Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
-
- All Faculty Scholarship (2)
- Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10) (1)
- Cultural Encounters, Conflicts, and Resolutions (1)
- Innovation in Western Water Law and Management (Summer Conference, June 5-7) (1)
- Journal of Strategic Security (1)
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Law
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
Protecting One's Own Privacy In A Big Data Economy, Anita L. Allen
All Faculty Scholarship
Big Data is the vast quantities of information amenable to large-scale collection, storage, and analysis. Using such data, companies and researchers can deploy complex algorithms and artificial intelligence technologies to reveal otherwise unascertained patterns, links, behaviors, trends, identities, and practical knowledge. The information that comprises Big Data arises from government and business practices, consumer transactions, and the digital applications sometimes referred to as the “Internet of Things.” Individuals invisibly contribute to Big Data whenever they live digital lifestyles or otherwise participate in the digital economy, such as when they shop with a credit card, get treated at a hospital, apply …
Slides: Water Governance Innovation And Transnational Networks, Michele-Lee Moore
Slides: Water Governance Innovation And Transnational Networks, Michele-Lee Moore
Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10)
Presenter: Michele-Lee Moore, Assistant Professor, Department of Geography, University of Victoria; Water, Innovation, and Global Governance Lab
10 slides
Immigrants, Roma And Sinti Unveil The “National” In Italian Identity, Francesco Melfi
Immigrants, Roma And Sinti Unveil The “National” In Italian Identity, Francesco Melfi
Cultural Encounters, Conflicts, and Resolutions
This essay picks up a few threads in the ongoing debate on national identity in Italy. Immigration and the intertwining of cultures locally have stretched the contours of the nation state to a breaking point. As a result, the social self has become a sharply contested terrain between those who want to install a symbolic electronic fence around an imagined fatherland and those who want a more inclusive nation at home in a global world. After discussing the views of Amin Maalouf (2000), Alessandro Dal Lago (2009), Abdelmalek Sayad (1999) and Patrick Manning (2005) on national identity and migration in …
Eriksonian Identity Theory In Counterterrorism, Cally O'Brien
Eriksonian Identity Theory In Counterterrorism, Cally O'Brien
Journal of Strategic Security
Certain terrorists come from unexpected backgrounds. They give up comfortable lives and opportunities in order to wage jihad. Their existence has puzzled various theorists since they came to light. This article will explain how a theory of psychosocial identity formation created by Erik Erikson and his student James Marcia may explain this phenomenon. It will also explain how Erikson's theoretical legacy has contributed to current attempts at increasing moderation in the Middle East through education. Many of those attempts reflect ideas that are drawn from Eriksonian theory, although they are not typically described in Eriksonian terms. Meanwhile, while some theorists …
Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman
Liberating Copyright: Thinking Beyond Free Speech, Jennifer E. Rothman
All Faculty Scholarship
Scholars have often turned to the First Amendment to limit the scope of ever-expanding copyright law. This approach has mostly failed to convince courts that independent review is merited and has offered little to individuals engaged in personal rather than political or cultural expression. In this Article, I consider the value of an alternative paradigm using the lens of substantive due process and liberty to evaluate users’ rights. A liberty-based approach uses this other developed body of constitutional law to demarcate justifiable personal, identity-based uses of copyrighted works. Uses that are essential for mental integrity, intimacy promotion, communication, or religious …
Pyramid Lake Negotiated Settlement: Overview And Perspective, Joe Ely
Pyramid Lake Negotiated Settlement: Overview And Perspective, Joe Ely
Innovation in Western Water Law and Management (Summer Conference, June 5-7)
20 pages.