John Palfrey’s research while affiliated with Harvard School of Engineering and Applied Sciences and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (64)


Planning for the Next Pandemic: A Global, Interoperable System of Contact Tracing
  • Article

January 2021

·

4 Reads

·

1 Citation

Georgetown Journal of International Affairs

John Palfrey

·


How the COPPA, as Implemented, Is Misinterpreted by the Public: A Research Perspective
  • Preprint
  • File available

January 2017

·

51 Reads

Mr. Chairman, Members of the Senate Subcommittee, and Commissioners of the United States Federal Trade Commission: Thank you for focusing attention on the important issues of youth privacy and safety online. As researchers, we welcome the opportunity to provide input into these hearings regarding the Children’s Online Privacy Protection Act (COPPA). We write as individuals, but we work together as the principal investigators of the Youth and Media Policy Working Group Initiative at Harvard’s Berkman Center for Internet and Society. The goal of our working group is to explore policy issues that fall into three substantive categories that emerge from youth media practices: 1) Risky Behaviors and Online Safety; 2) Privacy, Publicity, and Reputation; and 3) Information Dissemination, Youth-Created Content and Information Quality. Our work is intended to consider how research on the intersection of youth and technology can and should be used to inform policy. We seek to translate research from those who study youth media practices into terms responsive to the children’s privacy hearings.There is no doubt that protecting children’s privacy and safety is of utmost importance in our society. These issues are growing in importance with every passing year. We commend the authors of COPPA for being so deeply concerned about privacy and safety. As you consider the future of legislation and rule-making in this area, we urge you to consider the gap between the intentions of COPPA and how children and their parents perceive the implementation. It is this gap that we’d like to address in our submission. And it is our proposal that this Subcommittee consider how COPPA’s two P’s – of Privacy Protection – might be worked more effectively back into any revision of COPPA.

Download

Empowering Parents and Protecting Children in an Evolving Media Landscape

January 2017

·

480 Reads

When it comes to youth and technology, issues of concern about the future – rather than issues related to opportunities – often dominate the public discourse. This is understandable. First, parents and grandparents are often baffled by, and sometimes concerned about, the habits of their children and the generations that follow – and this shift in behavior by many youth is surely no exception to that rule. Second, we are in the midst of radical transformations in the information technology environment and in patterns of usage of technology, changes that are bringing with them much creativity but also challenges to existing hierarchies. And third, adults perceive that their children are more likely to use these new information technologies in ways that are at best perplexing and at worst dangerous to themselves and to society. The data collected by social scientists about young people, how they use technologies, and the challenges and opportunities they face often are at odds with this public perception. We appreciate the frame of the FCC’s NOI, which encourages respondents to focus on the empowerment of parents as well as the protection of our children with respect to online behaviors.


What You Must Know to Help Combat Youth Bullying, Meanness, and Cruelty

January 2017

·

15 Reads

In order to empower youth to create a kinder and braver world, we must begin by making sure that youth are safe. Youth are not safe when they are being bullied, harassed, or threatened. Thus, one of the first things that we must do to help youth be safe is combat the culture of meanness and cruelty that is at the root of bullying, peer violence, and abuse.Bullying is a systems problem and many well-intended people don’t realize the complexity of the issue. The following are research-driven elements of bullying that should ground any discussion of how to address this complex issue.


Education and Social Media: Toward a Digital Future

May 2016

·

50 Reads

·

34 Citations

Christine Greenhow

·

·

·

[...]

·

Ri Pierce-Grove

The past ten years have brought significant growth in access to Web technology and in the educational possibilities of social media. These changes challenge previous conceptualizations of education and the classroom, and pose practical questions for learners, teachers, and administrators. Today, the unique capabilities of social media are influencing learning and teaching in ways previously unseen. Social media is transforming sectors outside education by changing patterns in personal, commercial, and cultural interaction. These changes offer a window into the future(s) of education, with new means of knowledge production and reception, and new roles for learners and teachers. Surveying the uses to which social media has been applied in these early years, we see a need to re-envision education for the coming decades. To date, no book has systematically and accessibly examined how the cultural and technological shift of social media is influencing educational practices. With this book, we aim to fill that gap. This book critically explores the future of education and online social media, convening leading scholars from the fields of education, law, communications, and cultural studies. We believe that this interdisciplinary edited volume will appeal to a broad audience of scholars, practitioners, and policy makers who seek to understand the opportunities for learning and education that exist at the intersection of social media and education. The book will examine educational institutions, access and participation, new literacies and competencies, cultural reproduction, international accreditation, intellectual property, privacy and protection, new business models, and technical architectures for digital education.


