Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Privacy Law (15)
- Internet Law (12)
- Constitutional Law (8)
- Computer Law (4)
- Intellectual Property Law (3)
-
- Law and Philosophy (3)
- Science and Technology Law (3)
- Fourth Amendment (2)
- Health Law and Policy (2)
- International Law (2)
- Legal Education (2)
- Legislation (2)
- Library and Information Science (2)
- Social and Behavioral Sciences (2)
- Administrative Law (1)
- Business Organizations Law (1)
- Civil Rights and Discrimination (1)
- Communication (1)
- Communication Technology and New Media (1)
- Communications Law (1)
- Computer Sciences (1)
- Conflict of Laws (1)
- Consumer Protection Law (1)
- Contracts (1)
- European Law (1)
- First Amendment (1)
- Human Rights Law (1)
- Information Security (1)
- International Humanitarian Law (1)
- Institution
-
- Maurer School of Law: Indiana University (5)
- Boston University School of Law (4)
- Columbia Law School (3)
- University of Maryland Francis King Carey School of Law (3)
- Georgetown University Law Center (2)
-
- Schulich School of Law, Dalhousie University (2)
- University of Kentucky (2)
- Brigham Young University Law School (1)
- Notre Dame Law School (1)
- Saint Louis University School of Law (1)
- University of Colorado Law School (1)
- University of Florida Levin College of Law (1)
- University of Maine School of Law (1)
- University of Michigan Law School (1)
- University of Nebraska - Lincoln (1)
- University of New Hampshire (1)
- University of Washington School of Law (1)
- Western University (1)
- Publication Year
- Publication
-
- Faculty Scholarship (11)
- Articles by Maurer Faculty (4)
- Articles, Book Chapters, & Popular Press (2)
- Georgetown Law Faculty Publications and Other Works (2)
- Law Faculty Scholarly Articles (2)
-
- All Faculty Scholarship (1)
- Articles (1)
- Austen Parrish (2014-2022) (1)
- FIMS Presentations (1)
- Faculty Publications (1)
- Fellow, Adjunct, Lecturer, and Research Scholar Works (1)
- Journal Articles (1)
- Law Faculty Scholarship (1)
- Library Philosophy and Practice (e-journal) (1)
- Publications (1)
- UF Law Faculty Publications (1)
Articles 1 - 30 of 32
Full-Text Articles in Law
Political Advertising In Virtual Reality, Scott P. Bloomberg
Political Advertising In Virtual Reality, Scott P. Bloomberg
Faculty Publications
This Article is about how biometric data collected through VR technologies will greatly exacerbate existing problems with political ad microtargeting. Commercially available VR devices can—and in some cases, must—be integrated with sensors that track users’ eyes, faces, hands, and bodies. Political campaigns will be able to leverage this data to target ads with extraordinary precision. Indeed, targeting ads with biometric data may well be the next step in the evolution of microtargeted political messaging—a practice that has contributed to a rise in disinformation, filter-bubbles, and privacy invasions. If this sounds like science fiction, it is closer than you may think. …
Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu
Data Privacy, Human Rights, And Algorithmic Opacity, Sylvia Lu
Fellow, Adjunct, Lecturer, and Research Scholar Works
Decades ago, it was difficult to imagine a reality in which artificial intelligence (AI) could penetrate every corner of our lives to monitor our innermost selves for commercial interests. Within just a few decades, the private sector has seen a wild proliferation of AI systems, many of which are more powerful and penetrating than anticipated. In many cases, AI systems have become “the power behind the throne,” tracking user activities and making fateful decisions through predictive analysis of personal information. Despite the growing power of AI, proprietary algorithmic systems can be technically complex, legally claimed as trade secrets, and managerially …
Teaching Information Privacy Law, Joseph A. Tomain
Teaching Information Privacy Law, Joseph A. Tomain
Articles by Maurer Faculty
Teaching information privacy law is exciting and challenging because of the fast pace of technological and legal development and because "information privacy law" sprawls across a vast array of disparate areas of substantive law that do not automatically connect. This Essay provides one approach to teaching this fascinating, doctrinally diverse, and rapidly moving area of law. Through the framework of ten key course themes, this pedagogical approach seeks to help students find a common thread that connects these various areas of law into a cohesive whole. This framework provides a way to think about not only privacy law, but also …
Privacy And Pandemics, Clarisa Long
Privacy And Pandemics, Clarisa Long
Faculty Scholarship
The beginning of 2020 marked an unexpected turn for the world, the global pandemic of COVID-19 has affected every aspect of life. It has also created an unprecedented opportunity for governments to justify the expansion of their surveillance and collection of data. The foregoing essay, which was first published in Faculty Publications at Scholarship Archive of the Columbia Law School focuses on two types of data collection – governmental mass collection of nonanonymized location data and state-collected nonanonymized data on people's health and immunity status. Several countries have applied one or both practices and it is relevant to look into …
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Right To Privacy, A Complicated Concept To Review, Ali Alibeigi, Abu Bakar Munir, Md Ershadul Karim
