Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 4 of 4
Full-Text Articles in Law
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
All Faculty Scholarship
What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.
Workplace Freakonomics, Matthew T. Bodie
Workplace Freakonomics, Matthew T. Bodie
All Faculty Scholarship
Data analytics has revolutionized our economy, and employment is no exception. Sometimes called people analytics or HR analytics, the study of worker behavior and activity now includes the collection of massive amounts of data that is then crunched by algorithms looking for both expected and unexpected patterns. This work is akin to the "freakonomics" approach, which asks unusual questions and is prepared to find answers that may upset conventional wisdom. This paper explores the possibility of a "workplace freakonomics" approach to using big data in the workplace, and considers the legal and ethical ramifications for wide-ranging explorations of employee data.
Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick
Privacy, Poverty, And Big Data: A Matrix Of Vulnerabilities For Poor Americans, Mary Madden, Michele E. Gilman, Karen Levy, Alice Marwick
All Faculty Scholarship
This Article examines the matrix of vulnerabilities that low-income people face as a result of the collection and aggregation of big data and the application of predictive analytics. On one hand, big data systems could reverse growing economic inequality by expanding access to opportunities for low-income people. On the other hand, big data could widen economic gaps by making it possible to prey on low-income people or to exclude them from opportunities due to biases entrenched in algorithmic decision-making tools. New kinds of “networked privacy” harms, in which users are simultaneously held liable for their own behavior and the actions …
The Use Of Information And Communications Technology In Criminal Procedure In The Usa, Stephen C. Thaman
The Use Of Information And Communications Technology In Criminal Procedure In The Usa, Stephen C. Thaman
All Faculty Scholarship
In this chapter, the author discusses the three types of criminal surveillance and the subsequent data mining used to synthesize and compare the results of surveillance techniques. In addition, the author examines how the aforementioned procedures should be viewed in light of United States case law involving the privacy of American citizens.