Mapping the Arabic Blogosphere: Politics, Culture, and Dissent

January 2014

·

353 Reads

·

83 Citations

On January 17, 2009, a popular Saudi television sports program covered the day’s disappointing loss by the national soccer team to Oman in the Gulf Cup. The show’s host and his guests, including a professional soccer player and a former coach, are critiquing the team and its management when a call comes in from Saudi Prince Sultan bin Fahd, a key patron of the team. He is not happy with their analysis. On air, the prince dresses them down in turn, and goes so far as to tell one of them he is poorly raised, a serious insult in Saudi culture. The prince’s tone is disrespectful, and his words are not those of a leader to citizens, but of a ruler to his subjects. A clip of the tirade quickly appears on YouTube, and blogs and online forums post the link, spawning long chains of comments. These are overwhelmingly critical of the prince, who was seen as speaking to the commentators as though they were his slaves.


Smarter Law School Casebooks

April 2012

·

12 Reads

·

3 Citations

A Walk Through the Law Library In 2011 If one were to walk through the main reading room in the library at Harvard Law School on more or less any day during the school year, one would find most of the seats occupied by students. These students are arrayed, elbow to elbow, at long tables beneath a high, vaulted ceiling and the steady gaze of legal luminaries from the past (mostly white men, some in wigs). Though they are from many walks of life and are of varying ages, the students often have the very same objects in front of them. Some of these objects are what one would expect of young people of their generation, immersed in study. Coffee is ordinarily close at hand, primarily in school-approved, oversized mugs with tight lids to protect the library and its books from spillage; there is also a laptop computer, connected to the wireless network as an on-ramp to the Internet. But there is another common feature as well: an old-fashioned bound thick legal casebook. These casebooks look very much like what law books have looked like for more than a century. They are an enduring feature of the study of law – even in our increasingly digital age.


Better Data for a Better Internet

December 2011

·

34 Reads

·

10 Citations

Science

When people took to the streets across the UK in the summer of 2011, the Prime Minister suggested restricting access to digital and social media in order to limit their use in organizing. The resulting debate complemented speculation on the effects of social media in the Arab Spring and the widespread critique of President Mubarak's decision to shut off the Internet and mobile phone systems completely in Egypt (see the photo).



Why Parents Help Their Children Lie to Facebook About Age: Unintended Consequences of the ‘Children's Online Privacy Protection Act.”’

October 2011

·

1,469 Reads

·

114 Citations

First Monday

Facebook, like many communication services and social media sites, uses its Terms of Service (ToS) to forbid children under the age of 13 from creating an account. Such prohibitions are not uncommon in response to the Children’s Online Privacy Protection Act (COPPA), which seeks to empower parents by requiring commercial Web site operators to obtain parental consent before collecting data from children under 13. Given economic costs, social concerns, and technical issues, most general–purpose sites opt to restrict underage access through their ToS. Yet in spite of such restrictions, research suggests that millions of underage users circumvent this rule and sign up for accounts on Facebook. Given strong evidence of parental concern about children’s online activity, this raises questions of whether or not parents understand ToS restrictions for children, how they view children’s practices of circumventing age restrictions, and how they feel about children’s access being regulated. In this paper, we provide survey data that show that many parents know that their underage children are on Facebook in violation of the site’s restrictions and that they are often complicit in helping their children join the site. Our data suggest that, by creating a context in which companies choose to restrict access to children, COPPA inadvertently undermines parents’ ability to make choices and protect their children’s data. Our data have significant implications for policy–makers, particularly in light of ongoing discussions surrounding COPPA and other age–based privacy laws.


Citations (37)


... SM is a collection of online platforms allowing users to communicate with others through user-generated content (UGC), such as Facebook (Aichner & Jacob, 2015), whereas legacy media is traditional or old media, such as newspapers (Langer & Gruber, 2021). Given SM's rising popularity and sociopolitical impact, political regimes worldwide, regardless of their regime types-from autocracies to democracies-seek to control them (Gehlbach & Sonin, 2014;Shahbaz & Funk, 2021;Zittrain & Palfrey, 2008). The extent of restrictions varies across platforms, underscoring the need for scholarly examination of social media censorship (SMC) and its links to both regime types and SM platforms. ...

Reference:

Do the Reasons for Social Media Censorship Vary Across Political Regimes and Social Media Platforms?
Internet Filtering: The Politics and Mechanisms of Control
  • Citing Chapter
  • January 2008

... Horizontal and vertical coordination seems necessary for aligning policymaking and implementation (70). Another study explored many shortcomings in the global response to the COVID-19 pandemic including the failure to coordinate efforts across geographic regions, within and between countries, ranks near the top of the list of poor performance (71). ...

Planning for the Next Pandemic: A Global, Interoperable System of Contact Tracing
  • Citing Article
  • January 2021

Georgetown Journal of International Affairs

... Engaging learners in their own learning through social media In a post-digital world, where the impacts and influences of technology are increasingly normalised, the concept of learning through experience has been transformed (Greenhow, Sonnevend, & Agur, 2016;Kaplan & Haenlein, 2016). Social media, collaboration, knowledge acquisition have changed work, play and life, and those changes are not simply potential or cutting edge, they are impacting on the critical processes of higher education from design through to delivery and assessment. ...

Education and Social Media: Toward a Digital Future
  • Citing Article
  • May 2016

... This is possibly the most familiar type of sovereignty, associated with concepts of censorship, protection from external threats, and symbolised by common images of "walled gardens" and "firewalls". The evolution of this type of sovereignty, going from ensuring citizens within a specific territory could not access external content perceived by rulers as destabilising, to strengthening and legitimising practices of censorship of users operating within a country's borders have been well documented in the Access trilogy published by Ronald Deibert, John Palfrey, Rafal Rohozinski and Jonathan Zittrain (2008;2010;2011). The technical means required to ensure this type of sovereignty are now in reach to even the most resource strapped governments, and it could be considered a battle of the past if it was not for the complexities later introduced by social networking platforms. ...

Access Contested: Security, Identity, and Resistance in Asian Cyberspace

... This is possibly the most familiar type of sovereignty, associated with concepts of censorship, protection from external threats, and symbolised by common images of "walled gardens" and "firewalls". The evolution of this type of sovereignty, going from ensuring citizens within a specific territory could not access external content perceived by rulers as destabilising, to strengthening and legitimising practices of censorship of users operating within a country's borders have been well documented in the Access trilogy published by Ronald Deibert, John Palfrey, Rafal Rohozinski and Jonathan Zittrain (2008;2010;2011). The technical means required to ensure this type of sovereignty are now in reach to even the most resource strapped governments, and it could be considered a battle of the past if it was not for the complexities later introduced by social networking platforms. ...

Access Denied The Practice and Policy of Global Internet Filtering

... For political elites accustomed to manipulating electoral messages to secure votes, social media platforms challenge their position of privilegealthough those very same elites can also exploit them (Olojo & Allen, 2021). Thus, social media has become a powerful tool in revolutionizing African politics as Etling (2009) submits that social media might be the only means left for citizens in authoritarian regimes to influence government, fight corruption, or defend their rights. Now, social media is the new forum that brings people to exchange ideas and mobilizedecentralized democracy. ...

Mapping the Arabic Blogosphere: Politics, Culture, and Dissent

... Pada awal lahirnya, mayantara menjanjikan ruang partisipatoris bebas, demokrasi yang sejati. Belakangan, janji ini semakin jauh dari kenyataan ketika partisipasi aktoraktor dalam ruang sosial digital justru menguatkan oligarki dan negara malah semakin bias (Deibert et al., 2012). ...

Access contested: Toward the fourth phase of cyberspace controls
  • Citing Chapter
  • January 2011

... For instance, the technical mechanism of the super topic landing page may be informative for other forms of state-organized platformized propaganda Liang et al., 2021) and platform-facilitated cybernationalism and populism (Liu, 2019;Plantin and de Seta, 2019) in China. Beyond the Chinese context, previous studies have found that non-democratic governments in Asia and the Middle East tended to use social media platforms to demonize protest movements and dissidents but induce government supporters to voice their support for the existing regime (Deibert et al., 2011;Tufekci, 2014). Although the relationship between governments and platform companies, as well as the nuanced dynamics between governments and their supporters, might differ because of contextual differences, the platform-based discursive production identified in this study could serve as a benchmark for capturing and examining similar practices of diffusion-proofing in other non-democratic contexts. ...

Access contested: Security, identity, and resistance in Asian cyberspace
  • Citing Book
  • January 2011

... Някои автори (М. Prensky, U. Gasser, J. Palfrey) определят многозначността като глобално условие за повишаване на производителността през новото хилядолетие (Prensky 2012;Gasser, Palfrey). L. Rosen подчертава, че за поколението iGeneration, дигиталните технологии не са "инструменти", а част от околната среда. ...

Mastering Multitasking
  • Citing Article
  • March 2009

Educational leadership: journal of the Department of Supervision and Curriculum Development, N.E.A

... Finally, the third example shows that the adoption and use of technology competes for scarce resources with other types of subjects or objects required for law schools' adequate operation such as books for the library, scholarships for students with limited economic resources, more full-time professors, and improvements in the institutions' infrastructure. 92 Choosing technology over other possible areas of investment involves a political decision that ranks the different needs or aspirations these academic units have. In this case, technology is not a neutral means in that it requires the investment of scarce resources that could go elsewhere. ...

Smarter Law School Casebooks
  • Citing Article
  • April 2012