Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Law
Reputation Systems Bias In The Platform Workplace, E. Gary Spitko
Reputation Systems Bias In The Platform Workplace, E. Gary Spitko
BYU Law Review
Online reputation systems enable the providers and consumers of a product or service to rate one another and allow others to rely upon those reputation scores in deciding whether to engage with a particular provider or consumer. Reputation systems are an intrinsic feature of the platform workplace, in which a platform operator, such as Uber or TaskRabbit, intermediates between the provider of a service and the consumer of that service. Operators typically rely upon consumer ratings of providers in rewarding and penalizing providers. Thus, these reputation systems allow an operator to achieve enormous scale while maintaining quality control and user …
Copyright’S Memory Hole, Eric Goldman, Jessica Silbey
Copyright’S Memory Hole, Eric Goldman, Jessica Silbey
BYU Law Review
There is growing interest in using copyright to protect the privacy and reputation of people depicted in copyrighted works. This pressure is driven by heightened concerns about privacy and reputation on the Internet, plus copyright’s plaintiff-favorable attributes compared to traditional privacy and reputation torts.
The Constitution authorizes copyright law because its exclusive rights benefit society by increasing our knowledge. But copyright law is being misdeployed by suppressing socially valuable works in a counterproductive attempt to advance privacy and reputation interests. This results in “memory holes” in society’s knowledge, analogous to those discussed in George Orwell’s dystopian novel 1984.
This Article …
“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts
“My Computer Is My Castle”: New Privacy Frameworks To Regulate Police Hacking, Ivan Škorvánek, Bert-Jaap Koops, Bryce Clayton Newell, Andrew Roberts
BYU Law Review
Several countries have recently introduced laws allowing the police to hack into suspects’ computers. Legislators recognize that police hacking is highly intrusive to personal privacy but consider it justified by the increased use of encryption and mobile computing—both of which challenge traditional investigative methods. Police hacking also exemplifies a major challenge to the way legal systems deal with, and conceptualize, privacy. Existing conceptualizations of privacy and privacy rights do not always adequately address the types and degrees of intrusion into individuals’ private lives that police hacking powers enable.
Traditional privacy pillars such as the home and secrecy of communications do …
Kill Me Through The Phone: The Legality Of Encouraging Suicide In An Increasingly Digital World, Sierra Taylor
Kill Me Through The Phone: The Legality Of Encouraging Suicide In An Increasingly Digital World, Sierra Taylor
BYU Law Review
No abstract provided.