Category: Volume 69, Issue 5
-
Keynote Address: Symposium Cybersecurity, Fake News & Policy: Dis- and Mis-Information
[et_pb_row][et_pb_column type=”4_4″][et_pb_text] Justine Isola Volume 69, Issue 5, 1333-1338 Full Article [/et_pb_column][/et_pb_row][/et_pb_section]
-
Tobriner Memorial Lecture: Free Speech on Campus
[et_pb_row][et_pb_column type=”4_4″][et_pb_text] Erwin Chemerinsky Volume 69, Issue 5, 1339-1354 Full Article [/et_pb_column][/et_pb_row][/et_pb_section]
-
Can Democracy Withstand the Cyber Age?: 1984 in the 21st Century
[et_pb_row][et_pb_column type=”4_4″][et_pb_text] David M. Howard Volume 69, Issue 5, 1355-1378 Democracy has evolved throughout history, and democracy can survive the challenges of the cyber age. However, democracy will be affected by the internet and increased cybersecurity. Cybersecurity and democracy sometimes appear at odds, and the recent cyberattacks on democratic elections show the growing need for…
-
Media Literacy: A Foundational Skill for Democracy in the 21st Century
[et_pb_row admin_label=”row”] [et_pb_column type=”4_4″][et_pb_text admin_label=”Text”] Tessa Jolls & Michele Johnsen Volume 69, Issue 5, 1379-1408 The current focus on the validity, credibility, and trustworthiness of media and information is urgent and global. In the past ten to twenty years, the information landscape has fundamentally changed due to an exponential increase in access to information consumption…
-
Spreading Like Wildfire: Solutions for Abating the Fake News Problem on Social Media via Technology Controls and Government Regulation
[et_pb_row][et_pb_column type=”4_4″][et_pb_text] Alexandra Andorfer Volume 69, Issue 5, 1409-1431 “Fake news” seems to be the phrase du jour these days. During the 2016 presidential election, fake news and propaganda proliferated on social media sites like Facebook, Twitter, and Google, with many of the concocted faux sources emanating from Russia and elsewhere. In Fall 2017, tech…
-
The Spider’s Parlor: Government Malware on the Dark Web
[et_pb_row][et_pb_column type=”4_4″][et_pb_text] Kaleigh E. Aucoin Volume 69, Issue 5, 1433-1469 The United States government’s use of what it refers to as “Network Investigative Tools,” presents several constitutional and privacy-related issues. Revelations stemming from the use of these NITsa form of malwarewarrant a difficult discussion on the conflict between public transparency and the level of secrecy…