Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Law
A Qualitative Look Into Repair Practices, Jumana Labib
A Qualitative Look Into Repair Practices, Jumana Labib
Undergraduate Student Research Internships Conference
This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …
Law Library Blog (August 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (August 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Technology In The Security Sector: Mexico, Vanessa J. Gutierrez, Melina Ponte, Angiee Rosario, Arleen Castillo, Henry Saldarriaga, Hector Tejeda, Stephanie Reich, Rosemary Barberet
Technology In The Security Sector: Mexico, Vanessa J. Gutierrez, Melina Ponte, Angiee Rosario, Arleen Castillo, Henry Saldarriaga, Hector Tejeda, Stephanie Reich, Rosemary Barberet
Publications and Research
The use of technology in policing seeks to improve the efficiency and effectiveness of the daily duties police officers may encounter. However, there is mixed empirical data on the use of technology and if it is really contributing to the institutional goals of the security sector, or, if it is contributing to other factors. This report provides an exploratory approach to understanding what information technology is being used in Mexico at the state level, in order to compare where broader application of information technology could make impactful contributions to the security situation in the country.
With a focus on six …
Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel
Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel
Publications and Research
According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …
Law Library Blog (February 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (February 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Which Transportation Technologies Do We Want?, Michael Lewyn
Which Transportation Technologies Do We Want?, Michael Lewyn
Scholarly Works
A review of Todd Litman's book, New Mobilities- Smart Planning for Emerging Transportation Technologies
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Deepfakes, Shallowfakes, And The Need For A Private Right Of Action, Eric Kocsis
Dickinson Law Review (2017-Present)
For nearly as long as there have been photographs and videos, people have been editing and manipulating them to make them appear to be something they are not. Usually edited or manipulated photographs are relatively easy to detect, but those days are numbered. Technology has no morality; as it advances, so do the ways it can be misused. The lack of morality is no clearer than with deepfake technology.
People create deepfakes by inputting data sets, most often pictures or videos into a computer. A series of neural networks attempt to mimic the original data set until they are nearly …