To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The recent crypto winter – and the malfeasance of crypto bad actors – has revealed a difficulty in the developing law of digital property. Although the standard recourse for improperly taking someone else’s rivalrous digital property should be conversion (pay for it) or replevin (give it back), courts have only begun the common law process of articulating standards for these causes of action. In short, the current law invites and incentivizes digital theft because it can be very hard to get digital property back. We argue here that the common law is strongest in technology cases when it proceeds by analogy well-rooted in traditional case law, and that digital conversion and replevin are directly applicable to situations where someone has converted or improperly taken the digital property of another.
More than most innovations, smartphones have transformed the human experience. Most people now live with powerful computational devices within arm’s reach, day and night. By enabling the platform economy and bringing computers closer to the human experience, smartphones also opened new doors for tracking and surveillance. The sum of these changes radically altered the consumer contracting environment, exerting new pressures on the foundations of contract law. This chapter examines key factors in this transformation: unprecedented scale, privacy risks, linguistic complexity, and fundamental asymmetries. In sum, the smartphone era has exacerbated old conundrums in consumer contracting – while also introducing new ones. The net result: a further decoupling of consumer reality and contract law.
Data for Policy (dataforpolicy.org), a global community, focuses on policy–data interactions by exploring how data can be used for policy in an ethical, responsible, and efficient manner. Within its journal, six focus areas, including Data for Policy Area 1: Digital & Data-driven Transformations in Governance, were established to delineate the evolving research landscape from the Data for Policy Conference series. This review addresses the absence of a formal conceptualization of digital and data-driven transformations in governance within this focus area. The paper achieves this by providing a working definition, mapping current research trends, and proposing a future research agenda centered on three core transformations: (1) public participation and collective intelligence; (2) relationships and organizations; and (3) open data and government. The paper outlines research questions and connects these transformations to related areas such as artificial intelligence (AI), sustainable smart cities, digital divide, data governance, co-production, and service quality. This contribution forms the foundational development of a research agenda for academics and practitioners engaged in or impacted by digital and data-driven transformations in policy and governance.
This chapter first discusses how Bitcoin works in functional terms (as opposed to technical aspects), focusing on the structure of a decentralized, pseudonymous payment system. The chapter next discusses possible applications of the underlying blockchain technology, such as stock trading, property records, peer-to-peer sharing services, and smart contracts. Turning to the law, the chapter discusses several matters that the Uniform Commercial Code Amendments in 2022 addressed: A legal definition applicable to blockchain technologies, the negotiability of digital assets, the use of digital assets as collateral, and whether cryptocurrencies are money. The chapter then discusses some remaining issues, such as whether bitcoin transactions be traced and whether smart contracts are subject to contract law, and whether parties could opt out of contract law. Finally, the chapter looks specifically at the application of secured lending law to analogous transactions using smart contracts.
We consider a nonnegative random variable T representing the lifetime of a system. We discuss the residual lifetime $T_X=(T-X|T \gt X)$, where X denotes the random age of the system. We also discuss the mean residual life (MRL) of T at the random time X. It is shown that the MRL at random age (MRLR) is closely related to some well-known variability measures. In particular, we show that the MRLR can be considered a generalization of Gini’s mean difference (GMD). Under the proportional hazards model, we show that the MRLR gives the extended GMD and the extended cumulative residual entropy as special cases. Then, we provide a decomposition result indicating that the MRLR has a covariance representation. Some comparison results are also established for the MRLs of two systems at random ages.
The problem of how to effectively track and intercept small aircraft that break into the no-fly zones is now attracting increasing interest in robotics society. Vision-based control has been proved an effective solution to the target tracking problem for unmanned aerial vehicles (UAVs). Due to the limited field of view (FOV) of onboard vision sensors, existing works assume that the target is always detectable during tracking or limit the flight speed of the UAV in practice. In this paper, inspired by the broad FOV of camera network, we are the first to propose an eye-to-hand (i.e., fixed cameras) visual servoing scheme to track and intercept aerial targets by using UAVs and ground visual sensors. Specifically, utilizing rotation matrices, we first present a visual servoing equation to convert the UAV motion in image planes to the inertial frame. Then, an image-based visual servoing controller is designed directly based on image errors of camera nodes in the sensor network, and system stability is proved by means of Lyapunov analysis. Additionally, to achieve the desired translational velocity command, a low-level attitude controller is developed based on the UAV dynamics. Finally, a series of experiments in both simulated and real flight scenarios show the outstanding efficacy of our method.
The emphasis in L2 learning has mainly focused on individual writers and monomodal academic genres (e.g. narration, argumentation), neglecting the potential of collaborative composing and the use of digital genres that introduce additional semiotic sources, for fear of having to deal with “a messy transition to digital multimodal communication” (Lotherington, 2021: 220). Yet, because Web 2.0 technological upgrades have enabled interactivity, literacy has morphed from discretely reading and writing a static page to dynamically reading and writing a multimodal one, which underpins collaborative authorship and (local and global) audience awareness. Considering the inclusion of working collaboratively with multimodal tasks in the L2 classroom, the question of how to help students effectively incorporate multimodal with academic monomodal texts remains unanswered. In response to this challenge, this study examines the design and implementation of an online task to foster multiliteracies. Thirty-seven international students of diverse disciplines (e.g. economics, engineering, history), enrolled in a Spanish as a second language course, worked collaboratively to create multimodal texts based on previously created monomodal texts. Informed by a student questionnaire and a teacher focus group, we analyzed both students’ and teachers’ perceptions to ascertain the effectiveness of the intervention and the possibilities these kinds of tasks bring to the foreign language classroom. Both sets of participants reported positive results concerning linguistic advancement, motivation, and multiliteracies development. Pedagogical recommendations related to the inclusion of this pedagogical practice are provided.
