Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Privacy (2)
- Artificial intelligence (1)
- Blockchain (1)
- CJEU (1)
- Charter of fundamental rights (1)
-
- Communication (1)
- Content moderation (1)
- Copyright (1)
- Copyright violations (1)
- Court of justice of the european union (1)
- Cybersecurity (1)
- DRM (1)
- Data market (1)
- Directive 2019/790 (1)
- EU (1)
- EU Directive (1)
- EU Directive 2019/790 (1)
- Ecommerce (1)
- Economics (1)
- Eu jurisprudence (1)
- European Union (1)
- European parliament and council (1)
- Freedom of expression (1)
- Fundamental rights jurisprudence (1)
- ISP (1)
- Information policy (1)
- Intellectual property (1)
- Intellectual property rights (1)
- Intermediary (1)
- Intermediary liability (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Digital Communications and Networking
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
Seattle Journal of Technology, Environmental & Innovation Law
No abstract provided.
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
SMU Data Science Review
The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain distributed …
Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam
Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam
Faculty Publications
In the sustainability IoT, the cybersecurity risks to things, sensors, and monitoring systems are distinct from the conventional networking systems in many aspects. The interaction of sustainability IoT with the physical world phenomena (e.g., weather, climate, water, and oceans) is mostly not found in the modern information technology systems. Accordingly, actuation, the ability of these devices to make changes in real world based on sensing and monitoring, requires special consideration in terms of privacy and security. Moreover, the energy efficiency, safety, power, performance requirements of these device distinguish them from conventional computers systems. In this chapter, the cybersecurity approaches towards …