Writing this summer? Please cite Clovia Hamilton’s research!

Cite Clovia Hamilton’s research (smile)!  Professor Clovia Hamilton loves research and I am very proud of this body of research developed over the course of more than 20 years! If you are writing this summer, please cite Clovia Hamilton’s research! black male researcher writing

Lay summaries

Writing This Summer? Cite Clovia Hamilton’s Research!

If you’re writing this summer—whether it’s a journal article, conference paper, blog post, or policy brief—please consider citing the work of Professor Clovia Hamilton. With over 20 years of scholarship spanning AI ethics, data privacy, intellectual property, and diversity in STEM, her research offers a rich foundation for scholars, practitioners, and policymakers alike.

Why Clovia Hamilton’s Work Matters

Professor Hamilton’s research is grounded in real-world challenges and offers actionable insights. Her scholarship addresses some of today’s most pressing issues, including:

  • The ethical deployment of AI and robotics in law enforcement
  • Sustainable cryptocurrency practices
  • Inclusive innovation and entrepreneurship
  • University technology transfer and commercialization
  • Intellectual property rights and antitrust policy

Her work is not only academically rigorous but also deeply committed to social justice, equity, and sustainability.

Highlights from Her Research Portfolio

One standout publication is her 2024 article in the DePaul Business & Commercial Law Journal, titled “Money is Morphing.” In it, Hamilton explores how cryptocurrency could evolve into an environmentally and financially sustainable alternative to traditional banking. She reviews 201 publications from 2013 to 2022 and offers ten policy recommendations for crypto companies, including signing the Crypto Climate Accord, using renewable energy, and supporting unbanked communities.

Transitioning from fintech to public safety, Hamilton’s 2023 co-authored paper on smart policing—presented at the American Society for Engineering Management Conference—examines the ethical and cybersecurity implications of deploying robocops. The study recommends transparency, robust data analysis capabilities, and the appointment of AI ethics czars to oversee implementation.

Bridging Technology and Social Equity

Hamilton’s work also shines in the realm of diversity and inclusion. Her 2020 article in the Applied Management Journal, “Increasing Diversity among Women Entrepreneurs in High Growth High Tech Using HBCU Female Academic Entrepreneurs,” outlines how Historically Black Colleges and Universities (HBCUs) can enhance tech transfer and entrepreneurship among women faculty. She proposes model IP policies and highlights the importance of resource allocation and institutional support.

In another compelling piece, “Black Americans Past and Present Created Frugal Innovations,” Hamilton challenges dominant narratives in innovation studies by documenting how Black Americans have long practiced frugal innovation and circular economy principles—often without recognition.

A Call to Action for Scholars and Writers

Whether you’re researching AI governance, sustainable finance, or inclusive innovation, Professor Hamilton’s work offers a wealth of knowledge. Her publications span peer-reviewed journals, conference proceedings, black female researcher writingand book chapters, making them accessible across disciplines.

As you write this summer, take a moment to explore and cite her research. Doing so not only strengthens your own work but also helps amplify the voices of scholars committed to equity, sustainability, and ethical innovation.

You can find her full list of publications at cloviahamilton.com

If you are writing this summer, please cite Dr. Clovia Hamilton’s research!

Summer 2024

Voice Activate Cognitive Personal Assistants

Alexa device

This research is about voice activated cognitive personal assistants. In this article, we address the issue of consumer privacy against the backdrop of the national priority of maintaining global leadership in artificial intelligence. The ongoing research in Artificial Cognitive Assistants is discussed.

Also, there is explosive growth in the development and application of Voice Activated Personal Assistants (VAPAs) such as Alexa and Siri. This is spurred on by the needs and opportunities arising out of the COVID-19 global pandemic.

We begin by reviewing the growth of voice-activated personal assistants (VAPAs) and their legal issues in key sectors. These sectors include private homes, banks, healthcare, and education. In addition, we then summarize policy guidelines for VAPA development. We classify these guidelines into five major categories, each with specific traits.

Next, we assign a relative importance weight to each trait and category. We recommend creating a rating system based on legal, ethical, functional, and social content guidelines. We also propose forming an agency to manage this system. This agency would inform consumers about the risks of adopting specific VAPAs. Our article presents a framework to evaluate the social, ethical, and legal content of intelligent cognitive assistants (ICAs). Further, we examine the increasing use of ICAs in homes, healthcare, banking, and education. We emphasize the need for stronger consumer protection. Next, we assign weights to policy categories and recommend a rating system. We urge developers to prioritize ethical and legal standards.

Read more ….

GDPR comparative analysis to US data breaches

Introduction

gdpr

The newly implemented European Union General Data Protection Regulation (GDPR) requires mandatory breach notifications. The GDPR is a revision of a 1995 directive. To our disappointment, the US has no such federal law. Thus, this means companies must satisfy multiple US laws and that makes it more challenging to comply. This is a GDPR comparative analysis to the US data breach notifications. This study is a comparison of the GDPR with the statutes of the 50 US states. It highlights the challenges companies face. It reveals the types of decisions companies must make to be in compliance with these statutes.

Findings

Notably, this GDPR comparative analysis reveals that the requirements of various laws, statutes, or regulations vary by state, country, and audience. Companies must decide if they will base compliance on the most stringent requirements which can be financially prohibitive. Alternatively, they could meet the minimum requirements which could be managerially prohibitive. A comparison of the GDPR and the statutes related to data breach notifications reveals the types of decisions companies must make. Because the definitions of personal information and data breach vary, a company in one case would be considered to have had a breach. However, in another jurisdiction the company would not. Companies might decide on the behalf of the consumer to notify all their customers.

Further, the time required to notify the consumer or some authority agency varies. A company would likely notify the entities requiring the earliest notification and continue notifications as time permits. Since penalties vary, companies might notify according to those with the costliest penalties first. The contents of data breach notifications are not always specified or consistent. Thus, companies should develop a standard notification provisions for all required entities if the information is available.

Challenges

Briefly, comparative analysis highlights the challenges companies face in trying to comply with multiple regulations. The greatest challenge exists for small businesses. Just knowing the regulations is likely a challenge for an average small business. The GDPR may remain consistent, but the statutes of the 50 US states continue to be amended. In addition, there are the statutes of other countries. More than 100 countries have enacted data protection legislation. Several other countries are in the process of passing such laws with data protection laws (Banisar, 2011).

Further, Banisar notes that data protection laws have been enacted in countries such as Thailand, Mexico, Georgia and Malaysia. The most recent US personal information security breach statutes include new laws in Arizona, South Dakota, and Alabama (Bellamy, 2018). Thus, companies should put into place protections. They need personnel that would help prevent a data breach as per any of these governments’ definitions. Further, this needs to be in addition to a plan to comply with the existing laws. The countries that companies do business in require legal compliance.

Read more…