Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Privacy

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 3331

Full-Text Articles in Entire DC Network

Digital Intelligence In Egypt’S K-12 Public Schools: Educator’ Perspectives, Mohammed Al Mousa Jun 2024

Digital Intelligence In Egypt’S K-12 Public Schools: Educator’ Perspectives, Mohammed Al Mousa

Theses and Dissertations

Technological integration has been a dominant feature of Egypt’s education recently, especially after the announcement of the Education 2.0 initiative, which aims to transform Egypt's education to digital-based and skill-based learning (UNICEF, n.d.), Ever since, public schools in Egypt started adopting technology into teaching practices through online classes, digital textbooks, e-learning platforms, and digital examinations. This educational transformation requires teachers and students to possess the knowledge, skills, attitudes, and values to become effective and responsible users of the transforming digital education system and the digital world in general, which are collectively known as Digital Intelligence (DQ). Despite the substantial role …


Privacy’S Commodification And The Limits Of Antitrust, Jeffrey L. Vagle May 2024

Privacy’S Commodification And The Limits Of Antitrust, Jeffrey L. Vagle

Arkansas Law Review

This Article argues that the buying and selling of personal data forms what Debra Satz calls a “noxious market,” and, thus, any regulation of information privacy should not accept or depend upon its commodification but should stand on its own. This Article proceeds in three parts. Part I first lays out the history and effects of data commodification, arguing that the market created by this commodification is noxious and undesirable. Part II examines the renewal of antitrust’s purpose as a regulatory tool, especially in the context of its use in the regulation of large technology firms. Finally, Part III argues …


Implementing Information Fiduciaries, Samuel E. Marticke May 2024

Implementing Information Fiduciaries, Samuel E. Marticke

Georgia State University Law Review

This Note discusses the information fiduciary model, proposed by Jack Balkin, where fiduciary duties would be imposed on data collectors and analyzes how such a model could come to pass in the United States.


Open Letters & Impersonal Forms: Diaries, Letters, And Self-Disclosure In Rilke’S Prose, Abigail Svetlik May 2024

Open Letters & Impersonal Forms: Diaries, Letters, And Self-Disclosure In Rilke’S Prose, Abigail Svetlik

English Honors Theses

This paper places Letters alongside two other works of prose by Rilke — The Notebooks of Malte Laurids Brigge (1910) and Diaries of a Young Poet (1997). The first is Rilke’s only novel, in which a young man inscribes his thoughts, feelings, and activities in a series of journal entries; the second is a series of private journals which Rilke maintained between 1898 and 1900. Notebooks’ narrator resembles Rilke in several ways, but the novel’s fictiveness impedes upon readers’ instinct to treat the story as entirely autobiographical. In his actual diaries, published at the opposite end of the same …


Machine Speech: Towards A Unified Doctrine Of Attribution And Control, Brian Sites May 2024

Machine Speech: Towards A Unified Doctrine Of Attribution And Control, Brian Sites

University of Miami Law Review

Like many courts across the country in 2023, courts in the Eleventh Circuit were met with novel claims challenging ChatGPT and other artificial intelligence tools. These cases raise common questions: How should courts treat the speech of machines? When a machine generates allegedly defamatory material, who is the speaker—mortal or machine? When a machine generates expressive creations, who is the artist, and does that shape copyright eligibility? When a machine makes assertions about reality through lab analyses and other forensic reports, who is the accuser, and how does the answer impact a defendant’s rights at trial? Should those answers stem …


Legal Uncertainty In Virtual Worlds And Digital Goods: Do The Same Laws Apply?, Alanna Sadler May 2024

Legal Uncertainty In Virtual Worlds And Digital Goods: Do The Same Laws Apply?, Alanna Sadler

University of Miami Business Law Review

The growth of virtual worlds and digital goods will force US courts to examine whether traditional laws are sufficient to protect consumers. To do so requires judges and legislative officials to possess a deep understanding of concepts that are everchanging. Many aspects of virtual worlds, such as the metaverse(s), are driven by web3 technology, the technology responsible for the NFT and cryptocurrency craze of recent years. It is impossible to ascertain the impact of virtual worlds on daily life, however, companies must nevertheless prepare for the shift toward virtual spaces and digital goods. There is greater skepticism regarding the utility …


Privacy Or Safety? The Use Of Cameras To Combat Special Ed Abuse, Sarah M. Benites May 2024

Privacy Or Safety? The Use Of Cameras To Combat Special Ed Abuse, Sarah M. Benites

University of Massachusetts Law Review

Self-contained classroom students face abuse from educators at disproportionate rates compared to general education students. To combat the abuse, several jurisdictions, including Massachusetts, have proposed or enacted bills enabling cameras to be placed in self-contained classrooms. This has sparked privacy concerns, particularly regarding whether the usage would amount to an infringement on the Fourth Amendment rights of students and educators. This note argues that surveillance is an ineffective deterrent to prevent violent and abusive behavior and should not justify bypassing potential privacy and constitutional violations. It outlines the relevant case law regarding students and teachers and apply these standards to …


The Detention Of Immigration Policy: How States Are Commandeering Dhs Enforcement Guidelines, Brianna Riguera May 2024

The Detention Of Immigration Policy: How States Are Commandeering Dhs Enforcement Guidelines, Brianna Riguera

University of Miami Inter-American Law Review

In 2021, the Department of Homeland Security issued immigration guidelines that de-emphasized detention and removal of non-citizens who, aside from being undocumented, are otherwise contributing members of communities across the United States. However, Arizona, Montana, Ohio, Texas, and Louisiana challenged these guidelines, launching a nuanced legal dispute that concerned states standing under Article III, prosecutorial discretion, and nationwide preliminary injunctions. In United States v. Texas, the Court ruled 8-1 that the states lacked standing and reversed the Fifth Circuit’s nationwide injunction, but the majority opinion failed to address the other legal issues that are pressing on a rife debate about …


Authoritarian Privacy, Mark Jia May 2024

Authoritarian Privacy, Mark Jia

Georgetown Law Faculty Publications and Other Works

Privacy laws are traditionally associated with democracy. Yet autocracies increasingly have them. Why do governments that repress their citizens also protect their privacy? This Article answers this question through a study of China. China is a leading autocracy and the architect of a massive surveillance state. But China is also a major player in data protection, having enacted and enforced a number of laws on information privacy. To explain how this came to be, the Article first turns to several top-down objectives often said to motivate China’s privacy laws: advancing its digital economy, expanding its global influence, and protecting its …


The Role Of Investigative Genetic Genealogy In The Field Of Criminal Justice, Chloe Haas Apr 2024

The Role Of Investigative Genetic Genealogy In The Field Of Criminal Justice, Chloe Haas

Honors Projects

Investigative genetic genealogy is an investigative method used by law enforcement to solve crimes. It involves the uploading of DNA found at a crime scene to genealogy databases to narrow down the suspect pool. The research question for this study is: Is law enforcement’s use of investigative genetic genealogy ethical? I conducted ten interviews with individuals who had a background in the Criminal Justice field, the legal field, the forensics field, and the field of genealogy to see their opinions on this topic. A majority of the participants in this study stated that they believe that law enforcement should be …


The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson Apr 2024

The Post-Dobbs Reality: Privacy Expectations For Period-Tracking Apps In Criminal Abortion Prosecutions, Sophie L. Nelson

Pepperdine Law Review

The Supreme Court’s decision to overturn Roe v. Wade and Planned Parenthood v. Casey in June 2022 was met with waves of both support and criticism throughout the United States. Several states immediately implemented or began drafting trigger laws that criminalize seeking and providing an abortion. These laws prompted several period-tracking app companies to encrypt their users’ data to make it more difficult for the government to access period- and pregnancy-related information for criminal investigations. This Comment explores whether the Fourth Amendment and U.S. privacy statutes protect users of period-tracking apps from government surveillance. More specifically, this Comment argues that …


Personalization And Privacy Choice, Andrew Rhodes, Jidong Zhou Apr 2024

Personalization And Privacy Choice, Andrew Rhodes, Jidong Zhou

Cowles Foundation Discussion Papers

This paper studies consumers’ privacy choices when firms can use their data to make personalized offers. We first introduce a general framework of personalization and privacy choice, and then apply it to personalized recommendations, personalized prices, and personalized product design. We argue that due to firms’ reaction in the product market, consumers who share their data often impose a negative externality on other consumers. Due to this privacy-choice externality, too many consumers share their data relative to the consumer optimum; moreover, more competition, or improvements in data security, can lower consumer surplus by encouraging more data sharing.


Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran Apr 2024

Personal Data And Vaccination Hesitancy: Covid-19’S Lessons For Public Health Federalism, Charles D. Curran

Catholic University Law Review

During the COVID-19 vaccination campaign, the federal government adopted a more centralized approach to the collection of public health data. Although the states previously had controlled the storage of vaccination information, the federal government’s Operation Warp Speed plan required the reporting of recipients’ personal information on the grounds that it was needed to monitor the safety of novel vaccines and ensure correct administration of their multi-dose regimens.

Over the course of the pandemic response, this more centralized federal approach to data collection added a new dimension to pre-existing vaccination hesitancy. Requirements that recipients furnish individual information deterred vaccination among undocumented …


Content Moderation And The Least Cost Avoider, Paul Rosenzweig Apr 2024

Content Moderation And The Least Cost Avoider, Paul Rosenzweig

Joint PIJIP/TLS Research Paper Series

No abstract provided.


Children Seen But Not Heard, Stacey B. Steinberg Apr 2024

Children Seen But Not Heard, Stacey B. Steinberg

UF Law Faculty Publications

Children are expected to abide by the will of their parents. In the last 200 years, American jurisprudence has given parents the ability to control their children’s upbringing with few exceptions. The principle governing this norm is that parents know best and will use their better knowledge to protect their children’s welfare.

The COVID-19 pandemic, public school rules, and children’s privacy laws offer modern examples of regulations in which the interests of parents and children may not align. Minors may want access to vaccines, despite a parent’s refusal to sign a consent form. Minors may want to talk to their …


Authentication Of Cybernetic Avatars And Legal System Challenges; With A View To The Trial Concept Of New Dimensional Domain Jurisprudence (Ai, Robot, And Avatar Law), Fumio Shimpo Mar 2024

Authentication Of Cybernetic Avatars And Legal System Challenges; With A View To The Trial Concept Of New Dimensional Domain Jurisprudence (Ai, Robot, And Avatar Law), Fumio Shimpo

Japanese Society and Culture

This article aims to illustrate the basis for the development of authentication, which will be the foundation of future cybernetic-avatar (CA) infrastructures, enabling the safe and secure use of CA’s. This will be realised by the authentication of CA operators (User Authentication Technology), identification and authentication of CA’s (CA Authentication), and ensuring connectivity and existence between operators (User Entities) and the CA’s themselves (CA Notarisation). An ELSI (Ethical, Legal, Social Implications) research platform will be established, to develop a new dimension of the legal field, that is, AI, Robot, and Avatar Law to solve the social issues and realise an …


Enabling Privacy And Trust In Edge Ai Systems, Akanksha Atrey Mar 2024

Enabling Privacy And Trust In Edge Ai Systems, Akanksha Atrey

Doctoral Dissertations

Recent advances in mobile computing and the Internet of Things (IoT) enable the global integration of heterogeneous smart devices via wireless networks. A common characteristic across these modern day systems is their ability to collect and communicate streaming data, making machine learning (ML) appealing for processing, reasoning, and predicting about the environment. More recently, low network latency requirements have made offloading intelligence to the cloud undesirable. These novel requirements have led to the emergence of edge computing, an approach that brings computation closer to the device with low latency, high throughput, and enhanced reliability. Together, they enable ML-powered information processing …


Insights Into Privacy Protection Research In Ai, Shasha Yu Mar 2024

Insights Into Privacy Protection Research In Ai, Shasha Yu

School of Professional Studies

This paper presents a systematic bibliometric analysis of the artificial intelligence (AI) domain to explore privacy protection research as AI technologies integrate and data privacy concerns rise. Understanding evolutionary patterns and current trends in this research is crucial. Leveraging bibliometric techniques, the authors analyze 8,322 papers from the Web of Science (WoS) database, spanning 1990 to 2023. The analysis highlights IEEE Transactions on Knowledge and Data Engineering and IEEE Access journals as highly influential, the former being an early contributor and the latter emerging as a pivotal source. The study demonstrates substantial disparities in scientific productivity across countries. Specifically, the …


Regulating Social Media Through Family Law, Katharine B. Silbaugh, Adi Caplan-Bricker Mar 2024

Regulating Social Media Through Family Law, Katharine B. Silbaugh, Adi Caplan-Bricker

Faculty Scholarship

Social media afflicts minors with depression, anxiety, sleeplessness, addiction, suicidality, and eating disorders. States are legislating at a breakneck pace to protect children. Courts strike down every attempt to intervene on First Amendment grounds. This Article clears a path through this stalemate by leveraging two underappreciated frameworks: the latent regulatory power of parental authority arising out of family law, and a hidden family law within First Amendment jurisprudence. These two projects yield novel insights. First, the recent cases offer a dangerous understanding of the First Amendment, one that should not survive the family law reasoning we provide. First Amendment jurisprudence …


Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin Mar 2024

Speaking Back To Sexual Privacy Invasions, Brenda Dvoskin

Washington Law Review

Many big players in the internet ecosystem do not like hosting sexual expression. They often justify these bans as a protection of sexual privacy. For example, Meta states that it removes sexual imagery to prevent the nonconsensual distribution of sexual images. In response, this Article argues that banning digital sexual expression is counterproductive if the aim is to alleviate the harms inflicted by sexual privacy losses.

Contemporary sexual privacy theory, however, lacks analytical tools to explain why nudity bans harm the interests they intend to protect. This Article aims at building those tools. The main contribution is an invitation to …


Distinguishing Privacy Law: A Critique Of Privacy As Social Taxonomy, María P. Angel, Ryan Calo Mar 2024

Distinguishing Privacy Law: A Critique Of Privacy As Social Taxonomy, María P. Angel, Ryan Calo

Articles

What distinguishes privacy violations from other harms? This has proven a surprisingly difficult question to answer. For over a century, privacy law scholars labored to define the elusive concept of privacy. Then they gave up. Efforts to distinguish privacy were superseded at the turn of the millennium by a new approach: a taxonomy of privacy problems grounded in social recognition. Privacy law became the field that simply studies whatever courts or scholars talk about as related to privacy.

Decades into privacy as social taxonomy, the field has expanded to encompass a broad range of information-based harms—from consumer manipulation to algorithmic …


The Impact Of Culture On Construction, Vatulele Uluakiotonga Finau Mar 2024

The Impact Of Culture On Construction, Vatulele Uluakiotonga Finau

Construction Management

The aim of this comprehensive exploration is to identify elements within Japanese, Islamic/Arabic, and Tongan cultures that can be implemented into construction practices in California, leveraging their unique values to enhance home design and construction. The study reveals that culture plays a pivotal role in shaping the design and construction of homes, reflecting deeply held values, traditions, and societal norms. Through qualitative research, expert interviews, and a detailed literature review, key elements defining each cultural approach to housing are elucidated. From the emphasis on privacy and natural ventilation in Japanese homes to the integration of modesty and hospitality in Islamic/Arabic …


Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones Feb 2024

Book Review: Tracers In The Dark: The Global Hunt For The Crime Lords Of Cryptocurrency, Marion Jones

International Journal of Cybersecurity Intelligence & Cybercrime

Doubleday released Andy Greenberg’s Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency in November 2022. Through vivid case studies of global criminal investigations, the book dispels myths about the anonymizing power of cryptocurrency. The book details how the ability to identify cryptocurrency users and payment methods successfully brought down several large criminal empires, while also highlighting the continuous cat-and-mouse game between law enforcement officials and criminal actors using cryptocurrency. The book is an excellent resource for law enforcement officials, academics, and general cybersecurity practitioners interested in cryptocurrency-related criminal activities and law enforcement techniques.


An Exegesis Of The Meaning Of Dobbs: Despotism, Servitude, & Forced Birth, Athena D. Mutua Feb 2024

An Exegesis Of The Meaning Of Dobbs: Despotism, Servitude, & Forced Birth, Athena D. Mutua

Journal Articles

The Dobbs decision has been leaked. Gathered outside of New York City's St. Patrick's Old Cathedral, pro-choice protesters chant: "Not the church, not the state, the people must decide their fate."

A white man wearing a New York Fire Department sweatshirt and standing on the front steps responds: "l am the people, l am the people, l am the people, the people have decided, the court has decided, you lose . . . . You have no choice. Not your body, not your choice, your body is mine and you're having my baby."

Despicable but not unexpected,³ this man's comments …


Regulatory Issues In Electronic Health Records For Adolescent Hiv Research: Strategies And Lessons Learned, Sara Ali Shaw Green, Sung-Jae Lee, Samantha Chahin, Meardith Pooler-Burgess, Monique Green-Jones, Sitaji Gurung, Angulique Y. Outlaw, Sylvie Naar Feb 2024

Regulatory Issues In Electronic Health Records For Adolescent Hiv Research: Strategies And Lessons Learned, Sara Ali Shaw Green, Sung-Jae Lee, Samantha Chahin, Meardith Pooler-Burgess, Monique Green-Jones, Sitaji Gurung, Angulique Y. Outlaw, Sylvie Naar

Publications and Research

Background: Electronic health records (EHRs) are a cost-effective approach to provide the necessary foundations for clinical trial research. The ability to use EHRs in real-world clinical settings allows for pragmatic approaches to intervention studies with the emerging adult HIV population within these settings; however, the regulatory components related to the use of EHR data in multisite clinical trials poses unique challenges that researchers may find themselves unprepared to address, which may result in delays in study implementation and adversely impact study timelines, and risk noncompliance with established guidance.

Objective: As part of the larger Adolescent Trials Network (ATN) for HIV/AIDS …


Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick Jan 2024

Redefining The Injury-In-Fact: Treating Personally Identifying Information As Bailed Property, Austin Headrick

Georgia Law Review

There is a long-existing circuit split among federal courts of appeals as to whether an individual has standing under Article III of the United States Constitution when their personally identifying information (PII) is stolen from an entity to which they entrusted it such as a hospital or bank. Federal courts disagree as to whether an individual whose PII has been stolen—without more—has suffered an injury-in-fact, a necessary element of standing. The disagreement between the courts centers on whether the injury-in-fact has already occurred at the time the PII is stolen or whether the injury occurs once the PII has been …


E-Ethics, 2003 June, Advocate Aurora Health Jan 2024

E-Ethics, 2003 June, Advocate Aurora Health

Historical Documents - Combined

The Park Ridge Center, Chicago, IL: Issue of "e-Ethics", a publication from The Park Ridge Center for the Study of Health, Faith and Ethics, associated with Lutheran General Hospital. This issue has a discussion of the new mandatory compliance of HIPAA on April 14, 2003.


Prevent Phishy Business: Comparing California’S And The United Kingdom’S Age-Appropriate Design Code To Protect Youth From Cybersecurity Threats, Morgan Comite Jan 2024

Prevent Phishy Business: Comparing California’S And The United Kingdom’S Age-Appropriate Design Code To Protect Youth From Cybersecurity Threats, Morgan Comite

University of Miami International and Comparative Law Review

Cybersecurity is the safeguarding of computer systems and networks against information disclosure, theft, or damage to users’ hardware, software, or electronic data, as well as disruption or misdirection of the services computers and networks provide. Knowing privacy would be breached due to the impact of COVID, in 2020, the United Kingdom got ahead of the game and passed rules/regulations requiring online services to protect children under the age of eighteen from scams, phishing, and security attacks. However, currently, the United States does not have a sufficient uniform privacy law governed to protect children under the age of eighteen from cybersecurity …


June 24, 2022, Bisma Shoaib Jan 2024

June 24, 2022, Bisma Shoaib

Seattle Journal for Social Justice

No abstract provided.


Development Of A Secure Model For Mobile Government Applications In Jordan, Ala’A Saeb Al-Sherideh, Roesnita Ismail, Mohammad Rasmi Al-Mousa, Khaled Al-Qawasmi, Alaa Al-Shaikh, Hebatullah Awwad Jan 2024

Development Of A Secure Model For Mobile Government Applications In Jordan, Ala’A Saeb Al-Sherideh, Roesnita Ismail, Mohammad Rasmi Al-Mousa, Khaled Al-Qawasmi, Alaa Al-Shaikh, Hebatullah Awwad

Journal of Statistics Applications & Probability

This paper develops a secure model for mobile government (M-G) applications using effective privacy methods and validates the model through semi-structured interviews with eight Jordanian e-government experts. The experts emphasized the importance of M-G applications in enhancing services such as bill payments, civil services, civil defense, and police services. To improve privacy, the experts suggested methods such as strong textual passwords, data encryption, login tracking, SMS login confirmation, and signup confirmation. Based on these suggestions, a prototype with suggested privacy features was developed using Android programming, and a questionnaire was administered to 150 Jordanian citizens who confirmed the ease of …