Title
|
Author
|
Year
|
Memes on Memes and the New Creativity
Memes challenge basic assumptions underlying copyright law. Creators of memes want to be copied. Creators may use copyright selectively to prevent changes to a meme by a select few.
|
Jeanne Fromer |
2022 |
The First Amendment Does Not Protect Replicants
Often, the Constitution protects speech from censorship even if the speaker is not human. However, the Constitution may not bar all regulation of speech created by artificial intelligence-based systems (AI).
|
Lawrence Lessig |
2022 |
Proactive Moderation of Online Discussions: Existing Practices and the Potential for Algorithmic Support
Human moderators may intervene to stop users from posting offensive content, but proactive intervention is labor intensive. Algorithmic tools help moderators identify problematic conversations on a large scale.
|
Karen Levy, Charlotte Schluger, Cristian Danescu-Niculescu-Mizil, Jonathan P. Chang |
2022 |
Assuming Good Faith Online
Many online service providers assume that users act in good faith in posting content online. As the online population grows and bad actors multiply, this assumption is hard to sustain.
|
Eric Goldman |
2022 |
Misreading Campbell: Lessons for Warhol
Rereading the case in which the Supreme Court first recognized transformative fair use could help the Supreme Court resolve tension between derivative rights and transformative fair use in Andy Warhol Foundation v. Goldsmith.
|
Peter Menell, Shyamkrishna Balganesh |
2022 |
Understanding Challenges for Developers to Create Accurate Privacy Nutrition Labels
Apple’s privacy nutrition labels require app developers to complete a form to make data collection processes more transparent to users. Developers support more transparency, but found the labelling process challenging.
|
Lorrie Faith Cranor, Jason I. Hong, Kayla Reiman, Tianshi Li, Yuvraj Agarwal |
2022 |
The Effects of Data Localization on Cybersecurity
Data localization policies prohibit the transfer of data to foreign countries. Data localization affects the ability of organizations to prevent and respond to cyberattacks, increasing cybersecurity risks.
|
Peter Swire, DeBrae Kennedy-Mayo |
2022 |
Toggles, Dollar Signs, and Triangles: How to (In)Effectively Convey Privacy Choices with Icons and Link Texts
Websites often use icons to guide consumers to privacy choices. Designing effective icons can be difficult. Sites could improve results by testing icons before use.
|
Alessandro Acquisti, Florian Schaub, Joel R. Reidenberg, Hana Habib, Lorrie Faith Cranor, Norman Sadeh, Yaxing Yao, Yixin Zou |
2021 |
Internet Access and its Implications for Productivity, Inequality, and Resilience
During and after the COVID-19 pandemic, the proportion of employees who work from home increased substantially. Universal access to quality internet access would facilitate working from home, and improve productivity.
|
Nicholas Bloom, José María Barrero, Steven J. Davis |
2021 |
Reclaiming Spectrum from Incumbents in Inefficiently Allocated Bands: Transaction Costs, Competition, and Flexibility
Some electromagnetic spectrum is used inefficiently. In reclaiming this spectrum for allocation to more efficient uses and users, the FCC may choose between a simple overlay auction and a more complex two-sided auction.
|
Gregory L. Rosston, Andrzej (Andy) Skrzypacz |
2021 |