Publications
Background: Intimate partner violence (IPV) is a complex global problem, not only because it is a human rights issue, but also because it is associated with chronic mental and physical illnesses as well as acute health outcomes related to injuries for women and their children. Attitudes, beliefs, and norms regarding IPV are significantly associated with the likelihood of both…
Regulators and privacy advocates increasingly demand that privacy be protected through the technical design of products and services, as well as through organizational procedures and policies. Privacy research by computer scientists and engineers are producing insights and techniques that empower a new professional in the technology sector—the privacy engineer. Despite great enthusiasm for…
This article examines one of the largest interventions in computer-based learning currently underway, the One Laptop per Child (OLPC) project, with 2.5 million laptops in use worldwide. Drawing on 2010 and 2013 fieldwork investigating a project in Paraguay with 10,000 of OLPC's “XO” laptops, I explore the ways in which participants interpreted leisure laptop use as “learning.” I show that the…
The meaning of privacy has been much disputed throughout its history in response to wave after wave of new technological capabilities and social configurations. The current round of disputes over privacy fuelled by data science has been a cause of despair for many commentators and a death knell for privacy itself for others. We argue that privacy’s disputes are neither an accidental feature of…
Computational social science is an emerging field at the intersection of statistics, computer science, and the social sciences. This paper addresses the philosophical foundations of this new field. Kant and Peirce provide an understanding of scientific objectivity as intersubjective validity. Modern mathematics, and especially the mathematics of algorithms and statistics, get their objectivity…
This article examines one of the largest interventions in computer-based learning currently underway, the One Laptop per Child (OLPC) project, with 2.5 million laptops in use worldwide. Drawing on 2010 and 2013 fieldwork investigating a project in Paraguay with 10,000 of OLPC's “XO” laptops, I explore the ways in which participants interpreted leisure laptop use as “learning.” I show that the…
The migration of robots from the laboratory into sensitive home settings as commercially available therapeutic agents represents a significant transition for information privacy and ethical imperatives. We present new privacy paradigms and apply the fair information practices (FIPs) to investigate concerns unique to the placement of therapeutic robots in private home contexts. We then explore…
This paper explores corporate concept videos as a type of design fiction that embed a vision about the future of computing – including how computing should be done, for whom, and the norms that might exist – and allow for a discourse to explore and contest these claims. We introduce a method for critiquing and analyzing concept videos. Through an analysis of Google Glass’ and Microsoft…
Policy proposals often feature information sharing as a means to improve cybersecurity, but lack specificity connecting these activities to specific goals intended to advance the state of cybersecurity. We use the Doctrine of Cybersecurity as a lens to examine existing information sharing efforts and evaluate the utility of information sharing proposals. Leaning on the analogous public good-…
Achieving any specific level of cybersecurity inevitably entails making compromises with regard to cost, function, and convenience, as well as trade‑offs
between societal values, such as openness, privacy, freedom of expression, and innovation. In defining regulations and incentives, decisions have to be made about how to balance these trade‑offs while optimizing security outcomes. To…
Models of learning in EDM and LAK are pushing the boundaries of what can be measured from large quantities of historical data. When controlled randomization is present in the learning platform, such as randomized ordering of problems within a problem set, natural quasi-randomized controlled studies can be conducted, post-hoc. Difficulty and learning gain attribution are among the factors of…
Consumer Protection regulators worldwide share basic problems: the companies that regulators police are so powerful and rich that fines do not matter. Consider the French with their €150,000 fine against Google in 2014. Efficacious fines against dominant platforms would have to rise to nine-figure levels to cause change, but consumer protection agencies generally lack the authority and…
This article presents a material ecosystemic approach as a theoretical grounding for understanding digital technologies as potential catalysts of socioeconomic development. Through such an approach, talk of “technology” is replaced by talk of the “material.” Material is understood as inclusive of the human-made as well as the natural, of human relationships, human bodies, and words spoken. And…
FTC Privacy Law and Policy is a broad-ranging primer on the FTC’s consumer protection mission. It is the first hundred-year history of the agency’s consumer protection activities, and it links consumer cases to modern internet privacy efforts. The book offers practical tips for lawyers, strategy for advocates, and insight for policymakers on the challenge of addressing…
In this paper, we address issues of transparency, modularity, and privacy with the introduction of an open source, web-based data repository and analysis tool tailored to the Massive Open Online Course community. The tool integrates data request/authorization and distribution workflow features as well as provides a simple analytics module upload format to enable reuse and replication of…
This article considers the issue of opacity as a problem for socially consequential mechanisms of classification and ranking, such as spam filters, credit card fraud detection, search engines, news trends, market segmentation and advertising, insurance or loan qualification, and credit scoring. These mechanisms of classification all frequently rely on computational algorithms, and in many…
In Miyamoto et al. (2015, this issue) the authors looked to substantiate the presence of the spacing effect, referenced from the psychology literature, in several MOOCs. Their secondary analyses constituted a robust, empirical finding on the correspondence between session distribution and certification but with only a coarse, analogous relationship to the theory of distributed practice. This…
Native advertising is the new term for “advertorials,” advertisements disguised as editorial content. Modern native advertising started in the 1950s, but its first uses were clearly signaled to the consumer. This paper explains why consumers might be misled by advertorials—even when labeled as such—when advertising material has elements of editorial content.