Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Educational programs in computer science and law: panel., , , , , and . CSLAW, page 1. ACM, (2019)Should Copyright Owners Have to Give Notice of Their Use of Technical Protection Measures?, and . JTHTL, 6 (1): 41-76 (2007)Big Data and Due Process: Toward A Framework to Redress Predictive Privacy Harms, and . Boston College Law Review, (2014)A Framework for Deprecating Datasets: Standardizing Documentation, Identification, and Communication., , , , , and . FAccT, page 199-212. ACM, (2022)The internet of things we don't own?. Commun. ACM, 59 (5): 36-38 (2016)Why parents help their children lie to Facebook about age: Unintended consequences of the 'Children's Online Privacy Protection Act'., , , and . First Monday, (2011)The Problem of Zombie Datasets: A Framework For Deprecating Datasets., , , , , and . CoRR, (2021)Artificial Intelligence for Social Good., , , , , , , , , and 1 other author(s). CoRR, (2019)Protecting Traditional Knowledge and Expanding Access to Scientific Data: Juxtaposing Intellectual Property Agendas via a Model, , and . International Journal of Cultural Property, 12 (03): 285-314 (2005)