For too long, cyber abuse has been misunderstood and ignored. The prevailing view is that cyber abuse is not “really real,” though in rare cases authorities take it seriously. Justices of the U.S. Supreme Court, for instance, demanded and received extra protection for themselves after facing online threats, but, in oral argument, dismissed a woman as “overly sensitive” for reporting hundreds of threatening texts to law enforcement. In other words, protection for me (the powerful) but not for thee. For everyday women and minorities, cyber abuse is unseen and unredressed, due to invidious stereotypes and gender norms. Empirical proof now exists that makes non-recognition difficult to justify. Studies show that cyber abuse is widespread, the injuries profound, and disproportionately borne by women, who often have intersecting disadvantaged identities. (Hence, the moniker cyber gender abuse). After years of advocacy and scholarship, it pains me to acknowledge the continued invisibility of cyber gender abuse, but progress is possible if we recognize our failings and commit to structural reform. Internet exceptionalism must end for the businesses best situated to prevent destructive cyber gender abuse. Congress should condition the immunity afforded content platforms on a duty of care to address cyber gender abuse and eliminate the legal shield for platforms whose business is abuse. Companies must commit to safety by design as a core principle.
We live in a golden age of student surveillance. Some surveillance is old school: video cameras, school resource officers, and tip lines. Old-school...
A resilience agenda is an essential part of protecting national security in a digital age. Digital technologies impact nearly all aspects of everyday...
Cyber stalking involves repeated, often relentless targeting of someone with abuse. Death and rape threats may be part of a perpetrator’s playbook...
Fifty years ago, federal and state lawmakers called for the regulation of a criminal justice “databank” connecting federal, state, and local agencies...
Large language models (LLMs) now perform extremely well on many natural language processing tasks. Their ability to convert legal texts to data may...
This chapter provides an overview of computational text analysis techniques used to study judicial behavior and decision-making. As legal texts become...
Generative AI is already beginning to alter legal practice. If optimistic forecasts prove warranted, how might this technology transform judicial...
Working hand-in-hand with the private sector, largely in a regulatory vacuum, policing agencies at the federal, state, and local level are acquiring...
This article argues that the fact that an action will compound a prior injustice counts as a reason against doing the action. I call this reason The...
Modern antitrust law has come under intense criticism in recent years, with a bipartisan chorus of complaints about the power of technology and...
In 2018, Congress rightly highlighted the problem of sex trafficking, which is a moral abomination and vicious scourge. It condemned sites like...
China won’t yet commit to keep autonomy out of its nuclear command and control. It will take a lot more talking to get there.
Now that the Supreme Court has revoked the constitutional right to reproductive autonomy, we must reckon with the risks that our surveillance economy...
For too long, cyber abuse has been misunderstood and ignored. The prevailing view is that cyber abuse is not “really real,” though in rare cases...
Section 230 is finally getting the clear-eyed attention that it deserves. No longer is it naive to suggest that we revisit the law that immunizes...