Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- City University of New York (CUNY) (2)
- Old Dominion University (2)
- Penn State Dickinson Law (1)
- Purdue University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
-
- Seattle University School of Law (1)
- Southern Methodist University (1)
- The British University in Egypt (1)
- University of Georgia School of Law (1)
- University of Nebraska - Lincoln (1)
- University of Pennsylvania Carey Law School (1)
- University of Rhode Island (1)
- University of Tennessee at Chattanooga (1)
- Keyword
-
- Privacy (3)
- Economics (2)
- Tech policy (2)
- Technology (2)
- AI ethics (1)
-
- Animal studies (1)
- Antitrust law & poicy (1)
- Archives (1)
- Artificial intelligence (1)
- Arts (1)
- BUE (1)
- Big data (1)
- Blockchain (1)
- Business (1)
- CJEU (1)
- COVID-19 (1)
- COVID19 (1)
- Charter of fundamental rights (1)
- Communication (1)
- Competition (1)
- Computer programming (1)
- Consent (1)
- Consumer welfare (1)
- Content moderation (1)
- Contextual integrity (1)
- Copyright (1)
- Copyright violations (1)
- Coronavirus Pandemic (1)
- Court of justice of the european union (1)
- Cybersecurity (1)
- Publication
-
- Open Educational Resources (2)
- The Journal of Sociotechnical Critique (2)
- All Faculty Scholarship (1)
- Articles, Chapters and Online Publications (1)
- Dickinson Law Review (2017-Present) (1)
-
- English Language and Literature (1)
- Faculty Publications (1)
- Honors Theses (1)
- Independent Study Project (ISP) Collection (1)
- Markets, Globalization & Development Review (1)
- SMU Data Science Review (1)
- School of Computing: Faculty Publications (1)
- Seattle Journal of Technology, Environmental & Innovation Law (1)
- Publication Type
Articles 1 - 15 of 15
Full-Text Articles in Computer Engineering
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
Seattle Journal of Technology, Environmental & Innovation Law
No abstract provided.
Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook
Global Privacy Concerns Of Facial Recognition Big Data, Myranda Westbrook
Honors Theses
Facial recognition technology is a system of automatic acknowledgement that recognizes individuals by categorizing specific features of their facial structure to link the scanned information to stored data. Within the past few decades facial recognition technology has been implemented on a large scale to increase the security measures needed to access personal information. This has been specifically used in surveillance systems, social media platforms, and mobile device access control. The extensive use of facial recognition systems has created challenges as it relates to biometric information control and privacy concerns. This concern raises the cost and benefit analysis of an individual’s …
Pedagogy Of The Pandemic: A Case Study Of Emergency Remote Education In A Private Higher Education Institution In Egypt, Rania M Rafik Khalil, Shadia Fahim, Wadouda Badran, Hadia Fakhreldin, Maguid Hassan, Hani Ghali, Attia Attia, Sarah Khalil, Hassan Abdelhamid, Yasmine Abdel Moneim, Omar H. Karam
Pedagogy Of The Pandemic: A Case Study Of Emergency Remote Education In A Private Higher Education Institution In Egypt, Rania M Rafik Khalil, Shadia Fahim, Wadouda Badran, Hadia Fakhreldin, Maguid Hassan, Hani Ghali, Attia Attia, Sarah Khalil, Hassan Abdelhamid, Yasmine Abdel Moneim, Omar H. Karam
English Language and Literature
COVID19 caught almost every higher education institution off guard. The pandemic interrupted the teaching and learning process and required immediate implementation of emergency remote learning strategies. Teaching pedagogy turned to new ways of thinking about learning. Consequently, both academic staff and students had to adapt without warning to the challenges of teaching with advanced technology from home which was taking the world by storm. Overcoming this challenge in Egypt has been much easier for private universities in comparison to state universities because of the availability of facilities, funding, smaller cohorts and validation by partner western universities. This paper shares reflections …
Network Effects In Action, Christopher S. Yoo
Network Effects In Action, Christopher S. Yoo
All Faculty Scholarship
This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies alternative …
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
Fixing Social Media: Toward A Democratic Digital Commons, Michael Kwet
Fixing Social Media: Toward A Democratic Digital Commons, Michael Kwet
Markets, Globalization & Development Review
In the past few years, big Social Media networks like Facebook, Twitter, and YouTube have received intense scrutiny from the intellectual classes. This article critiques the dominant strain of criticism, the neo-Brandeisian School of antitrust, for its narrow focus on “regulated competition” as an appropriate means to “fix social media”. This essay calls for a socialist alternative: a democratic social media commons based on free and open source technology, decentralization, and democratic socialist legal solutions. It reviews how existing solutions like the Fediverse and LibreSocial work, and how they may provide answers for a better way forward.
