29,614 research outputs found

    Genomic stuff: Governing the (im)matter of life

    Get PDF
    Emphasizing the context of what has often been referred to as “scarce natural resources”, in particular forests, meadows, and fishing stocks, Elinor Ostrom’s important work Governing the commons (1990) presents an institutional framework for discussing the development and use of collective action with respect to environmental problems. In this article we discuss extensions of Ostrom’s approach to genes and genomes and explore its limits and usefulness. With the new genetics, we suggest, the biological gaze has not only been turned inward to the management and mining of the human body, also the very notion of the “biological” has been destabilized. This shift and destabilization, we argue, which is the result of human refashioning and appropriation of “life itself”, raises important questions about the relevance and applicability of Ostrom’s institutional framework in the context of what we call “genomic stuff”, genomic material, data, and information

    Updating democracy studies: outline of a research program

    Get PDF
    Technologies carry politics since they embed values. It is therefore surprising that mainstream political and legal theory have taken the issue so lightly. Compared to what has been going on over the past few decades in the other branches of practical thought, namely ethics, economics and the law, political theory lags behind. Yet the current emphasis on Internet politics that polarizes the apologists holding the web to overcome the one-to-many architecture of opinion-building in traditional representative democracy, and the critics that warn cyber-optimism entails authoritarian technocracy has acted as a wake up call. This paper sets the problem – “What is it about ICTs, as opposed to previous technical devices, that impact on politics and determine uncertainty about democratic matters?” – into the broad context of practical philosophy, by offering a conceptual map of clusters of micro-problems and concrete examples relating to “e-democracy”. The point is to highlight when and why the hyphen of e-democracy has a conjunctive or a disjunctive function, in respect to stocktaking from past experiences and settled democratic theories. My claim is that there is considerable scope to analyse how and why online politics fails or succeeds. The field needs both further empirical and theoretical work

    Social Software, Groups, and Governance

    Get PDF
    Formal groups play an important role in the law. Informal groups largely lie outside it. Should the law be more attentive to informal groups? The paper argues that this and related questions are appearing more frequently as a number of computer technologies, which I collect under the heading social software, increase the salience of groups. In turn, that salience raises important questions about both the significance and the benefits of informal groups. The paper suggests that there may be important social benefits associated with informal groups, and that the law should move towards a framework for encouraging and recognizing them. Such a framework may be organized along three dimensions by which groups arise and sustain themselves: regulating places, things, and stories

    Addressing the Challenges in Federating Edge Resources

    Full text link
    This book chapter considers how Edge deployments can be brought to bear in a global context by federating them across multiple geographic regions to create a global Edge-based fabric that decentralizes data center computation. This is currently impractical, not only because of technical challenges, but is also shrouded by social, legal and geopolitical issues. In this chapter, we discuss two key challenges - networking and management in federating Edge deployments. Additionally, we consider resource and modeling challenges that will need to be addressed for a federated Edge.Comment: Book Chapter accepted to the Fog and Edge Computing: Principles and Paradigms; Editors Buyya, Sriram

    Pedagogic approaches to using technology for learning: literature review

    Get PDF
    This literature review is intended to address and support teaching qualifications and CPD through identifying new and emerging pedagogies; "determining what constitutes effective use of technology in teaching and learning; looking at new developments in teacher training qualifications to ensure that they are at the cutting edge of learning theory and classroom practice and making suggestions as to how teachers can continually update their skills." - Page 4

    Generating Rembrandt: Artificial Intelligence, Copyright, and Accountability in the 3A Era--The Human-like Authors are Already Here- A New Model

    Get PDF
    Artificial intelligence (AI) systems are creative, unpredictable, independent, autonomous, rational, evolving, capable of data collection, communicative, efficient, accurate, and have free choice among alternatives. Similar to humans, AI systems can autonomously create and generate creative works. The use of AI systems in the production of works, either for personal or manufacturing purposes, has become common in the 3A era of automated, autonomous, and advanced technology. Despite this progress, there is a deep and common concern in modern society that AI technology will become uncontrollable. There is therefore a call for social and legal tools for controlling AI systems’ functions and outcomes. This Article addresses the questions of the copyrightability of artworks generated by AI systems: ownership and accountability. The Article debates who should enjoy the benefits of copyright protection and who should be responsible for the infringement of rights and damages caused by AI systems that independently produce creative works. Subsequently, this Article presents the AI Multi- Player paradigm, arguing against the imposition of these rights and responsibilities on the AI systems themselves or on the different stakeholders, mainly the programmers who develop such systems. Most importantly, this Article proposes the adoption of a new model of accountability for works generated by AI systems: the AI Work Made for Hire (WMFH) model, which views the AI system as a creative employee or independent contractor of the user. Under this proposed model, ownership, control, and responsibility would be imposed on the humans or legal entities that use AI systems and enjoy its benefits. This model accurately reflects the human-like features of AI systems; it is justified by the theories behind copyright protection; and it serves as a practical solution to assuage the fears behind AI systems. In addition, this model unveils the powers behind the operation of AI systems; hence, it efficiently imposes accountability on clearly identifiable persons or legal entities. Since AI systems are copyrightable algorithms, this Article reflects on the accountability for AI systems in other legal regimes, such as tort or criminal law and in various industries using these systems

    The Beginnings and Prospective Ending of “End-to-End”: An Evolutionary Perspective On the Internet’s Architecture

    Get PDF
    The technology of “the Internet” is not static. Although its “end-to- end” architecture has made this “connection-less” communications system readily “extensible,” and highly encouraging to innovation both in hardware and software applications, there are strong pressures for engineering changes. Some of these are wanted to support novel transport services (e.g. voice telephony, real-time video); others would address drawbacks that appeared with opening of the Internet to public and commercial traffic - e.g., the difficulties of blocking delivery of offensive content, suppressing malicious actions (e.g. “denial of service” attacks), pricing bandwidth usage to reduce congestion. The expected gains from making “improvements” in the core of the network should be weighed against the loss of the social and economic benefits that derive from the “end-to-end” architectural design. Even where technological “fixes” can be placed at the networks’ edges, the option remains to search for alternative, institutional mechanisms of governing conduct in cyberspace.

    Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World

    Get PDF
    Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americans’ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure
    • 

    corecore