Benjamin W. Cramer
YOU?
Author Swipe
View article: ‘Hard’ and ‘soft’ approaches in active transport promotion: analysis and mapping of government policies
‘Hard’ and ‘soft’ approaches in active transport promotion: analysis and mapping of government policies Open
Active transport can be promoted through approaches ranging from environmental changes (e.g. bike lanes or paths) to social programs (e.g. training and education). This study reviewed how local and state governments in Victoria, Australia …
View article: Critical Shrinking: The Perils of Opaque and Undefined Critical Infrastructure Policy in American Communications
Critical Shrinking: The Perils of Opaque and Undefined Critical Infrastructure Policy in American Communications Open
This article analyzes American regulations, legislation, and executive orders that address the matter of critical infrastructure, primarily in communications. The article conducts policy-oriented research into the relevant government docum…
View article: Research Handbook on Information Policy
Research Handbook on Information Policy Open
In the very first published article in the very first issue of the Journal of Information Policy back in 2011, Sandra Braman defined information policy as "laws, regulations, and doctrinal positions—and other decision making and practices …
View article: Informed Dissent: Toward a Constitutional Right to Know
Informed Dissent: Toward a Constitutional Right to Know Open
This article argues that the American judiciary should recognize a constitutional right of access to government information, or more forcefully a “right to know”, for purposes of achieving the self-government that was envisioned by the Fou…
View article: Nearly Extinct in the Wild: The Vulnerable Transparency of the Endangered Species List
Nearly Extinct in the Wild: The Vulnerable Transparency of the Endangered Species List Open
This article reconstructs the Endangered Species Act as a government information statute. That Act makes use of an official list of vulnerable creatures that is used for agency action to save them from extinction. This article argues that …
View article: From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform
From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform Open
In the United States, Section 230 of the Communications Decency Act provides immunity from liability for Internet operators who host information submitted by their users. This article will argue that Section 230 allows firms to avoid accou…
View article: From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform
From Liability to Accountability: The Ethics of Citing Section 230 to Avoid the Obligations of Running a Social Media Platform Open
In the United States, Section 230 of the Communications Decency Act provides immunity from liability for Internet operators who host information submitted by their users. This article will argue that Section 230 allows firms to avoid accou…
View article: The Influence of Topography and Fracking on Cellular Network Availability in Unserved Areas of North Central Pennsylvania
The Influence of Topography and Fracking on Cellular Network Availability in Unserved Areas of North Central Pennsylvania Open
North Central Pennsylvania suffers from sparse cellular network coverage due to the longstanding challenges of low populations and rugged topography that are common in other remote areas. However, in recent years the natural gas (“fracking…
View article: The Influence of Topography and Fracking on Cellular Network Availability in Unserved Areas of North Central Pennsylvania
The Influence of Topography and Fracking on Cellular Network Availability in Unserved Areas of North Central Pennsylvania Open
North Central Pennsylvania suffers from sparse cellular network coverage due to the longstanding challenges of low populations and rugged topography that are common in other remote areas. However, in recent years the natural gas (“fracking…
View article: A Proposal to Adopt Data Discrimination Rather than Privacy as the Justification for Rolling Back Data Surveillance
A Proposal to Adopt Data Discrimination Rather than Privacy as the Justification for Rolling Back Data Surveillance Open
Critics of data surveillance by government and businesses have used a legal strategy based on privacy, but have thus far been unsuccessful. This article suggests that civil libertarians should consider raising the specter of unfair data di…
View article: Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked
Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked Open
Now that governments are finally investigating the use of personal data by online behemoths like Facebook, the time is nigh for evaluating how such companies have convinced billions of people to hand over their personal data voluntarily. S…
View article: A Proposal to Adopt Data Discrimination Rather than Privacy as the Justification for Rolling Back Data Surveillance
A Proposal to Adopt Data Discrimination Rather than Privacy as the Justification for Rolling Back Data Surveillance Open
Critics of data surveillance by government and businesses have used a legal strategy based on privacy, but have thus far been unsuccessful. This article suggests that civil libertarians should consider raising the specter of unfair data di…
View article: Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked
Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked Open
Now that governments are finally investigating the use of personal data by online behemoths like Facebook, the time is nigh for evaluating how such companies have convinced billions of people to hand over their personal data voluntarily. S…
View article: The Attention Merchants: The Epic Scramble to Get Inside Our Heads
The Attention Merchants: The Epic Scramble to Get Inside Our Heads Open
The influential Tim Wu of Columbia University is building a viable side career as the author of general-interest books that reinterpret media and telecommunications history to provide new perspectives on present realities. In his first mas…
View article: Crash and Learn: The Inability of Transparency Laws to Penetrate American Monetary Policy
Crash and Learn: The Inability of Transparency Laws to Penetrate American Monetary Policy Open
INTRODUCTIONWith the fiftieth anniversary of the Freedom of Information Act (FOIA) in 2016, advocates for greater transparency in the American government will contemplate whether and how that statute and others like it have shed light on t…
View article: Obfuscation: A User's Guide for Privacy and Protest
Obfuscation: A User's Guide for Privacy and Protest Open
Helen Nissenbaum, a professor at New York University (NYU), is one of our leading researchers on the changing meaning of “privacy” in the modern age of big data and constant connection. In her influential 2010 book Privacy in Context: Tech…
View article: A Call in the Woods: Fracking Industry Influence on Network Availability in Underserved Areas
A Call in the Woods: Fracking Industry Influence on Network Availability in Underserved Areas Open
North-Central Pennsylvania has long been a blank spot in cellular network coverage maps. The mountainous and heavily-forested region is unusually under-populated for the northeastern United States. Insufficient transportation infrastructur…
View article: America's Battle for Media Democracy: The Triumph of Corporate Libertarianism and the Future of Media Reform
America's Battle for Media Democracy: The Triumph of Corporate Libertarianism and the Future of Media Reform Open
My copy of this book contains a very interesting and inadvertently revealing typo. On the last page, the publisher has furnished a list of “Other Books in the Series” that includes an item by Victor Pickard titled How America Lost the Batt…