Rapidly growing applications of teleoperated robots raise the question; what if the computer systems for these robots are attacked, taken over and even turned into weapons? This paper seeks to answer this question by systematically analyzing possible cyber security attacks against an advanced teleoperated robotic surgery system, aiming to raise awareness and increase understanding of these emerging threats.
This paper identifies privacy and security issues arising from possible misuse or inappropriate use of brain-computer interfaces. It won the Best Paper award at the 2014 International Symposium on Ethics in Engineering, Science and Technology.
Published by Brookings, this paper is part of series focused on the future of civilian robotics, which seeks to answer the varied legal questions around the integration of robotics into human life.
Two decades of analysis have produced a rich set of insights as to how the law should apply to the Internet’s peculiar characteristics. But, in the meantime, technology has not stood still. This article, published in the California Law Review, is the first to examine what the introduction of a new, equally transformative technology means for cyberlaw (and law in general).
This paper studies the legal and policy issues surrounding crypto currencies, such as Bitcoin, and how those issues interact with technical design options. It was presented at the 2015 Financial Cryptography and Data Security Conference.
Here we examine privacy and security policies for open government with an eye toward best practices. Municipalities across the US perceive the potential benefits to their organizations and the public at large from making the datasets they collect available online to the public. However, the same municipalities along with numerous scholars and public policy advocates are increasingly concerned about the consequences of releases of data about local residents. This paper was published in the Berkeley Technology Law Journal.
With an intended audience of designers and regulators, this project brings an interdisciplinary group of experts together to build a set of consumer protection best practices for design and user control of connected devices in the home. This paper was presented at CHI ’17: ACM CHI Conference on Human Factors in Computing Systems.
In this paper, from the 2014 Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE 2014), an interdisciplinary research team describes their vision of AR and explores the unique and difficult problems AR presents for law and policy–including privacy, free speech, discrimination, and safety.