Biographies-06282011.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Enhancing Child Safety & Online Technologies
Enhancing Child Safety & Online Technologies: FINAL REPORT OF THE INTERNET SAFETY TECHNICAL TASK FORCE To the Multi-State Working Group on Social Networking of State Attorneys General of the United States DECEMBER 31, 2008 �� ������� ���������� ENHANCING CHILD SAFETY AND ONLINE TECHNOLOGIES: FINAL REPORT OF THE INTERNET SAFETY TECHNICAL TASK FORCE TO THE MULTI-STATE WORKING GROUP ON SOCIAL NETWORKING OF STATE ATTORNEYS GENERAL OF THE UNITED STATES December 31, 2008 Directed by the Berkman Center for Internet & Society at Harvard University Chair: Professor John Palfrey Co-Director: Dena T. Sacco Co-Director and Chair, Research Advisory Board: danah boyd Chair, Technology Advisory Board: Laura DeBonis Coordinator: Jessica Tatlock Task Force Members: AOL/Bebo Aristotle AT&T Berkman Center for Internet & Society at Harvard University (Directors) Center for Democracy & Technology Comcast Community Connect Inc. ConnectSafely.org Enough Is Enough Facebook Family Online Safety Institute Google Inc. IAC ikeepsafe IDology, Inc. Institute for Policy Innovation Linden Lab Loopt Microsoft Corp MTV Networks/Viacom. MySpace and Fox Interactive Media National Center for Missing & Exploited Children The Progress & Freedom Foundation Sentinel Tech Holding Corp. Symantec Verizon Communications, Inc. Xanga Yahoo!, Inc. Wiredsafety.org 1 December 31, 2008 To the Multi-State Working Group on Social Networking of State Attorneys General of the United States: On behalf of the Internet Safety Technical Task Force, I am pleased to transmit to the 52 Attorneys General on the Multi-State Working Group the Task Force’s Final Report on the role and the promise of technologies to reduce the risk to minors of harmful contact and content on the Internet. -
336 Infotech Text
Media and Values: Issues of Content, Community and Intellectual Property A Report of the 2007 Aspen Institute Forum on Communications and Society Richard P. Adler Drew Clark Kathleen Wallman Rapporteurs Communications and Society Program Charles M. Firestone Executive Director Washington, DC 2008 To purchase additional copies of this report, please contact: The Aspen Institute Publications Office P.O. Box 222 109 Houghton Lab Lane Queenstown, Maryland 21658 Phone: (410) 820-5326 Fax: (410) 827-9174 E-mail: [email protected] For all other inquiries, please contact: The Aspen Institute Communications and Society Program One Dupont Circle, NW Suite 700 Washington, DC 20036 Phone: (202) 736-5818 Fax: (202) 467-0790 Charles M. Firestone Patricia K. Kelly Executive Director Assistant Director Copyright © 2008 by The Aspen Institute The Aspen Institute One Dupont Circle, NW Suite 700 Washington, DC 20036 Published in the United States of America in 2008 by The Aspen Institute All rights reserved Printed in the United States of America ISBN: 0-89843-488-2 08-008 1666CSP/08-BK Contents INTRODUCTION , Charles M. Firestone ........................................................ 3 CONTENT ISSUES FOR OLD AND NEW MEDIA , Drew Clark ..................... 9 Offensive Speech: “Indecency” on TV ................................................ 12 New Approaches to Offensive Content ............................................... 18 Beyond the V-Chip: Filtering, Labeling, and Rating Internet Content .............................................................. -
Minnesota Journal of Law, Science & Technology
MINNESOTA JOURNAL OF LAW, SCIENCE & TECHNOLOGY VOLUME 14 WINTER 2013 ISSUE 1 Technopanics, Threat Inflation, and the Danger of an Information Technology Precautionary Principle by Adam Thierer This article originally appeared in Issue 14.1 of the Minnesota Journal of Law, Science & Technology (Winter 2013) and should be cited as: 14 Minn. J. L. Sci. & Tech. 309 (2013) It can be found online at: http://purl.umn.edu/144225 Visit http://mjlst.umn.edu to view the issue in which this article appears or for more information about the Minnesota Journal of Law, Science and Technology THIERER_PROOF (DO NOT DELETE) 2/11/2013 10:53 AM Technopanics, Threat Inflation, and the Danger of an Information Technology Precautionary Principle Adam Thierer* I. INTRODUCTION .................................................................. 