Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Law

Network Effects In Action, Christopher S. Yoo Nov 2020

Network Effects In Action, Christopher S. Yoo

All Faculty Scholarship

This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies alternative …


FacebookʼS Latest Attempt To Address Vaccine Misinformation — And Why ItʼS Not Enough, Ana Santos Rutschman Nov 2020

FacebookʼS Latest Attempt To Address Vaccine Misinformation — And Why ItʼS Not Enough, Ana Santos Rutschman

All Faculty Scholarship

On October 13, 2020 Facebook announced the adoption of a series of measures to promote vaccine trust “while prohibiting ads with misinformation that could harm public health efforts.” In the post written by Kang-Xing Jin (head of health) and Rob Leathern (director of product management), the company explained that the new measures were designed with an emphasis on encouraging widespread use of this yearʼs flu vaccine, as well as in anticipation of potential COVID-19 vaccines becoming available in the near future.

The changes focus mainly on the establishment of a multiprong informational campaign about the seasonal flu vaccine, which includes …


The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig Aug 2020

The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig

Joint PIJIP/TLS Research Paper Series

No abstract provided.


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


From Protecting To Performing Privacy, Garfield Benjamin May 2020

From Protecting To Performing Privacy, Garfield Benjamin

The Journal of Sociotechnical Critique

Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …


Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood Apr 2020

Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood

Independent Study Project (ISP) Collection

The digital domain is the emerging environment for which the internet and data connectivity exists. This new domain is challenging the traditional place for geopolitics to exist, and creating new challenges to international relations. The use of cyberweapons through direct cyberattacks, such as the possibility of an attack on the U.S. power grid, or misinformation campaigns, such as the one launched by Russia against the 2016 U.S. Presidential election, can expand the international threat landscape. While these new threats increase, states are widely not prepared to address the new challenges in the digital domain. This paper will use three primary …


Extrajudicial Statements And Prejudice In The Digital Age: Creating Factors To Preserve The Balance Between Attorney And State Interests In Trial Litigation, Emily R. O'Hara Feb 2020

Extrajudicial Statements And Prejudice In The Digital Age: Creating Factors To Preserve The Balance Between Attorney And State Interests In Trial Litigation, Emily R. O'Hara

William & Mary Law Review

As social media’s prevalence and usage grows within the United States, people and organizations capitalize on new media to send news to users. In 2017, 67 percent of people consumed their news from social media websites, and the rate continues to grow. Local and national news sources bring newsworthy stories to active users on social media sites such as Twitter, where users can communicate and interact with one another to promote ideas and spread information. These online accounts cover not only mundane, day-to-day news, but also salacious stories relating to civil and criminal lawsuits.

In April 2018, attorney Neal Katyal …


There And Back: Vindicating The Listener's Interests In Targeted Advertising In The Internet Information Economy, Caitlin Jokubaitis Jan 2020

There And Back: Vindicating The Listener's Interests In Targeted Advertising In The Internet Information Economy, Caitlin Jokubaitis

Kernochan Center for Law, Media, and the Arts

Targeted advertising — the process by which advertisers direct their message at a specific demographic — is neither a recent1 nor an irrational phenomenon.2 One industry executive has proclaimed it the “rare win for everyone” because it serves producers, advertisers, and consumers alike. It should be no surprise that the Information sector of the online economy — particularly new and social media platforms with robust access to consumer data — has structured revenue streams to benefit from targeted advertising. These platforms generate “substantially all of [their] revenue from advertising,” which in turn rely on active user engagement.

The Internet Information …


Iran, Diane M. Zorri Jan 2020

Iran, Diane M. Zorri

Publications

Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …


Acts Of Meaning, Resource Diagrams, And Essential Learning Behaviors: The Design Evolution Of Lost & Found, Owen Gottlieb, Ian Schreiber Jan 2020

Acts Of Meaning, Resource Diagrams, And Essential Learning Behaviors: The Design Evolution Of Lost & Found, Owen Gottlieb, Ian Schreiber

Articles

Lost & Found is a tabletop-to-mobile game series designed for teaching medieval religious legal systems. The long-term goals of the project are to change the discourse around religious laws, such as foregrounding the prosocial aspects of religious law such as collaboration, cooperation, and communal sustainability. This design case focuses on the evolution of the design of the mechanics and core systems in the first two tabletop games in the series, informed by over three and a half years’ worth of design notes, playable prototypes, outside design consultations, internal design reviews, playtests, and interviews.