Open Access. Powered by Scholars. Published by Universities.®

Law and Society Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Law and Society

Reasonable Expectations Of Privacy In An Era Of Drones And Deepfakes: Expanding The Supreme Court Of Canada’S Decision In R V Jarvis, Suzie Dunn, Kristen Mj Thomasen Jan 2021

Reasonable Expectations Of Privacy In An Era Of Drones And Deepfakes: Expanding The Supreme Court Of Canada’S Decision In R V Jarvis, Suzie Dunn, Kristen Mj Thomasen

Articles, Book Chapters, & Popular Press

Perpetrators of Technology-Facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalker-ware, using drones to non-consensually film or harass, or manipulating and distributing intimate images online such as deep-fakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada’s Supreme Court recently addressed Technology-Facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019). The discussion of …


Is It Actually Violence? Framing Technology-Facilitated Abuse As Violence, Suzie Dunn Jan 2021

Is It Actually Violence? Framing Technology-Facilitated Abuse As Violence, Suzie Dunn

Articles, Book Chapters, & Popular Press

When discussing the term “Technology-Facilitated violence” (TFV) it is often asked: “Is it actually violence?” While international human rights standards, such as the United Nations’ Convention on the Elimination of All Forms of Discrimination against Women, have long recognized emotional and psychological abuse as forms of violence, including many forms of technology-facilitated abuse, law makers and the general public continue to grapple with the question of whether certain harmful technology-facilitated behaviors are actually forms of violence. This chapter explores this question in two parts. First, it reviews three theoretical concepts of violence and examines how these concepts apply to technology-facilitated …


Transparency Too Little, Too Late? Why And How Health Canada Should Make Clinical Data And Regulatory Decision-Making Open To Scrutiny In The Face Of Covid-19, Sterling Edmonds, Andrea Macgregor, Agnieszka Doll, Ipek Eren Vural, Janice Graham, Katherine Fierlbeck, Joel Lexchin, Peter Doshi, Matthew Herder Jan 2020

Transparency Too Little, Too Late? Why And How Health Canada Should Make Clinical Data And Regulatory Decision-Making Open To Scrutiny In The Face Of Covid-19, Sterling Edmonds, Andrea Macgregor, Agnieszka Doll, Ipek Eren Vural, Janice Graham, Katherine Fierlbeck, Joel Lexchin, Peter Doshi, Matthew Herder

Articles, Book Chapters, & Popular Press

Hard-won gains in the transparency of therapeutic product data in recent years1 have occurred alongside growing reliance by regulators upon expedited review processes.2 The concurrence of these two trends raises fundamental questions for the future of pharmaceutical regulation about whether the institutionalization of transparency will foster improved oversight of drugs, biologics, vaccines, and other interventions, or else, provide cover for a relaxing of regulatory standards of safety, effectiveness, and quality.3 The urgency of the COVID-19 pandemic, however, has brought this tension into immediate and sharp relief. During the course of the global health crisis, regulatory bodies have markedly expanded the …


Editorial, Lucie Guibault Jan 2020

Editorial, Lucie Guibault

Articles, Book Chapters, & Popular Press

1 This issue marks the tenth month into the COVID-19 pandemic. Since March 2020, we have learned to live with the more or less strict public health measures put in place to ‘flatten the curve’ of infection from the virus. Words like ‘social distancing’, ‘mask wearing’, and ‘lockdowns’ have taken an entirely new meaning. In spite of these measures, the human toll is huge, most clearly among frontline workers and vulnerable people. While the curve is far from flat in most countries, the pandemic has brought to light the long time unacknowledged persistence of systemic inequalities: figures show that poorer, …


Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert Jan 2020

Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert

Articles, Book Chapters, & Popular Press

Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.