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.
Human Supremacy As Posthuman Risk, Daniel Estrada
Human Supremacy As Posthuman Risk, Daniel Estrada
The Journal of Sociotechnical Critique
Human supremacy is the widely held view that human interests ought to be privileged over other interests as a matter of ethics and public policy. Posthumanism is the historical situation characterized by a critical reevaluation of anthropocentrist theory and practice. This paper draws on animal studies, critical posthumanism, and the critique of ideal theory in Charles Mills and Serene Khader to address the appeal to human supremacist rhetoric in AI ethics and policy discussions, particularly in the work of Joanna Bryson. This analysis identifies a specific risk posed by human supremacist policy in a posthuman context, namely the classification of …
Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley
Born-Digital Preservation: The Art Of Archiving Photos With Script And Batch Processing, Rachel S. Evans, Leslie Grove, Sharon Bradley
Articles, Chapters and Online Publications
With our IT department preparing to upgrade the University of Georgia’s Alexander Campbell King Law Library (UGA Law Library) website from Drupal 7 to 8 this fall, a web developer, an archivist, and a librarian teamed up a year ago to make plans for preserving thousands of born-digital images. We wanted to harvest photographs housed only in web-based photo galleries on the law school website and import them into our repository’s collection. The problem? There were five types of online photo galleries, and our current repository did not include appropriate categories for all of the photographs. The solution? Expand our …
The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D
The Effects Of Computer And Information Technology On Education, Iwasan D. Kejawa Ed.D
School of Computing: Faculty Publications
In the society of ours, is it true really that computers and information technology have contributed immensely to the way we learn? After observing and reading various educational paraphernalia and scanning the environment research has shown that the educational systems have greatly been impacted by computers and information technology. With the growth of technology, the ways we learn have been improved tremendously. Innovative technologies have contributed to the innovation of learning in the education arena and outside. The traditional ways of conveying instructions to learners have been augmented with the use of computers information technologies. The educational system of our …
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
SMU Data Science Review
The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain distributed …
Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood
Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood
Independent Study Project (ISP) Collection
The digital domain is the emerging environment for which the internet and data connectivity exists. This new domain is challenging the traditional place for geopolitics to exist, and creating new challenges to international relations. The use of cyberweapons through direct cyberattacks, such as the possibility of an attack on the U.S. power grid, or misinformation campaigns, such as the one launched by Russia against the 2016 U.S. Presidential election, can expand the international threat landscape. While these new threats increase, states are widely not prepared to address the new challenges in the digital domain. This paper will use three primary …
Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam
Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam
Faculty Publications
In the sustainability IoT, the cybersecurity risks to things, sensors, and monitoring systems are distinct from the conventional networking systems in many aspects. The interaction of sustainability IoT with the physical world phenomena (e.g., weather, climate, water, and oceans) is mostly not found in the modern information technology systems. Accordingly, actuation, the ability of these devices to make changes in real world based on sensing and monitoring, requires special consideration in terms of privacy and security. Moreover, the energy efficiency, safety, power, performance requirements of these device distinguish them from conventional computers systems. In this chapter, the cybersecurity approaches towards …