This section contains research on the networks that make the Internet work, the evolution of different business models that operate on the Internet, and ways to store and access information on the Internet through Cloud Computing.
"Having the director of national intelligence reporting to Congress, having the threat bandied about very publicly, could get platforms to work more on these problems. This is the kind of feedback loop we need." — Danielle Citron, Professor of Law, University of Maryland
"It's a combination of technology that is ready for prime time and technology that clearly is not ready for prime time. It's a drone that flies coffee around. It's going to be hard, cross referencing all these (factors) ... Why not use a land-based cart?" — Ryan Calo, Professor of Law, University of Washington
This article outlines the path one California resident, Alastair Mactaggart, took to pursue privacy legislation through a statewide ballot initiative. University of California, Berkeley privacy expert Chris Hoofnagle was asked to share his expertise.
"Tasks within jobs typically show considerable variability in 'suitability for machine learning' while few -- if any -- jobs can be fully automated using machine learning. Machine learning technology can transform many jobs in the economy, but full automation will be less significant than the re-engineering of processes and the reorganization of tasks." — Erik Brynjolfsson, Professor of Economics, MIT Sloan School of Management
"I want these tools, you want these tools, everyone wants these tools. The question is: on what terms are they offered to you?" — Chris Hoofnagle, Professor of Law, University of California, Berkeley
"Automation is almost always about automating a task, not the entire job." — James Bessen, Economist, Boston University
"Yet what makes Bitcoin and other cryptocurrencies appealing to criminals also limits their usefulness to them. Bitcoin transaction records helped investigators find the Russian agents under indictment." — Kevin Werbach, Professor of Legal Studies & Business Ethics, University of Pennsylvania
"The risk of improper use is extremely high. And data scores are not properly vetted and validated and available for scrutiny." — Frank Pasquale, Professor of Law, University of Maryland
As Evan Selinger, a professor of philosophy at the Rochester Institute of Technology, pointed out in a recent essay, facial recognition is a technology so "potently, uniquely danger," "so inherently toxic," it warrants being "completely rejected, banned, and stigmatized" — not just in schools, but everywhere.
"Political commentary comes in different forms. Imagine a concerned citizen sets up a bot to criticize a particular official for failing to act on climate change. Now say that official runs for re-election. Is the concerned citizen now in violation of California law?" — Ryan Calo, Professor of Law, University of Washington
Select an Issue
TAP Academics
View all academics with expertise in Networks, the Internet, and Cloud Computing
TAP Blog
Discussing contextual integrity as a framework to design, evaluate, and craft regulation for privacy was the focus of last month’s symposium hosted by Princeton’s Center for Information Technology and Cornell Tech’s Digital Life Initiative. Read the summary of the report.
October 22, 2018
View all blog posts about Networks, the Internet, and Cloud Computing
Upcoming Events
There are currently no upcoming events about Networks, the Internet, and Cloud Computing. Please see our events calendar for all upcoming events.
Fact Sheets
High-speed Internet access – often referred to as “broadband” – is a set of technologies that, taken together, are recognized as a potential catalyst for global economic and social change.
View all fact sheets about Networks, the Internet, and Cloud Computing
Featured Article
This paper examines the effects of trademark use in advertisements by third-party resellers.
October 31, 2012
View all articles on Networks, the Internet, and Cloud Computing