpr, And Proposals For Compliance, Noah Walters Dec 2019

Privacy Law Issues In Public Blockchains: An Analysis Of Blockchain, Pipeda, The Gdpr, And Proposals For Compliance, Noah Walters

Canadian Journal of Law and Technology

Proponents of blockchain proclaim that the technology’s greatest innovation is trust. Blockchain create trust by serving as an indispensable ledger (a central point of truth), for all stakeholders to a transaction. Instead of companies managing and reconciling records of the same transaction in privately held databases, both sides of a transaction are recorded simultaneously on a shared ledger — the blockchain. As a result, the crypto economic environment is characterized by the decentralized coordination of business processes and transactions. Proponents of crypto-economics regard decentralized coordination as an opportunity for new forms of economic innovation, forms designed to increase value for …


Data And Experience Design: Negotiating Community-Oriented Digital Research With Service-Learning, Sweta Baniya, Shelton Weech Oct 2019

Data And Experience Design: Negotiating Community-Oriented Digital Research With Service-Learning, Sweta Baniya, Shelton Weech

Purdue Journal of Service-Learning and International Engagement

In this research with reflection paper, we discuss our experiences from a graduate level service learning course in which we assisted the local food bank on exploring the efficiency of their client tracking software, Link2Feed. In the semester-long project, we developed a close relationship with the staff of the community partner and worked to explore functionality and usability (Johnson, Salvo, & Zoetewey, 2007; Johnson, 2010) of Link2Feed. Throughout the semester, we applied various academic skills like taking interviews, rhetorical analysis of the software, and analyzing the community partner needs and how the software meets those needs. At the end of …


Making Room For Big Data: Web Scraping And An Affirmative Right To Access Publicly Available Information Online, Amber Zamora Oct 2019

Making Room For Big Data: Web Scraping And An Affirmative Right To Access Publicly Available Information Online, Amber Zamora

The Journal of Business, Entrepreneurship & the Law

This paper will explore the legality of web scraping through the lens of recent litigation between web scraper hiQ Labs and the online professional networking platform, LinkedIn. First, the paper will study the background of web scraping litigation, some challenges courts face in issuing consistent verdicts, and the most common claims companies make against web scrapers. Then the paper will address three of the most common claims and identify court motivations and limitations within the doctrines. The first claims are those arising from the federal Computer Fraud and Abuse Act (CFAA). Next, the paper will investigate copyright claims and defenses …


The Noisy "Silent Witness": The Misperception And Misuse Of Criminal Video Evidence, Aaron M. Williams Oct 2019

The Noisy "Silent Witness": The Misperception And Misuse Of Criminal Video Evidence, Aaron M. Williams

Indiana Law Journal

This Note examines recent developments in the research of situational video evidence biases. Part I examines the current and growing body of psychological research into the various situational biases that can affect the reliability of video evidence and the gaps in this research that require further attention from researchers and legal academics. Because these biases do not “operate in a vacuum,” Part I also examines some of the recent and exciting research into the interaction between situational and dispositional biases. Part II examines the development of camera and video processing technology and its limitations as a means of mitigating such …


Tribal Data Governance And Informational Privacy: Constructing "Indigenous Data Sovereignty", Rebecca Tsosie Aug 2019

Tribal Data Governance And Informational Privacy: Constructing "Indigenous Data Sovereignty", Rebecca Tsosie

Montana Law Review

This essay discusses tribal claims to data sovereignty and informational privacy, examining the nature of the respective claims, as well as how tribal governments can exercise effective authority over the collection and use of data about the community and its members. Part I of the essay explores the issue of data sovereignty comparatively, framing the concept within its global and national contexts, and then discussing the rights of tribal governments and other Indigenous peoples. Part II of the essay examines the various claims that are comprised within the movement toward "Indigenous data sovereignty," as well as the current context of …


Engage Stakeholders In Program Evaluation: Throw Them A Party!, Kendra M. Lewis, Timothy Ewers, Marianne Bird, Tamekia Wilkins Aug 2019

Engage Stakeholders In Program Evaluation: Throw Them A Party!, Kendra M. Lewis, Timothy Ewers, Marianne Bird, Tamekia Wilkins

The Journal of Extension

A data party is an engaging way to involve stakeholders in program evaluation. We explain the use of a data party for engaging 4-H program stakeholders (e.g., staff and volunteers) in data interpretation and helping them understand, embrace, and use program evaluation information to make data-driven decisions about their programs. We present two tools that can be used for presenting data in a clear and meaningful way: data place mats and gallery walks. We also provide information on the process we used, our lessons learned, and the utility of data parties in Extension programming.


Issues Of Strategic Approach In Management Accounting, B.Yu Makhsudov Jun 2019

Issues Of Strategic Approach In Management Accounting, B.Yu Makhsudov

Economics and Innovative Technologies

Мanagement accounting focuses on the internal activities of enterprises, the outside business environment in which he operates remains largely unnoticed.Therefore, there is a great need for the concept of management accounting, iestrategic management accounting, which focuses on the external environment. The research justified the need for the introduction of strategic management accounting. Developed a description and conceptual framework for the introduction of strategic management accounting in the field of strategic information based on the analysis of economic literature.


Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman May 2019

Digital Colonialism: The 21st Century Scramble For Africa Through The Extraction And Control Of User Data And The Limitations Of Data Protection Laws, Danielle Coleman

Michigan Journal of Race and Law

As Western technology companies increasingly rely on user data globally, extensive data protection laws and regulations emerged to ensure ethical use of that data. These same protections, however, do not exist uniformly in the resource-rich, infrastructure-poor African countries, where Western tech seeks to establish its presence. These conditions provide an ideal landscape for digital colonialism.

Digital colonialism refers to a modern-day “Scramble for Africa” where largescale tech companies extract, analyze, and own user data for profit and market influence with nominal benefit to the data source. Under the guise of altruism, large scale tech companies can use their power and …


The Gdpr: It Came, We Saw, But Did It Conquer?, Leila Javanshir Apr 2019

The Gdpr: It Came, We Saw, But Did It Conquer?, Leila Javanshir

Seattle University Law Review

On February 1, 2019, the Seattle University Law Review held its annual symposium at the Seattle University School of Law. Each year, the Law Review hosts its symposium on a topic that is timely and meaningful. This year, privacy and data security professionals from around the globe gathered to discuss the current and future effects of the General Data Protection Regulation (GDPR) that was implemented on May 25, 2018. The articles and essays that follow this Foreword are the product of this year’s symposium.


Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett Apr 2019

Confiding In Con Men: U.S. Privacy Law, The Gdpr, And Information Fiduciaries, Lindsey Barrett

Seattle University Law Review

In scope, ambition, and animating philosophy, U.S. privacy law and Europe’s General Data Protection Regulation are almost diametric opposites. The GDPR’s ambitious individual rights, significant prohibitions, substantive enforcement regime, and broad applicability contrast vividly with a scattershot U.S. regime that generally prioritizes facilitating commerce over protecting individuals, and which has created perverse incentives for industry through anemic enforcement of the few meaningful limitations that do exist. A privacy law that characterizes data collectors as information fiduciaries could coalesce with the commercial focus of U.S. law, while emulating the GDPR’s laudable normative objectives and fortifying U.S. consumer privacy law with a …


Privacy Statements Under The Gdpr, Mike Hintze Apr 2019

Privacy Statements Under The Gdpr, Mike Hintze

Seattle University Law Review

The need to include specific types of information in a privacy statement is a GDPR compliance obligation that does not get as much attention as some other GDPR requirements. Perhaps that is because privacy statements have been much maligned in recent years. They are too long and full of legalese. Nobody reads them. They are part of a notice and consent approach to privacy that puts an unrealistic burden on consumers to make informed choices. But despite these well-known criticisms, the GDPR doubles down on privacy statements. In fact, gauging by the roughly fourfold increase in privacy statement requirements compared …


Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount Apr 2019

Footprints: Privacy For Enterprises, Processors, And Custodians…Oh My!, Blair Witzel, Carrie Mount

Seattle University Law Review

Americans’ interest in privacy—as evidenced by increasing news coverage, online searches, and new legislation—has grown over the past decade. After the European Union enacted the General Data Protection Regulation (GDPR), technologists and legal professionals have focused on primary collectors of data—known under various legal regimes as the “controller” or “custodian.” Thanks to advances in computing, many of these data collectors offload the processing of data to third parties providing data-related cloud services like Amazon, Microsoft, and Google. In addition to the data they have already collected about the data subjects themselves, these companies now “hold” that data on behalf of …


Title 2.0: Discrimination Law In A Data-Driven Society, Bryan Casey Apr 2019

Title 2.0: Discrimination Law In A Data-Driven Society, Bryan Casey

Journal of Law and Mobility

More than a quarter century after civil rights activists pioneered America’s first ridesharing network, the connections between transportation, innovation, and discrimination are again on full display. Industry leaders such as Uber, Amazon, and Waze have garnered widespread acclaim for successfully combatting stubbornly persistent barriers to transportation. But alongside this well-deserved praise has come a new set of concerns. Indeed, a growing number of studies have uncovered troubling racial disparities in wait times, ride cancellation rates, and service availability in companies including Uber, Lyft, Task Rabbit, Grubhub, and Amazon Delivery.

Surveying the methodologies employed by these studies reveals a subtle, but …


Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr. Mar 2019

Nowhere To Run, Nowhere To Hide.* Applying The Fourth Amendment To Connected Cars In The Internet-Of-Things Era, Gregory C. Brown, Jr.

Journal of Civil Rights and Economic Development

(Excerpt)

Part I of this Note will briefly discuss the key components of a Connected Car, identify who collects the data from the Car, and examine the various uses for the data. Part I also explores whether Car owners consent to the collection of their Car’s data. Part II-A will trace the historical development of the automobile exception to the Fourth Amendment, which generally permits law-enforcement officers to conduct a warrantless search of a vehicle. Part II-B will discuss how the Supreme Court has applied the Fourth Amendment to pre-Internet technologies. Part II-C will discuss two recent Fourth Amendment Supreme …


Transcript Of Keynote Speech, David Medine Mar 2019

Transcript Of Keynote Speech, David Medine

Idaho Law Review

No abstract provided.


Getting To October: Why Understanding Technology Is Essential For Privacy Law, Aaron Massey Mar 2019

Getting To October: Why Understanding Technology Is Essential For Privacy Law, Aaron Massey

Idaho Law Review

No abstract provided.


Intimate Surveillance, Karen E.C. Levy Mar 2019

Intimate Surveillance, Karen E.C. Levy

Idaho Law Review

No abstract provided.


Data Diving Into “Noticing Poetry”: An Analysis Of Student Engagement With The “I Notice” Method, Scot Slaby, Jordan Benedict Feb 2019

Data Diving Into “Noticing Poetry”: An Analysis Of Student Engagement With The “I Notice” Method, Scot Slaby, Jordan Benedict

Journal of Inquiry and Action in Education

This paper explores students’ engagement in reading poems, examining data on their self perceptions of their confidence and competence in reading poems before, during, and after using the “I Notice” methodology as adapted from The Academy of American Poets’ unit plan, “Noticing Poetry” (Slaby, 2017). The data was collected over the course of a month from January 9 through January 30, 2018 and involved five classes of one hundred general English tenth grade students across three teachers’ classrooms at Shanghai American School’s Puxi High School Campus. Data indicates that the “I Notice” method and the “Noticing Poetry” unit and its …


Reports Feb 2019

Reports

Swiss American Historical Society Review

No abstract provided.


