Title
|
Author
|
Year
|
SIRI-OUSLY 2.0: What Artificial Intelligence Reveals about the First Amendment
Machines that can actually think are referred to as strong Artificial intelligence (AI). The First Amendment might protect speech by strong AI. Courts focused on the value of speech to listeners and the need to constrain government power will be sympathetic to this view.
|
Margot Kaminski, Helen Norton, Toni M. Massaro |
2017 |
The Three Laws of Robotics in the Age of Big Data
Robots are set in motion by human beings. Laws governing robots should bind the firms and governments that use robots. Those that use robots, big data, and artificial intelligence should act in good faith and take care not to harm the public.
|
Jack M. Balkin |
2017 |
The Truth about Blockchain
Transactional records are important to business, but today’s transactions are often slow and costly. Blockchain will make it possible for businesses to verify transactions cheaply and quickly. Blockchain can provide substitutes for ordinary currency and financial services.
|
Marco Iansiti, Karim R. Lakhani |
2017 |
Trust, But Verify: Why the Blockchain Needs the Law
Blockchain is an important development in information technology. Blockchain systems can be dangerous if not effectively governed, but application of rigid rules could discourage blockchain-based innovation. Blockchain systems can develop governance systems that link up with traditional legal institutions.
|
Kevin Werbach |
2017 |
"Netwar": The Unwelcome Militarization of the Internet has Arrived
Once, fear of "cyberwar" was exaggerated. Today, governments and the military control networks for surveillance and use platforms like Facebook and Twitter for propaganda campaigns. These campaigns challenge the firms whose networks are targeted.
|
Jonathan Zittrain |
2017 |
The Internet of Heirlooms and Disposable Things
Everything from stuffed animal to toilets is now being connected to the Internet of Things (IoT). Connecting everyday objects to the Internet could be harmful. The objects or data collected by the objects could be hacked, and the software is subject to glitches.
|
Woodrow Hartzog, Evan Selinger |
2016 |
Policy, Legal and Regulatory Implications of a Europe-Only Cloud
Reports of surveillance by the United States lead Europeans to propose a Europe-only cloud, also called the “Schengen cloud.” A Europe-only cloud would require complex legal and technical limits on the routing of data.
|
Chris Reed, Christopher Millard, Ian Walden, Jon Crowcroft, Jatinder Singh, W. Kuan Hon |
2016 |
A Design Space for Effective Privacy Notices
This paper surveys the literature on “best practices” for privacy policy design, and describes how to design useable privacy policies. Most policies are ineffective. Privacy policies should consist of multiple layers, offering information when it becomes relevant.
|
Lorrie Faith Cranor, Florian Schaub, Rebecca Balebako, Adam Durity |
2015 |
Face Recognition and Privacy in the Age of Augmented Reality
Billions of photographs are posted online, and facial recognition software is becoming more accurate. Researchers used photographs and off-the-shelf software to identify strangers in public places by name and predict their interests.
|
Alessandro Acquisti, Frederic Stutzman, Ralph Gross |
2014 |
The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies
Digital technologies such as robots and self-driving cars are advancing rapidly. These new technologies will bring profound benefits. However, companies will have less need for some kinds of workers, resulting in unemployment.
|
Erik Brynjolfsson, Andrew McAfee |
2014 |