Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Algorithms (2)
- Big data (2)
- ABA standards (1)
- AI (1)
- Administración pública (1)
-
- Administrative law (1)
- Algoritmi (1)
- Algoritmos (1)
- Analisi predittive (1)
- Análisis predictivo (1)
- Aprendizaje automático (1)
- Artificial intelligence (1)
- Autonomous systems (1)
- Big data (1)
- Clinics (1)
- Computational propaganda (1)
- Copyright (1)
- Dead weight loss (1)
- Debido proceso (1)
- Denunciante (1)
- Derecho administrativo (1)
- Derechos digitales (1)
- Derechos humanos (1)
- Digital government (1)
- Diritto amministrativo (1)
- Disinformation (1)
- E-government (1)
- E-governo (1)
- Esplicabilità (1)
- Experiential learning (1)
Articles 1 - 5 of 5
Full-Text Articles in Computer Engineering
Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez
Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez
Independent Study Project (ISP) Collection
Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …
Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove
Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove
Presentations
ABA Standards require students to complete six credit hours of experiential learning. Hours must be tracked, and field placements in particular require students to keep logs of their activities to document compliance. Various web-based solutions are used, including “high-end suites like CORE ELMS, the Symplicity experiential learning module, and the basic and free Dropbox and Google Suite” as well as Canvas, and a time-tracking program called Tick. Here at the University of Georgia School of Law, we decided to add simple timesheet functionality to our Drupal-based student portal, allowing students to securely log their hours and activities, and faculty to …
Toward The Personalization Of Copyright Law, Adi Libson, Gideon Parchomovsky
Toward The Personalization Of Copyright Law, Adi Libson, Gideon Parchomovsky
All Faculty Scholarship
In this Article, we provide a blueprint for personalizing copyright law in order to reduce the deadweight loss that stems from its universal application to all users, including those who would not have paid for it. We demonstrate how big data can help identify inframarginal users, who would not pay for copyrighted content, and we explain how copyright liability and remedies should be modified in such cases.
Transparency And Algorithmic Governance, Cary Coglianese, David Lehr
Transparency And Algorithmic Governance, Cary Coglianese, David Lehr
All Faculty Scholarship
Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …
The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard
The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard
Copyright, Fair Use, Scholarly Communication, etc.
Executive Summary
Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.
1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.
2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …