Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Law

PDF

Data

Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 50

Full-Text Articles in Social and Behavioral Sciences

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg Jul 2022

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg

Articles

The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …


The Role Of Data For Ai Startup Growth, James Bessen, Stephen Michael Impink, Lydia Reichensperger, Robert Seamans Jun 2022

The Role Of Data For Ai Startup Growth, James Bessen, Stephen Michael Impink, Lydia Reichensperger, Robert Seamans

Faculty Scholarship

Artificial intelligence (“AI”)-enabled products are expected to drive economic growth. Training data are important for firms developing AI-enabled products; without training data, firms cannot develop or refine their algorithms. This is particularly the case for AI startups developing new algorithms and products. However, there is no consensus in the literature on which aspects of training data are most important. Using unique survey data of AI startups, we find that startups with access to proprietary training data are more likely to acquire venture capital funding.


Law Library Blog (April 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Apr 2022

Law Library Blog (April 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Ethical Ai Development: Evidence From Ai Startups, James Bessen, Stephen Michael Impink, Lydia Reichensperger, Robert Seamans Mar 2022

Ethical Ai Development: Evidence From Ai Startups, James Bessen, Stephen Michael Impink, Lydia Reichensperger, Robert Seamans

Faculty Scholarship

Artificial Intelligence startups use training data as direct inputs in product development. These firms must balance numerous trade-offs between ethical issues and data access without substantive guidance from regulators or existing judicial precedence. We survey these startups to determine what actions they have taken to address these ethical issues and the consequences of those actions. We find that 58% of these startups have established a set of AI principles. Startups with data-sharing relationships with high-technology firms; that were impacted by privacy regulations; or with prior (non-seed) funding from institutional investors are more likely to establish ethical AI principles. Lastly, startups …


Appendix D: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman Jan 2022

Appendix D: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman

Research Data

This document, "Problem Solving & Interface Comments,” is an electronic Appendix D to, and is cited in, the empirical study: Susan Nevelow Mart, Adam Litzler, and David Gunderman, Hunting and Gathering on the Legal Information Savannah, 114 Law Libr. J. 1, 15 n.43 (2022), https://scholar.law.colorado.edu/articles/1548/.


Appendix E: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman Jan 2022

Appendix E: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman

Research Data

This document, "Random Search Order,” is an electronic Appendix C to, and is cited in, the empirical study: Susan Nevelow Mart, Adam Litzler, and David Gunderman, Hunting and Gathering on the Legal Information Savannah, 114 Law Libr. J. 1, 15 n.44 (2022), available at https://scholar.law.colorado.edu/articles/1548/.


Dataset And Codebook For Jamovi Tutorials, Saera R. Khan Jan 2022

Dataset And Codebook For Jamovi Tutorials, Saera R. Khan

Journal of Interdisciplinary Perspectives and Scholarship

No abstract provided.


Appendix C: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman Jan 2022

Appendix C: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman

Research Data

This document, "Twelve Problems,” is an electronic Appendix C to, and is cited in, the empirical study: Susan Nevelow Mart, Adam Litzler, and David Gunderman, Hunting and Gathering on the Legal Information Savannah, 114 Law Libr. J. 1, 13 n.37 (2022), available at https://scholar.law.colorado.edu/articles/1548/.


The New Bailments, Danielle D'Onfro Jan 2022

The New Bailments, Danielle D'Onfro

Scholarship@WashULaw

The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …


Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2021

Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Rwu Law Equity Scorecard February 2021, Roger Williams University School Of Law Jan 2021

Rwu Law Equity Scorecard February 2021, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


From Protecting To Performing Privacy, Garfield Benjamin May 2020

From Protecting To Performing Privacy, Garfield Benjamin

The Journal of Sociotechnical Critique

Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …


Data Governance And The Emerging University, Michael J. Madison Jan 2020

Data Governance And The Emerging University, Michael J. Madison

Book Chapters

Knowledge and information governance questions are tractable primarily in institutional terms, rather than in terms of abstractions such as knowledge itself or individual or social interests. This chapter offers the modern research university as an example. Practices of data-intensive research by university-based researchers, sometimes reduced to the popular phrase “Big Data,” pose governance challenges for the university. The chapter situates those challenges in the traditional understanding of the university as an institution for understanding forms and flows of knowledge. At a broad level, the chapter argues that the new salience of data exposes emerging shifts in the social, cultural, and …


Tools For Data Governance, Michael J. Madison Jan 2020

Tools For Data Governance, Michael J. Madison

Articles

This article describes the challenges of data governance in terms of the broader framework of knowledge commons governance, an institutional approach to governing shared knowledge, information, and data resources. Knowledge commons governance highlights the potential for effective community- and collective-based governance of knowledge resources. The article focuses on key concepts within the knowledge commons framework rather than on specific law and public policy questions, directing the attention of researchers and policymakers to critical inquiry regarding relevant social groups and relevant data “things.” Both concepts are key tools for effective data governance.


Telling Your Story: Using Metrics To Display Your Value (H2), Wendy E. Moore, Thomas J. Striepe, Steve Lastres, Joy Shoemaker Jul 2018

Telling Your Story: Using Metrics To Display Your Value (H2), Wendy E. Moore, Thomas J. Striepe, Steve Lastres, Joy Shoemaker

Presentations

The American Bar Association, academic institutions, law firms, and governments are demanding more and more outcome-based performance. However, displaying these outcomes is difficult for law libraries. Law libraries possess an abundance of data, but determining which metrics will showcase your law library’s value and performance is difficult. Speakers from a law school, law firm, and court library will explain the different metrics they use to display their value to their stakeholders. After these short presentations, a “fishbowl” discussion will provide participants the chance to share and learn about different metrics and tools law libraries are using to best tell their …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Law Library Blog (September 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law Sep 2017

Law Library Blog (September 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Slides: Rivers And People In The Neotropics: Social And Ecological Science For Environmental Flows, Elizabeth P. Anderson Jun 2016

Slides: Rivers And People In The Neotropics: Social And Ecological Science For Environmental Flows, Elizabeth P. Anderson

Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10)

Presenter: Elizabeth P. Anderson, Florida International University

38 slides


Early Warning/Intervention Systems (Presentation Slides From Nacole Symposium 2016 Held At John Jay College), Jennifer Helsby, Samuel Carton, Kenneth Joseph, Ayesha Mahmud, Youngsoo Park, Joe Walsh, Lauren Haynes Apr 2016

Early Warning/Intervention Systems (Presentation Slides From Nacole Symposium 2016 Held At John Jay College), Jennifer Helsby, Samuel Carton, Kenneth Joseph, Ayesha Mahmud, Youngsoo Park, Joe Walsh, Lauren Haynes

Publications and Research

Adverse interactions between police and the public harm police legitimacy and produce high costs due to harms to both officers and the public as well as litigation. Early intervention systems (EIS) that flag officers considered most likely to be involved in one of these adverse situations are an important tool for police supervision and for targeting of interventions such as counseling or training. However, the EIS that exist are often not data-driven and are based on supervior intuition. We have developed a prototype data-driven EIS that uses a diverse set of data sources from the Charlotte-Mecklenburg Police Department and machine …


Preparing Law Students For Information Governance, Susan David Demaine Jan 2016

Preparing Law Students For Information Governance, Susan David Demaine

Articles by Maurer Faculty

Information governance is a holistic business approach to managing and using information that recognizes information as an asset as well as a potential source of risk. Law librarians and legal information professionals are well situated to take leadership roles in information governance efforts, including instructing law students in information governance principles and practices. This article traces the development of information governance and its importance to the legal profession, offers a primer on information governance principles and implementation, and discusses how academic law librarians and other legal educators can teach information governance to law students using problem-based learning or similar pedagogical …


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova Jan 2015

Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova

Journal of Digital Forensics, Security and Law

With ubiquitous computing and the growth of the Internet of Things, there is vast expansion in the deployment and use of event data recording systems in a variety of environments. From the ships’ logs of antiquity through the evolution of personal devices for recording personal and environmental activities, these devices offer rich forensic and evidentiary opportunities that smash against rights of privacy and personality. The technical configurations of these devices provide for greater scope of sensing, interconnection options for local, near, and cloud storage of data, and the possibility of powerful analytics. This creates the unique situation of near-total data …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


A Reply To David Richards’ Review Of Measuring Human Rights, Todd Landman, Edzia Carvalho Jan 2012

A Reply To David Richards’ Review Of Measuring Human Rights, Todd Landman, Edzia Carvalho

