Saving Facebook James Grimmelmann Cornell Law School, [email protected]
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Comprehensive Analysis and Action Plan on a Social Media Strategy for Disaster Response: Risk Mitigation
__________________________ A COMPREHENSIVE ANALYSIS AND ACTION PLAN ON A SOCIAL MEDIA STRATEGY FOR DISASTER RESPONSE: RISK MITIGATION Prepared by summer 2017 Masters students at the University of Southern California’s Sol Price School of Public Policy for Italy’s Dipartimento Protezione Civile. __________________________ Acknowledgments This report was written and compiled by Wenjing Dong, Maria de la Luz Garcia, Kalisi Kupu, Leyao Li, Hilary Olson, Xuepan Zeng, and Giovanni Zuniga. We want to thank Dr. Eric Heikkila, Ph.D., for his insight and supervision during this process. We would also like to thank Professors Veronica Vecchi and Raffaella Saporito from the SDA Bocconi School of Management for their coordination efforts and use of their facilities, as well as providing us with educational enrichment and guidance while in Milan, Italy. A final thanks to the Dipartimento Protezione Civile for being available to us and for answering all of our many questions. The Dipartimento Protezione Civile’s support and feedback were greatly appreciated and instrumental in the creation of this report. 1. Table of Contents I. INTRODUCTION AND MOTIVATIONS ............................................................................. 3 CONSIDERATION 1. A PERSON-CENTRIC APPROACH .................................................. 3 CONSIDERATION 2. VULNERABLE SUBGROUPS ........................................................... 4 CONSIDERATION 3. DATA NEEDS ..................................................................................... 5 II. MOVING -
1 1 State of New Jersey 2 Urban Enterprise Zone Authority Meeting 3 4 5 in Re: : 6 : 7 Public Meeting
1 1 STATE OF NEW JERSEY 2 URBAN ENTERPRISE ZONE AUTHORITY MEETING 3 4 5 IN RE: : 6 : 7 PUBLIC MEETING : 8 : 9 10 11 12 Mary Roebling Building Conference Room #218 13 20 West State Street Trenton, New Jersey 14 Wednesday, June 13, 2007 10:00 a.m. 15 16 17 18 19 20 21 22 23 24 25 2 1 HELD BEFORE BOARD MEMBERS: 2 3 KEVIN DRENNAN 4 Chairman Designee 5 6 AMBAR ABELAR 7 Public Member 8 9 LOIS A. CUCCINELLO 10 Labor and Workforce Designee 11 12 LEWIS HURD 13 Public Member 14 15 LOPA KOLLURI 16 Treasury Designee 17 18 PAUL STRIDICK 19 DCA Designee 20 21 22 BOARD STAFF & PROFESSIONALS: 23 24 PATRICIA BRUCK, ESQ. 25 Deputy Attorney General 3 1 2 LISA MIGLIACCIO 3 Administrative Assistant 4 Office of Urban Programs 5 6 KATHIE CUBE, Director 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 4 1 I N D E X 2 3 APPLICANT PAGE 4 5 Elizabeth 5 6 Gloucester City 12 7 Jersey City 15 8 Kearny 30 9 Lakewood 36 10 Millville 37 11 Mount Holly 44 12 Newark 53 13 Orange 56 14 Passaic 57 15 Pleasantville 57 16 Union City 64 17 Vineland 66 18 West New York 73 19 Consent Agenda 75 20 21 PUBLIC COMMENT 22 23 Jenn Northrop 76 24 Louis Ferrara 80 25 Rafael Zabala 82 5 1 Roger Tees 89 2 Roberta Farber 93 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 6 1 MR. -
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites. -
The Impact of Data Access Regimes on Artificial Intelligence and Machine Learning
A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Martens, Bertin Working Paper The impact of data access regimes on artificial intelligence and machine learning JRC Digital Economy Working Paper, No. 2018-09 Provided in Cooperation with: Joint Research Centre (JRC), European Commission Suggested Citation: Martens, Bertin (2018) : The impact of data access regimes on artificial intelligence and machine learning, JRC Digital Economy Working Paper, No. 2018-09, European Commission, Joint Research Centre (JRC), Seville This Version is available at: http://hdl.handle.net/10419/202237 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. www.econstor.eu JRC Digital Economy Working Paper 2018-09 The impact of data access regimes on artificial intelligence and machine learning Bertin Martens December 2018 This publication is a Working Paper by the Joint Research Centre, the European Commission’s in-house science service. -
A Study of the Diffusion of Innovations and Hurricane Response Communication in the U.S