Library Philosophy and Practice (e-journal)
The Concept and definition of the privacy has been changed during the time affecting by different factors. At the same time, the boundaries of privacy may differ from one place to another affecting by the culture, religion, etc. Nonetheless, there is not a unique general accepted definition for the privacy. Privacy has been considered from different disciplines like sociology, psychology, law and philosophy. It is a multidisciplinary domain, having an easy concept but difficult to define. However, by reviewing all different viewpoints, it can be concluded that privacy is an individual tendency, wish and natural need to be away from …
Explanation < Justification: Gdpr And The Perils Of Privacy, Talia B. Gillis, Josh Simons
Explanation < Justification: Gdpr And The Perils Of Privacy, Talia B. Gillis, Josh Simons
Faculty Scholarship
The European Union’s General Data Protection Regulation (GDPR) is the most comprehensive legislation yet enacted to govern algorithmic decision-making. Its reception has been dominated by a debate about whether it contains an individual right to an explanation of algorithmic decision-making. We argue that this debate is misguided in both the concepts it invokes and in its broader vision of accountability in modern democracies. It is justification that should guide approaches to governing algorithmic decision-making, not simply explanation. The form of justification – who is justifying what to whom – should determine the appropriate form of explanation. This suggests a sharper …
Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley
Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley
Faculty Scholarship
Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results …
Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish
Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish
Austen Parrish (2014-2022)
A recent Bureau of Labor Statistics report estimated a near 30 percent growth in coming years for information security professionals, far outpacing most other job types. While Indiana University has long recognized the importance of data security and privacy, multiple new initiatives are ensuring that the next generation of chief information security officers, systems analysts, privacy professionals and others will come from our law school.
One of the ways the law school is leading the way is through the university’s new master of science in cybersecurity risk management. That degree program combines the resources of three of IU’s top-ranked schools …
Workplace Freakonomics, Matthew T. Bodie
Workplace Freakonomics, Matthew T. Bodie
All Faculty Scholarship
Data analytics has revolutionized our economy, and employment is no exception. Sometimes called people analytics or HR analytics, the study of worker behavior and activity now includes the collection of massive amounts of data that is then crunched by algorithms looking for both expected and unexpected patterns. This work is akin to the "freakonomics" approach, which asks unusual questions and is prepared to find answers that may upset conventional wisdom. This paper explores the possibility of a "workplace freakonomics" approach to using big data in the workplace, and considers the legal and ethical ramifications for wide-ranging explorations of employee data.
Information Privacy Litigation As Bellwether For Institutional Change, Julie E. Cohen
Information Privacy Litigation As Bellwether For Institutional Change, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
Information privacy litigation is controversial and headline-grabbing. New class complaints are filed seemingly every few weeks. Legal scholars vie with one another to articulate more comprehensive theories of harm that such lawsuits might vindicate. Large information businesses and defense counsel bemoan the threats that information privacy litigation poses to corporate bottom lines and to “innovation” more generally. For all that, though, the track record of litigation achievements on the information privacy front is stunningly poor. This essay examines emerging conventions for disposing of information privacy claims, including denial of standing, enforcement of boilerplate waivers, denial of class certification, and the …
Unilateral Invasions Of Privacy, Roger Allan Ford
Unilateral Invasions Of Privacy, Roger Allan Ford
Law Faculty Scholarship
Most people seem to agree that individuals have too little privacy, and most proposals to address that problem focus on ways to give those users more information about, and more control over, how information about them is used. Yet in nearly all cases, information subjects are not the parties who make decisions about how information is collected, used, and disseminated; instead, outsiders make unilateral decisions to collect, use, and disseminate information about others. These potential privacy invaders, acting without input from information subjects, are the parties to whom proposals to protect privacy must be directed. This Article develops a theory …
Spying Inc., Danielle K. Citron
Spying Inc., Danielle K. Citron
Faculty Scholarship
The latest spying craze is the “stalking app.” Once installed on someone’s cell phone, the stalking app provides continuous access to the person’s calls, texts, snap chats, photos, calendar updates, and movements. Domestic abusers and stalkers frequently turn to stalking apps because they are undetectable even to sophisticated phone owners.
Business is booming for stalking app providers, even though their entire enterprise is arguably illegal. Federal and state wiretapping laws ban the manufacture, sale, or advertisement of devices knowing their design makes them primarily useful for the surreptitious interception of electronic communications. But those laws are rarely, if ever, enforced. …
The Zombie First Amendment, Julie E. Cohen
The Zombie First Amendment, Julie E. Cohen
Georgetown Law Faculty Publications and Other Works
Scholarly and popular critiques of contemporary free speech jurisprudence have noted an attitude of unquestioning deference to the political power of money. Rather than sheltering the ability to speak truth to power, they have lamented, the contemporary first amendment shelters power’s ability to make and propagate its own truth. This essay relates developments in recent first amendment jurisprudence to a larger struggle now underway to shape the distribution of information power in the era of informational capitalism. In particular, it argues that cases about political speech — cases that lie at the first amendment’s traditional core — tell only a …
Outing Privacy, Scott Skinner-Thompson
Outing Privacy, Scott Skinner-Thompson
Publications
The government regularly outs information concerning people's sexuality, gender identity, and HIV status. Notwithstanding the implications of such outings, the Supreme Court has yet to resolve whether the Constitution contains a right to informational privacy - a right to limit the government's ability to collect and disseminate personal information.
This Article probes informational privacy theory and jurisprudence to better understand the judiciary's reluctance to fully embrace a constitutional right to informational privacy. The Article argues that while existing scholarly theories of informational privacy encourage us to broadly imagine the right and its possibilities, often focusing on informational privacy's ability to …
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
FIMS Presentations
No abstract provided.
Consumers: The (Still) Missing Piece In A Piecemeal Approach To Privacy, Clark Asay
Consumers: The (Still) Missing Piece In A Piecemeal Approach To Privacy, Clark Asay
Faculty Scholarship
U.S. consumers have little actual control over how companies collect, use, and disclose their personal information. This paper identifies two specific instances of this lack of control under U.S. law related to third-party disclosures, what I call the Incognito and Onward Transfer Problems. It then identifies the types of privacy harms that result and examines the advantages and possible drawbacks of a model law aimed at addressing these specific problems. The model law is based on a system of consumer notice and choice, the predominant method used in the U.S. to provide consumers with control over their information. Up until …
Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale
Network Accountability For The Domestic Intelligence Apparatus, Danielle Keats Citron, Frank Pasquale
Faculty Scholarship
A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.
While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …
Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale
Network Accountability For The Domestic Intelligence Apparatus, Danielle K. Citron, Frank Pasquale
Faculty Scholarship
A new domestic intelligence network has made vast amounts of data available to federal and state agencies and law enforcement officials. The network is anchored by “fusion centers,” novel sites of intergovernmental collaboration that generate and share intelligence and information. Several fusion centers have generated controversy for engaging in extraordinary measures that place citizens on watch lists, invade citizens’ privacy, and chill free expression. In addition to eroding civil liberties, fusion center overreach has resulted in wasted resources without concomitant gains in security.
While many scholars have assumed that this network represents a trade-off between security and civil liberties, our …
Designing Surveillance Law, Patricia L. Bellia
Designing Surveillance Law, Patricia L. Bellia
Journal Articles
As communications surveillance techniques become increasingly important in government efforts to detect and thwart criminal and terrorist activities, questions of how to reconcile privacy and law enforcement interests take on paramount importance. These questions have institutional as well as substantive dimensions. That is, the issue is not simply what the limits on communications surveillance should be, but who should set them — courts through application of the Fourth Amendment or legislatures through statutes and the oversight process? The scholarly literature offers divergent positive and normative perspectives on these questions.
For most scholars, the question of who should regulate communications surveillance …
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle K. Citron
Faculty Scholarship
The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers.
To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle K. Citron, Leslie Henry
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle K. Citron, Leslie Henry
Faculty Scholarship
Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.
In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value of …
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Fulfilling Government 2.0'S Promise With Robust Privacy Protections, Danielle Keats Citron
Faculty Scholarship
The public can now “friend” the White House and scores of agencies on social networks, virtual worlds, and video-sharing sites. The Obama Administration sees this trend as crucial to enhancing governmental transparency, public participation, and collaboration. As the President has underscored, government needs to tap into the public’s expertise because it doesn’t have all of the answers. To be sure, Government 2.0 might improve civic engagement. But it also might produce privacy vulnerabilities because agencies often gain access to individuals’ social network profiles, photographs, videos, and contact lists when interacting with individuals online. Little would prevent agencies from using and …
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry
Visionary Pragmatism And The Value Of Privacy In The Twenty-First Century, Danielle Keats Citron, Leslie Meltzer Henry
Faculty Scholarship
Despite extensive scholarly, legislative, and judicial attention to privacy, our understanding of privacy and the interests it protects remains inadequate. At the crux of this problem is privacy’s protean nature: it means “so many different things to so many different people” that attempts to articulate just what it is, or why it is important, generally have failed or become unwieldy. As a result, important privacy problems remain unaddressed, often to society’s detriment.
In his newest book, Understanding Privacy, Daniel J. Solove aims to reverse this state of affairs with a pluralistic conception of privacy that recognizes the societal value …
Privacy And The New Virtualism, Jonathon Penney
Privacy And The New Virtualism, Jonathon Penney
Articles, Book Chapters, & Popular Press
First generation cyberlaw scholars were deeply influenced by the uniqueness of cyberspace, and believed its technology and scope meant it could not be controlled by any government. Few still ascribe to this utopian vision. However, there is now a growing body of second generation cyberlaw scholarship that speaks not only to the differential character of cyberspace, but also analyzes legal norms within virtual spaces while drawing connections to our experience in real space. I call this the New Virtualism. Situated within this emerging scholarship, this article offers a new approach to privacy in virtual spaces by drawing on what Orin …
Understanding The New Virtualist Paradigm, Jonathon Penney
Understanding The New Virtualist Paradigm, Jonathon Penney
Articles, Book Chapters, & Popular Press
This article discusses the central ideas within an emerging body of cyberlaw scholarship I have elsewhere called the "New Virtualism". We now know that the original "virtualists"- those first generation cyberlaw scholars who believed virtual worlds and spaces were immune to corporate and state control - were wrong; these days, such state and corporate interests are ubiquitous in cyberspace and the Internet. But is this it? Is there not anything else we can learn about cyberlaw from the virtualists and their utopian dreams? I think so. In fact, the New Virtualist paradigm of cyberlaw scholarship draws on the insights of …
Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger
Twilight Of The Idols? Eu Internet Privacy And The Post Enlightenment Paradigm, Mark F. Kightlinger
Law Faculty Scholarly Articles
This Article provides a timely examination of the European Union's approach to information privacy on the internet, an approach that some legal scholars have held up as a model for law reform in the United States. Building on the author's recent piece discussing the U.S. approach to internet privacy, this Article applies to the EU's internet privacy regime a theoretical framework constructed from the writings of philosopher and social theorist Alasdair MacIntyre on the failures of Enlightenment and post-Enlightenment thought. The EU internet privacy regime is shown to reflect and reinforce three key elements of the "post-Enlightenment paradigm," i.e., the …
The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger
The Gathering Twilight? Information Privacy On The Internet In The Post-Enlightenment Era, Mark F. Kightlinger
Law Faculty Scholarly Articles
The steady stream of news reports about violations of privacy on the Internet has spawned a growing body of literature discussing the legal protections available for personally identifiable information—i.e., information about identified or identifiable persons—collected via the Internet. This Article takes the discussion of Internet privacy protection in a new and very different direction by reexamining the U.S. Internet privacy regime from the perspective of a broader cultural/historical analysis and critique. The perspective adopted is that of Alasdair MacIntyre's account of the disarray in Enlightenment and post-Enlightenment discourse about morality and human nature and the accompanying disappearance of rational justifications …
The Impact Of Eu Unfair Contract Terms Law On U.S. Business-To-Consumer Internet Merchants, Jane K. Winn, Mark Webber
The Impact Of Eu Unfair Contract Terms Law On U.S. Business-To-Consumer Internet Merchants, Jane K. Winn, Mark Webber
Articles
This article focuses on the application of European Union unfair contract terms law to retail Internet transactions that U.S. businesses might engage in with European consumers. It compares attitudes toward consumer protection regulation in the U.S. and the EU to provide some context within which the specific provisions of unfair contract terms law can be understood.
While many lawyers and legal academics in the U.S. who study the development of online markets are aware of the profound differences in U.S. and EU information privacy laws, the magnitude of the divergence in consumer electronic contracting law is not as widely recognized. …
Terrorism, Technology, And Information Privacy: Finding The Balance, Fred H. Cate
Terrorism, Technology, And Information Privacy: Finding The Balance, Fred H. Cate
Articles by Maurer Faculty
No abstract provided.
Human Identification Theory And The Identity Theft Problem, Lynn M. Lopucki
Human Identification Theory And The Identity Theft Problem, Lynn M. Lopucki
UF Law Faculty Publications
This paper builds on the theory of human identification proposed by Professor Roger Clarke and uses the product as the basis for a proposed solution to the identity theft problem. The expanded theory holds that all human identification fits a single model. The identifior matches the characteristics of a person observed in a first observation with the characteristics of a person observed in a second observation to determine whether they are the same person. From the theory it follows that a characteristic used for identification in the credit reporting system, such as social security number, mother's maiden name and date …