Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (67)
- Physical Sciences and Mathematics (15)
- Constitutional Law (12)
- Privacy Law (11)
- Computer Sciences (10)
-
- Criminal Law (8)
- Criminal Procedure (8)
- Internet Law (7)
- Health Law and Policy (6)
- Information Security (5)
- Science and Technology Law (5)
- Social and Behavioral Sciences (5)
- Computer Law (4)
- International Law (4)
- Labor and Employment Law (4)
- Business (3)
- Comparative and Foreign Law (3)
- Dispute Resolution and Arbitration (3)
- First Amendment (3)
- Fourth Amendment (3)
- Intellectual Property Law (3)
- Legislation (3)
- Civil Rights and Discrimination (2)
- Communications Law (2)
- Consumer Protection Law (2)
- Evidence (2)
- Law and Society (2)
- Management Information Systems (2)
- Military, War, and Peace (2)
- Public Affairs, Public Policy and Public Administration (2)
- Institution
-
- BLR (11)
- George Washington University Law School (7)
- University of Wollongong (7)
- Chicago-Kent College of Law (5)
- Edith Cowan University (5)
-
- University of Missouri School of Law (5)
- Duke Law (4)
- Selected Works (4)
- SelectedWorks (3)
- Vanderbilt University Law School (3)
- California State University, San Bernardino (2)
- Case Western Reserve University School of Law (2)
- New York Law School (2)
- Pace University (2)
- Saint Louis University School of Law (2)
- Schulich School of Law, Dalhousie University (2)
- University of New Hampshire (2)
- Boston University School of Law (1)
- Brigham Young University (1)
- Butler University (1)
- City University of New York (CUNY) (1)
- Dartmouth College (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Marquette University (1)
- Maurer School of Law: Indiana University (1)
- Northwestern Pritzker School of Law (1)
- Roger Williams University (1)
- Singapore Management University (1)
- The University of Maine (1)
- Publication
-
- ExpressO (11)
- GW Law Faculty Publications & Other Works (7)
- Chicago-Kent Law Review (5)
- Faculty Publications (5)
- Faculty of Informatics - Papers (Archive) (5)
-
- Australian Information Security Management Conference (4)
- Duke Law Journal (2)
- Elisabeth Haub School of Law Faculty Publications (2)
- NYLS Law Review (2)
- Saint Louis University Public Law Review (2)
- Vanderbilt Journal of Entertainment & Technology Law (2)
- Alaska Law Review (1)
- All Faculty Scholarship (1)
- American Indian Law Review (1)
- Articles (1)
- Articles by Maurer Faculty (1)
- Articles, Book Chapters, & Popular Press (1)
- Associate Professor Katina Michael (1)
- Benjamin Barros (1)
- Canadian Journal of Law and Technology (1)
- Dartmouth Scholarship (1)
- Dr Rebecca Wong (1)
- Electronic Theses and Dissertations (1)
- Faculty Scholarship (1)
- Faculty Works (1)
- Faculty of Social Sciences - Papers (Archive) (1)
- Fordham Journal of Corporate & Financial Law (1)
- Georgetown Law Faculty Publications and Other Works (1)
- Jia Zhang (1)
- Journal of Dispute Resolution (1)
- Publication Type
Articles 1 - 30 of 90
Full-Text Articles in Entire DC Network
The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael
The Importance Of Scenarios In Evaluating The Socio-Ethical Implications Of Location-Based Services, L. Perusco, Katina Michael
Faculty of Informatics - Papers (Archive)
Location-based services (LBS) are those applications that utilize the position of an end-user, animal or thing based on a given device (handheld, wearable, interwoven into fabric or implanted), executed for a particular purpose. LBS applications range from those that are mission-critical to those that are used for convenience, from those that are mandatory to those that are voluntary, from those that are targeted at the mass market to those that cater for the needs of a niche market. Location services can be implemented using a variety of access mediums including global positioning systems and radio-frequency identification, rendering approximate or precise …
Science Fiction And Shed Dna, D. H. Kaye
Cyber Crime And Biometric Authentication – The Problem Of Privacy Versus Protection Of Business Assets, Michael G. Crowley
Cyber Crime And Biometric Authentication – The Problem Of Privacy Versus Protection Of Business Assets, Michael G. Crowley
Australian Information Security Management Conference
Cyber crime is now a well recognised international problem that is a major issue for anyone who runs, manages, owns, uses or accesses computer systems linked to the worldwide web. Computer systems are business assets. Personal biometric information is also an asset. Studies have shown that privacy concerns represent a key hurdle to the successful introduction of biometric authentication. In addition, terrorist activity and the resultant legislation have added an additional risk factor businesses need to take into account if they propose using biometric authentication technology. This paper explores the use of biometric authentication to protect business and individual assets. …
Uncontrollable Privacy - The Right That Every Attacker Desires, Giannakis Antoniou, Stefanos Gritzalis
Uncontrollable Privacy - The Right That Every Attacker Desires, Giannakis Antoniou, Stefanos Gritzalis
Australian Information Security Management Conference
The request of the Internet users enjoying privacy during their e-activities enforces the Internet society to develop techniques which offer privacy to the Internet users, known as Privacy Enhancing Technologies (PETs). Among the Internet users, there are attackers who desire more than anything else to enjoy privacy during their malicious actions, and a PET is what they were looking for. Thus, although a PET should offer privacy to the internet users, proper techniques should also be employed in order to help the victims during the investigation procedure and unveil the identification of the attackers. The paper summarizes the current design …
Electronic Surveillance In Hospitals: A Review, Sue Kennedy
Electronic Surveillance In Hospitals: A Review, Sue Kennedy
Australian Information Security Management Conference
This paper focuses on the increasing use of electronic surveillance systems in hospitals and the apparent lack of awareness of the implications of these systems for privacy of the individual. The systems are used for identification and tracking of equipment, staff and patients. There has been little public comment or analysis of these systems with regard to privacy as their implementation has been driven by security issues. The systems that gather this information include video, smart card and more recently RFID systems. The system applications include tracking of vital equipment, labelling of blood and other samples, tracking of patients, new …
Making Research Real: Is Action Research A Suitable Methodology For Medical Information Security Investigations?, Patricia A. Williams
Making Research Real: Is Action Research A Suitable Methodology For Medical Information Security Investigations?, Patricia A. Williams
Australian Information Security Management Conference
In the medical field, information security is an important yet vastly underrated issue. Research into the protection of sensitive medical data is often technically focused and does not address information systems and behavioural aspects integral to effective information security implementation. Current information security policy and guidelines are strategically oriented which, whilst relevant to large organisations, are less supportive to smaller enterprises such as primary care practices. Further, the conservative nature of the medical profession has been shown to hinder investigation into information technology use and management, making effective improvement based on research problematical. It is an environment which relies greatly …
Derecho A La Intimidad Y Responsabilidad Civil. El Refuerzo De Los Derechos Fundamentales A Través De Los Remedios Civilísticos, Leysser L. Leon
Derecho A La Intimidad Y Responsabilidad Civil. El Refuerzo De Los Derechos Fundamentales A Través De Los Remedios Civilísticos, Leysser L. Leon
Leysser L. León
¿Puede la responsabilidad civil cumplir funciones de refuerzo de derechos de la personalidad (derechos fundamentales)? La protección resarcitoria de la intimidad es la clave para analizar el impacto de esta nueva función de una institución del derecho privado que se renueva permanentemente.
Pretextual Searches And Seizures: Alaska’S Failure To Adopt A Standard, Shardul Desai
Pretextual Searches And Seizures: Alaska’S Failure To Adopt A Standard, Shardul Desai
Alaska Law Review
No abstract provided.
National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael
National Security: The Social Implications Of The Politics Of Transparency, M G. Michael, Katina Michael
Faculty of Informatics - Papers (Archive)
This special issue of Prometheus is dedicated to the theme of the Social Implications of National Security Measures on Citizens and Business. National security measures can be defined as those technical and non-technical measures that have been initiated as a means to curb breaches in national security, irrespective of whether these might occur by nationals or aliens in or from outside the sovereign state. National security includes such government priorities as maintaining border control, safeguarding against pandemic outbreaks, preventing acts of terror, and even discovering and eliminating identification fraud. Governments worldwide are beginning to implement information and communication security techniques …
Residential Privacy And Free Speech: Competing Interests In Charitable Solicitation Regulation, Marcus Wilbers
Residential Privacy And Free Speech: Competing Interests In Charitable Solicitation Regulation, Marcus Wilbers
Missouri Law Review
Although these two quotations represent society's mixed feelings toward charity, they also represent a distinction people often make between a charity's aims and its means. Charitable organizations have the potential to spread hope, re-allocate societal resources, and advocate societal values. How they go about accomplishing these noble goals, however, is sometimes the subject of public frustration and annoyance. This creates a tension between admiring the charity's philanthropy and becoming irritated with the means used to achieve it. Undoubtedly, one of the most unwelcome guests in any household is a telemarketer. In fact, 98% of 1.78 million respondents to a recent …
Security In Pervasive Computing: Current Status And Open Issues, Munirul Haque, Sheikh Iqbal Ahamed
Security In Pervasive Computing: Current Status And Open Issues, Munirul Haque, Sheikh Iqbal Ahamed
Mathematics, Statistics and Computer Science Faculty Research and Publications
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies. The wireless nature of these devices has fostered a new era of mobility. Thousands of pervasive devices are able to arbitrarily join and leave a network, creating a nomadic environment known as a pervasive ad hoc network. However, mobile devices have vulnerabilities, and some are proving to be challenging. Security in pervasive computing is the most critical challenge. Security is needed to …
Taking The Sting Out Of Reporting Requirements: Reproductive Health Clinics And The Constitutional Right To Informational Privacy, Jessica Ansley Bodger
Taking The Sting Out Of Reporting Requirements: Reproductive Health Clinics And The Constitutional Right To Informational Privacy, Jessica Ansley Bodger
Duke Law Journal
No abstract provided.
Hi-Tech Vs Privacy, K. Michael
Hi-Tech Vs Privacy, K. Michael
Associate Professor Katina Michael
No abstract provided.
Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael
Location-Based Services And The Privacy-Security Dichotomy, Katina Michael, L. Perusco, M G. Michael
Faculty of Informatics - Papers (Archive)
Location-based services (LBS) rely on knowledge of a user’s location to provide tailored services or information by means of a wireless device. LBS applications have wide-ranging implications for society, particularly in the context of tracking and monitoring groups of individuals such as children, invalids, and parolees. Despite a great deal of attention paid to technical and commercial aspects of LBS technologies, consideration of the legal, ethical, social and technology momentum issues involved has been wanting. This paper examines some of the more pressing issues that are expected to arise from the widespread use of LBS. The outcome of this paper …
Privacy Enhanced Superdistribution Of Layered Content With Trusted Access Control, Daniel J. T. Chong, Robert H. Deng
Privacy Enhanced Superdistribution Of Layered Content With Trusted Access Control, Daniel J. T. Chong, Robert H. Deng
Research Collection School Of Computing and Information Systems
Traditional superdistribution approaches do not address consumer privacy issues and also do not reliably prevent the malicious consumer from indiscriminately copying and redistributing the decryption keys or the decrypted content. The layered nature of common digital content can also be exploited to efficiently provide the consumer with choices over the quality of the content, allowing him/her to pay less for lower quality consumption and vice versa. This paper presents a system that superdistributes encrypted layered content and (1) allows the consumer to select a quality level at which to decrypt and consume the content; (2) prevents the merchant from knowing …
Conversational Standing: A New Approach To An Old Privacy Problem, Christopher M. Drake
Conversational Standing: A New Approach To An Old Privacy Problem, Christopher M. Drake
ExpressO
American society has long considered certain conversations private amongst the participants in those conversations. In other words, when two or more people are conversing in a variety of settings and through a variety of media, there are times when all parties to the conversation can reasonably expect freedom from improper government intrusion, whether through direct participation or secret monitoring. This shared expectation of privacy has been slow to gain judicial recognition. Courts have indicated that the Fourth Amendment to the United States Constitution only protects certain elements of the conversation, such as where and how it takes place, but that …
The Liberal Assault On The Fourth Amendment, Christopher Slobogin
The Liberal Assault On The Fourth Amendment, Christopher Slobogin
ExpressO
The Liberal Assault on the Fourth Amendment Christopher Slobogin As construed by the Supreme Court, the Fourth Amendment’s reasonableness requirement regulates overt, non-regulatory government searches of homes, cars, and personal effects–-and virtually nothing else. This essay is primarily about how we got to this point. It is fashionable to place much of the blame for today’s law on the Warren Court’s adoption of the malleable expectation of privacy concept as the core value protected by the Fourth Amendment. But this diagnosis fails to explain why even the more liberal justices have often gone along with many of the privacy-diminishing holdings …
In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
In Sickness, Health, And Cyberspace: Protecting The Security Of Electronic Private Health Information, Sharona Hoffman, Andy Podgurski
ExpressO
The electronic processing of health information provides considerable benefits to patients and health care providers at the same time that it creates serious risks to the confidentiality, integrity, and availability of the data. The Internet provides a conduit for rapid and uncontrolled dispersion and trafficking of illicitly-obtained private health information, with far-reaching consequences to the unsuspecting victims. In order to address such threats to electronic private health information, the U.S. Department of Health and Human Services enacted the HIPAA Security Rule, which thus far has received little attention in the legal literature. This article presents a critique of the Security …
Redefining The Right To Be Let Alone: Privacy Rights And The Constitutionality Of Technical Surveillance Measures In Germany And The United States, Nicole E. Jacoby
Redefining The Right To Be Let Alone: Privacy Rights And The Constitutionality Of Technical Surveillance Measures In Germany And The United States, Nicole E. Jacoby
ExpressO
U.S. and German courts alike long have struggled to find the proper balance between protecting the privacy rights of criminal suspects and granting law enforcement officials the adequate tools to fight crime. The highest courts in each country have produced different paradigms for determining where the public sphere ends and the private sphere begins. In a series of cases, the U.S. Supreme Court has inquired whether a criminal defendant had a reasonable expectation of privacy when the state conducted a warrantless search of the suspect’s person, premises, or belongings. Germany’s Federal Constitutional Court, in contrast, has asked whether an investigative …
The Place Of Covert Policing In Democratic Societies: An Empirical Study Of The U.S. And Germany, Jacqueline E. Ross
The Place Of Covert Policing In Democratic Societies: An Empirical Study Of The U.S. And Germany, Jacqueline E. Ross
ExpressO
My study of undercover policing explores the ways in which democratic legal systems change when they legalize highly contested police practices that have long been quietly tolerated and accorded minimal scrutiny. Undercover policing is a prime of example of such a practice. It has long been subject to remarkably little legislative oversight and systematic regulation in the United States and Western Europe. It exists in a twilight of legality—a necessary evil, but one inviting anxieties about its legitimacy and consonance with the rule of law. Under pressure from the European Court of Human Rights, Germany (along with other Western European …
8th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2006, Department Of Attorney General, State Of Rhode Island
8th Annual Open Government Summit: Access To Public Records Act & Open Meetings Act, 2006, Department Of Attorney General, State Of Rhode Island
School of Law Conferences, Lectures & Events
No abstract provided.
Personal Privacy Protection Within Pervasive Rfid Environments, Eeva Kaarina Hedefine
Personal Privacy Protection Within Pervasive Rfid Environments, Eeva Kaarina Hedefine
Electronic Theses and Dissertations
Recent advancements in location tracking technologies have increased the threat to an individual's personal privacy. Radio frequency identification (RFID) technology allows for the identification and potentially continuous tracking of an object or individual, without obtaining the individual's consent or even awareness that the tracking is taking place. Although many positive applications for RFID technology exist, for example in the commercial sector and law enforcement, the potential for abuse in the collection and use of personal information through this technology also exists. Location data linked to other types of personal information allows not only the detection of past spatial travel and …
No Direction Home: Will The Law Keep Pace With Human Tracking Technology To Protect Individual Privacy And Stop Geoslavery, William A. Herbert
No Direction Home: Will The Law Keep Pace With Human Tracking Technology To Protect Individual Privacy And Stop Geoslavery, William A. Herbert
Publications and Research
Increasingly, public and private employers are utilizing human tracking devices to monitor employee movement and conduct. Due to the propensity of American labor law to give greater weight toemployer property interests over most employee privacy expectations, there are currently few limitations on the use of human tracking in employment. The scope and nature of current legal principles regarding individual privacy are not sufficient to respond to the rapid development and use of human tracking technology. The academic use of the phrase “geoslavery” to describe the abusive use of such technology underscores its power. This article examines the use of such …
Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman
Workplace Blogs And Workers' Privacy, Rafael Gely, Leonard Bierman
Faculty Publications
In this article we focus on a related issue. We discuss the development of blogs, and the virtual “space” where blogs and bloggers interact the “blogosphere” and their impact on the issue of workers' privacy. To some extent it would seem a bit of a contradiction to talk about privacy and blogging in the same article. Blogging, as we will discuss below, does not appear to be the most private of enterprises. There are, we argue, a number of interesting privacy issues raised by the development of blogs as an employee communication tool and by the way employers have reacted …
Bargaining For Privacy In The Unionized Workplace, Ann C. Hodges
Bargaining For Privacy In The Unionized Workplace, Ann C. Hodges
Law Faculty Publications
This article considers whether collective bargaining can enhance privacy protection for employees in the United States. Employers are increasingly engaging in practices that invade employee privacy with few existing legal protections to limit their actions. While data on the extent of bargaining about privacy is limited, it appears that unions in the U.S. have primarily used the grievance and arbitration procedure to challenge invasions of privacy that lead to discipline of the employee instead of negotiating explicit contractual privacy rights. In contrast to the U.S., labor representatives in many other countries, particularly in the European Union, have greater legal rights …
Open Secrets: The Widespread Availability Of Information About The Health And Environmental Effects Of Chemicals, James W. Conrad Jr.
Open Secrets: The Widespread Availability Of Information About The Health And Environmental Effects Of Chemicals, James W. Conrad Jr.
Law and Contemporary Problems
Conrad discusses the point of view of the chemical industry concerning when and how access to health effects information may be affected by financial interests. He argues that no qualitative distinction can be drawn between the financial and other incentives that might affect disclosure by for-profit entities and the incentives that might affect disclosure by other entities that may conduct, sponsor, or opine on scientific research.
Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael
Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael
Professor Katina Michael
No abstract provided.
Protecting Privacy With The Mpeg-21 Ipmp Framework, N. P. Sheppard, R. Safavi-Naini
Protecting Privacy With The Mpeg-21 Ipmp Framework, N. P. Sheppard, R. Safavi-Naini
Faculty of Informatics - Papers (Archive)
A number of authors have observed a duality between privacy protection and copyright protection, and, in particular, observed how digital rights management technology may be used as the basis of a privacy protection system. In this paper, we describe our experiences in implementing a privacy protection system based on the Intellectual Property Management and Protection ("IPMP") components of the MPEG-21 Multimedia Framework. Our approach allows individuals to express their privacy preferences in a way enabling automatic enforcement by data users' computers. This required the design of an extension to the MPEG Rights Expression Language to cater for privacy applications, and …
Reasonable Expectations Of Privacy And Novel Search Technologies: An Economic Approach, Steven Penney
Reasonable Expectations Of Privacy And Novel Search Technologies: An Economic Approach, Steven Penney
ExpressO
The “reasonable expectation of privacy” test, which defines the scope of constitutional protection from governmental privacy intrusions in both the United States and Canada, is notoriously indeterminate. This indeterminacy stems in large measure from the tendency of judges to think of privacy in non-instrumentalist terms. This “moral” approach to privacy is normatively questionable, and it does a poor job of identifying the circumstances in which privacy should prevail over countervailing interests, such as the deterrence of crime.
In this paper, I develop an alternative, economically-informed approach to the reasonable expectation of privacy test. In contrast to the moral approach, which …
The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael
The Emerging Ethics Of Humancentric Gps Tracking And Monitoring, Katina Michael, Andrew Mcnamee, M G. Michael
Faculty of Informatics - Papers (Archive)
The Global Positioning System (GPS) is increasingly being adopted by private and public enterprise to track and monitor humans for location-based services (LBS). Some of these applications include personal locators for children, the elderly or those suffering from Alzheimer’s or memory loss, and the monitoring of parolees for law enforcement, security or personal protection purposes. The continual miniaturization of the GPS chipset means that receivers can take the form of wristwatches, mini mobiles and bracelets, with the ability to pinpoint the longitude and latitude of a subject 24/7/365. This paper employs usability context analyses to draw out the emerging ethical …