Project Insight: A Granular Approach To Enterprise Cybersecurity, Sunna Quazi, Adam Baca, Sam Darsche Jan 2019

Project Insight: A Granular Approach To Enterprise Cybersecurity, Sunna Quazi, Adam Baca, Sam Darsche

SMU Data Science Review

In this paper, we disambiguate risky activity corporate users are propagating with their software in real time by creating an enterprise security visualization solution for system administrators. The current problem in this domain is the lag in cyber intelligence that inhibits preventative security measure execution. This is partially due to the overemphasis of network activity, which is a nonfinite dataset and is difficult to comprehensively ingest with analytics. We address these concerns by elaborating on the beta of a software called "Insight" created by Felix Security. The overall solution leverages endpoint data along with preexisting whitelist/blacklist designations to unambiguously communicate …


The Cosmography Of Aesthetics, Yrjö Sepänmaa Jan 2019

The Cosmography Of Aesthetics, Yrjö Sepänmaa

Contemporary Aesthetics (Journal Archive)

No abstract provided.


Privacy Preserving Social Norm Nudges, Yifat Nahmias Jan 2019

Privacy Preserving Social Norm Nudges, Yifat Nahmias

Michigan Technology Law Review

Nudges comprise a key component of the regulatory toolbox. Both the public and private sectors use nudges extensively in various domains, ranging from environmental regulation to health, food and financial regulation. This article focuses on a particular type of nudge: social norm nudges. It discusses, for the first time, the privacy risks of such nudges. Social norm nudges induce behavioral change by capitalizing on people’s desire to fit in with others, on their predisposition to social conformity, and on their susceptibility to the way information is framed. In order to design effective social norm nudges, personal information about individuals and …


Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon Jan 2019

Privacy In Gaming, N. Cameron Russell, Joel R. Reidenberg, Sumyung Moon

Fordham Intellectual Property, Media and Entertainment Law Journal

Video game platforms and business models are increasingly built on collection, use, and sharing of personal information for purposes of both functionality and revenue. This paper examines privacy issues and explores data practices, technical specifications, and policy statements of the most popular games and gaming platforms to provide an overview of the current privacy legal landscape for mobile gaming, console gaming, and virtual reality devices. The research observes how modern gaming aligns with information privacy notions and norms and how data practices and technologies specific to gaming may affect users and, in particular, child gamers.

After objectively selecting and analyzing …


Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby Jan 2019

Forensic Border Searches After Carpenter Require Probable Cause And A Warrant, Christopher I. Pryby

Michigan Law Review

Under the border search doctrine, courts have upheld the federal government's practice of searching people and their possessions upon entry into or exit from the United States, without any requirement of suspicion, as reasonable under the Fourth Amendment. Since the advent of electronic devices with large storage capacities, courts have grappled with whether this definition of reasonableness continues to apply. So far, courts have consistently characterized “nonforensic” border inspections of electronic devices (for example, paging through photos on a phone) as “routine” searches that, like inspecting luggage brought across international lines, require no suspicion. But there is a circuit split …


An Empirical Evaluation Of Eada And Ncaa College Sports Financial Data: Applications For Research And Litigation, Ted Tatos Jan 2019

An Empirical Evaluation Of Eada And Ncaa College Sports Financial Data: Applications For Research And Litigation, Ted Tatos

Marquette Sports Law Review

None


"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode Jan 2019

"You Have The Data"...The Writ Of Habeas Data And Other Data Protection Rights: Is The United States Falling Behind?, Sarah L. Lode

Indiana Law Journal

In Part I of this Note, I will discuss the writ of habeas data that has been developed primarily, but not exclusively, in Latin American countries. I will discuss the intricacies of the writ, how it evolved, and how it is applied today. Using Argentina as an example, I will discuss how the writ would be used by an Argentine citizen to protect her personal data. Part II summarizes the previously employed data protection scheme in the European Union, the Data Protection Directive (“the Directive”), and will also discuss the new EU data protection regulation, the General Data Protection Regulation …