Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

2006

Privacy

Discipline
Institution
Publication
Publication Type

Articles 1 - 30 of 90

Full-Text Articles in Entire DC Network

The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael Dec 2006

The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael

Faculty of Informatics - Papers (Archive)

Location-based services (LBS) are those applications that utilize the position of an end-user, animal or thing based on a given device (handheld, wearable, interwoven into fabric or implanted), executed for a particular purpose. LBS applications range from those that are mission-critical to those that are used for convenience, from those that are mandatory to those that are voluntary, from those that are targeted at the mass market to those that cater for the needs of a niche market. Location services can be implemented using a variety of access mediums including global positioning systems and radio-frequency identification, rendering approximate or precise …


Science Fiction And Shed Dna, D. H. Kaye Dec 2006

Science Fiction And Shed Dna, D. H. Kaye

NULR Online

No abstract provided.


Cyber Crime And Biometric Authentication – The Problem Of Privacy Versus Protection Of Business Assets, Michael G. Crowley Dec 2006

Cyber Crime And Biometric Authentication – The Problem Of Privacy Versus Protection Of Business Assets, Michael G. Crowley

Australian Information Security Management Conference

Cyber crime is now a well recognised international problem that is a major issue for anyone who runs, manages, owns, uses or accesses computer systems linked to the worldwide web. Computer systems are business assets. Personal biometric information is also an asset. Studies have shown that privacy concerns represent a key hurdle to the successful introduction of biometric authentication. In addition, terrorist activity and the resultant legislation have added an additional risk factor businesses need to take into account if they propose using biometric authentication technology. This paper explores the use of biometric authentication to protect business and individual assets. …


Uncontrollable Privacy - The Right That Every Attacker Desires, Giannakis Antoniou, Stefanos Gritzalis Dec 2006

Uncontrollable Privacy - The Right That Every Attacker Desires, Giannakis Antoniou, Stefanos Gritzalis

Australian Information Security Management Conference

The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs). Among the Internet users, there are attackers who desire more than anything else to enjoy privacy during their malicious actions, and a PET is what they were looking for. Thus, although a PET should offer privacy to the internet users, proper techniques should also be employed in order to help the victims during the investigation procedure and unveil the identification of the attackers. The paper summarizes the current design …


Electronic Surveillance In Hospitals: A Review, Sue Kennedy Dec 2006

Electronic Surveillance In Hospitals: A Review, Sue Kennedy

Australian Information Security Management Conference

This paper focuses on the increasing use of electronic surveillance systems in hospitals and the apparent lack of awareness of the implications of these systems for privacy of the individual. The systems are used for identification and tracking of equipment, staff and patients. There has been little public comment or analysis of these systems with regard to privacy as their implementation has been driven by security issues. The systems that gather this information include video, smart card and more recently RFID systems. The system applications include tracking of vital equipment, labelling of blood and other samples, tracking of patients, new …


Making Research Real: Is Action Research A Suitable Methodology For Medical Information Security Investigations?, Patricia A. Williams Dec 2006

Making Research Real: Is Action Research A Suitable Methodology For Medical Information Security Investigations?, Patricia A. Williams

Australian Information Security Management Conference

In the medical field, information security is an important yet vastly underrated issue. Research into the protection of sensitive medical data is often technically focused and does not address information systems and behavioural aspects integral to effective information security implementation. Current information security policy and guidelines are strategically oriented which, whilst relevant to large organisations, are less supportive to smaller enterprises such as primary care practices. Further, the conservative nature of the medical profession has been shown to hinder investigation into information technology use and management, making effective improvement based on research problematical. It is an environment which relies greatly …


Derecho A La Intimidad Y Responsabilidad Civil. El Refuerzo De Los Derechos Fundamentales A Través De Los Remedios Civilísticos, Leysser L. Leon Dec 2006

Derecho A La Intimidad Y Responsabilidad Civil. El Refuerzo De Los Derechos Fundamentales A Través De Los Remedios Civilísticos, Leysser L. Leon

Leysser L. León

¿Puede la responsabilidad civil cumplir funciones de refuerzo de derechos de la personalidad (derechos fundamentales)? La protección resarcitoria de la intimidad es la clave para analizar el impacto de esta nueva función de una institución del derecho privado que se renueva permanentemente.


