It's been a real privilege—and a genuine joy—to be trusted with early drafts of work across law, technology, and policy. Getting to read and contribute at that stage is a small but meaningful part of how scholarship takes shape. I'm grateful to have had the chance to support projects I admire, and to learn from them in the process.
2026
AI-Assisted Moot Courts: Simulating Justice-Specific Questioning in Oral Arguments
Kylie Zhang, Nimra Nadeem, Lucia Zheng, Dominik Stammbach, and Peter Henderson.
CS & Law 2026.Benchmarking Legal RAG: The Promise and Limits of AI Statutory Surveys
Mohamed Afane, Emaan Hariri, Derek Ouyang, and Daniel E. Ho.
CS & Law 2026.Screenshots in Human Communication Research: Protecting Privacy in Light of Law, Ethics and User Expectations
Alexis Shore Ingber.
New Media & Society (published online January 23, 2026).
Kylie Zhang, Nimra Nadeem, Lucia Zheng, Dominik Stammbach, and Peter Henderson.
CS & Law 2026.Benchmarking Legal RAG: The Promise and Limits of AI Statutory Surveys
Mohamed Afane, Emaan Hariri, Derek Ouyang, and Daniel E. Ho.
CS & Law 2026.Screenshots in Human Communication Research: Protecting Privacy in Light of Law, Ethics and User Expectations
Alexis Shore Ingber.
New Media & Society (published online January 23, 2026).
2025
Beyond Big Tech: Advocacy Technologists within Mission-Driven Civil Society Organizations
Lauren Marietta Chambers.
Proceedings of the ACM on Human-Computer Interaction 9(7), October 2025.Dynamic Risk Assessments for Offensive Cybersecurity Agents
Boyi Wei, Benedikt Stroebl, Jiacen Xu, Joie Zhang, Zhou Li, and Peter Henderson.
arXiv preprint, 2025.Basic Research, Lethal Effects: Military AI Research Funding as Enlistment
David Gray Widder, Sireesh Gururaja, and Lucy Suchman.
arXiv preprint, 2025.Product Liability as a Model for UK AI Security
Gaurav Yadav.
Pivotal Research, 2025.Public Utility for What?: Governing AI Datastructures
Julie E. Cohen.
Yale Journal of Law and Technology 27 (2025).The Role of Compute Thresholds for AI Governance
Matteo Pistillo et al.
George Washington Journal of Law & Technology 1(1): 26–68, 2025.AI "Born Secret"? The Atomic Energy Act, AI, and Federalism
Kylie Zhang and Peter Henderson.
Trials & Errors.
Lauren Marietta Chambers.
Proceedings of the ACM on Human-Computer Interaction 9(7), October 2025.Dynamic Risk Assessments for Offensive Cybersecurity Agents
Boyi Wei, Benedikt Stroebl, Jiacen Xu, Joie Zhang, Zhou Li, and Peter Henderson.
arXiv preprint, 2025.Basic Research, Lethal Effects: Military AI Research Funding as Enlistment
David Gray Widder, Sireesh Gururaja, and Lucy Suchman.
arXiv preprint, 2025.Product Liability as a Model for UK AI Security
Gaurav Yadav.
Pivotal Research, 2025.Public Utility for What?: Governing AI Datastructures
Julie E. Cohen.
Yale Journal of Law and Technology 27 (2025).The Role of Compute Thresholds for AI Governance
Matteo Pistillo et al.
George Washington Journal of Law & Technology 1(1): 26–68, 2025.AI "Born Secret"? The Atomic Energy Act, AI, and Federalism
Kylie Zhang and Peter Henderson.
Trials & Errors.
2024
2023
Toward Better Automated Content Moderation in Low-Resource Languages
Gabriel Nicholas and Aliya Bhatia.
Journal of Online Trust and Safety, 2023.Shooting the Messenger: Remediation of Disclosed Vulnerabilities as CFAA "Loss"
Riana Pfefferkorn.
Richmond Journal of Law & Technology, 2023.Tips for Running a Mastodon Instance
Alex Stamos and Sara Shah.
Stanford Internet Observatory, October 17, 2023.
Gabriel Nicholas and Aliya Bhatia.
Journal of Online Trust and Safety, 2023.Shooting the Messenger: Remediation of Disclosed Vulnerabilities as CFAA "Loss"
Riana Pfefferkorn.
Richmond Journal of Law & Technology, 2023.Tips for Running a Mastodon Instance
Alex Stamos and Sara Shah.
Stanford Internet Observatory, October 17, 2023.
2022
Defragging Feminist Cyberlaw
Amanda Levendowski.
Berkeley Technology Law Journal 38(2), 2022.A Haunted (Smart) House: Smart Home Devices as Tools of Harassment and Abuse
Dana Holmstrand.
Georgetown Law Technology Review 6, 2022.Resisting Face Surveillance with Copyright Law
Amanda Levendowski.
North Carolina Law Review 100, 2022.Uncommon yet Consequential Online Harms
Ronald E. Robertson.
Journal of Online Trust and Safety, 2022.
Amanda Levendowski.
Berkeley Technology Law Journal 38(2), 2022.
Situating Dead-and-Dying Platforms: Technological Failure, Infrastructural Precarity, and Digital Decline
Muira McCammon and Jessa Lingel.
2022.
Dana Holmstrand.
Georgetown Law Technology Review 6, 2022.Resisting Face Surveillance with Copyright Law
Amanda Levendowski.
North Carolina Law Review 100, 2022.Uncommon yet Consequential Online Harms
Ronald E. Robertson.
Journal of Online Trust and Safety, 2022.
Earlier
But Facebook's Not a Country: How to Interpret Human Rights Law for Social Media Companies
Susan Benesch.
Yale Journal on Regulation Bulletin, 2020.Tweeted, Deleted: An Exploratory Study of the U.S. Government's Digital Memory Holes
Muira McCammon.
New Media & Society 24(3): 741–759.The Yemen War Online: Propagation of Censored Content on Twitter
Helmi Noman, Robert Faris, and John Kelly.
Berkman Klein Center for Internet & Society, 2018.
Susan Benesch.
Yale Journal on Regulation Bulletin, 2020.Tweeted, Deleted: An Exploratory Study of the U.S. Government's Digital Memory Holes
Muira McCammon.
New Media & Society 24(3): 741–759.The Yemen War Online: Propagation of Censored Content on Twitter
Helmi Noman, Robert Faris, and John Kelly.
Berkman Klein Center for Internet & Society, 2018.
Surveillance, Secrecy, and Self-Censorship: New Digital Freedom Challenges in Turkey
PEN International, 2014.
Proposals for Improved Regulation of Harmful Online Content
Susan Benesch.