Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Internet Law

Reasonable Expectations Of Privacy In An Era Of Drones And Deepfakes: Expanding The Supreme Court Of Canada’S Decision In R V Jarvis, Suzie Dunn, Kristen Mj Thomasen Jan 2021

Reasonable Expectations Of Privacy In An Era Of Drones And Deepfakes: Expanding The Supreme Court Of Canada’S Decision In R V Jarvis, Suzie Dunn, Kristen Mj Thomasen

Articles, Book Chapters, & Popular Press

Perpetrators of Technology-Facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalker-ware, using drones to non-consensually film or harass, or manipulating and distributing intimate images online such as deep-fakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada’s Supreme Court recently addressed Technology-Facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019). The discussion of …


Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar Jan 2020

Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar

Articles, Book Chapters, & Popular Press

In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …


Technology-Facilitated Gender-Based Violence: An Overview, Suzie Dunn Jan 2020

Technology-Facilitated Gender-Based Violence: An Overview, Suzie Dunn

Articles, Book Chapters, & Popular Press

Technology facilitated gender-based violence (TFGBV) is a complex worldwide phenomenon with devastating results. Research to date shows that victim-survivors of intimate partner violence are tracked by their abusive partners who use technology to monitor their movements and communication. Many women journalists, human rights defenders and politicians face daily death threats and rape threats for speaking out about equality issues or for simply being a woman in a leadership role. Those with intersecting marginalized identities are at specific risk, with Black, Indigenous, and people of colour, LGBTQ+ people, and people with disabilities facing higher rates of attacks and concerted attacks that …


When Law Frees Us To Speak, Jonathon Penney, Danielle Citron Jan 2019

When Law Frees Us To Speak, Jonathon Penney, Danielle Citron

Articles, Book Chapters, & Popular Press

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …


Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney Jan 2018

Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney

Articles, Book Chapters, & Popular Press

Do laws criminalizing online harassment and cyberbullying "chill" online speech? Critics often argue that they do. However, this article discusses findings from a new empirical legal study that suggests, counter-intuitively, that while such legal interventions likely have some dampening effect, they may also facilitate and encourage more speech, expression, and sharing by those who are most often the targets of online harassment: women. Relevant findings on this point from this first-of-its-kind study are set out and discussed along with their implications.


More Than 'Revenge Porn' Civil Remedies For The Nonconsensual Distribution Of Intimate Images, Suzie Dunn, Alessia Petricone-Westwood Jan 2018

More Than 'Revenge Porn' Civil Remedies For The Nonconsensual Distribution Of Intimate Images, Suzie Dunn, Alessia Petricone-Westwood

Articles, Book Chapters, & Popular Press

The non-consensual distribution of intimate images, or “revenge porn” as it is colloquially known, is a growing phenomenon in the digital era that has devastated the lives of countless individuals. Targets of this conduct have suffered both short and long-lasting harms that have had serious repercussions on their mental health, physical well-being, and safety. Once their intimate images have been shared without their consent, they can face damage to their personal and professional reputations. There are reported cases where individuals have lost their jobs, have had to relocate, were stalked and harassed, experienced some form of emotional trauma, and had …


Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney Jan 2016

Chilling Effects: Online Surveillance And Wikipedia Use, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the results of the first empirical study providing evidence of regulatory “chilling effects” of Wikipedia users associated with online government surveillance. The study explores how traffic to Wikipedia articles on topics that raise privacy concerns for Wikipedia users decreased after the widespread publicity about NSA/PRISM surveillance revelations in June 2013. Using an interdisciplinary research design, the study tests the hypothesis, based on chilling effects theory, that traffic to privacy-sensitive Wikipedia articles reduced after the mass surveillance revelations. The Article finds not only a statistically significant immediate decline in traffic for these Wikipedia articles after June 2013, but …


Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay Jan 2015

Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay

Articles, Book Chapters, & Popular Press

This article focuses on the role and limits of law as a response to cyberbullying. The problem of cyberbullying engages many of our most fundamental legal concepts and provides an interesting case study. Even when there is general agreement that the problem merits a legal response, there are significant debates about what that response should be. Which level and what branch of government can and should best respond? What is the most appropriate legal process for pursuing cyberbullies—traditional legal avenues or more creative restorative approaches? How should the rights and responsibilities of perpetrators, victims and even bystanders be balanced? Among …


Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay Jan 2015

Law As An Ally Or Enemy In The War On Cyberbullying: Exploring The Contested Terrain Of Privacy And Other Legal Concepts In The Age Of Technology And Social Media, A. Wayne Mackay

Articles, Book Chapters, & Popular Press

This article focuses on the role and limits of law as a response to cyberbullying. The problem of cyberbullying engages many of our most fundamental legal concepts and provides an interesting case study. Even when there is general agreement that the problem merits a legal response, there are significant debates about what that response should be. Which level and what branch of government can and should best respond? What is the most appropriate legal process for pursuing cyberbullies—traditional legal avenues or more creative restorative approaches? How should the rights and responsibilities of perpetrators, victims and even bystanders be balanced? Among …


Your Day In 'Wiki-Court': Adr, Fairness, And Justice In Wikipedia's Global Community, Sara Gwendolyn Ross Jan 2014

Your Day In 'Wiki-Court': Adr, Fairness, And Justice In Wikipedia's Global Community, Sara Gwendolyn Ross

Articles, Book Chapters, & Popular Press

Wikipedia has quickly become the largest volume of collected knowledge on the planet, but it is also one of the busiest centers for dispute resolution in the world. From small groups of individuals negotiating article changes on “talk pages”, to the involvement of hundreds of people in the formation of the community consensuses needed to implement new policies, to the use of binding arbitration to create final conflict resolutions, the Wikipedia community has developed a complex network of norms and rules that funnel all disagreements and intractable differences through a series of progressively more involved dispute resolution processes. I provide …


Open Connectivity, Open Data: Two Dimensions Of The Freedom To Seek, Receive And Impart Information In The New Zealand Bill Of Rights, Jonathon Penney Jan 2012

Open Connectivity, Open Data: Two Dimensions Of The Freedom To Seek, Receive And Impart Information In The New Zealand Bill Of Rights, Jonathon Penney

Articles, Book Chapters, & Popular Press

Recently, ideas about "rights" to Internet access or connectivity have received growing recognition from governments, legal institutions, and other political actors in several countries, including New Zealand Despite this emerging political and legal recognition, there are few, if any, systematic studies exploring such ideas. This paper aims to change this. First, it offers a theoretical exploration of the idea of a "right" to Internet access, including the diferent versions of such rights talk. Secondly, it examines whether there is any legal basis for such rights claims in New Zealand and ultimately argues that section 14 of the New Zealand Bill …


Understanding The New Virtualist Paradigm, Jonathon Penney Jan 2009

Understanding The New Virtualist Paradigm, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …