Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Data

Law

Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 54

Full-Text Articles in Social and Behavioral Sciences

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg Jul 2022

Too Much Of A Good Thing? A Governing Knowledge Commons Review Of Abundance In Context, Michael J. Madison, Brett M. Frischmann, Madelyn Sanfilippo, Katherine J. Strandburg

Articles

The economics of abundance, along with the sociology of abundance, the law of abundance, and so forth, should be re-framed, linked, and situated in a common context for empirical rather than conceptual research. Abundance may seem to be a new, big thing, between anxiety over information overload, Big Data, and related technological disruptions. But scholars know that abundance is an ancient phenomenon, which only seemed to disappear as twentieth century social science focused on scarcity instead. Restoring the study of abundance, and figuring out how to solve the problems that abundance might create, means shedding disciplinary blinders and going back …


The Role Of Data For Ai Startup Growth, James Bessen, Stephen Michael Impink, Lydia Reichensperger, Robert Seamans Jun 2022

The Role Of Data For Ai Startup Growth, James Bessen, Stephen Michael Impink, Lydia Reichensperger, Robert Seamans

Faculty Scholarship

Artificial intelligence (“AI”)-enabled products are expected to drive economic growth. Training data are important for firms developing AI-enabled products; without training data, firms cannot develop or refine their algorithms. This is particularly the case for AI startups developing new algorithms and products. However, there is no consensus in the literature on which aspects of training data are most important. Using unique survey data of AI startups, we find that startups with access to proprietary training data are more likely to acquire venture capital funding.


Law Library Blog (April 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Apr 2022

Law Library Blog (April 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Ethical Ai Development: Evidence From Ai Startups, James Bessen, Stephen Michael Impink, Lydia Reichensperger, Robert Seamans Mar 2022

Ethical Ai Development: Evidence From Ai Startups, James Bessen, Stephen Michael Impink, Lydia Reichensperger, Robert Seamans

Faculty Scholarship

Artificial Intelligence startups use training data as direct inputs in product development. These firms must balance numerous trade-offs between ethical issues and data access without substantive guidance from regulators or existing judicial precedence. We survey these startups to determine what actions they have taken to address these ethical issues and the consequences of those actions. We find that 58% of these startups have established a set of AI principles. Startups with data-sharing relationships with high-technology firms; that were impacted by privacy regulations; or with prior (non-seed) funding from institutional investors are more likely to establish ethical AI principles. Lastly, startups …


Appendix D: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman Jan 2022

Appendix D: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman

Research Data

This document, "Problem Solving & Interface Comments,” is an electronic Appendix D to, and is cited in, the empirical study: Susan Nevelow Mart, Adam Litzler, and David Gunderman, Hunting and Gathering on the Legal Information Savannah, 114 Law Libr. J. 1, 15 n.43 (2022), https://scholar.law.colorado.edu/articles/1548/.


Appendix E: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman Jan 2022

Appendix E: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman

Research Data

This document, "Random Search Order,” is an electronic Appendix C to, and is cited in, the empirical study: Susan Nevelow Mart, Adam Litzler, and David Gunderman, Hunting and Gathering on the Legal Information Savannah, 114 Law Libr. J. 1, 15 n.44 (2022), available at https://scholar.law.colorado.edu/articles/1548/.


Dataset And Codebook For Jamovi Tutorials, Saera R. Khan Jan 2022

Dataset And Codebook For Jamovi Tutorials, Saera R. Khan

Journal of Interdisciplinary Perspectives and Scholarship

No abstract provided.


Appendix C: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman Jan 2022

Appendix C: Hunting And Gathering On The Legal Information Savannah, Susan Nevelow Mart, Adam Litzler, David Gunderman

Research Data

This document, "Twelve Problems,” is an electronic Appendix C to, and is cited in, the empirical study: Susan Nevelow Mart, Adam Litzler, and David Gunderman, Hunting and Gathering on the Legal Information Savannah, 114 Law Libr. J. 1, 13 n.37 (2022), available at https://scholar.law.colorado.edu/articles/1548/.


The New Bailments, Danielle D'Onfro Jan 2022

The New Bailments, Danielle D'Onfro

Scholarship@WashULaw

The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …


Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law Jan 2021

Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Rwu Law Equity Scorecard February 2021, Roger Williams University School Of Law Jan 2021

Rwu Law Equity Scorecard February 2021, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


From Protecting To Performing Privacy, Garfield Benjamin May 2020

From Protecting To Performing Privacy, Garfield Benjamin

The Journal of Sociotechnical Critique

Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …


Data Governance And The Emerging University, Michael J. Madison Jan 2020

Data Governance And The Emerging University, Michael J. Madison

Book Chapters

Knowledge and information governance questions are tractable primarily in institutional terms, rather than in terms of abstractions such as knowledge itself or individual or social interests. This chapter offers the modern research university as an example. Practices of data-intensive research by university-based researchers, sometimes reduced to the popular phrase “Big Data,” pose governance challenges for the university. The chapter situates those challenges in the traditional understanding of the university as an institution for understanding forms and flows of knowledge. At a broad level, the chapter argues that the new salience of data exposes emerging shifts in the social, cultural, and …


Tools For Data Governance, Michael J. Madison Jan 2020

Tools For Data Governance, Michael J. Madison

Articles

This article describes the challenges of data governance in terms of the broader framework of knowledge commons governance, an institutional approach to governing shared knowledge, information, and data resources. Knowledge commons governance highlights the potential for effective community- and collective-based governance of knowledge resources. The article focuses on key concepts within the knowledge commons framework rather than on specific law and public policy questions, directing the attention of researchers and policymakers to critical inquiry regarding relevant social groups and relevant data “things.” Both concepts are key tools for effective data governance.


Telling Your Story: Using Metrics To Display Your Value (H2), Wendy E. Moore, Thomas J. Striepe, Steve Lastres, Joy Shoemaker Jul 2018

Telling Your Story: Using Metrics To Display Your Value (H2), Wendy E. Moore, Thomas J. Striepe, Steve Lastres, Joy Shoemaker

Presentations

The American Bar Association, academic institutions, law firms, and governments are demanding more and more outcome-based performance. However, displaying these outcomes is difficult for law libraries. Law libraries possess an abundance of data, but determining which metrics will showcase your law library’s value and performance is difficult. Speakers from a law school, law firm, and court library will explain the different metrics they use to display their value to their stakeholders. After these short presentations, a “fishbowl” discussion will provide participants the chance to share and learn about different metrics and tools law libraries are using to best tell their …


Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj Dec 2017

Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj

Capstones

Breadcrumbs: Privacy as a Privilege Abstract

By: Prachi Bhardwaj

In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.

That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …


Law Library Blog (September 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law Sep 2017

Law Library Blog (September 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


Paper Dragon Thieves, J.S. Nelson Dec 2016

Paper Dragon Thieves, J.S. Nelson

J.S. Nelson

Developments in the law are making the corporate form more opaque and allowing the agents who animate it to escape individual accountability for their actions. The law now provides protection for agents to engage in widespread frauds that inflict massive harm on the public. This article challenges the academic orthodoxy that shareholder and director liability are enough to control agent behavior by developing a paper dragon analogy to focus on the importance of agents in corporate animation. Lack of agent accountability encourages the patterns of fraud that caused the financial crisis in which forty-five percent of the world’s wealth disappeared, …


Slides: Rivers And People In The Neotropics: Social And Ecological Science For Environmental Flows, Elizabeth P. Anderson Jun 2016

Slides: Rivers And People In The Neotropics: Social And Ecological Science For Environmental Flows, Elizabeth P. Anderson

Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10)

Presenter: Elizabeth P. Anderson, Florida International University

38 slides


Early Warning/Intervention Systems (Presentation Slides From Nacole Symposium 2016 Held At John Jay College), Jennifer Helsby, Samuel Carton, Kenneth Joseph, Ayesha Mahmud, Youngsoo Park, Joe Walsh, Lauren Haynes Apr 2016

Early Warning/Intervention Systems (Presentation Slides From Nacole Symposium 2016 Held At John Jay College), Jennifer Helsby, Samuel Carton, Kenneth Joseph, Ayesha Mahmud, Youngsoo Park, Joe Walsh, Lauren Haynes

Publications and Research

Adverse interactions between police and the public harm police legitimacy and produce high costs due to harms to both officers and the public as well as litigation. Early intervention systems (EIS) that flag officers considered most likely to be involved in one of these adverse situations are an important tool for police supervision and for targeting of interventions such as counseling or training. However, the EIS that exist are often not data-driven and are based on supervior intuition. We have developed a prototype data-driven EIS that uses a diverse set of data sources from the Charlotte-Mecklenburg Police Department and machine …


Preparing Law Students For Information Governance, Susan David Demaine Jan 2016

Preparing Law Students For Information Governance, Susan David Demaine

Articles by Maurer Faculty

Information governance is a holistic business approach to managing and using information that recognizes information as an asset as well as a potential source of risk. Law librarians and legal information professionals are well situated to take leadership roles in information governance efforts, including instructing law students in information governance principles and practices. This article traces the development of information governance and its importance to the legal profession, offers a primer on information governance principles and implementation, and discusses how academic law librarians and other legal educators can teach information governance to law students using problem-based learning or similar pedagogical …


The Corporate Shell Game, J.S. Nelson Dec 2015

The Corporate Shell Game, J.S. Nelson

J.S. Nelson

This Article identifies for the first time the hardening of the corporate shell. It provides compelling evidence that shell-hardening pushes and disguises the way that corporations and agents commit large-scale wrongdoing, and it traces the contributing legal streams that protect the agents who engage in this behavior. The only way to combat widespread frauds that inflict damage on the public is for the corporate shell to be-come less opaque.


The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth Aug 2015

The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth

Sara Smyth

This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh the …


Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova Jan 2015

Cyber Black Box/Event Data Recorder: Legal And Ethical Perspectives And Challenges With Digital Forensics, Michael Losavio, Pavel Pastukov, Svetlana Polyakova

Journal of Digital Forensics, Security and Law

With ubiquitous computing and the growth of the Internet of Things, there is vast expansion in the deployment and use of event data recording systems in a variety of environments. From the ships’ logs of antiquity through the evolution of personal devices for recording personal and environmental activities, these devices offer rich forensic and evidentiary opportunities that smash against rights of privacy and personality. The technical configurations of these devices provide for greater scope of sensing, interconnection options for local, near, and cloud storage of data, and the possibility of powerful analytics. This creates the unique situation of near-total data …


Labor Market Data Needs Relating To Antidiscrimination Activity: Comment, Ronald Ehrenberg Jul 2013

Labor Market Data Needs Relating To Antidiscrimination Activity: Comment, Ronald Ehrenberg

Ronald G. Ehrenberg

[Excerpt] Barbara Bergmann's background paper divides data needs in the antidiscrimination area into data that would be useful in the formulation of national policy and data that would be useful as an aid in enforcing the laws and executive orders against discrimination. Although the former are likely to be of greatest concern to the commission, she has performed a valuable service by discussing these interrelated needs in one place. I find much to agree with, and very little to disagree with or question, in her paper. The presentation is, in the main, an objective one and she tempers her desire …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


A Reply To David Richards’ Review Of Measuring Human Rights, Todd Landman, Edzia Carvalho Jan 2012

A Reply To David Richards’ Review Of Measuring Human Rights, Todd Landman, Edzia Carvalho

Human Rights & Human Welfare

Professor Richards highlights, in his generous review of our book Measuring Human Rights that one of the aims of the book is to bring to the forefront the importance of conceptualization before operationalization – that conceptual clarity (or lack of it) is at the heart of the problems concerning the measurement of human rights. He draws out three key issues from the book as the springboard for further discussion on measurement of the concept – a) the “Respect, Protect and Fulfill” (RPF) framework, b) the lack of reliable data sources, and c) the conceptual links between human rights, human development, …


Phased Retirement Data Sheet, Workplace Flexibility 2010, Georgetown University Law Center Mar 2010

Phased Retirement Data Sheet, Workplace Flexibility 2010, Georgetown University Law Center

Memos and Fact Sheets

This data sheet includes information on current coverage and participation by American workers in pension and retirement plans. It also includes information on what employees say they want in terms of flexible work arrangements and access to pension and retirement funds, as well as what employers say they need with regard to the workforce of the future.


Flexible Work Arrangements: The Fact Sheet, Jean Flatley Mcguire, Kaitlyn Kenney, Phyllis Brashler Mar 2010

Flexible Work Arrangements: The Fact Sheet, Jean Flatley Mcguire, Kaitlyn Kenney, Phyllis Brashler

Memos and Fact Sheets

A "flexible work arrangement" (FWA) is any one of a spectrum of work structures that alters the time and/or place that work gets done on a regular basis. The term includes (but is not limited to):

1. flexibility in the scheduling of hours worked, such as alternative work schedules (e.g., flex time and compressed workweeks), and arrangements regarding shift and breack schedules:

2. flexibility in the amount of hours worked, such as part-time work and job shares; and

3. flexibility in the place of work, such as working at home or at a satellite location.