Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Student Self-Grading Form, Brett Whysel Jun 2022

Student Self-Grading Form, Brett Whysel

Open Educational Resources

This is a word document that students use at the beginning, midpoint, and end of a semester to set relevant goals, measure progress towards goals, and self-grade. It is intended to build motivation, metacognition, and accountability. Instructors may use it on its own or to supplement other assessment tools, and improve the accuracy, validity, and fairness of final grades.


Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur Jun 2022

Spotlight Report #6: Proffering Machine-Readable Personal Privacy Research Agreements: Pilot Project Findings For Ieee P7012 Wg, Noreen Y. Whysel, Lisa Levasseur

Publications and Research

What if people had the ability to assert their own legally binding permissions for data collection, use, sharing, and retention by the technologies they use? The IEEE P7012 has been working on an interoperability specification for machine-readable personal privacy terms to support this ability since 2018. The premise behind the work of IEEE P7012 is that people need technology that works on their behalf—i.e. software agents that assert the individual’s permissions and preferences in a machine-readable format.

Thanks to a grant from the IEEE Technical Activities Board Committee on Standards (TAB CoS), we were able to explore the attitudes of …


Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel Feb 2022

Designing Respectful Tech: What Is Your Relationship With Technology?, Noreen Y. Whysel

Publications and Research

According to research at the Me2B Alliance, people feel they have a relationship with technology. It’s emotional. It’s embodied. And it’s very personal. We are studying digital relationships to answer questions like “Do people have a relationship with technology?” “What does that relationship feel like?” And “Do people understand the commitments that they are making when they explore, enter into and dissolve these relationships?” There are parallels between messy human relationships and the kinds of relationships that people develop with technology. As with human relationships, we move through states of discovery, commitment and breakup with digital applications as well. Technology …


Me2b Alliance Validation Testing Report: Consumer Perception Of Legal Policies In Digital Technology, Noreen Y. Whysel, Karina Alexanyan, Shaun Spaulting, Julia Little Jan 2022

Me2b Alliance Validation Testing Report: Consumer Perception Of Legal Policies In Digital Technology, Noreen Y. Whysel, Karina Alexanyan, Shaun Spaulting, Julia Little

Publications and Research

Our relationship with technology involves legal agreements that we either review or enter into when using a technology, namely privacy policies and terms of service or terms of use (“TOS/TOU”). We initiated this research to understand if providing a formal rating of the legal policies (privacy policies and TOS/TOUs) would be valuable to consumers (or Me-s). From our early qualitative discussions, we noticed that people were unclear on whether these policies were legally binding contracts or not. Thus, a secondary objective emerged to quantitatively explore whether people knew who these policies protected (if anyone), and if the policies were perceived …


A Call For The Library Community To Deploy Best Practices Toward A Database For Biocultural Knowledge Relating To Climate Change, Martha B. Lerski Jan 2022

A Call For The Library Community To Deploy Best Practices Toward A Database For Biocultural Knowledge Relating To Climate Change, Martha B. Lerski

Publications and Research

Abstract

Purpose – In this paper, a call to the library and information science community to support documentation and conservation of cultural and biocultural heritage has been presented.

Design/methodology/approach – Based in existing Literature, this proposal is generative and descriptive— rather than prescriptive—regarding precisely how libraries should collaborate to employ technical and ethical best practices to provide access to vital data, research and cultural narratives relating to climate.

Findings – COVID-19 and climate destruction signal urgent global challenges. Library best practices are positioned to respond to climate change. Literature indicates how libraries preserve, share and cross-link cultural and scientific knowledge. …


Intangible Cultural Heritage: A Benefit To Climate-Displaced And Host Communities, Gül Aktürk, Martha B. Lerski May 2021

Intangible Cultural Heritage: A Benefit To Climate-Displaced And Host Communities, Gül Aktürk, Martha B. Lerski

Publications and Research

Climate change is borderless, and its impacts are not shared equally by all communities. It causes an imbalance between people by creating a more desirable living environment for some societies while erasing settlements and shelters of some others. Due to floods, sea level rise, destructive storms, drought, and slow-onset factors such as salinization of water and soil, people lose their lands, homes, and natural resources. Catastrophic events force people to move voluntarily or involuntarily. The relocation of communities is a debatable climate adaptation measure which requires utmost care with human rights, ethics, and psychological well-being of individuals upon the issues …


The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood Oct 2020

The Internet Never Forgets: Image-Based Sexual Abuse And The Workplace, John Schriner, Melody Lee Rood

Publications and Research

Image-based sexual abuse (IBSA), commonly known as revenge pornography, is a type of cyberharassment that often results in detrimental effects to an individual's career and livelihood. Although there exists valuable research concerning cyberharassment in the workplace generally, there is little written about specifically IBSA and the workplace. This chapter examines current academic research on IBSA, the issues with defining this type of abuse, victim blaming, workplace policy, and challenges to victim-survivors' redress. The authors explore monetary motivation for websites that host revenge pornography and unpack how the dark web presents new challenges to seeking justice. Additionally, this chapter presents recommendations …


Regulation Of Radioactive Fracking Waste, Elizabeth Ann Glass Geltman, Nichole Leclair Jan 2018

Regulation Of Radioactive Fracking Waste, Elizabeth Ann Glass Geltman, Nichole Leclair

Publications and Research

Natural gas extracted form shale reached record production totals in 2015 in the United States and the US Energy Information Administration (EIA) forecasts natural gas production will continue to increase. Wastes from shale gas extraction can contain the radioactive isotopes radium-226 (Ra-226) and radium-228 (Ra-228), which decay further into radon (Rn). Exposure to radon, a form of naturally occurring radioactive materials (NORM), is the leading cause of lung cancer in the United States, after smoking. This article explores how states handle the disposal of technologically enhanced naturally occurring radioactive materials (TENORM) and/or NORM waste from oil and gas operations to …


Framing The Question, "Who Governs The Internet?", Robert J. Domanski Jan 2015

Framing The Question, "Who Governs The Internet?", Robert J. Domanski

Publications and Research

There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …