Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez Oct 2019

Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez

Independent Study Project (ISP) Collection

Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …


Bleeding Out: The Case For Strengthening Healthcare Client Portal Data Privacy Regulations, Matthew D. Mccord Aug 2019

Bleeding Out: The Case For Strengthening Healthcare Client Portal Data Privacy Regulations, Matthew D. Mccord

Minnesota Journal of Law, Science & Technology

No abstract provided.


Centralizing Energy Consumption Data In State Energy Data Centers, Zach Sibley Aug 2019

Centralizing Energy Consumption Data In State Energy Data Centers, Zach Sibley

Minnesota Journal of Law, Science & Technology

No abstract provided.


The Perils And Promises Of Artificial General Intelligence, Brian S. Haney Jun 2019

The Perils And Promises Of Artificial General Intelligence, Brian S. Haney

Journal of Legislation

No abstract provided.


Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove Jun 2019

Are You Experienced? - Simple Timesheets For Experiential Learning Courses, Eleanor C. Lanier, Leslie Grove

Presentations

ABA Standards require students to complete six credit hours of experiential learning. Hours must be tracked, and field placements in particular require students to keep logs of their activities to document compliance. Various web-based solutions are used, including “high-end suites like CORE ELMS, the Symplicity experiential learning module, and the basic and free Dropbox and Google Suite” as well as Canvas, and a time-tracking program called Tick. Here at the University of Georgia School of Law, we decided to add simple timesheet functionality to our Drupal-based student portal, allowing students to securely log their hours and activities, and faculty to …


Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill May 2019

Stability In Government, Emerging Technology, And Decentralized Economies: An Analysis Of Alternative Uses Of Cryptocurrencies, Mickayla Stogsdill

Chancellor’s Honors Program Projects

No abstract provided.


Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane Jan 2019

Procure-To-Pay Software In The Digital Age: An Exploration And Analysis Of Efficiency Gains And Cybersecurity Risks In Modern Procurement Systems, Drew Lane

MPA/MPP/MPFM Capstone Projects

Procure-to-Pay (P2P) softwares are an integral part of the payment and procurement processing functions at large-scale governmental institutions. These softwares house all of the financial functions related to procurement, accounts payable, and often human resources, helping to facilitate and automate the process from initiation of a payment or purchase, to the actual disbursal of funds. Often, these softwares contain budgeting and financial reporting tools as part of the offering. As such an integral part of the financial process, these softwares obviously come at an immense cost from a set of reputable vendors. In the case of government, these vendors mainly …


Toward The Personalization Of Copyright Law, Adi Libson, Gideon Parchomovsky Jan 2019

Toward The Personalization Of Copyright Law, Adi Libson, Gideon Parchomovsky

All Faculty Scholarship

In this Article, we provide a blueprint for personalizing copyright law in order to reduce the deadweight loss that stems from its universal application to all users, including those who would not have paid for it. We demonstrate how big data can help identify inframarginal users, who would not pay for copyrighted content, and we explain how copyright liability and remedies should be modified in such cases.


Transparency And Algorithmic Governance, Cary Coglianese, David Lehr Jan 2019

Transparency And Algorithmic Governance, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are improving and automating important functions in medicine, transportation, and business. Government officials have also started to take notice of the accuracy and speed that such algorithms provide, increasingly relying on them to aid with consequential public-sector functions, including tax administration, regulatory oversight, and benefits administration. Despite machine-learning algorithms’ superior predictive power over conventional analytic tools, algorithmic forecasts are difficult to understand and explain. Machine learning’s “black-box” nature has thus raised concern: Can algorithmic governance be squared with legal principles of governmental transparency? We analyze this question and conclude that machine-learning algorithms’ relative inscrutability does not pose a …


The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard Jan 2019

The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.

1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …


Should Robots Prosecute And Defend?, Stephen E. Henderson Dec 2018

Should Robots Prosecute And Defend?, Stephen E. Henderson

Stephen E Henderson

Even when we achieve the ‘holy grail’ of artificial intelligence—machine intelligence that is at least as smart as a human being in every area of thought—there may be classes of decisions for which it is intrinsically important to retain a human in the loop. On the common account of American criminal adjudication, the role of prosecutor seems to include such decisions given the largely unreviewable declination authority, whereas the role of defense counsel would seem fully susceptible of automation. And even for the prosecutor, the benefits of automation might outweigh the intrinsic decision-making loss, given that the ultimate decision—by judge …