Human Rights & Human Welfare

Professor Richards highlights, in his generous review of our book Measuring Human Rights that one of the aims of the book is to bring to the forefront the importance of conceptualization before operationalization – that conceptual clarity (or lack of it) is at the heart of the problems concerning the measurement of human rights. He draws out three key issues from the book as the springboard for further discussion on measurement of the concept – a) the “Respect, Protect and Fulfill” (RPF) framework, b) the lack of reliable data sources, and c) the conceptual links between human rights, human development, …


Phased Retirement Data Sheet, Workplace Flexibility 2010, Georgetown University Law Center Mar 2010

Phased Retirement Data Sheet, Workplace Flexibility 2010, Georgetown University Law Center

Memos and Fact Sheets

This data sheet includes information on current coverage and participation by American workers in pension and retirement plans. It also includes information on what employees say they want in terms of flexible work arrangements and access to pension and retirement funds, as well as what employers say they need with regard to the workforce of the future.


Flexible Work Arrangements: The Fact Sheet, Jean Flatley Mcguire, Kaitlyn Kenney, Phyllis Brashler Mar 2010

Flexible Work Arrangements: The Fact Sheet, Jean Flatley Mcguire, Kaitlyn Kenney, Phyllis Brashler

Memos and Fact Sheets

A "flexible work arrangement" (FWA) is any one of a spectrum of work structures that alters the time and/or place that work gets done on a regular basis. The term includes (but is not limited to):

1. flexibility in the scheduling of hours worked, such as alternative work schedules (e.g., flex time and compressed workweeks), and arrangements regarding shift and breack schedules:

2. flexibility in the amount of hours worked, such as part-time work and job shares; and

3. flexibility in the place of work, such as working at home or at a satellite location.


A Summary Of Data From Families And Work Institute’S National Study Of Employers (2008), Workplace Flexibility 2010, Georgetown University Law Center May 2009

A Summary Of Data From Families And Work Institute’S National Study Of Employers (2008), Workplace Flexibility 2010, Georgetown University Law Center

Memos and Fact Sheets

This memo presents data from the Families and Work Institute’s 2008 National Study of Employers describing the similarities in access to flexible work arrangements (“FWAs”) for employees of small and large employers. The 2008 National Study of Employers (“2008 Study”) provides a comparison of the availability of 12 types of FWAs to employees of small (50-99 employees) and large (over 1,000 employees) employers.


Telework In The Federal Government: The Overview Memo, Workplace Flexibility 2010, Georgetown University Law Center Apr 2009

Telework In The Federal Government: The Overview Memo, Workplace Flexibility 2010, Georgetown University Law Center

Memos and Fact Sheets

Flexible Work Arrangements (FWAs) alter the time and/or place that employees work on a regular basis in a manner that is manageable and predictable for both employees and employers.1 Telework, also called telecommuting, refers to an FWA that enables an employee to work from an alternative place to the employer’s usual worksite, typically home or a satellite work center. Telework technically refers to work performed with the use of a telecommunications connection to the workplace (e.g., computer, telephone), but the term is also


Statements Illustrating The Legislative Intent Of These Laws, Workplace Flexibility 2010, Georgetown University Law Center Apr 2009

Statements Illustrating The Legislative Intent Of These Laws, Workplace Flexibility 2010, Georgetown University Law Center

Memos and Fact Sheets

Based on statements in the legislative history, these laws were meant to provide:

  1. Overarching Benefits in the Current Economy
  2. Benefits to Families
  3. Benefits to Management
  4. Equality for Women
  5. Protection of the Environment


An Overview Of Early Laws Increasing Access To Flexible Scheduling And Reduced Hours In The Federal Workforce, Workplace Flexibility 2010, Georgetown University Law Center Apr 2009

An Overview Of Early Laws Increasing Access To Flexible Scheduling And Reduced Hours In The Federal Workforce, Workplace Flexibility 2010, Georgetown University Law Center

Memos and Fact Sheets

The Federal Employees Flexible and Compressed Work Schedules Act (FEFCWA) authorizes, but does not require, agencies to offer alternative work schedules to employees. FEFCWA permits employees to designate non-traditional arrival and departure times, centered around core agency hours, and to experiment with four-day workweeks or other compressed schedules. Under the law, implementation and employee utilization of alternative work schedules depends on management support and leadership.