Shifting to cycling in urban areas reduces greenhouse gas emissions and improves public health. Access to street-level data on bicycle traffic would assist cities in planning targeted infrastructure improvements to encourage cycling and provide civil society with evidence to advocate for cyclists’ needs. Yet, the data currently available to cities and citizens often only comes from sparsely located counting stations. This paper extrapolates bicycle volume beyond these few locations to estimate street-level bicycle counts for the entire city of Berlin. We predict daily and average annual daily street-level bicycle volumes using machine-learning techniques and various data sources. These include app-based crowdsourced data, infrastructure, bike-sharing, motorized traffic, socioeconomic indicators, weather, holiday data, and centrality measures. Our analysis reveals that crowdsourced cycling flow data from Strava in the area around the point of interest are most important for the prediction. To provide guidance for future data collection, we analyze how including short-term counts at predicted locations enhances model performance. By incorporating just 10 days of sample counts for each predicted location, we are able to almost halve the error and greatly reduce the variability in performance among predicted locations.
This study analyzes National Cyber Security Strategies (NCSSs) of G20 countries through a novel combination of qualitative and quantitative methodologies. It focuses on delineating the shared objectives, distinct priorities, latent themes, and key priorities within the NCSSs. Latent dirichlet allocation topic modeling technique was used to identify implicit themes in the NCSSs to augment the explicitly articulated strategies. By exploring the latest versions of NCSS documents, the research uncovers a detailed panorama of multinational cybersecurity dynamics, offering insights into the complexities of shared and unique national cybersecurity challenges. Although challenged by the translation of non-English documents and the intrinsic limitations of topic modeling, the study significantly contributes to the cybersecurity policy domain, suggesting directions for future research to broaden the analytical scope and incorporate more diverse national contexts. In essence, this research underscores the indispensability of a multifaceted, analytical approach in understanding and devising NCSSs, vital for navigating the complex, and ever-changing digital threat environment.
Recent developments in national health data platforms have the potential to significantly advance medical research, improve public health outcomes, and foster public trust in data governance. Across Europe, initiatives such as the NHS Research Secure Data Environment in England and the Data Room for Health-Related Research in Switzerland are underway, reflecting examples analogous to the European Health Data Space in two non-EU nations. Policy discussions in England and Switzerland emphasize building public trust to foster participation and ensure the success of these platforms. Central to building public trust is investing efforts into developing and implementing public involvement activities. In this commentary, we refer to three national research programs, namely the UK Biobank, Genomics England, and the Swiss Health Study, which implemented effective public involvement activities and achieved high participation rates. The public involvement activities used within these programs are presented following on established guiding principles for fostering public trust in health data research. Under this lens, we provide actionable policy recommendations to inform the development of trust-building public involvement activities for national health data platforms.
The REDATAM (retrieval of data for small areas by microcomputer) statistical package and format, developed by ECLAC, has been a critical tool for disseminating census data across Latin America since the 1990s. However, significant limitations persist, including its proprietary nature, lack of documentation, and restricted flexibility for advanced data analysis. These challenges hinder the transformation of raw census data into actionable information for policymakers, researchers, and advocacy groups. To address these issues, we developed Open REDATAM, an open-source and multiplatform tool that converts REDATAM data into widely supported CSV files and native R and Python data structures. By providing integration with R and Python, Open REDATAM empowers users to work with the tools they already know and perform data analyses without leaving their R or Python window. Our work emphasizes the need for a REDATAM official format specification to further enable informed policy debates that can improve policy processes’ implementation and feedback.
As data becomes a key component of urban governance, the night-time economy is still barely visible in datasets or in policies to improve urban life. In the last 20 years, over 50 cities worldwide appointed night mayors and governance mechanisms to tackle conflicts, foster innovation, and help the night-time economy sector grow. However, the intersection of data, digital rights, and 24-hour cities still needs more studies, examples, and policies. Here, the key argument is that the increasing importance of the urban night in academia and local governments claims for much-needed responsible data practices to support and protect nightlife ecosystems. By understanding these ecosystems and addressing data invisibilities, it is possible to develop a robust framework anchored in safeguarding human rights in the digital space and create comprehensive policies to help such ecosystems thrive. Night-time governance matters for the data policy community for three reasons. First, it brings together issues covered in different disciplines by various stakeholders. We need to build bridges between sectors to avoid siloed views of urban data governance. Second, thinking about data in cities also means considering the social, economic, and cultural impact of datafication and artificial intelligence on a 24-hour cycle. Creating a digital rights framework for the night means putting into practice principles of justice, ethics, and responsibility. Third, as Night Studies is an emerging field of research, policy and advocacy, there is an opportunity to help shape how, why, and when data about the night is collected and made available to society.
In the reliability analysis of multicomponent stress-strength models, it is typically assumed that strengths are either independent or dependent on a common stress factor. However, this assumption may not hold true in certain scenarios. Therefore, accurately estimating the reliability of the stress-strength model becomes a significant concern when strengths exhibit interdependence with both each other and the common stress factor. To address this issue, we propose an Archimedean copula (AC)-based hierarchical dependence approach to effectively model these interdependencies. We employ four distinct semi-parametric methods to comprehensively estimate the reliability of the multicomponent stress-strength model and determine associated dependence parameters. Furthermore, we derive asymptotic properties of our estimator and demonstrate its effectiveness through both Monte Carlo simulations and real-life datasets. The main original contribution of this study is the first attempt to evaluate the reliability problem under dependent strengths and stress using a hierarchical AC approach.