Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Law

Cambridge Analytica's Black Box, Margaret Hu Aug 2020

Cambridge Analytica's Black Box, Margaret Hu

Faculty Publications

The Cambridge Analytica–Facebook scandal led to widespread concern over the methods deployed by Cambridge Analytica to target voters through psychographic profiling algorithms, built upon Facebook user data. The scandal ultimately led to a record-breaking $5 billion penalty imposed upon Facebook by the Federal Trade Commission (FTC) in July 2019. The FTC action, however, has been criticized as failing to adequately address the privacy and other harms emanating from Facebook’s release of approximately 87 million Facebook users’ data, which was exploited without user authorization. This Essay summarizes the FTC’s response to the Cambridge Analytica–Facebook scandal. It concludes that the scandal focuses …


Candidate Privacy, Rebecca Green Mar 2020

Candidate Privacy, Rebecca Green

Faculty Publications

In the United States, we have long accepted that candidates for public office who have voluntarily stepped into the public eye sacrifice claims to privacy. This refrain is rooted deep within the American enterprise, emanating from the Framers' concept of the informed citizen as a bedrock of democracy. Voters must have full information about candidates to make their choices at the ballot box. Even as privacy rights for ordinary citizens have expanded, privacy theorists and courts continue to exempt candidates from privacy protections. This Article suggests that two disruptions warrant revisiting the privacy interests of candidates. The first is a …


Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam Jan 2020

Internet Of Things For Sustainability: Perspectives In Privacy, Cybersecurity, And Future Trends, Abdul Salam

Faculty Publications

In the sustainability IoT, the cybersecurity risks to things, sensors, and monitoring systems are distinct from the conventional networking systems in many aspects. The interaction of sustainability IoT with the physical world phenomena (e.g., weather, climate, water, and oceans) is mostly not found in the modern information technology systems. Accordingly, actuation, the ability of these devices to make changes in real world based on sensing and monitoring, requires special consideration in terms of privacy and security. Moreover, the energy efficiency, safety, power, performance requirements of these device distinguish them from conventional computers systems. In this chapter, the cybersecurity approaches towards …