Publications
In this paper I argue for an analytic approach that courts should employ when determining ownership of a tangible copy of a copyrighted work. Courts are surprisingly divided on this apparently simple question, as I will detail several distinct and conflicting approaches, sometimes adopted within the same Circuit.
I argue that a correct approach to determining copy ownership must be…
Linked Data has become a popular term and method of how to expose structured data on the Web. There currently are two school of thought when it comes to defining what Linked Data actually is, with one school of thought defining it more narrowly as a set of principles describing of how to publish data based on Semantic Web technologies, whereas the…
U.S. privacy law is under attack. Scholars and advocates criticize it as weak, incomplete, and confusing, and argue that it fails to empower individuals to control the use of their personal information. The most recent detailed inquiry into corporate treatment of privacy, conducted in 1994, frames these critiques, finding that firms neglected the issue in their data management practices…
Free-market capitalism, hegemony, Western culture, peace, and democracy—the ideas that shaped world politics in the twentieth century and underpinned American foreign policy—have lost a good deal of their strength. Authority is now more contested and power more diffuse. Hegemony (benign or otherwise) is no longer a choice, not for the United States, for China, or for anyone else.
…
In this article, we develop hypotheses about three key correlates of attitudes about discretionary online behaviors and control over one’s own online information: frequency of engaging in risky online behaviors, experience of an online adverse event, and the disposition to be more or less trusting and cautious of others. Through an analysis of survey results, we find that online adverse events…
In this paper we apply theory and research from sociology and social psychology to the problem of collective information sharing and exchange on the internet. We investigate the relationships between pre-existing dispositions to be cautious towards others, the propensity to exert more or less effort as a function of group affiliation, and contribution towards a collective goal. We find that…
Web-based access to services increasingly moves to location-oriented scenarios, with either the client being mobile and requesting relevant information for the current location, or with a mobile or stationary client accessing a service which provides access to location-based information. The Web currently has no specific support for this kind of service pattern, and many scenarios use…
In this study, we investigate the relationship between uncertainty and trust in exogenous shifts in modes of social exchange (i.e., those that are not initiated by the individuals in a given exchange system). We explore how transitions from a high uncertainty environment (reciprocal exchange) to lower-uncertainty environments (nonbinding or binding negotiated exchange) affect the level of…
The use of social and technological intermediaries to seek intimate partners has a long history. Yet the affordances and limitations of modern computer-mediated communication (CMC) systems built for this purpose — specifically, online dating sites — present new challenges and opportunities for those who use them to initiate intimate relationships. The sheer number of potential mates available…
RESTful services on the Web expose information through retrievable resource representations that represent self-describing descriptions of resources, and through the way how these resources are interlinked through the hyperlinks that can be found in those representations. This basic design of RESTful services means that for extracting the most useful information from a service, it is necessary…
The field of intelligent tutoring systems has been using the well known knowledge tracing model, popularized by Corbett and Anderson (1995), to track student knowledge for over a decade. Surprisingly, models currently in use do not allow for individual learning rates nor individualized estimates of student initial knowledge. Corbett and Anderson, in their original articles, were interested in…
This article examines forms of shared access to technology where some privileges of ownership are retained. Sharing is defined as informal, non-remunerative resource distributing activities where multiple individuals have a relationship to a single device as purchaser, owner, possessor, operator and/or user. In the specific case of mobile phones in rural Uganda, dynamics of social policing and…