Pretextual Searches And Seizures: Alaska’S Failure To Adopt A Standard, Shardul Desai Dec 2006

Pretextual Searches And Seizures: Alaska’S Failure To Adopt A Standard, Shardul Desai

Alaska Law Review

No abstract provided.


National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael Dec 2006

National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael

Faculty of Informatics - Papers (Archive)

This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …


Residential Privacy And Free Speech: Competing Interests In Charitable Solicitation Regulation, Marcus Wilbers Nov 2006

Residential Privacy And Free Speech: Competing Interests In Charitable Solicitation Regulation, Marcus Wilbers

Missouri Law Review

Although these two quotations represent society's mixed feelings toward charity, they also represent a distinction people often make between a charity's aims and its means. Charitable organizations have the potential to spread hope, re-allocate societal resources, and advocate societal values. How they go about accomplishing these noble goals, however, is sometimes the subject of public frustration and annoyance. This creates a tension between admiring the charity's philanthropy and becoming irritated with the means used to achieve it. Undoubtedly, one of the most unwelcome guests in any household is a telemarketer. In fact, 98% of 1.78 million respondents to a recent …


Security In Pervasive Computing: Current Status And Open Issues, Munirul Haque, Sheikh Iqbal Ahamed Nov 2006

Security In Pervasive Computing: Current Status And Open Issues, Munirul Haque, Sheikh Iqbal Ahamed

Mathematics, Statistics and Computer Science Faculty Research and Publications

Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to …


Taking The Sting Out Of Reporting Requirements: Reproductive Health Clinics And The Constitutional Right To Informational Privacy, Jessica Ansley Bodger Nov 2006

Taking The Sting Out Of Reporting Requirements: Reproductive Health Clinics And The Constitutional Right To Informational Privacy, Jessica Ansley Bodger

Duke Law Journal

No abstract provided.


Hi-Tech Vs Privacy, K. Michael Oct 2006

Hi-Tech Vs Privacy, K. Michael

Associate Professor Katina Michael

No abstract provided.


Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael Oct 2006

Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael

Faculty of Informatics - Papers (Archive)

Location-based services (LBS) rely on knowledge of a user’s location to provide tailored services or information by means of a wireless device. LBS applications have wide-ranging implications for society, particularly in the context of tracking and monitoring groups of individuals such as children, invalids, and parolees. Despite a great deal of attention paid to technical and commercial aspects of LBS technologies, consideration of the legal, ethical, social and technology momentum issues involved has been wanting. This paper examines some of the more pressing issues that are expected to arise from the widespread use of LBS. The outcome of this paper …


Privacy Enhanced Superdistribution Of Layered Content With Trusted Access Control, Daniel J. T. Chong, Robert H. Deng Oct 2006

Privacy Enhanced Superdistribution Of Layered Content With Trusted Access Control, Daniel J. T. Chong, Robert H. Deng

Research Collection School Of Computing and Information Systems

Traditional superdistribution approaches do not address consumer privacy issues and also do not reliably prevent the malicious consumer from indiscriminately copying and redistributing the decryption keys or the decrypted content. The layered nature of common digital content can also be exploited to efficiently provide the consumer with choices over the quality of the content, allowing him/her to pay less for lower quality consumption and vice versa. This paper presents a system that superdistributes encrypted layered content and (1) allows the consumer to select a quality level at which to decrypt and consume the content; (2) prevents the merchant from knowing …


Conversational Standing: A New Approach To An Old Privacy Problem, Christopher M. Drake Sep 2006

Conversational Standing: A New Approach To An Old Privacy Problem, Christopher M. Drake

ExpressO

American society has long considered certain conversations private amongst the participants in those conversations. In other words, when two or more people are conversing in a variety of settings and through a variety of media, there are times when all parties to the conversation can reasonably expect freedom from improper government intrusion, whether through direct participation or secret monitoring. This shared expectation of privacy has been slow to gain judicial recognition. Courts have indicated that the Fourth Amendment to the United States Constitution only protects certain elements of the conversation, such as where and how it takes place, but that …


The Liberal Assault On The Fourth Amendment, Christopher Slobogin Aug 2006

The Liberal Assault On The Fourth Amendment, Christopher Slobogin

ExpressO

The Liberal Assault on the Fourth Amendment Christopher Slobogin As construed by the Supreme Court, the Fourth Amendment’s reasonableness requirement regulates overt, non-regulatory government searches of homes, cars, and personal effects–-and virtually nothing else. This essay is primarily about how we got to this point. It is fashionable to place much of the blame for today’s law on the Warren Court’s adoption of the malleable expectation of privacy concept as the core value protected by the Fourth Amendment. But this diagnosis fails to explain why even the more liberal justices have often gone along with many of the privacy-diminishing holdings …


In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski Aug 2006

In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski

ExpressO

The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …


Redefining The Right To Be Let Alone: Privacy Rights And The Constitutionality Of Technical Surveillance Measures In Germany And The United States, Nicole E. Jacoby Aug 2006

Redefining The Right To Be Let Alone: Privacy Rights And The Constitutionality Of Technical Surveillance Measures In Germany And The United States, Nicole E. Jacoby

ExpressO

U.S. and German courts alike long have struggled to find the proper balance between protecting the privacy rights of criminal suspects and granting law enforcement officials the adequate tools to fight crime. The highest courts in each country have produced different paradigms for determining where the public sphere ends and the private sphere begins. In a series of cases, the U.S. Supreme Court has inquired whether a criminal defendant had a reasonable expectation of privacy when the state conducted a warrantless search of the suspect’s person, premises, or belongings. Germany’s Federal Constitutional Court, in contrast, has asked whether an investigative …


The Place Of Covert Policing In Democratic Societies: An Empirical Study Of The U.S. And Germany, Jacqueline E. Ross Aug 2006

The Place Of Covert Policing In Democratic Societies: An Empirical Study Of The U.S. And Germany, Jacqueline E. Ross

ExpressO

My study of undercover policing explores the ways in which democratic legal systems change when they legalize highly contested police practices that have long been quietly tolerated and accorded minimal scrutiny. Undercover policing is a prime of example of such a practice. It has long been subject to remarkably little legislative oversight and systematic regulation in the United States and Western Europe. It exists in a twilight of legality—a necessary evil, but one inviting anxieties about its legitimacy and consonance with the rule of law. Under pressure from the European Court of Human Rights, Germany (along with other Western European …


8th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2006, Department Of Attorney General, State Of Rhode Island Aug 2006

8th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2006, Department Of Attorney General, State Of Rhode Island

School of Law Conferences, Lectures & Events

No abstract provided.


Personal Privacy Protection Within Pervasive Rfid Environments, Eeva Kaarina Hedefine Aug 2006

Personal Privacy Protection Within Pervasive Rfid Environments, Eeva Kaarina Hedefine

Electronic Theses and Dissertations

Recent advancements in location tracking technologies have increased the threat to an individual's personal privacy. Radio frequency identification (RFID) technology allows for the identification and potentially continuous tracking of an object or individual, without obtaining the individual's consent or even awareness that the tracking is taking place. Although many positive applications for RFID technology exist, for example in the commercial sector and law enforcement, the potential for abuse in the collection and use of personal information through this technology also exists. Location data linked to other types of personal information allows not only the detection of past spatial travel and …


No Direction Home: Will The Law Keep Pace With Human Tracking Technology To Protect Individual Privacy And Stop Geoslavery, William A. Herbert Jul 2006

No Direction Home: Will The Law Keep Pace With Human Tracking Technology To Protect Individual Privacy And Stop Geoslavery, William A. Herbert

Publications and Research

Increasingly, public and private employers are utilizing human tracking devices to monitor employee movement and conduct. Due to the propensity of American labor law to give greater weight toemployer property interests over most employee privacy expectations, there are currently few limitations on the use of human tracking in employment. The scope and nature of current legal principles regarding individual privacy are not sufficient to respond to the rapid development and use of human tracking technology. The academic use of the phrase “geoslavery” to describe the abusive use of such technology underscores its power. This article examines the use of such …


Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman Jul 2006

Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman

Faculty Publications

In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …


Bargaining For Privacy In The Unionized Workplace, Ann C. Hodges Jul 2006

Bargaining For Privacy In The Unionized Workplace, Ann C. Hodges

Law Faculty Publications

This article considers whether collective bargaining can enhance privacy protection for employees in the United States. Employers are increasingly engaging in practices that invade employee privacy with few existing legal protections to limit their actions. While data on the extent of bargaining about privacy is limited, it appears that unions in the U.S. have primarily used the grievance and arbitration procedure to challenge invasions of privacy that lead to discipline of the employee instead of negotiating explicit contractual privacy rights. In contrast to the U.S., labor representatives in many other countries, particularly in the European Union, have greater legal rights …


Open Secrets: The Widespread Availability Of Information About The Health And Environmental Effects Of Chemicals, James W. Conrad Jr. Jul 2006

Open Secrets: The Widespread Availability Of Information About The Health And Environmental Effects Of Chemicals, James W. Conrad Jr.

Law and Contemporary Problems

Conrad discusses the point of view of the chemical industry concerning when and how access to health effects information may be affected by financial interests. He argues that no qualitative distinction can be drawn between the financial and other incentives that might affect disclosure by for-profit entities and the incentives that might affect disclosure by other entities that may conduct, sponsor, or opine on scientific research.


Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael Jun 2006

Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael

Professor Katina Michael

No abstract provided.


Protecting Privacy With The Mpeg-21 Ipmp Framework, N. P. Sheppard, R. Safavi-Naini Jun 2006

Protecting Privacy With The Mpeg-21 Ipmp Framework, N. P. Sheppard, R. Safavi-Naini

Faculty of Informatics - Papers (Archive)

A number of authors have observed a duality between privacy protection and copyright protection, and, in particular, observed how digital rights management technology may be used as the basis of a privacy protection system. In this paper, we describe our experiences in implementing a privacy protection system based on the Intellectual Property Management and Protection ("IPMP") components of the MPEG-21 Multimedia Framework. Our approach allows individuals to express their privacy preferences in a way enabling automatic enforcement by data users' computers. This required the design of an extension to the MPEG Rights Expression Language to cater for privacy applications, and …


Reasonable Expectations Of Privacy And Novel Search Technologies: An Economic Approach, Steven Penney Jun 2006

Reasonable Expectations Of Privacy And Novel Search Technologies: An Economic Approach, Steven Penney

ExpressO

The “reasonable expectation of privacy” test, which defines the scope of constitutional protection from governmental privacy intrusions in both the United States and Canada, is notoriously indeterminate. This indeterminacy stems in large measure from the tendency of judges to think of privacy in non-instrumentalist terms. This “moral” approach to privacy is normatively questionable, and it does a poor job of identifying the circumstances in which privacy should prevail over countervailing interests, such as the deterrence of crime.

In this paper, I develop an alternative, economically-informed approach to the reasonable expectation of privacy test. In contrast to the moral approach, which …


The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael Jun 2006

The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael

Faculty of Informatics - Papers (Archive)

The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer’s or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical …