Trusting Big Data Research
ABSTRACT Although it might puzzle or even infuriate data scientists, suspicion about big data is understandable. The concept does not seem promising to most pe…
ABSTRACT Although it might puzzle or even infuriate data scientists, suspicion about big data is understandable. The concept does not seem promising to most pe…
INTRODUCTION A person without privacy is vulnerable. But what is it to be vulnerable? And what role does privacy or privacy law play in vulnerability? This Art…
Data’s intangibility poses significant difficulties for determining where data is located. The problem is not that data is located nowhere, but that it may be l…
In imposing a strict liability regime for alleged copyright infringement occurring on YouTube, Justice Salomão of the Brazilian Superior Tribunal de Justiça sta…
This article examines the challenge facing cyber intelligence analysts who have to explain threat information and analysis to non-technical consumers, like exec…
Abstract Encryption shields private information from malicious eavesdroppers. After years of slow adoption, encryption is finally becoming widespread in consum…
As part of its Digital Single Market Strategy, the European Commission would like to introduce vertical regulations, replacing — or better conflicting with — th…
(with Christophe Geiger and Oleksandr Bulayenko) This article discusses the proposed introduction in EU law of neighbouring rights for press publishers for the…
Abstract Sharing economy firms such as Uber and Airbnb facilitate trusted transactions between strangers on digital platforms. This creates economic and other…
Abstract This Article focuses on one cyberphysical domain — automated driving — to methodically analyze the so-called liability problem. It considers how autom…
Abstract Though scholars have identified the expanding scope of First Amendment speech doctrine, little attention has been paid to the theoretical transformati…
Abstract This article maps ICANN’s ambivalent drift into online content regulation through its contractual facilitation of a “trusted notifier” copyright enfor…