Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Law

Modularity Theory And Internet Regulation, Christopher S. Yoo Jan 2016

Modularity Theory And Internet Regulation, Christopher S. Yoo

All Faculty Scholarship

Modularity is often cited as one of the foundations for the Internet’s success. Unfortunately, academic discussions about modularity appearing in the literature on Internet policy are undertheorized. The persistence of nonmodular architectures for some technologies underscores the need for some theoretical basis for determining when modularity is the preferred approach. Even when modularity is desirable, theory must provide some basis for making key design decisions, such as the number of modules, the location of the interfaces between the modules, and the information included in those interfaces.

The literature on innovation indicates that modules should be determined by the nature of …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan Jan 2015

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

All Faculty Scholarship

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


Drones, Henry H. Perritt Jr., Eliot O. Sprague Apr 2014

Drones, Henry H. Perritt Jr., Eliot O. Sprague

All Faculty Scholarship

Abstract

Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.

Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.

This article evaluates drone technology and design …


Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan Jan 2013

Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan

All Faculty Scholarship

Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.

Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …


Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan Jan 2012

Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan

All Faculty Scholarship

When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …


Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan Jan 2011

Vulnerable Software: Product-Risk Norms And The Problem Of Unauthorized Access, Richard Warner, Robert H. Sloan

All Faculty Scholarship

Unauthorized access to online information costs billions of dollars per year. Software vulnerabilities are a key. Software currently contains an unacceptable number of vulnerabilities. The standard solution notes that the typical software business strategy is to keep costs down and be the first to market even if that means the software has significant vulnerabilities. Many endorse the following remedy: make software developers liable for negligent or defective design. This remedy is unworkable. We offer an alternative based on an appeal to product-risk norms. Product-risk norms are social norms that govern the sale of products. A key feature of such norms …


Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo Jan 2011

Are Those Who Ignore History Doomed To Repeat It?, Peter Decherney, Nathan Ensmenger, Christopher S. Yoo

All Faculty Scholarship

In The Master Switch, Tim Wu argues that four leading communications industries have historically followed a single pattern that he calls “the Cycle.” Because Wu’s argument is almost entirely historical, the cogency of its claims and the force of its policy recommendations depends entirely on the accuracy and completeness of its treatment of the historical record. Specifically, he believes that industries begin as open, only to be transformed into closed systems by a great corporate mogul until some new form of ingenuity restarts the Cycle anew. Interestingly, even taken at face value, many of the episodes described in the …


Whose Music Is It Anyway?: How We Came To View Musical Expression As A Form Of Property -- Part I, Michael W. Carroll Sep 2003

Whose Music Is It Anyway?: How We Came To View Musical Expression As A Form Of Property -- Part I, Michael W. Carroll

Working Paper Series

Many participants in the music industry consider unauthorized downloading of music files over the Internet to be “theft” of their “property.” Many Internet users who exchange music files reject that characterization. Prompted by this dispute, this Article explores how those who create and distribute music first came to look upon music as their property and when in Western history the law first supported this view. By analyzing the economic and legal structures governing musicmaking in Western Europe from the classical period in Greece through the Renaissance, the Article shows that the law first granted some exclusive rights in the Middle …


Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen Jan 2000

Privacy-As-Data Control: Conceptual, Practical, And Moral Limits Of The Paradigm, Anita L. Allen

All Faculty Scholarship

No abstract provided.