311 II. ARGUMENTUM IN CYBER-TERROREM: A FRAMEWORK FOR EVALUATING FEAR APPEALS ........................................................................ 312 A. Appeals to Fear as an Argumentation Device .......... 312 B. Deconstructing Fear Appeal Arguments: The Violent Media Case Study ....................................... 313 C. Technopanics .............................................................. 315 D. Threat Inflation ......................................................... 317 1. Cybersecurity Threat Inflation ........................... 318 2. Online Safety Threat Inflation ............................ 320 3. Online Privacy Threat Inflation .......................... 325 4. EconoMic- and Business-Related Threat -
ED441402.Pdf
DOCUMENT RESUME ED 441 402 IR 020 434 TITLE Commission on Child Online Protection (COPA) Report to Congress. Appendices. PUB DATE 2000-10-20 NOTE 1085p.; For the Commission on Child Online Protection (COPA) Report to Congress, see IR 020 433. AVAILABLE FROM For full text: http://www.copacommission.org. PUB TYPE Reports Descriptive (141) EDRS PRICE MF08/PC44 Plus Postage. DESCRIPTORS Access to Information; *Child Safety; *Children; Federal Legislation; Federal Regulation; Freedom of Speech; *Information Policy; Information Technology; *Internet; Policy Formation; Pornography; Privacy IDENTIFIERS Acceptable Use Policy; Commission on Online Child Protection; Filters; First Amendment ABSTRACT The appendices for the Commission on Child Online Protection (COPA) Report to Congress, October 20, 2000, include the following: Commission overview, which includes scope and timeline, original statute, amended statute, technologies and methods, and biographies of the commissioners; Commission finances; Commission meetings for the year 2000; materials submitted to the Commission, including materials for hearings as well as research papers, reports, and correspondence; compilation of matrices on filtering, labeling, and rating technologies; Commission responses to questionnaire; and catalog of drawer files, which includes a detailed index of all materials submitted to the Commission in nonelectronic format such as books, software programs, handouts, and VHS tape recordings of hearings and transcripts. (AA) Reproductions supplied by EDRS are the best that can be made from the original document. Commission on Child Online Protection (COPA) Report to Congress October 20, 2000 Appendices BEST COPYAVAILABLE U.S. DEPARTMENT OF EDUCATION CSA 011ice of Educational Research fins Improvement PERMISSION TO REPRODUCE AND EDUCATIONAL RESOURCES INFORMATION DISSEMINATE THIS MATERIAL HAS CENTER (ERIC) BEEN GRAN TED BY 0 This document has been reproduced as received from the person or organization originating it. -
Working Paper
No. 12-09 February 2012 WORKING PAPER TECHNOPANICS, THREAT INFLATION, AND THE DANGER OF AN INFORMATION TECHNOLOGY PRECAUTIONARY PRINCIPLE By Adam Thierer The ideas presented in this research are the author’s and do not represent official positions of the Mercatus Center at George Mason University. TECHNOPANICS, THREAT INFLATION, AND THE DANGER OF AN INFORMATION TECHNOLOGY PRECAUTIONARY PRINCIPLE Adam Thierer* CONTENTS I. Introduction ..................................................................................................... 3 II. Argumentum in Cyber-Terrorem: A Framework for Evaluating Fear Appeals ..................................................................................................... 4 A. Appeals to Fear as an Argumentational Device .......................................... 4 B. Deconstructing Fear Appeal Arguments: The Violent Media Case Study ................................................................................................. 5 C. Technopanics ............................................................................................... 6 D. Threat Inflation ............................................................................................ 9 1. Cybersecurity Threat Inflation ........................................................... 9 2. Online Safety Threat Inflation ........................................................... 12 3. Online Privacy Threat Inflation .......................................................... 16 4. Economic and Business-Related Threat Inflation ............................. -
PRIVACY PAPERS for POLICYMAKERS 2015 This Publication of Privacy Papers for Policymakers Is Supported by AT&T, Microsoft, and TUNE