Now, research on adversarial …


Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar Jan 2020

Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar

Articles, Book Chapters, & Popular Press

In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …


Technology-Facilitated Gender-Based Violence: An Overview, Suzie Dunn Jan 2020

Technology-Facilitated Gender-Based Violence: An Overview, Suzie Dunn

Articles, Book Chapters, & Popular Press

Technology facilitated gender-based violence (TFGBV) is a complex worldwide phenomenon with devastating results. Research to date shows that victim-survivors of intimate partner violence are tracked by their abusive partners who use technology to monitor their movements and communication. Many women journalists, human rights defenders and politicians face daily death threats and rape threats for speaking out about equality issues or for simply being a woman in a leadership role. Those with intersecting marginalized identities are at specific risk, with Black, Indigenous, and people of colour, LGBTQ+ people, and people with disabilities facing higher rates of attacks and concerted attacks that …


When Law Frees Us To Speak, Jonathon Penney, Danielle Citron Jan 2019

When Law Frees Us To Speak, Jonathon Penney, Danielle Citron

Articles, Book Chapters, & Popular Press

A central aim of online abuse is to silence victims. That effort is as regrettable as it is successful. In the face of cyber harassment and sexual privacy invasions, women and marginalized groups retreat from online engagement. These documented chilling effects, however, are not inevitable. Beyond its deterrent function, law has an equally important expressive role. In this article, we highlight law’s capacity to shape social norms and behavior through education. We focus on a neglected dimension of law’s expressive role—its capacity to empower victims to express their truths and engage with others. Our argument is theoretical and empirical. We …


Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney Jan 2018

Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney

Articles, Book Chapters, & Popular Press

Do laws criminalizing online harassment and cyberbullying "chill" online speech? Critics often argue that they do. However, this article discusses findings from a new empirical legal study that suggests, counter-intuitively, that while such legal interventions likely have some dampening effect, they may also facilitate and encourage more speech, expression, and sharing by those who are most often the targets of online harassment: women. Relevant findings on this point from this first-of-its-kind study are set out and discussed along with their implications.


More Than 'Revenge Porn' Civil Remedies For The Nonconsensual Distribution Of Intimate Images, Suzie Dunn, Alessia Petricone-Westwood Jan 2018

More Than 'Revenge Porn' Civil Remedies For The Nonconsensual Distribution Of Intimate Images, Suzie Dunn, Alessia Petricone-Westwood

Articles, Book Chapters, & Popular Press

The non-consensual distribution of intimate images, or “revenge porn” as it is colloquially known, is a growing phenomenon in the digital era that has devastated the lives of countless individuals. Targets of this conduct have suffered both short and long-lasting harms that have had serious repercussions on their mental health, physical well-being, and safety. Once their intimate images have been shared without their consent, they can face damage to their personal and professional reputations. There are reported cases where individuals have lost their jobs, have had to relocate, were stalked and harassed, experienced some form of emotional trauma, and had …


Open Connectivity, Open Data: Two Dimensions Of The Freedom To Seek, Receive And Impart Information In The New Zealand Bill Of Rights, Jonathon Penney Jan 2012

Open Connectivity, Open Data: Two Dimensions Of The Freedom To Seek, Receive And Impart Information In The New Zealand Bill Of Rights, Jonathon Penney

Articles, Book Chapters, & Popular Press

Recently, ideas about "rights" to Internet access or connectivity have received growing recognition from governments, legal institutions, and other political actors in several countries, including New Zealand Despite this emerging political and legal recognition, there are few, if any, systematic studies exploring such ideas. This paper aims to change this. First, it offers a theoretical exploration of the idea of a "right" to Internet access, including the diferent versions of such rights talk. Secondly, it examines whether there is any legal basis for such rights claims in New Zealand and ultimately argues that section 14 of the New Zealand Bill …


Why Cherry Picking Never Leads To Harmonisation: The Case Of The Limitations On Copyright Under Directive 2001/29/Ec, Lucie Guibault Jan 2010

Why Cherry Picking Never Leads To Harmonisation: The Case Of The Limitations On Copyright Under Directive 2001/29/Ec, Lucie Guibault

Articles, Book Chapters, & Popular Press

The article examines whether the norms laid down in the Directive in relation to the exceptions and limitations on copyright and related rights can be conducive to a sensible degree of harmonisation across the European Union. Before discussing the degree of harmonisation achieved so far by the Directive, the first part gives a short overview of the main characteristics of the list of exceptions and limitations contained in Article 5 of the Directive. A comprehensive review of the implementation of each limitation by the Member States is beyond the scope of this article. The following section takes a closer look …


Understanding The New Virtualist Paradigm, Jonathon Penney Jan 2009

Understanding The New Virtualist Paradigm, Jonathon Penney

Articles, Book Chapters, & Popular Press

This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …