Skip to main content

Showing 1–3 of 3 results for author: Knodel, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.12955  [pdf

    cs.CY

    A new framework for global data regulation

    Authors: Ellie Graeden, David Rosado, Tess Stevens, Mallory Knodel, Rachele Hendricks-Sturrup, Andrew Reiskind, Ashley Bennett, John Leitner, Paul Lekas, Michelle DeMooy

    Abstract: Under the current regulatory framework for data protections, the protection of human rights writ large and the corresponding outcomes are regulated largely independently from the data and tools that both threaten those rights and are needed to protect them. This separation between tools and the outcomes they generate risks overregulation of the data and tools themselves when not linked to sensitiv… ▽ More

    Submitted 24 August, 2023; originally announced August 2023.

    Comments: 15 pages, 2 figures

  2. arXiv:2308.05829  [pdf

    cs.NI cs.CY

    Slicing the Network: Maintaining Neutrality, Protecting Privacy, and Promoting Competition

    Authors: Nick Doty, Mallory Knodel

    Abstract: The principles of net neutrality have been essential for maintaining the diversity of services built on top of the internet and for maintaining some competition between small and large providers of those online services. That diversity and competition, in turn, provide users with a broader array of choices for seeking online content and disseminating their own speech. Furthermore, in order for the… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

    Comments: 41 pages

  3. arXiv:2202.04617  [pdf

    cs.CR

    Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems

    Authors: Seny Kamara, Mallory Knodel, Emma Llansó, Greg Nojeim, Lucy Qin, Dhanaraj Thakur, Caitlin Vogus

    Abstract: In this paper, we assess existing technical proposals for content moderation in End-to-End Encryption (E2EE) services. First, we explain the various tools in the content moderation toolbox, how they are used, and the different phases of the moderation cycle, including detection of unwanted content. We then lay out a definition of encryption and E2EE, which includes privacy and security guarantees… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.