Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of Pennsylvania Carey Law School (49)
- Seattle University School of Law (27)
- Selected Works (11)
- Singapore Management University (11)
- University of New Hampshire (9)
-
- The Catholic University of America, Columbus School of Law (6)
- City University of New York (CUNY) (5)
- Boise State University (4)
- University of Nebraska - Lincoln (4)
- University of Pittsburgh School of Law (4)
- Emory University School of Law (3)
- SelectedWorks (3)
- UIC School of Law (3)
- University at Buffalo School of Law (3)
- University of Maryland Francis King Carey School of Law (3)
- William & Mary Law School (3)
- Embry-Riddle Aeronautical University (2)
- Maurer School of Law: Indiana University (2)
- Syracuse University (2)
- Technological University Dublin (2)
- University of Michigan Law School (2)
- Bowdoin College (1)
- Bridgewater State University (1)
- Butler University (1)
- California Polytechnic State University, San Luis Obispo (1)
- California State University, San Bernardino (1)
- Chicago-Kent College of Law (1)
- Cleveland State University (1)
- Dartmouth College (1)
- Duke Law (1)
- Keyword
-
- Privacy (54)
- Privacy Law (15)
- Surveillance (14)
- Data protection (9)
- Data privacy (7)
-
- Women (7)
- Artificial intelligence (6)
- Constitutional Law (6)
- Internet (6)
- Technology (6)
- Free speech (5)
- Public health (5)
- Cybersecurity (4)
- Feminism (4)
- Fourth Amendment (4)
- Law and Technology (4)
- Moral and Political Philosophy (4)
- Philosophy (4)
- Politics (4)
- Right to privacy (4)
- Security (4)
- Singapore (4)
- AI (3)
- Behavioral advertising (3)
- COVID-19 (3)
- Censorship (3)
- Civil liberties (3)
- Constitutional law (3)
- Copyright (3)
- Corporations (3)
- Publication Year
- Publication
-
- All Faculty Scholarship (50)
- Seattle Journal for Social Justice (25)
- Research Collection Yong Pung How School Of Law (10)
- Articles (6)
- Catholic University Journal of Law and Technology (6)
-
- Law Faculty Scholarship (6)
- Management Faculty Publications and Presentations (4)
- Faculty Articles (3)
- Journal of Business & Technology Law (3)
- Library Philosophy and Practice (e-journal) (3)
- UIC Law Open Access Faculty Scholarship (3)
- Chris Jay Hoofnagle (2)
- Faculty Publications (2)
- Faculty Scholarship (2)
- Journal Articles (2)
- Michael Friedewald (2)
- Publications and Research (2)
- Seattle Journal of Technology, Environmental & Innovation Law (2)
- Siyuan CHEN (2)
- The University of New Hampshire Law Review (2)
- Anil Kalhan (1)
- Articles by Maurer Faculty (1)
- Book Chapters (1)
- Buffalo Law Review (1)
- Dartmouth Undergraduate Journal of Politics, Economics and World Affairs (1)
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
- Dickinson Law Review (2017-Present) (1)
- Dissertations and Theses (1)
- Electronic Theses, Projects, and Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Publication Type
- File Type
Articles 1 - 30 of 194
Full-Text Articles in Social and Behavioral Sciences
Consumers' Perceptions Of Digital Privacy In The United States And Japan, Destiny Randle
Consumers' Perceptions Of Digital Privacy In The United States And Japan, Destiny Randle
Whittier Scholars Program
The purpose of my study is to explore the contours of contemporary consumer privacy protections derived from legislation, regulations and publicly available company policies as a way to get a better understanding of how consumer data is protected. A few examples ranging from company-based consumer protection in the United States to data breaches in Japan will be explored and examined. Finally, this paper includes a comparative survey of consumer perceptions and concerns related to personal data privacy in the U.S. and Japan. As a way to assess the degree to which digital privacy and personal data breaches have adversely influenced …
Confused About Copyright?, Sara Anne Hook
Confused About Copyright?, Sara Anne Hook
Graduate Scholarship and Professional Work
No abstract provided.
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Governing Smart Cities As Knowledge Commons - Introduction, Chapter 1 & Conclusion, Brett M. Frischmann, Michael J. Madison, Madelyn Sanfilippo
Book Chapters
Smart city technology has its value and its place; it isn’t automatically or universally harmful. Urban challenges and opportunities addressed via smart technology demand systematic study, examining general patterns and local variations as smart city practices unfold around the world. Smart cities are complex blends of community governance institutions, social dilemmas that cities face, and dynamic relationships among information and data, technology, and human lives. Some of those blends are more typical and common. Some are more nuanced in specific contexts. This volume uses the Governing Knowledge Commons (GKC) framework to sort out relevant and important distinctions. The framework grounds …
§230 And Tinfoil Hats: What Conspiracy Theories Teach Us About The Marketplace Of Ideas And Online Speech, Connor B. Flannery
§230 And Tinfoil Hats: What Conspiracy Theories Teach Us About The Marketplace Of Ideas And Online Speech, Connor B. Flannery
Catholic University Journal of Law and Technology
Famously imputed into First Amendment jurisprudence by Justice Oliver Wendell Holmes, the Marketplace of Ideas is a foundational paradigm in free speech theory. However, current trends in social discourse suggest the Marketplace has crashed. Conspiracy theories illustrate this crash as a story of unintended consequences and, paradoxically, a consequence of judicial and legislative efforts to prevent it. Acknowledging the popularity and widespread use of the internet and social media, I explore solutions to rejuvenate the Marketplace of Ideas and better align its prominence in First Amendment doctrine with the reality of the current speech landscape.
Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman
Swipe Right Into A Disciplinary Hearing: How The Use Of Dating Apps Could Earn An Attorney More Than A Bad First Date, Zachary S. Aman
Catholic University Journal of Law and Technology
The Model Rules of Professional Conduct seek to police the conduct of attorneys. Each jurisdiction adopts its own rules of professional conduct to apply to the attorneys licensed within it. Notably, the model rules prohibit any sexual relationship between the attorney and client unless that relationship precedes the attorney-client relationship. Traditionally, defining a "sexual relationship" was simple, particularly if the attorney and client engaged in sexual intercourse. The introduction of dating apps, however, has blurred the line.
This article outlines the inherent risks of attorneys using dating apps at a time when most newly-licensed attorneys make up the majority of …
Content Moderation As Surveillance, Hannah Bloch-Wehba
Content Moderation As Surveillance, Hannah Bloch-Wehba
Faculty Scholarship
Technology platforms are the new governments, and content moderation is the new law, or so goes a common refrain. As platforms increasingly turn toward new, automated mechanisms of enforcing their rules, the apparent power of the private sector seems only to grow. Yet beneath the surface lies a web of complex relationships between public and private authorities that call into question whether platforms truly possess such unilateral power. Law enforcement and police are exerting influence over platform content rules, giving governments a louder voice in supposedly “private” decisions. At the same time, law enforcement avails itself of the affordances of …
Suspect Development Systems: Databasing Marginality And Enforcing Discipline, Rashida Richardson, Amba Kak
Suspect Development Systems: Databasing Marginality And Enforcing Discipline, Rashida Richardson, Amba Kak
University of Michigan Journal of Law Reform
Algorithmic accountability law—focused on the regulation of data-driven systems like artificial intelligence (AI) or automated decision-making (ADM) tools—is the subject of lively policy debates, heated advocacy, and mainstream media attention. Concerns have moved beyond data protection and individual due process to encompass a broader range of group-level harms such as discrimination and modes of democratic participation. While a welcome and long overdue shift, the current discourse ignores systems like databases, which are viewed as technically “rudimentary” and often siloed from regulatory scrutiny and public attention. Additionally, burgeoning regulatory proposals like algorithmic impact assessments are not structured to surface important –yet …
Gauging The Acceptance Of Contact Tracing Technology: An Empirical Study Of Singapore Residents’ Concerns With Sharing Their Information And Willingness To Trust, Ee-Ing Ong, Wee Ling Loo
Gauging The Acceptance Of Contact Tracing Technology: An Empirical Study Of Singapore Residents’ Concerns With Sharing Their Information And Willingness To Trust, Ee-Ing Ong, Wee Ling Loo
Research Collection Yong Pung How School Of Law
In response to the COVID-19 pandemic, governments began implementing various forms of contact tracing technology. Singapore’s implementation of its contact tracing technology, TraceTogether, however, was met with significant concern by its population, with regard to privacy and data security. This concern did not fit with the general perception that Singaporeans have a high level of trust in its government. We explore this disconnect, using responses to our survey (conducted pre-COVID-19) in which we asked participants about their level of concern with the government and business collecting certain categories of personal data. The results show that respondents had less concern with …
Whither Privacy Protection In The Law Of Nuisance, Cheng Lim Saw, Aaron Yoong
Whither Privacy Protection In The Law Of Nuisance, Cheng Lim Saw, Aaron Yoong
Research Collection Yong Pung How School Of Law
Privacy-related concerns often feature in disputes involving the tort of private nuisance. Despite the growing importance ascribed to the protection of an individual’s privacy in the modern world, English law has tended to shy away from allowing such concerns to influence the thinking behind the more traditional areas of law (like nuisance). This article examines and questions the various notions that underpin this English approach. Using the recent decisions of Giles Duncan Fearn v The Board of Trustees of the Tate Gallery [2019] EWHC 246 (Ch) and Giles Fearn v The Board of Trustees of the Tate Gallery [2020] EWCA …
Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary
Seattle Journal of Technology, Environmental & Innovation Law
The aim of this article is to analyze and compare current events in the People's Republic of China and the United States to discuss the moral dilemmas that arise when establishing the boundary between national security interests and individual privacy rights. As we continue to intertwine our lives with technology, it has become increasingly important to establish clear privacy rights. The question then becomes: at what point should individuals sacrifice their rights for what the government considers the "greater good" of the country?
Further, this article analyzes the development of U.S. privacy law and its relationship to national security, technology, …
Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder
Privacy Frameworks For Smart Cities, Lindsey Tonsager, Jayne Ponder
Journal of Law and Mobility
This paper identifies some of the core privacy considerations raised by smart cities – government surveillance and data security in Part I. Then, Part II proposes a set of core principles for smart cities to consider in the development and deployment of smart cities to address privacy concerns. These principles include: (A) human-centric approaches to smart cities design and implementation, (B) transparency for city residents, (C) privacy by design, (D) anonymization and deidentification, (E) data minimization and purpose specification, (F) trusted data sharing, and (G) cybersecurity resilience.
“You Keep Using That Word”: Why Privacy Doesn’T Mean What Lawyers Think, Joshua A.T. Fairfield
“You Keep Using That Word”: Why Privacy Doesn’T Mean What Lawyers Think, Joshua A.T. Fairfield
Scholarly Articles
This article explores how the need to define privacy has impeded our ability to protect it in law.
The meaning of “privacy” is notoriously hard to pin down. This article contends that the problem is not with the word “privacy,” but with the act of trying to pin it down. The problem lies with the act of definition itself and is particularly acute when the words in question have deep-seated and longstanding common-language meanings, such as liberty, freedom, dignity, and certainly privacy. If one wishes to determine what words like these actually mean to people, definition is the wrong tool …
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
The Rise Of 5g Technology: How Internet Privacy And Protection Of Personal Data Is A Must In An Evolving Digital Landscape, Justin Rabine
Catholic University Journal of Law and Technology
No abstract provided.
The Negative Impact Of Service Member And Veteran Post Traumatic Stress Disorder (Ptsd) Rating Or Specter Of Ptsd On Child Custody Arrangements, Erhan Bedestani
The Negative Impact Of Service Member And Veteran Post Traumatic Stress Disorder (Ptsd) Rating Or Specter Of Ptsd On Child Custody Arrangements, Erhan Bedestani
Catholic University Journal of Law and Technology
No abstract provided.
The Application Of The Right To Be Forgotten In The Machine Learning Context: From The Perspective Of European Laws, Zeyu Zhao
Catholic University Journal of Law and Technology
The right to be forgotten has been evolving for decades along with the progress of different statutes and cases and, finally, independently enacted by the General Data Protection Regulation, making it widely applied across Europe. However, the related provisions in the regulation fail to enable machine learning systems to realistically forget the personal information which is stored and processed therein.
This failure is not only because existing European rules do not stipulate standard codes of conduct and corresponding responsibilities for the parties involved, but they also cannot accommodate themselves to the new environment of machine learning, where specific information can …
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan
Dickinson Law Review (2017-Present)
Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.
Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …
The Privacy Paradox By Proxy: Considering Predictors Of Sharenting, Niamh Ní Bhroin, Thuy Dinh, Kira Thiel, Elisabeth Staksrud, Kjartan Ólafsson
The Privacy Paradox By Proxy: Considering Predictors Of Sharenting, Niamh Ní Bhroin, Thuy Dinh, Kira Thiel, Elisabeth Staksrud, Kjartan Ólafsson
Articles
Despite being worried that children may compromise their privacy by disclosing too much personal data online, many parents paradoxically share pictures and information about their children themselves, a practice called sharenting. In this article we utilise data from the EU Kids Online survey to investigate this paradox. We examine both how individual charac‐ teristics such as demographics and digital skills, and relational factors, including parental mediation styles, concerns about children’s privacy, and communication between parents and children influence sharenting practices. Counter‐intuitively, our findings show that parents with higher levels of digital skills are more likely to engage in sharenting. Furthermore, …
The New Bailments, Danielle D'Onfro
The New Bailments, Danielle D'Onfro
Scholarship@WashULaw
The rise of cloud computing has dramatically changed how consumers and firms store their belongings. Property that owners once managed directly now exists primarily on infrastructure maintained by intermediaries. Consumers entrust their photos to Apple instead of scrapbooks; businesses put their documents on Amazon’s servers instead of in file cabinets; seemingly everything runs in the cloud. Were these belongings tangible, the relationship between owner and intermediary would be governed by the common-law doctrine of bailment. Bailments are mandatory relationships formed when one party entrusts their property to another. Within this relationship, the bailees owe the bailors a duty of care …
Ua45/1 Registrar Updates, Wku Registrar
Ua45/1 Registrar Updates, Wku Registrar
WKU Archives Records
Newsletter created by and about the WKU Registrar's Office.
Tracking The Tracing: A Global Investigation Of Privacy Issues In The Age Of Covid-19, Jessie Miller
Tracking The Tracing: A Global Investigation Of Privacy Issues In The Age Of Covid-19, Jessie Miller
Dartmouth Undergraduate Journal of Politics, Economics and World Affairs
As the COVID-19 pandemic tore through the globe, policymakers grappled with two key questions. First, to what extent could new tools to collect and analyze data on a massive scale help limit the virus’s spread and, second, how would the collection of that data impact the privacy rights of individuals? This paper examines both questions and reveals how nation-specific traditions, values, and leaders shaped the delicate balance between the right to privacy and the protection of the population from COVID-19. An exploration of the surveillance techniques developed in response to the SARS and HIV pandemics reveals the growing consensus around …
Suspicion Encoded: Women Of Color And Biometric Technology In The United States, Lilith A. Saylor
Suspicion Encoded: Women Of Color And Biometric Technology In The United States, Lilith A. Saylor
sprinkle: an undergraduate journal of feminist and queer studies
This paper explores the commodification of privacy through biometric technology in the United States. It examines the impact of this technology on poor women of color (WOC), arguing that poor WOC face intersectional discrimination based on the convergence of sex, race, and class in their identities. I highlight the unique and powerful intrusion of biometric technology into the lives of poor WOC, and argue that the connection between data and the physical body created through biometric data has formed an environment in which the state wields unrestricted control in all spheres over the privacy of poor WOC.
Geoprivacy, Convenience, And The Pursuit Of Anonymity In Digital Cities, Jerome Dobson, William A. Herbert
Geoprivacy, Convenience, And The Pursuit Of Anonymity In Digital Cities, Jerome Dobson, William A. Herbert
Publications and Research
Cities demand spatial efficiencies that can be achieved only through sharing of information. Current technologies support collection, processing, and dissemination of unprecedented quantities of personal, public, and corporate information. Inherent in this milieu is an inevitable contest among societal efficiency, corporate profits, consumer convenience, personal privacy, and even freedom. The authors examine current trends in technology, data collection, legislation, and public acceptance. They find that without broad specific regulations limiting location data collection and use—including a universal protected right for individuals to pursue anonymity—governments, commercial enterprises, employers, and individuals increasingly will exploit tracking technologies at the expense of geoprivacy.