PRIVACY PAPERS FOR POLICYMAKERS 2015 This publication of Privacy Papers for Policymakers is supported by AT&T, Microsoft, and TUNE. 2 | Future of Privacy Forum January 13th, 2016 We are pleased to introduce FPF’s sixth annual Privacy Papers for Policymakers. Each year, we invite privacy scholars and authors with an interest in privacy issues to submit papers to be considered by members of our Advisory Board. The Board then selects the scholarship they feel best analyzes emerging privacy issues and is most useful for policymakers in Congress and at government agencies, as well as for data protection authorities abroad. In a year in which privacy made headlines across a variety of contexts, from international data transfers to internet- connected consumer appliances, it isn’t a surprise that the papers selected this year examine a broad spectrum of privacy issues. The authors have explored wide-ranging topics, including the design of effective privacy notices, data release policies in light of the challenges of anonymization and re-identification, the relationship between privacy and markets, and the role of trust in data transfers. We hope this collection of scholarship can help to inform policymakers in Congress, at the FTC, and in other federal and state agencies as they work to explore new privacy issues. We want to thank AT&T, Microsoft, and TUNE for their special support of this project. And as always, we thank the scholars, advocates, and Advisory Board members that are engaged with us to explore the future of privacy. Sincerely, -
PRIVACY PAPERS for POLICYMAKERS 2018 February 6, 2019
PRIVACY PAPERS FOR POLICYMAKERS 2018 February 6, 2019 We are pleased to introduce FPF’s ninth annual Privacy Papers for Policymakers. Each year, we invite privacy scholars and authors to submit scholarship for consideration by a committee of reviewers and judges from the FPF Advisory Board. The selected papers are those judged to contain practical analyses of emerging issues that policymakers in Congress, in federal agencies, at the state level and internationally should find useful. This year’s winning papers examine a variety of topical privacy issues: • One paper focuses on sexual privacy abuses (Citron). The paper argues for the removal of some platform immunity and implementation of federal and state penalties to combat sexual privacy violations. This material is based upon work supported • Another paper grapples with how privacy is implemented during the design stage of technology by the National Science Foundation under and introduces a framework for incentivizing companies to bring privacy to the forefront of their Grant No. 1837413. business (Waldman). • A third paper suggests filling gaps in federal and state privacy laws regarding government surveillance and fair information practices by looking to local statutes, while arguing that certain local laws should prevail against federal and state preemption (Rubinstein). • Other papers focus on European privacy law and data subject rights. One paper investigates the results of an empirical study of data access requests, and finds that while access rights usually are not adequately accommodated, there are other potential solutions for controllers to improve the efficacy of access rights requests (Ausloos & Dewitte). • Another paper argues that the right to an explanation under GDPR is unlikely to remedy harms stemming from machine learning algorithms (Edwards & Veale). -
Cyberporn and Children: the Scope of the Problem, the State of the Technology, and the Need for Congressional Action
DOCUMENT RESUME ED 400 779 IR 018 119 TITLE Cyberporn and Children: The Scope of the Problem, the State of the Technology, and the Need for Congressional Action. Hearing on S.892, a Bill To Amend Section 1464 of Title 18, United States Code, To Punish Transmission by Computer of Indecent Material to Minors, before the Committee on the Judiciary, United States Senate. One Hundred Fourth Congress, First Session. INSTITUTION Congress of the U.S., Washington, D.C. Senate Committee on the Judiciary. REPORT NO ISBN-0-16-052623-X; Senate-Hrg-104-438 PUB DATE 24 Jul 95 NOTE 197p.; Serial No. J-104-36. AVAILABLE FROMU.S. Government Printing Office, Superintendent of Documents, Congressional Sales Office, Washington, DC 20402. PUB TYPE Legal/Legislative/Regulatory