Publications

Publication date: 2016

This article presents a material ecosystemic approach as a theoretical grounding for understanding digital technologies as potential catalysts of socioeconomic development. Through such an approach, talk of “technology” is replaced by talk of the “material.” Material is understood as inclusive of the human-made as well as the natural, of human relationships, human bodies, and words spoken. And...

Publication date: 2016

Consumer Protection regulators worldwide share basic problems: the companies that regulators police are so powerful and rich that fines do not matter. Consider the French with their €150,000 fine against Google in 2014. Efficacious fines against dominant platforms would have to rise to nine-figure levels to cause change, but consumer protection agencies generally lack the authority and...

Publication date: 2016

FTC Privacy Law and Policy is a broad-ranging primer on the FTC’s consumer protection mission. It is the first hundred-year history of the agency’s consumer protection activities, and it links consumer cases to modern internet privacy efforts. The book offers practical tips for lawyers, strategy for advocates, and insight for policymakers on the challenge of addressing unfair and deceptive ...

Publication date: 2016

In this paper, we address issues of transparency, modularity, and privacy with the introduction of an open source, web-based data repository and analysis tool tailored to the Massive Open Online Course community. The tool integrates data request/authorization and distribution workflow features as well as provides a simple analytics module upload format to enable reuse and replication of...

Publication date: 2016

This article considers the issue of opacity as a problem for socially consequential mechanisms of classification and ranking, such as spam filters, credit card fraud detection, search engines, news trends, market segmentation and advertising, insurance or loan qualification, and credit scoring. These mechanisms of classification all frequently rely on computational algorithms, and in many...

Publication date: 2015

In Miyamoto et al. (2015, this issue) the authors looked to substantiate the presence of the spacing effect, referenced from the psychology literature, in several MOOCs. Their secondary analyses constituted a robust, empirical finding on the correspondence between session distribution and certification but with only a coarse, analogous relationship to the theory of distributed practice. This...

Publication date: 2015

Native advertising is the new term for “advertorials,” advertisements disguised as editorial content. Modern native advertising started in the 1950s, but its first uses were clearly signaled to the consumer. This paper explains why consumers might be misled by advertorials—even when labeled as such—when advertising material has elements of editorial content.

Publication date: 2015

This dissertation investigates the roles of automated software agents in two user-generated content platforms: Wikipedia and Twitter. I analyze “bots” as an emergent form of sociotechnical governance, raising many issues about how code intersects with community. My research took an ethnographic approach to understanding how participation and governance operates in these two sites, including...

Publication date: 2015

Researchers associated with the UC Berkeley School of Information and School of Law, the Berkeley Center for Law and Technology, and the International Computer Science Institute (ICSI) released a workshop report detailing legal barriers and other disincentives to cybersecurity research, and recommendations to address them. The workshop held at Berkeley in April, supported by the National...

Publication date: 2015

In 1778, Vicesimus Knox declared his time the “Age of Information,” suggesting, in a fashion recognizable today, that the period had severed connections with prior ages. This paper examines Knox’s claim by exploring changes in conceptions of information across the eighteenth century. It notes in particular shifts in the concept’s personal and political implications, reflected in the different...

Publication date: 2015

This dissertation grapples with the questions: Does transparency lead to accountability? Is it possible to "democratize" surveillance, turning surveillance into an instrument of democratic control over state bureaucracy? Can a state bureaucracy combine visions of surveillance within the state and "openness" to citizens to help police itself? To address these questions, I studied an "open...

Publication date: 2015

An emerging field of educational data mining (EDM) is building on and contributing to a wide variety of disciplines through analysis of data coming from various educational technologies. EDM researchers are addressing questions of cognition, metacognition, motivation, affect, language, social discourse, etc. using data from intelligent tutoring systems, massive open online courses, educational...

Publication date: 2015

Since the early-to-mid 2000's, South Africa's Western Cape and Kenya's capital city Nairobi have been attracting flows of trade and investments in information technology-enabled services (ITES). The flows are small but significant and growing, with multinational companies like Amazon, Google, IBM, and others locating and developing market niches in these regions. Why have these regions managed...

Publication date: 2015

The notion that farmers use mobile phones to acquire market price information has become a kind of shorthand for the potential of this technology to empower rural, low-income populations in the Global South. We argue that the envisioned consequences of ‘market price information’ for market efficiency with benefits at all income levels is a kind of myth, one frequently promulgated in the...

Publication date: 2015

In this paper, we address issues of transparency, modularity, and privacy with the introduction of an open source, web-based data repository and analysis tool tailored to the Massive Open Online Course community. The tool integrates data request/authorization and distribution workflows as well as a simple analytics module upload format to enable reuse and replication of analytics results among...

Publication date: 2015

Effective use of spectrum is essential to the forms of mobile, ubiquitous, and social computing that increasingly shape and define CSCW research. This paper calls attention to the key policy processes by which the future of wireless spectrum – and the forms of technology design and use that depend on it – is being imagined, shaped, and contested. We review CSCW and HCI scholarship arguing for...

Publication date: 2014

What does it mean to "plan" a technology?  Designs with a footprint in public space are important hybrids, including wired bus stops and rebuilt payphones.  Our goal is to shift from designing technology for a neighborhood by planning technology as part of the neighborhood.  Aging phone booths were purchased in LA's historic Leimert Park.  For six months, residents joined with technologists to...

Publication date: 2014

With the rise of global telecommunications networks, and especially with the worldwide spread of the Internet, the world is considered to be becoming an information society: a society in which social relations are patterned by information, transcending time and space through the use of new information and communications technologies. Much of the popular press and academic literature on the...

Publication date: 2014

Trademark theory implicitly assumes that laws favoring the interests of the producer will inevitably serve the interests of the consumer. Such a claim justifies the way that trademark law privileges the voice of the producer in the marketplace. Historical work has tended to endorse this view, explaining the development of trademarks and trademark law in terms of the information needed for...

Pages