A Review Of Data Protection Regulations And The Right To Privacy: The Case Of The Us And India, Chrisann Campbell
A Review Of Data Protection Regulations And The Right To Privacy: The Case Of The Us And India, Chrisann Campbell
Dissertations and Theses
Since 1948 and the signing of the Universal Declaration of Human Rights, the concept of privacy has grown more complex with the rise of technology and a shift to the internet. In particular, the unregulated use of technologies that can capture individuals' personal data without their knowledge or consent poses a threat to their right to privacy and other additional human rights. The protection of the collection, storing, and transfer of users' personal data against data breaches also ensures that the right to privacy is guaranteed. Through examining two countries, the U.S. and India, on the idea of privacy, personal …
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
Privacy Vs. Transparency: Handling Protected Materials In Agency Rulemaking, Christopher S. Yoo, Kellen Mccoy
All Faculty Scholarship
Agencies conducting informal rulemaking proceedings increasingly confront conflicting duties with respect to protected materials included in information submitted in public rulemaking dockets. They must reconcile the broad commitment to openness and transparency reflected in federal law with the duty to protect confidential business information (CBI) and personally identifiable information (PII) against improper disclosure.
This Article presents an analysis of how agencies can best balance these often-countervailing considerations. Part I explores the statutory duties to disclose and withhold information submitted in public rulemaking dockets placed on agencies. It also examines judicial decisions and other legal interpretations regarding the proper way to …
Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Pandemic Surveillance Discrimination, Christian Sundquist
Pandemic Surveillance Discrimination, Christian Sundquist
Articles
The COVID-19 pandemic has laid bare the abiding tension between surveillance and privacy. Public health epidemiology has long utilized a variety of surveillance methods—such as contact tracing, quarantines, and mandatory reporting laws—to control the spread of disease during past epidemics and pandemics. Officials have typically justified the resulting intrusions on privacy as necessary for the greater public good by helping to stave off larger health crisis. The nature and scope of public health surveillance in the battle against COVID-19, however, has significantly changed with the advent of new technologies. Digital surveillance tools, often embedded in wearable technology, have greatly increased …
Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash
Compliance Management Systems: Do They Make A Difference?, Cary Coglianese, Jennifer Nash
All Faculty Scholarship
Regulatory compliance is vital for promoting the public values served by regulation. Yet many businesses remain out of compliance with some of the regulations that apply to them—presenting not only possible dangers to the public but also exposing themselves to potentially significant liability risk. Compliance management systems (CMSs) may help reduce the likelihood of noncompliance. In recent years, managers have begun using CMSs in an effort to address compliance issues in a variety of domains: environment, workplace health and safety, finance, health care, and aviation, among others. CMSs establish systematic, checklist-like processes by which managers seek to improve their organizations’ …
Stealing (Identity) From The Poor, Sara S. Greene
Stealing (Identity) From The Poor, Sara S. Greene
Faculty Scholarship
The law of data breaches is new, dynamic, and evolving. The number and complexity of breaches increases each year and legal scholars, courts, and policymakers scramble to respond. In 2019, 14.4 million consumers became victims of identity theft, the most problematic consequence of data breaches for consumers. Indeed, one-third of all Americans have experienced identity theft at some point in their lives. Yet despite low-income groups comprising at least thirty percent of all identity theft victims, existing discourse and debate on the regulatory regime governing data breaches and identity theft primarily reflects the experiences and concerns of middle- and high-income …
Contracting For Algorithmic Accountability, Cary Coglianese, Erik Lampmann
Contracting For Algorithmic Accountability, Cary Coglianese, Erik Lampmann
All Faculty Scholarship
As local, state, and federal governments increase their reliance on artificial intelligence (AI) decision-making tools designed and operated by private contractors, so too do public concerns increase over the accountability and transparency of such AI tools. But current calls to respond to these concerns by banning governments from using AI will only deny society the benefits that prudent use of such technology can provide. In this Article, we argue that government agencies should pursue a more nuanced and effective approach to governing the governmental use of AI by structuring their procurement contracts for AI tools and services in ways that …