TAP Blog

Take a look at the top viewed blog posts from this past year that have been written by TAP scholars.
George Washington University law professor Daniel Solove provides his list of notable books on privacy and security from 2019.
Harvard Business School professor Shane Greenstein provides a tongue-in-cheek look at notable information technology events and people from 2019.
Professor Daniel Solove discusses strategies for sustaining compliance with the GDPR, CCPA, and forthcoming regulations.
Professor Ed Felten and his research colleagues at Princeton’s Center for Information Technology Policy identify issues with data breach notifications that make it possible for “scammers to create fake phishing emails, potentially victimizing users twice.”
Professor Eric Goldman, Santa Clara University, provides a look into the four amicus briefs filed in support of a panel review of the Ninth Circuit’s ruling in Enigma v. Malwarebytes. This is a Section 230(c)(2) opinion that creates significant problems for anti-spyware/spam/virus vendors.
Joshua Gans, Rotman School of Management, introduces his new book, co-authored with Andrew Leigh. Innovation + Equality: How to create a future that is more Star Trek than Terminator examines the relationship between having more equality and more innovation.
Harvard business professor Shane Greenstein discusses some of the factors that machine-learning startups consider in developing their innovative products for commercial value.
In “Algorithmic Impact Assessments under the GDPR: Producing Multi-layered Explanations”, Colorado Law Professor Margot Kaminski and Gianclaudio Malgieri, Vrije Universiteit Brussel, explore how a Data Protection Impact Assessment (DPIA) links the two faces of the GDPR’s approach to algorithmic accountability: individual rights and systemic collaborative governance.
Contextual integrity (CI) was first proposed by Helen Nissenbaum in 2004 as a new framework for reasoning about privacy. Discussing how CI can inform policy and system design, and how the theory can be refined, operationalized, and applied to emerging technologies was the focus of the 2nd Symposium on Applications of Contextual Integrity.
Results 31 - 40 of 1056
|< < 1 2 3 4 5 > >|