John Palfrey's research while affiliated with Harvard School of Engineering and Applied Sciences and other places

Publications (47)

Preprint
Full-text available
Mr. Chairman, Members of the Senate Subcommittee, and Commissioners of the United States Federal Trade Commission: Thank you for focusing attention on the important issues of youth privacy and safety online. As researchers, we welcome the opportunity to provide input into these hearings regarding the Children’s Online Privacy Protection Act (COPPA)...
Preprint
Full-text available
When it comes to youth and technology, issues of concern about the future – rather than issues related to opportunities – often dominate the public discourse. This is understandable. First, parents and grandparents are often baffled by, and sometimes concerned about, the habits of their children and the generations that follow – and this shift in b...
Preprint
Full-text available
In order to empower youth to create a kinder and braver world, we must begin by making sure that youth are safe. Youth are not safe when they are being bullied, harassed, or threatened. Thus, one of the first things that we must do to help youth be safe is combat the culture of meanness and cruelty that is at the root of bullying, peer violence, an...
Chapter
Full-text available
On January 17, 2009, a popular Saudi television sports program covered the day’s disappointing loss by the national soccer team to Oman in the Gulf Cup. The show’s host and his guests, including a professional soccer player and a former coach, are critiquing the team and its management when a call comes in from Saudi Prince Sultan bin Fahd, a key p...
Article
A Walk Through the Law Library In 2011 If one were to walk through the main reading room in the library at Harvard Law School on more or less any day during the school year, one would find most of the seats occupied by students. These students are arrayed, elbow to elbow, at long tables beneath a high, vaulted ceiling and the steady gaze of legal l...
Article
When people took to the streets across the UK in the summer of 2011, the Prime Minister suggested restricting access to digital and social media in order to limit their use in organizing. The resulting debate complemented speculation on the effects of social media in the Arab Spring and the widespread critique of President Mubarak's decision to shu...
Article
Full-text available
Facebook, like many communication services and social media sites, uses its Terms of Service (ToS) to forbid children under the age of 13 from creating an account. Such prohibitions are not uncommon in response to the Children’s Online Privacy Protection Act (COPPA), which seeks to empower parents by requiring commercial Web site operators to obtai...
Book
Most managers leave intellectual property issues to the legal department, unaware that an organization’s intellectual property can help accomplish a range of management goals, from accessing new markets to improving existing products to generating new revenue streams. In this book, intellectual property expert and Harvard Law School professor John...
Book
Experts examine censorship, surveillance, and resistance across Asia, from China and India to Malaysia and the Philippines. © 2012 The President and Fellows of Harvard College. All rights reserved.
Article
We conclude that policymakers and scholars that have been most optimistic about the impact of digital tools have over-emphasized the role of information, specifically access to alternative and independent sources of information and unfiltered access to the Internet. We argue, in contrast, that more attention should be paid to the means of overcomin...
Article
This study explores the structure and content of the Arabic blogosphere using link analysis, term frequency analysis, and human coding of individual blogs. We identified a base network of approximately 35,000 Arabic-language blogs, mapped the 6000 most-connected blogs, and hand coded over 3000. The study is a baseline assessment of the networked pu...
Article
Full-text available
Many youth in the United States have fully integrated the Internet into their daily lives. For them, the Internet is a positive and powerful space for socializing, learning, and engaging in public life. Along with the positive aspects of Internet use come risks to safety, including the dangers of sexual solicitation, online harassment, and bullying...
Article
Full-text available
New digital networked technologies enable users to participate in the consumption, distribution, and creation of content in ways that are revolutionary for both culture and industry. As a result, "Digital Natives"—young people growing up in the digital world with access to the technologies and the skills to use them in sophisticated ways—are now co...
Article
Full-text available
On November 6, 2008, the J. Michael Goodson Law Library at the Duke University School of Law held a number of events in celebration of its newly renovated and expanded space. This is an edited version of the program, “The 21st Century Law Library: A Conversation,” that was held as part of that celebration. The conversation explores the role of the...
Article
Full-text available
This paper, one of three case studies in a transatlantic research project exploring the connection between Information and Communication Technology interoperability and eInnovation, considers the current state and possible evolution of Digital Identity. While consumers would undoubtedly reap convenience benefits from an ubiquitous single sign-on (S...
Article
In the twenty-first century, a state can come to know more about each of its citizens via surveillance than ever before in human history. Some states are beginning to exercise this ability. Much of this additional surveillance ability derives from enhanced access to digital information. This digital information comes in the form of bits of data tha...
Article
Interoperability, like openness, is something that we generally think of as a good thing in the context of information and communications technologies (ICTs). One of the reasons why we tend to like interoperability is that we believe it leads to innovation, as well as other positive things like consumer choice, ease of use, and competition. In this...
Article
This report – representing one of three case studies that are part of a transatlantic research project aimed at exploring the potential relation between ICT Interoperability and eInnovation – examines issues surrounding DRM interoperability within the context of music content. Recognizing that interoperability will likely be defined differently by...
Article
Many countries around the world block or filter Internet content, denying access to information--often about politics, but also relating to sexuality, culture, or religion--that they deem too sensitive for ordinary citizens. Access Denied documents and analyzes Internet filtering practices in over three dozen countries, offering the first rigorousl...
Article
Web services have been wildly hyped for a long while now. Web services, and more specifically mashups, on which we focus here, are an area of enormous innovation. That innovation is manifested through new business models, new technologies, and clever new ways to use and share data. It's also an area where interoperability is the name of the game; t...
Article
China's Internet filtering regime is the most sophisticated effort of its kind in the world. Compared to similar efforts in other states, China's filtering regime is pervasive, sophisticated, and effective. It comprises multiple levels of legal regulation and technical control. It involves numerous state agencies and thousands of public and private...
Article
ICANN's experimentation in running a representative and open corporate decision-making process to manage the domain name system has largely failed. This failure has manifested itself most explicitly by ICANN's retreat from its effort to enable the direct election of a subset of its Board members and, less explicitly, by the extent to which other ef...
Conference Paper
Abstract This demonstration will showcase the H2O project at the Berkman Center for Internet & Society in general and the H2O Rotisserie discussion tool specifically H2O is a nonprofit software development project that develops innovative educational tools designed not only to improve the academic educational experience but also to export the best...
Article
Full-text available
his paper is a response to the FCC's Notice of Inquiry (09-94) on Empowering Parents and Protecting Children in an Evolving Media Landscape (PDF). The response synthesizes current research and data on the media practices of youth, focusing on three main areas -- 1) Risky Behaviors and Online Safety, 2) Privacy, Publicity and Reputation, and 3) Info...

Citations

... To explain enduring authoritarianism in the digital era, scholars have explored how authoritarian states have adapted to the challenges through controlling and manipulating online information [12,13]. To what extent does the paradoxical co-existence of the empowering Internet and resilient authoritarianism rely on the state-controlled information environment? ...
... Since that, social media, and, more particularly, Facebook, play a crucial role in relaying political, economic, and social information (Allagui and Kuebler 2011). Accordingly, mobile technologies and social media have replaced the traditional mass media communication (Etling et al. 2014). They have been a significant windfall for Tunisians' autonomy and a tool to support and maintain individual freedoms (Benkler 2006). ...
... Where such strategies differ from the traditional exercise of state sovereignty is through the importance placed on responsibilizing private actors. To the extent that private actors dominate much of the telecom infrastructure, including key network nodes where surveillance and control are most effective, their cooperation with state strategies becomes crucially important (Deibert et al., 2012). Furthermore, as the uses of our networks multiply, and as internet-based threats and pathologies gain more attention, intermediaries become seen as the instrument for a diverse array of governance strategies. ...
... A number of scholars, especially political scientists, view the selective portrayal of negative Western images of Chinese, along with China's media censorship, as part of a territorial strategy to foster nationalism and consolidate political control in China (Huang 2015;Kim 2018;King, Pan, and Roberts 2017;Han 2015;Deibert et al. 2011). According to the relative deprivation theory (Brockmann et al. 2009), one's subjective feeling of happiness derives from a comparative appraisal of others' experience. ...
... Някои автори (М. Prensky, U. Gasser, J. Palfrey) определят многозначността като глобално условие за повишаване на производителността през новото хилядолетие (Prensky 2012;Gasser, Palfrey). L. Rosen подчертава, че за поколението iGeneration, дигиталните технологии не са "инструменти", а част от околната среда. ...
... To explain enduring authoritarianism in the digital era, scholars have explored how authoritarian states have adapted to the challenges through controlling and manipulating online information [12,13]. To what extent does the paradoxical co-existence of the empowering Internet and resilient authoritarianism rely on the state-controlled information environment? ...
... 50 Moreover, although DRM legal protection originates and is defined within copyright protection, it is in practice implemented to achieve anti-competitive practices. For example, interoperability requirements provided by the software directive 51 prompt essentially competition issues; 52 whereas on the side of the user, there are substantive privacy issues to be considered, as DRM can and is often used to track user behaviour. 53 Advances towards a balanced DRM will be determined not only by technology modifications, but also by current and emerging economic and legal developments. ...
... Although Benkler (2006), Lessig (2002) and Zittrain (2008) develop a fairly adept technical analysis, Palfrey and Zittrain note that greater understanding of the architecture of technology is needed within the literature (Palfrey and Zittrain, 2011), and that previous research does not fully incorporate the implications stemming from the change of locus of control over data from end-users to intermediaries. We posit that different technological layers can be leveraged for political or commercial interests to limit functionality and innovation across the entire technology stack. ...
... Many scholars focus on organizational advocacy networks online and their role in social movements (e.g., Bennett & Segerberg, 2011;Carpenter & Jose, 2012;Shumate, 2012). Another group of studies aims at mapping national or transnational ''blogospheres'' (Bruns et al., 2011;Etling, Kelly, Faris, & Palfrey, 2010;Moe, 2011). Recently, a growing number of scholars combined web crawling with content analysis techniques to learn more about what issues and narratives are actually communicated in these hyperlink networks (e.g., Benkler et al., 2015;Bruns et al., 2011;Carpenter & Jose, 2012;Haider, 2014;Wallis & Given, 2016). ...
... This section will address those changes, taking into account how analytical and critical perspectives deal with the balance between openness and security. The Internet and the networked environments it sustains—businesses, entertainment, news, social networking services, political fora— entered diplomacy and the political spotlight as a new " battlefield, " where heterogeneous political groups vie for control (Deibert et al. 2008; 2010; Mueller, 2004; 2010). The expression " network politics " refers to the discursive political nexus between technological, military, social and moral issues, or to ICT-mediated political action. ...