Content and Conduct
This study assesses the degree to which English-language Wikipedia is successful in moderating harmful speech
Youth and Cyberbullying
Examining the changing landscape of bullying while acknowledging the convergence between the online and offline world.
Youth and Artificial Intelligence
How can we empower young people to meaningfully interact with AI-based technologies to promote and bolster learning, creative expression, and well-being, while also addressing key… …
Internet Censorship and the Intraregional Geopolitical Conflicts in the Middle East and North Africa
How do adversarial relationships between states translate into Internet censorship practices?
Assessing the Assessments
This report provides context for state and local officials considering the development, procurement, implementation, and use of Risk Assessment (RA) tools.
This primer aims to provide a foundation that can guide future decisions when analyzing and sharing statistical data about individuals, informing individuals about the privacy…
Is Privacy Privacy?
How have different technical and normative conceptions of privacy evolved? What are the practical challenges that these divergent approaches pose?
The most comprehensive study yet published on media coverage of American presidential politics from April 2015 to the one year anniversary of the Trump presidency
Artificial Intelligence & Human Rights
A legal analysis of some of AI's promises and challenges to conceptions of human rights.
Censorship and Collateral Damage
Analyzing the aftermath of the Telegram ban in Iran, and presenting detailed data on one of the most widely used circumvention tools among Iranians.
Bridging the Gap between Computer Science and Legal Approaches to Privacy
A look at the gaps that exist between how privacy risks are conceptualized between the fields of law and computer science
A Harm-Reduction Framework for Algorithmic Fairness
Any evaluation of algorithmic fairness must consider a counterfactual analysis of the effects that algorithmic design, implementation, and use have on the well-being of…
A Smart Move? 24 Essentials Of A SWOT Analysis Policymakers Need To Consider
Analyzing the strengths, weaknesses, opportunities, and threats (SWOT analysis) facing governments as they design comprehensive AV policy.
5 Technological Factors Regulators And Policymakers Need To Know
The basics of autonomous vehicle technology and current policy discussions.
3 Practical Tools To Help Regulators Develop Better Laws And Policies
Three practical tools that policymakers and regulators can use to develop better AV policies and expand their toolkit of instruments to govern the technology.
What Governments Across The Globe Are Doing To Seize The Benefits Of Autonomous Vehicles
Introducing some of the AV strategies and initiatives that governments around the world are employing to navigate the challenges of AVs.
Coming in from the Cold: A Safe Harbor from the CFAA and DMCA §1201
A proposal for a statutory safe harbor from the Computer Fraud and Abuse Act and DMCA for security research activities.
Youth, Digital Transformation, and Forms of Inclusion in Latin America
A reflection on the challenges and opportunities that arise from digital practices by new generations. (en español)
AGTech Forum Briefing Book: State Attorneys General and Artificial Intelligence
Artificial intelligence is already starting to change our lives. Over the coming decades, these new technologies will shape many of our daily interactions and drive dramatic…
Encryption Policy And Its International Impacts: A Framework For Understanding Extraterritorial Ripple Effects
This paper explores the potential international ripple effects that can occur following changes to domestic encryption policies.
Big Data, Health Law, and Bioethics
This timely, groundbreaking volume explores how law promotes or discourages the use of big data in the health care sphere.
Practical Approaches to Big Data Privacy Over Time
This article analyzes how privacy risks multiply as large quantities of personal data are collected over longer periods of time.
The Yemen War Online: Propagation of Censored Content on Twitter
This study documents and analyzes the sharing of information on Twitter among different political groups related to the ongoing conflict in Yemen.
Follow-up Letter to the Members of the Massachusetts Legislature Regarding the Adoption of Actuarial Risk Assessment Tools in the Criminal Justice System
The following open letter — signed by Harvard and MIT-based faculty, staff, and researchers — is directed to the Massachusetts Legislature to inform its consideration of risk…