Publications

Publication date: 2011
In this paper, I reflect on a specific product of interaction design, social networking sites. The goals of this paper are two-fold. One is to bring a feminist reflexivity, to HCI, drawing on the work of Judith Butler and her concepts of peformativity, citationality, and interpellation. Her approach is, I argue, highly relevant to issues of identity and self-representation on social networking...
Publication date: 2011
In low-income regions, mobile phone–based tools can improve the scope and efficiency of field health workers. They can also address challenges in monitoring and supervising a large number of geographically distributed health workers. Several tools have been built and deployed in the field, but little comparison has been done to help understand their effectiveness. This is largely because no...
Publication date: 2011

Current scholarly understanding of information security regulation in the United States is limited. Several competing mechanisms exist, many of which are untested in the courts and before state regulators, and new mechanisms are being proposed on a regular basis.
Perhaps of even greater concern, the pace at which technology and threats change far outpaces the abilities of even the most...

Publication date: 2011

Through essays contributed by leading experts and scholars, Deviant Globalization argues that far from being marginal, illicit activities are a fundamental part of globalization. Narcotrafficking, human trafficking, the organ trade, computer malware, transnational gangs are just as much artifacts of globalization as are CNN and McDonald’s, free trade and capital mobility, accessible air travel...

Publication date: 2011

Among the first casebooks in the field, Software and Internet Law presents clear and incisive writing, milestone cases and legislation, and questions and problems that reflect the authors' extensive knowledge and classroom experience. Technical terms are defined in context to make the text accessible for students and professors with minimal background in technology, the software...

Publication date: 2011

Digital media and technology have become culturally and economically powerful parts of contemporary middle-class American childhoods. Immersed in various forms of digital media as well as mobile and Web-based technologies, young people today appear to develop knowledge and skills through participation in media. This MacArthur Report examines the ways in which afterschool programs, libraries,...

Publication date: 2011
Context enabled mobile applications are considered to provide a richer experience and to enhance the user interaction by acquiring information that allows the identification of the user’s current situation. Modern context inference infrastructures can source, process and deliver user information. However, a commercialization towards a context service has still been prohibited by the need for...
Publication date: 2010

In this paper I argue for an analytic approach that courts should employ when determining ownership of a tangible copy of a copyrighted work. Courts are surprisingly divided on this apparently simple question, as I will detail several distinct and conflicting approaches, sometimes adopted within the same Circuit.

I argue that a correct approach to determining copy ownership must be...

Publication date: 2010

Linked Data has become a popular term and method of how to expose structured data on the Web. There currently are two school of thought when it comes to defining what Linked Data actually is, with one school of thought defining it more narrowly as a set of principles describing of how to publish data based on Semantic Web technologies, whereas the...

Publication date: 2010

U.S. privacy law is under attack. Scholars and advocates criticize it as weak, incomplete, and confusing, and argue that it fails to empower individuals to control the use of their personal information. The most recent detailed inquiry into corporate treatment of privacy, conducted in 1994, frames these critiques, finding that firms neglected the issue in their data management practices...

Publication date: 2010

Free-market capitalism, hegemony, Western culture, peace, and democracy—the ideas that shaped world politics in the twentieth century and underpinned  American foreign policy—have lost a good deal of their strength. Authority is now more contested and power more diffuse. Hegemony (benign or otherwise) is no longer a choice, not for the United States, for China, or for anyone else.

...

Publication date: 2010
Events and periods are not objectively existing phenomena, but concepts we use to organize our knowledge of history. They make historical change comprehensible and help us orient ourselves with respect to the wider culture in which we participate. Thus they are indispensable for describing both the content of history scholarship and the context of documents that serve as evidence for that...
Publication date: 2010
Publication date: 2010

In this article, we develop hypotheses about three key correlates of attitudes about discretionary online behaviors and control over one’s own online information: frequency of engaging in risky online behaviors, experience of an online adverse event, and the disposition to be more or less trusting and cautious of others. Through an analysis of survey results, we find that online adverse events...

Publication date: 2010

In this paper we apply theory and research from sociology and social psychology to the problem of collective information sharing and exchange on the internet. We investigate the relationships between pre-existing dispositions to be cautious towards others, the propensity to exert more or less effort as a function of group affiliation, and contribution towards a collective goal. We find that...

Publication date: 2010

Web-based access to services increasingly moves to location-oriented scenarios, with either the client being mobile and requesting relevant information for the current location, or with a mobile or stationary client accessing a service which provides access to location-based information. The Web currently has no specific support for this kind of service pattern, and many scenarios use...

Publication date: 2010

In this study, we investigate the relationship between uncertainty and trust in exogenous shifts in modes of social exchange (i.e., those that are not initiated by the individuals in a given exchange system). We explore how transitions from a high uncertainty environment (reciprocal exchange) to lower-uncertainty environments (nonbinding or binding negotiated exchange) affect the level of...

Publication date: 2010

The use of social and technological intermediaries to seek intimate partners has a long history. Yet the affordances and limitations of modern computer-mediated communication (CMC) systems built for this purpose — specifically, online dating sites — present new challenges and opportunities for those who use them to initiate intimate relationships. The sheer number of potential mates available...

Pages