Old Dominion University ODU Digital Commons Communication & Theatre Arts Theses Communication & Theatre Arts Summer 2019 A Study of the Diffusion of Innovations and Hurricane Response Communication in the U.S. Coast Guard Melissa L. Leake Old Dominion University, [email protected] Follow this and additional works at: https://digitalcommons.odu.edu/communication_etds Part of the Mass Communication Commons, and the Military and Veterans Studies Commons Recommended Citation Leake, Melissa L.. "A Study of the Diffusion of Innovations and Hurricane Response Communication in the U.S. Coast Guard" (2019). Master of Arts (MA), Thesis, Communication & Theatre Arts, Old Dominion University, DOI: 10.25777/cqhe-xy91 https://digitalcommons.odu.edu/communication_etds/8 This Thesis is brought to you for free and open access by the Communication & Theatre Arts at ODU Digital Commons. It has been accepted for inclusion in Communication & Theatre Arts Theses by an authorized administrator of ODU Digital Commons. For more information, please contact [email protected]. A STUDY OF THE DIFFUSION OF INNOVATIONS AND HURRICANE-RESPONSE COMMUNICATION IN THE U. S. COAST GUARD by Melissa L. Leake B.A. May 2018, Pennsylvania State University A Thesis Submitted to the Faculty of Old Dominion University in Partial Fulfillment of the Requirements for the Degree of MASTER OF ARTS LIFESPAN & DIGITAL COMMUNICATION OLD DOMINION UNIVERSITY August 2019 Approved by: Thomas Socha (Director) Brenden O’Hallarn (Member) Katherine Hawkins (Member) ABSTRACT A STUDY OF THE DIFFUSION OF INNOVATIONS AND HURRICANE-RESPONSE COMMUNICATION IN THE U. S. COAST GUARD Melissa L. Leake Old Dominion University, 2019 Director: Dr. Thomas Socha Hurricane Harvey (HH) is considered to be the first natural disaster where social-network applications to request help surpassed already overloaded 911 systems (Seetharaman & Wells, 2017). -
La Protección De La Intimidad Y Vida Privada En Internet La Integridad
XIX Edición del Premio Protección de Datos Personales de Investigación de la Agencia Española de Protección de Datos PREMIO 2015 Las redes sociales se han convertido en una herramienta de comu- nicación y contacto habitual para millones de personas en todo el La protección de la intimidad mundo. De hecho, se calcula que más de un 75% de las personas Amaya Noain Sánchez que se conectan habitualmente a Internet cuentan con al menos un y vida privada en internet: la perfil en una red social. La autora plantea en el texto si las empre- sas propietarias de estos servicios ofrecen una información sufi- integridad contextual y los flujos de ciente a los usuarios sobre qué datos recogen, para qué los van a información en las redes sociales utilizar y si van a ser cedidos a terceros. En una reflexión posterior, propone como posibles soluciones el hecho de que estas empresas (2004-2014) pudieran implantar directrices técnicas compartidas y una adapta- ción normativa, fundamentalmente con la privacidad desde el di- seño, la privacidad por defecto y el consentimiento informado. Así, Amaya Noain Sánchez el resultado sería un sistema de información por capas, en el que el usuario fuera conociendo gradualmente las condiciones del trata- miento de su información personal. Este libro explica el funcionamiento de una red social, comenzan- do por la creación del perfil de usuario en el que se suministran datos, y analiza cómo la estructura del negocio está basada en la monetización de los datos personales, con sistemas como el targe- ting (catalogando al usuario según sus intereses, características y predilecciones) y el tracking down (cruzando información dentro y fuera de la red). -
IEEE 2015 Global Humanitarian Technology Conference (GHTC)
Using Open-source Hardware to Support Disadvantaged Communications Andrew Weinert, Hongyi Hu, Chad Spensky, and Benjamin Bullough MIT Lincoln Laboratory 244 Wood Street Lexington, MA 02420-9108 {andrew.weinert,hongyi.hu,chad.spensky,ben.bullough}@ll.mit.edu Abstract—During a disaster, conventional communications have transformed response [2]. However, there is frequently infrastructures are often compromised, which prevents local a disconnect between the realities the information systems populations from contacting family, friends, and colleagues. The at the affected location and those in the ubiquitous cloud. lack of communication also impedes responder efforts to gather, Internet enabled web technologies such as crowdsourcing [3] organize, and disseminate information. This problem is made and social media [4] have helped facilitate interaction across worse by the unique cost and operational constraints typically these actors, but fail when communications at the affected associated with the humanitarian assistance and disaster relief (HADR) space. In response, we present a low-cost, scalable system region are either degraded or nonexistent due to either natural that creates a wide-area, best-effort, ad-hoc wireless network for or human actions. For example, an estimated three million emergency information. The Communication Assistance Technol- people were without cellular service immediately following ogy over Ad-Hoc Networks (CATAN) system embraces the maker the Haiti Earthquake (2010) [5]. Similarly, cellphone networks and do it yourself (DIY) communities by leveraging open-source were overwhelmed in the moments after the 2013 Boston and hobbyist technologies to create cheap, lightweight, battery- Marathon bombings [6]. This effectively disconnects the peo- powered nodes that can be deployed quickly for a variety of ple in the affected region from the rest of the world (e.g., their operations. -
Data Portability and Privacy
SEPTEMBER 2019 CHARTING A WAY FORWARD Data Portability and Privacy Erin Egan VICE PRESIDENT AND CHIEF PRIVACY OFFICER, POLICY CHARTING A WAY FORWARD 1 Table of Contents 03 I. Intro 06 II. The Challenge 09 III. Five Questions About Portability and Responsibility 09 QUESTION 1 What is “data portability”? 13 QUESTION 2 Which data should be portable? 14 QUESTION 3 Whose data should be portable? 15 QUESTION 4 How should we protect privacy while enabling portability? 20 QUESTION 5 After people’s data is transferred, who is responsible if the data is misused or otherwise improperly protected? 24 IV. What’s Next? 25 End Notes CHARTING A WAY FORWARD 2 Data Portability and Privacy 01 There’s growing agreement among policymakers around the world that data portability—the principle that you should be able to take the data you share with one service and move it to another—can help promote competition online and encourage the emergence of new services. Competition and data protection experts agree that, although there are complicated issues involved, portability helps people control their data and can make it easier for them to choose among online service providers. The benefits of data portability to people and markets are clear, which is why our CEO, Mark Zuckerberg, recently called for laws that guarantee portability.1 But to build portability tools people can trust and use effectively, we should develop clear rules about what kinds of data should be portable and who is responsible for protecting that data as it moves to different providers.2 The purpose of this paper is to advance the conversation about what those rules should be. -
1 1 2 DEPARTMENT of JUSTICE ANTITRUST DIVISION 3 And
1 1 2 DEPARTMENT OF JUSTICE ANTITRUST DIVISION 3 and FEDERAL TRADE COMMISSION 4 5 Hearing on: 6 7 COMPETITION AND INTELLECTUAL PROPERTY LAW 8 AND POLICY IN THE KNOWLEDGE BASED ECONOMY 9 10 Session 1: Refusals to License and Compulsory 11 Licensing in the European Union, 12 Canada, and Australia 13 14 Session 2: Licensing in the European Union: 15 The Technology Transfer Block Exemption and 16 Agreements that Fall Outside its Scope 17 18 19 Wednesday, May 22, 2002 20 Great Hall of the U.S. Department of Justice 21 333 Pennsylvania Avenue, N.W. 22 Washington, D.C. 2 1 MORNING SESSION PARTICIPATING PANELISTS: 2 3 Morning Session: Refusals to License and 4 Compulsory Licensing 5 6 Gwillym Allen, Senior Economist and Strategic 7 Policy Advisor, Competition Policy 8 Branch, Canadian Competition Bureau 9 Henry Ergas, Managing Director, Network Economics 10 Consulting Group, Australia 11 Ian Forrester, Executive Partner, White & Case 12 LLP, Brussels 13 David W. Hull, Partner, Covington & Burling, 14 Brussels 15 John Temple Lang, Counsel, Cleary, Gottlieb, 16 Steen & Hamilton, Brussels 17 Patrick Rey, Professor of Economics, University 18 of Toulouse, France, and Research 19 Director, Institut d'Economie 20 Industrielle 21 James S. Venit, Partner, Skadden, Arps, Slate, 22 Meagher & Flom, Brussels 3 1 AFTERNOON SESSION PARTICIPATING PANELISTS: 2 3 Afternoon Session: Licensing in the European 4 Union: The Technology Transfer Block 5 Exemption and Agreements that Fall 6 Outside its Scope 7 8 Peter Alexiadis, Partner, Squire, Sanders & 9 Dempsey, Brussels 10 Fiona Carlin, Local Partner, European Law Center, 11 Baker & McKenzie, Brussels 12 Yee Wah Chin, Senior Counsel, Mintz, Levin, Cohn, 13 Ferris, Glovsky & Popeo, P.C. -
Facebook Timeline
Facebook Timeline 2003 October • Mark Zuckerberg releases Facemash, the predecessor to Facebook. It was described as a Harvard University version of Hot or Not. 2004 January • Zuckerberg begins writing Facebook. • Zuckerberg registers thefacebook.com domain. February • Zuckerberg launches Facebook on February 4. 650 Harvard students joined thefacebook.com in the first week of launch. March • Facebook expands to MIT, Boston University, Boston College, Northeastern University, Stanford University, Dartmouth College, Columbia University, and Yale University. April • Zuckerberg, Dustin Moskovitz, and Eduardo Saverin form Thefacebook.com LLC, a partnership. June • Facebook receives its first investment from PayPal co-founder Peter Thiel for US$500,000. • Facebook incorporates into a new company, and Napster co-founder Sean Parker becomes its president. • Facebook moves its base of operations to Palo Alto, California. N. Lee, Facebook Nation, DOI: 10.1007/978-1-4614-5308-6, 211 Ó Springer Science+Business Media New York 2013 212 Facebook Timeline August • To compete with growing campus-only service i2hub, Zuckerberg launches Wirehog. It is a precursor to Facebook Platform applications. September • ConnectU files a lawsuit against Zuckerberg and other Facebook founders, resulting in a $65 million settlement. October • Maurice Werdegar of WTI Partner provides Facebook a $300,000 three-year credit line. December • Facebook achieves its one millionth registered user. 2005 February • Maurice Werdegar of WTI Partner provides Facebook a second $300,000 credit line and a $25,000 equity investment. April • Venture capital firm Accel Partners invests $12.7 million into Facebook. Accel’s partner and President Jim Breyer also puts up $1 million of his own money. -
The Safeguards of Privacy Federalism
THE SAFEGUARDS OF PRIVACY FEDERALISM BILYANA PETKOVA∗ ABSTRACT The conventional wisdom is that neither federal oversight nor fragmentation can save data privacy any more. I argue that in fact federalism promotes privacy protections in the long run. Three arguments support my claim. First, in the data privacy domain, frontrunner states in federated systems promote races to the top but not to the bottom. Second, decentralization provides regulatory backstops that the federal lawmaker can capitalize on. Finally, some of the higher standards adopted in some of the states can, and in certain cases already do, convince major interstate industry players to embed data privacy regulation in their business models. TABLE OF CONTENTS I. INTRODUCTION: US PRIVACY LAW STILL AT A CROSSROADS ..................................................... 2 II. WHAT PRIVACY CAN LEARN FROM FEDERALISM AND FEDERALISM FROM PRIVACY .......... 8 III. THE SAFEGUARDS OF PRIVACY FEDERALISM IN THE US AND THE EU ............................... 18 1. The Role of State Legislatures in Consumer Privacy in the US ....................... 18 2. The Role of State Attorneys General for Consumer Privacy in the US ......... 28 3. Law Enforcement and the Role of State Courts in the US .................................. 33 4. The Role of National Legislatures and Data Protection Authorities in the EU…….. .............................................................................................................................................. 45 5. The Role of the National Highest Courts -
Pattern, the Visual Mathematics: a Search for Logical Connections in Design Through Mathematics, Science, and Multicultural Arts
Rochester Institute of Technology RIT Scholar Works Theses 6-1-1996 Pattern, the visual mathematics: A search for logical connections in design through mathematics, science, and multicultural arts Seung-eun Lee Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Lee, Seung-eun, "Pattern, the visual mathematics: A search for logical connections in design through mathematics, science, and multicultural arts" (1996). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. majWiif." $0-J.zn jtiJ jt if it a mtrc'r icjened thts (waefii i: Tkirr. afaidiid to bz i d ! -Lrtsud a i-trio. of hw /'' nvwte' mfratWf trawwi tpf .w/ Jwitfl- ''','-''' ftatsTB liovi 'itcj^uitt <t. dt feu. Tfui ;: tti w/ik'i w cWii.' cental cj lniL-rital. p-siod. [Jewy anJ ./tr.-.MTij of'irttion. fan- 'mo' that. I: wo!'.. PicrdoTrKwe, wiifi id* .or.if'iifer -now r't.t/ry summary Jfem2>/x\, i^zA 'jX7ipu.lv z&ietQStd (Xtrma iKc'i-J: ffocub. The (i^piicaiom o". crWx< M Wf flrtu't. fifesspwn, Jiii*iaiin^ jfli dtfifi,tmi jpivxei u3ili'-rCi luvjtv-tzxi patcrr? ;i t. drifters vcy. Symmetr, yo The theoretical concepts of symmetry deal with group theory and figure transformations. Figure transformations, or symmetry operations refer to the movement and repetition of an one-, two , and three-dimensional space. (f_8= I lhowtuo irwti) familiar iltjpg .