Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Law

A Qualitative Look Into Repair Practices, Jumana Labib Aug 2022

A Qualitative Look Into Repair Practices, Jumana Labib

Undergraduate Student Research Internships Conference

This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …


Law Library Blog (August 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Aug 2022

Law Library Blog (August 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Technology In The Security Sector: Mexico, Vanessa J. Gutierrez, Melina Ponte, Angiee Rosario, Arleen Castillo, Henry Saldarriaga, Hector Tejeda, Stephanie Reich, Rosemary Barberet Jun 2022

Technology In The Security Sector: Mexico, Vanessa J. Gutierrez, Melina Ponte, Angiee Rosario, Arleen Castillo, Henry Saldarriaga, Hector Tejeda, Stephanie Reich, Rosemary Barberet

Publications and Research

The use of technology in policing seeks to improve the efficiency and effectiveness of the daily duties police officers may encounter. However, there is mixed empirical data on the use of technology and if it is really contributing to the institutional goals of the security sector, or, if it is contributing to other factors. This report provides an exploratory approach to understanding what information technology is being used in Mexico at the state level, in order to compare where broader application of information technology could make impactful contributions to the security situation in the country.

With a focus on six …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel Feb 2022

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


Law Library Blog (February 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Feb 2022

Law Library Blog (February 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Which Transportation Technologies Do We Want?, Michael Lewyn Jan 2022

Which Transportation Technologies Do We Want?, Michael Lewyn

Scholarly Works

A review of Todd Litman's book, New Mobilities- Smart Planning for Emerging Transportation Technologies


Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis Jan 2022

Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis

Dickinson Law Review (2017-Present)

For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.

People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …