Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Communications Law (3)
- Computer Law (3)
- Law and Technology (3)
- Science and Technology (3)
- Informational norms (2)
-
- Law and Economics (2)
- Norms (2)
- Privacy (2)
- Administrative Law (1)
- Air and Space Law (1)
- Assurance Game (1)
- Aviation (1)
- Behavioral advertising (1)
- Coordination games (1)
- Courts (1)
- Drones (1)
- ENG (1)
- Economics (1)
- Electronic News Gathering (1)
- Energy and Utilities Law (1)
- Game theory (1)
- Informational privacy (1)
- Law Enforcement and Corrections (1)
- Law and Society (1)
- Markets and informational privacy (1)
- NSA (1)
- National Security Agency (1)
- Privacy in public (1)
- Snowden (1)
- Stag Hunt (1)
Articles 1 - 4 of 4
Full-Text Articles in Law
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan
All Faculty Scholarship
We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?
The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …
Drones, Henry H. Perritt Jr., Eliot O. Sprague
Drones, Henry H. Perritt Jr., Eliot O. Sprague
All Faculty Scholarship
Abstract
Drone technology is evolving rapidly. Microdrones—what the FAA calls “sUAS”—already on the market at the $1,000 level, have the capability to supplement manned helicopters in support of public safety operations, news reporting, and powerline and pipeline patrol, when manned helicopter support is infeasible, untimely, or unsafe.
Larger drones–"machodrones”–are not yet available outside battlefield and counterterrorism spaces. Approximating the size of manned helicopters, but without pilots, or with human pilots being optional, their design is still in its infancy as designers await greater clarity in the regulatory requirements that will drive airworthiness certification.
This article evaluates drone technology and design …
The Conundrum Of Cameras In The Courtroom, Nancy S. Marder
The Conundrum Of Cameras In The Courtroom, Nancy S. Marder
All Faculty Scholarship
In spite of a communications revolution that has given the public access to new media in new places, the revolution has been stopped cold at the steps to the U.S. federal courthouse. The question whether to allow television cameras in federal courtrooms has aroused strong passions on both sides, and Congress keeps threatening to settle the debate and permit cameras in federal courts. Proponents of cameras in federal courtrooms focus mainly on the need to educate the public and to make judges accountable, whereas opponents focus predominantly on the ways in which cameras can affect participants’ behavior and compromise the …
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
Behavioral Advertising: From One-Sided Chicken To Informational Norms, Richard Warner, Robert Sloan
All Faculty Scholarship
When you download the free audio recording software from Audacity, you agree that Audacity may collect your information and use it to send you advertising. Billions of such pay-with-data exchanges feed information daily to a massive advertising ecosystem that tailors web site advertising as closely as possible to individual interests. The vast majority want considerably more control over our information. We nonetheless routinely enter pay-with-data exchanges when we visit CNN.com, use Gmail, or visit any of a vast number of other websites. Why? And, what, if anything, should we do about it? We answer both questions by describing pay-with-data exchanges …