Materials (090) EDRS PRICE MF01/PC08 Plus Postage. DESCRIPTORS *Access to Information; Censorship; *Child Welfare; Computer Software; Content Analysis; *Federal Legislation; Freedom of Information; Freedom of Speech; *Government Role; Hearings; *Internet; Law Enforcement; Obscenity; Online Vendors; *Pornography; Sexual Abuse IDENTIFIERS Congress 104th; Cyberspace ABSTRACT This document presents witness testiuony and supplemental materials from a Congressional hearing called to address pornography in cyberspace. It features opening statements by Senator Charles E. Grassley and Senator Patrick J. Leahy; and statements by Senators Strom Thurmond, Russell D. Feingold, Orrin G. Hatch, Chairman of the Senate Committee on the Judiciary, Paul Simon, and Herbert Kohl. Testimony is included from three panels of witnesses. The first includes: Donelle Gruff; Patricia W. Shao; and Susan Tillman Elliott, M.D.; all of whom describe experiences with pornography on the Internet. The second panel includes: Barry F. -
Privacy Papers for Policy Makers 2012 Inside Front Cover
Cover Privacy Papers for Policy Makers 2012 Inside front cover The publication of “Privacy Papers for Policy Makers” was supported by AT&T, Microsoft, and GMAC. November 7, 2012 We are delighted to provide you with FPF’s third annual “Privacy Papers for Policy Makers,” representing cutting-edge research and analysis on a variety of important privacy issues. The featured works were selected by members of the Future of Privacy Forum Advisory Board (scholars, privacy advocates, and Chief Privacy Officers) based on criteria emphasizing clarity, practicality and overall utility. Given the excellent submissions we received, choosing was a difficult task. But we believe our Advisory Board has chosen well, and has put together a diverse and thought-provoking collection. Two of the papers were recipients of the IAPP award for best papers presented at the 2012 Privacy Law Scholars Conference. We hope this relevant and timely scholarship helps inform and stimulate thinking among policy makers and policy influentials in the US and around the world, with whom we are sharing this compilation. We are delighted to share new ways of thinking about privacy. We want to thank AT&T, Microsoft, and GMAC for their special support of the “Privacy Papers” project. Sincerely yours, Christopher Wolf Jules Polonetsky Founder and Co-chair Director and Co-chair Future of Privacy Forum Advisory Board Alessandro Acquisti Simon Davies Jeff Jarvis Associate Professor of Information Technology Founder, Privacy International Associate Professor; Director of the Interactive -
Learner at the Center of a Networked World
AAspenReportPrint.inddspenReportPrint.indd 0101 66/5/14/5/14 77:58:58 AAMM AAspenReportPrint.inddspenReportPrint.indd 0202 66/5/14/5/14 77:58:58 AAMM LEARNER AT THE CENTER OF A NETWORKED WORLD THE REPORT OF AAspenReportPrint.inddspenReportPrint.indd 0303 66/5/14/5/14 77:58:58 AAMM The Aspen Institute Task Force on Learning and the Internet invites you to view the digital version of this report at www.aspentaskforce.org. Copyright ©2014 by The Aspen Institute The Aspen Institute One Dupont Circle, NW Suite 700 Washington, DC 20036 Published in the United States of America in 2014 by The Aspen Institute All rights reserved Printed in the United States of America: ISBN: 0-89843-604-4 Pub#: 14/008 This work is licensed under the Creative Commons Attribution-Noncommercial 3.0 United States License. To view a copy of this license visit, http://creativecommons.org/licenses/by-nc/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, 94104, USA. Individuals are encouraged to cite this report and its contents. In doing so, please include the following attribution: Aspen Institute Task Force on Learning and the Internet, Learner at the Center of a Networked World, Washington, D.C.: The Aspen Institute, June 2014. For more information, contact: To purchase additional copies of this report, please contact: The Aspen Institute The Aspen Institute Communications and Society Program Publications Office One Dupont Circle, NW P.O. Box 222 Suite 700 109 Houghton Lab Lane Washington, DC 20036 Queenstown, Maryland 21658 Phone: (202)-736-5818 Phone: (410)-820-5326 Fax: (202)-467-0790 www.aspeninstitute.org/c&s A project of the Aspen Institute Communications and Society Program and the John D.