Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Law

Intimate Images And Authors’ Rights: Non- Consensual Disclosure And The Copyright Disconnect, Meghan Sali Jan 2022

Intimate Images And Authors’ Rights: Non- Consensual Disclosure And The Copyright Disconnect, Meghan Sali

Canadian Journal of Law and Technology

This article responds to a brand of legal realpolitik that says using property law to respond to the non-consensual distribution of intimate images (NCDII) is appropriate and even necessary, because its remedial frameworks are well developed and provide the relief that is often most sought after by targets of an assault: the immediate removal of photos from online platforms. While some targets are not considered the ‘‘authors’’ of their intimate images, most of the images that are the subject of NCDII are selfies, taken by the target themselves. In these cases, that person rightfully owns the copyright in those images …


Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence Jan 2022

Reframing Technology-Facilitated Gender-Based Violence At The Intersections Of Law & Society, Jane Bailey, Carys Craig, Suzie Dunn, Sonia Lawrence

Canadian Journal of Law and Technology

This introductory article proceeds in three parts. First, it discusses the origins of this special issue as part of a multi-event, SSHRC-funded conference that focused on pushing beyond a narrow conception of TFGBV; rather than approaching TFGBV as solely an issue of interpersonal behaviours, the animating objective of the conference was to examine the structural, systemic, and design factors that contribute to TFGBV. Second, it explores the importance and promise of reframing TFGBV in this way through intersectional and structural lenses. Third, it briefly highlights some of the key insights from each of the contributions in this special issue. It …


“I Bet You Don’T Get What We Get”: An Intersectional Analysis Of Technology-Facilitated Violence Experienced By Racialized Women Anti- Violence Online Activists In Canada, Nasreen Rajani Jan 2022

“I Bet You Don’T Get What We Get”: An Intersectional Analysis Of Technology-Facilitated Violence Experienced By Racialized Women Anti- Violence Online Activists In Canada, Nasreen Rajani

Canadian Journal of Law and Technology

Despite growing attention to violence that women face in online settings, a relatively small proportion of academic work centres on the experiences and perspectives of racialized women in Canada. Informed by an intersectional framework, I draw on semi-structured interviews with nine women across Canada, all of whom are involved in anti-violence online activism, about their experiences of technology-facilitated violence (TFV). Their experiences revealed less prominent narratives, including instances of TFV beyond instances of intimate partner violence (IPV) and beyond sources of anonymous trolling by supposed white men, such as violence perpetrated by peers, white women, and racialized men. In this …


‘‘Don’T Take On The Responsibilty Of Somebody Else’S Fu**Ed Up Behavior”: Responding To Online Abuse In The Context Of Barriers To Support, Chandell Gosse Jan 2022

‘‘Don’T Take On The Responsibilty Of Somebody Else’S Fu**Ed Up Behavior”: Responding To Online Abuse In The Context Of Barriers To Support, Chandell Gosse

Canadian Journal of Law and Technology

Responsibilization, in a true circular fashion, is not only born of but also benefits institutional (e.g., social media companies and law enforcement) and cultural power structures (e.g., misogyny and patriarchy). When targets of online abuse take responsibility for the abuse launched against them, that assumption of responsibility requires energy, and that energy is taken away from efforts to hold institutions and perpetrators accountable. Responsibilization tries to tranquilize change in the service of power. The tricky thing about interrupting this process is that it requires more than just offering better support. It also requires exposing, challenging, and dismantling harmful ideologies, belief …


Onlife Harms: Uber And Sexual Violence, Amanda Turnbull Jan 2022

Onlife Harms: Uber And Sexual Violence, Amanda Turnbull

Canadian Journal of Law and Technology

Uber markets itself as a technology company that is managed primarily by ML algorithms with the support of human engineers. Yet, in its 2019 Report, the role that its technology played in relation to sexual violence is, for all intents and purposes, absent. Likewise, solutions dealing specifically with the role of technology in facilitating gender-based violence are also missing from the series of initiatives in which Uber has invested that are aimed at preventing sexual violence. Uber was not sufficiently rigorous in defining the problem it was trying to solve. It was a missed opportunity that has resulted in continued …


Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim Jan 2022

Submission To The Province Of Nova Scotia On Its Review Of The Intimate Images And Cyber-Protection Act - Leaf, Suzie Dunn, Rosel Kim

Reports & Public Policy Documents

The Women’s Legal Education and Action Fund (LEAF) commends the Nova Scotia government for reviewing its Intimate Images and Cyber-protection Act (the Act) and seeking public input for this review. Nova Scotia has been, and continues to be, a leader in Canada for its role in advancing innovative laws and supports for people targeted by technology-facilitated violence (TFV), digital abuse, and the non-consensual distribution of intimate images (NCDII). As these forms of harmful behaviour evolve and become better understood, it is important to revisit this legislation to assess whether it is providing meaningful and accessible responses to such serious social …


Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar Jan 2020

Politics Of Adversarial Machine Learning, Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar

Articles, Book Chapters, & Popular Press

In addition to their security properties, adversarial machine-learning attacks and defenses have political dimensions. They enable or foreclose certain options for both the subjects of the machine learning systems and for those who deploy them, creating risks for civil liberties and human rights. In this paper, we draw on insights from science and technology studies, anthropology, and human rights literature, to inform how defenses against adversarial attacks can be used to suppress dissent and limit attempts to investigate machine learning systems. To make this concrete, we use real-world examples of how attacks such as perturbation, model inversion, or membership inference …


Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert Jan 2020

Legal Risks Of Adversarial Machine Learning Research, Ram Shankar Siva Kumar, Jonathon Penney, Bruce Schneier, Kendra Albert

Articles, Book Chapters, & Popular Press

Adversarial machine learning is the systematic study of how motivated adversaries can compromise the confidentiality, integrity, and availability of machine learning (ML) systems through targeted or blanket attacks. The problem of attacking ML systems is so prevalent that CERT, the federally funded research and development center tasked with studying attacks, issued a broad vulnerability note on how most ML classifiers are vulnerable to adversarial manipulation. Google, IBM, Facebook, and Microsoft have committed to investing in securing machine learning systems. The US and EU are likewise putting security and safety of AI systems as a top priority.

Now, research on adversarial …


Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney Jan 2018

Can Cyber Harassment Laws Encourage Online Speech?, Jonathon Penney

Articles, Book Chapters, & Popular Press

Do laws criminalizing online harassment and cyberbullying "chill" online speech? Critics often argue that they do. However, this article discusses findings from a new empirical legal study that suggests, counter-intuitively, that while such legal interventions likely have some dampening effect, they may also facilitate and encourage more speech, expression, and sharing by those who are most often the targets of online harassment: women. Relevant findings on this point from this first-of-its-kind study are set out and discussed along with their implications.


Towards An Effective Regime Against Online Copyright Infringement In India, Ashwin Ramakrishnan May 2017

Towards An Effective Regime Against Online Copyright Infringement In India, Ashwin Ramakrishnan

LLM Theses

With Internet usage on the rise, it is important for India to establish an effective regulatory regime to combat piracy and mass copyright infringement online. This thesis argues that, in the face of unique legal and cultural challenges specific to India, present laws in the country have failed to do so. Unless and until these challenges are met it will be difficult to have an effective mechanism that deals with online copyright infringement. Countries like the United States, Canada, Ireland, and France have all adopted different regulatory models. However, this thesis argues that each not only have significant limitations on …


Respectful And Responsible Relationships: There’S No App For That (The Report Of The Nova Scotia Task Force On Bullying And Cyberbullying), A. Wayne Mackay Jan 2012

Respectful And Responsible Relationships: There’S No App For That (The Report Of The Nova Scotia Task Force On Bullying And Cyberbullying), A. Wayne Mackay

Reports & Public Policy Documents

Chairing this Task Force and producing this report has been both the most engaging and exhausting project that I have ever undertaken. Since my appointment in late May 2011, I have lived and breathed in the world of bullying and cyberbullying. I am sure my fellow Task Force members and members of the Working Group did the same. Born in the wake of tragic teen suicides it was easy for the members of the Task Force to be motivated. Indeed, few ventures have stirred my passions as much as this exercise has.

Bullying is a major social issue throughout the …