Publications

Publication date: 2016

This article examines one of the largest interventions in computer-based learning currently underway, the One Laptop per Child (OLPC) project, with 2.5 million laptops in use worldwide. Drawing on 2010 and 2013 fieldwork investigating a project in Paraguay with 10,000 of OLPC's “XO” laptops, I explore the ways in which participants interpreted leisure laptop use as “learning.” I show that the...

Publication date: 2016

The migration of robots from the laboratory into sensitive home settings as commercially available therapeutic agents represents a significant transition for information privacy and ethical imperatives. We present new privacy paradigms and apply the fair information practices (FIPs) to investigate concerns unique to the placement of therapeutic robots in private home contexts. We then explore...

Publication date: 2016

This paper explores corporate concept videos as a type of design fiction that embed a vision about the future of computing – including how computing should be done, for whom, and the norms that might exist – and allow for a discourse to explore and contest these claims. We introduce a method for critiquing and analyzing concept videos. Through an analysis of Google Glass’ and Microsoft...

Publication date: 2016

Policy proposals often feature information sharing as a means to improve cybersecurity, but lack specificity connecting these activities to specific goals intended to advance the state of cybersecurity. We use the Doctrine of Cybersecurity as a lens to examine existing information sharing efforts and evaluate the utility of information sharing proposals. Leaning on the analogous public good-...

Publication date: 2016

Achieving any specific level of cybersecurity inevitably entails making compromises with regard to cost, function, and convenience, as well as trade‑offs
between societal values, such as openness, privacy, freedom of expression, and innovation. In defining regulations and incentives, decisions have to be made about how to balance these trade‑offs while optimizing security outcomes. To...

Publication date: 2016

Models of learning in EDM and LAK are pushing the boundaries of what can be measured from large quantities of historical data. When controlled randomization is present in the learning platform, such as randomized ordering of problems within a problem set, natural quasi-randomized controlled studies can be conducted, post-hoc. Difficulty and learning gain attribution are among the factors of...

Publication date: 2016

This article presents a material ecosystemic approach as a theoretical grounding for understanding digital technologies as potential catalysts of socioeconomic development. Through such an approach, talk of “technology” is replaced by talk of the “material.” Material is understood as inclusive of the human-made as well as the natural, of human relationships, human bodies, and words spoken. And...

Publication date: 2016

Consumer Protection regulators worldwide share basic problems: the companies that regulators police are so powerful and rich that fines do not matter. Consider the French with their €150,000 fine against Google in 2014. Efficacious fines against dominant platforms would have to rise to nine-figure levels to cause change, but consumer protection agencies generally lack the authority and...

Publication date: 2016

FTC Privacy Law and Policy is a broad-ranging primer on the FTC’s consumer protection mission. It is the first hundred-year history of the agency’s consumer protection activities, and it links consumer cases to modern internet privacy efforts. The book offers practical tips for lawyers, strategy for advocates, and insight for policymakers on the challenge of addressing unfair and deceptive ...

Publication date: 2016

In this paper, we address issues of transparency, modularity, and privacy with the introduction of an open source, web-based data repository and analysis tool tailored to the Massive Open Online Course community. The tool integrates data request/authorization and distribution workflow features as well as provides a simple analytics module upload format to enable reuse and replication of...

Publication date: 2016

This article considers the issue of opacity as a problem for socially consequential mechanisms of classification and ranking, such as spam filters, credit card fraud detection, search engines, news trends, market segmentation and advertising, insurance or loan qualification, and credit scoring. These mechanisms of classification all frequently rely on computational algorithms, and in many...

Publication date: 2015

In Miyamoto et al. (2015, this issue) the authors looked to substantiate the presence of the spacing effect, referenced from the psychology literature, in several MOOCs. Their secondary analyses constituted a robust, empirical finding on the correspondence between session distribution and certification but with only a coarse, analogous relationship to the theory of distributed practice. This...

Publication date: 2015

Native advertising is the new term for “advertorials,” advertisements disguised as editorial content. Modern native advertising started in the 1950s, but its first uses were clearly signaled to the consumer. This paper explains why consumers might be misled by advertorials—even when labeled as such—when advertising material has elements of editorial content.

Publication date: 2015

This dissertation investigates the roles of automated software agents in two user-generated content platforms: Wikipedia and Twitter. I analyze “bots” as an emergent form of sociotechnical governance, raising many issues about how code intersects with community. My research took an ethnographic approach to understanding how participation and governance operates in these two sites, including...

Publication date: 2015

An examination of corporate privacy management in the United States, Germany, Spain, France, and the United Kingdom, identifying international best practices and making policy recommendations.

Barely a week goes by without a new privacy revelation or scandal. Whether by hackers or spy agencies or social networks, violations of our personal information have shaken...

Publication date: 2015

Researchers associated with the UC Berkeley School of Information and School of Law, the Berkeley Center for Law and Technology, and the International Computer Science Institute (ICSI) released a workshop report detailing legal barriers and other disincentives to cybersecurity research, and recommendations to address them. The workshop held at Berkeley in April, supported by the National...

Publication date: 2015

To explain the uncanny holding power that some technologies seem to have, this paper presents a theory of charisma as attached to technology. It uses the One Laptop per Child project as a case study for exploring the features, benefits, and pitfalls of charisma. It then contextualizes OLPC's charismatic power in the historical arc of other charismatic technologies, highlighting the enduring...

Publication date: 2015

In 1778, Vicesimus Knox declared his time the “Age of Information,” suggesting, in a fashion recognizable today, that the period had severed connections with prior ages. This paper examines Knox’s claim by exploring changes in conceptions of information across the eighteenth century. It notes in particular shifts in the concept’s personal and political implications, reflected in the different...

Pages