Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Privacy (2)
- Social media (2)
- Access (1)
- Antitrust law & poicy (1)
- Artificial intelligence (1)
-
- COVID-19 (1)
- CSS (1)
- Censorship (1)
- Columbia Journal of Law and the Arts (1)
- Commercial speech (1)
- Communications Decency Act (1)
- Competition (1)
- Consent (1)
- Consumer welfare (1)
- Content moderation (1)
- Contextual integrity (1)
- Current Events (1)
- Cybersecurity (1)
- Data (1)
- Data collection (1)
- Data scraping (1)
- Disinformation (1)
- Economics of networks (1)
- Encryption (1)
- Externalities (1)
- Facebook (1)
- Flu (1)
- Global Viewpoints (1)
- Identity (1)
- Information policy (1)
- Publication
- Publication Type
Articles 1 - 10 of 10
Full-Text Articles in Law
Network Effects In Action, Christopher S. Yoo
Network Effects In Action, Christopher S. Yoo
All Faculty Scholarship
This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies alternative …
FacebookʼS Latest Attempt To Address Vaccine Misinformation — And Why ItʼS Not Enough, Ana Santos Rutschman
FacebookʼS Latest Attempt To Address Vaccine Misinformation — And Why ItʼS Not Enough, Ana Santos Rutschman
All Faculty Scholarship
On October 13, 2020 Facebook announced the adoption of a series of measures to promote vaccine trust “while prohibiting ads with misinformation that could harm public health efforts.” In the post written by Kang-Xing Jin (head of health) and Rob Leathern (director of product management), the company explained that the new measures were designed with an emphasis on encouraging widespread use of this yearʼs flu vaccine, as well as in anticipation of potential COVID-19 vaccines becoming available in the near future.
The changes focus mainly on the establishment of a multiprong informational campaign about the seasonal flu vaccine, which includes …
The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig
The Law And Policy Of Client-Side Scanning (Originally Published By Lawfare), Paul Rosenzweig
Joint PIJIP/TLS Research Paper Series
No abstract provided.
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood
Geopolitics And The Digital Domain: How Cyberspace Is Impacting International Security, Georgia Wood
Independent Study Project (ISP) Collection
The digital domain is the emerging environment for which the internet and data connectivity exists. This new domain is challenging the traditional place for geopolitics to exist, and creating new challenges to international relations. The use of cyberweapons through direct cyberattacks, such as the possibility of an attack on the U.S. power grid, or misinformation campaigns, such as the one launched by Russia against the 2016 U.S. Presidential election, can expand the international threat landscape. While these new threats increase, states are widely not prepared to address the new challenges in the digital domain. This paper will use three primary …
Extrajudicial Statements And Prejudice In The Digital Age: Creating Factors To Preserve The Balance Between Attorney And State Interests In Trial Litigation, Emily R. O'Hara
William & Mary Law Review
As social media’s prevalence and usage grows within the United States, people and organizations capitalize on new media to send news to users. In 2017, 67 percent of people consumed their news from social media websites, and the rate continues to grow. Local and national news sources bring newsworthy stories to active users on social media sites such as Twitter, where users can communicate and interact with one another to promote ideas and spread information. These online accounts cover not only mundane, day-to-day news, but also salacious stories relating to civil and criminal lawsuits.
In April 2018, attorney Neal Katyal …
There And Back: Vindicating The Listener's Interests In Targeted Advertising In The Internet Information Economy, Caitlin Jokubaitis
There And Back: Vindicating The Listener's Interests In Targeted Advertising In The Internet Information Economy, Caitlin Jokubaitis
Kernochan Center for Law, Media, and the Arts
Targeted advertising — the process by which advertisers direct their message at a specific demographic — is neither a recent1 nor an irrational phenomenon.2 One industry executive has proclaimed it the “rare win for everyone” because it serves producers, advertisers, and consumers alike. It should be no surprise that the Information sector of the online economy — particularly new and social media platforms with robust access to consumer data — has structured revenue streams to benefit from targeted advertising. These platforms generate “substantially all of [their] revenue from advertising,” which in turn rely on active user engagement.
The Internet Information …
Iran, Diane M. Zorri
Iran, Diane M. Zorri
Publications
Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …
Acts Of Meaning, Resource Diagrams, And Essential Learning Behaviors: The Design Evolution Of Lost & Found, Owen Gottlieb, Ian Schreiber
Acts Of Meaning, Resource Diagrams, And Essential Learning Behaviors: The Design Evolution Of Lost & Found, Owen Gottlieb, Ian Schreiber
Articles
Lost & Found is a tabletop-to-mobile game series designed for teaching medieval religious legal systems. The long-term goals of the project are to change the discourse around religious laws, such as foregrounding the prosocial aspects of religious law such as collaboration, cooperation, and communal sustainability. This design case focuses on the evolution of the design of the mechanics and core systems in the first two tabletop games in the series, informed by over three and a half years’ worth of design notes, playable prototypes, outside design consultations, internal design reviews, playtests, and interviews.