Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2012

Privacy

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 21 of 21

Full-Text Articles in Social and Behavioral Sciences

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman Dec 2012

After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman

Simon Chesterman

This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino Oct 2012

Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino

FIMS Presentations

No abstract provided.


Legal And Managerial Issues In Airport Scanning, Joan Hubbard Oct 2012

Legal And Managerial Issues In Airport Scanning, Joan Hubbard

Administrative Issues Journal

After the September 11 terrorist attacks on the U.S., the National Commission on Terrorist Attacks Upon the United States recommended that The TSA and the Congress give priority attention to improving the ability of screening checkpoints to detect explosives on passengers. As the legality of the TSA’s full-body scanner program continues to be debated, the federal government is investigating the next generation of airport screening technology. The privacy debate centers on the Department of Homeland Security’s use of full-body scanners to screen passengers at the nation’s major airports.


Privacy Preserving Boosting In The Cloud With Secure Half-Space Queries, Shumin Guo, Keke Chen Oct 2012

Privacy Preserving Boosting In The Cloud With Secure Half-Space Queries, Shumin Guo, Keke Chen

Kno.e.sis Publications

This paper presents a preliminary study on the PerturBoost approach that aims to provide efficient and secure classifier learning in the cloud with both data and model privacy preserved.


Walled Gardens: Privacy Within Public Leisure Space Online And Offline, Payal Arora Oct 2012

Walled Gardens: Privacy Within Public Leisure Space Online And Offline, Payal Arora

Payal Arora

Social network sites are the new urban parks where people congregate, socialize and exercise leisure. Its web architectures however are being walled in, dictated by market systems and State ideologies. These cyber-enclosures are justified along the lines of privacy that garners protection, efficiency and functionality. There is significant concern for the potential irrevocable loss of the ‘public’ and ‘open’ character intended of internet infrastructures, fearing the fostering of social segregation, homogenization and corporatization of leisure and a loss of civic sense. This paper addresses these concerns by looking at contemporary material architectures that are shaping public social and leisure space, …


Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine Sep 2012

Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine

Articles by Maurer Faculty

Attendees at the ALL-SIS Breakfast and Business Meeting at the AALL Annual Meeting had the pleasure of hearing from Daniel Schuman of the Sunlight Foundation speak on “Law Libraries, Government Transparency, and the Internet.” The Sunlight Foundation is a nonpartisan, nonprofit organization whose mission is to increase access to federal government information resources through advocacy and the development of information technology tools.


When Antitrust Met Facebook, Christopher S. Yoo Jul 2012

When Antitrust Met Facebook, Christopher S. Yoo

All Faculty Scholarship

Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …


Social Networking Among Irish 9-16 Year Olds, Brian O'Neill, Thuy Dinh Jun 2012

Social Networking Among Irish 9-16 Year Olds, Brian O'Neill, Thuy Dinh

Reports

Social networking is a hugely popular and fast-growing online activity for young people in Ireland. In the EU Kids Online survey, while SNS use was not the most frequently mentioned online activity (‘watching video clips’ and ‘playing computer games’ were the most often cited items), it features across all age groups, and particularly so for teenagers.


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele Apr 2012

Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele

Library Staff Publications

No abstract provided.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke Jan 2012

Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke

Associate Professor Katina Michael

Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …


Public Perception Of The Data Environment And Information Transactions - A Selected-Survey Analysis Of The European Public's Views On The Data Environment And Data Transactions, Dara Hallinan, Michael Friedewald Jan 2012

Public Perception Of The Data Environment And Information Transactions - A Selected-Survey Analysis Of The European Public's Views On The Data Environment And Data Transactions, Dara Hallinan, Michael Friedewald

Michael Friedewald

When engaging in data transactions, it has consistently been observed that individuals' behaviour does not correspond with individuals' theoretically stated preferences about privacy and the importance of personal data. This paper considers this 'paradox'. First, through an analysis of selected surveys, we elaborate a picture of how the public perceives the data environment and their interaction with it. We find that, whilst the public places significant weight on the values of privacy and data protection and has a formal understanding of the features of the data environment, there is a significant knowledge deficit relating to the specifics of data flows …


Into The World Of Privatized Publicity: Online Privacy On Social Network Sites, Yongjun Shin Jan 2012

Into The World Of Privatized Publicity: Online Privacy On Social Network Sites, Yongjun Shin

Communication Studies Faculty Publications

Social network sites enable and drive users to express themselves, attract attention, and gain recognition from other people by disclosing private and sensational information about themselves to their networks as well as to the public. As a result, social network sites have affected the perception and concept of privacy. In this vein, this paper aims to discuss how to address the social transformation regarding privacy on SNS space through a systematic literature study. To this end, it reviews the current research on online privacy, particularly focusing on the logic of the users’ disclosure of personal information and changing notion of …


Robust Distributed Privacy-Preserving Secure Aggregation In Vehicular Communication, Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo Jan 2012

Robust Distributed Privacy-Preserving Secure Aggregation In Vehicular Communication, Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

Vehicular ad hoc networks (VANETs), formed by computers embedded in vehicles and the traffic infrastructure, are expected to develop in the near future to improve traffic safety and efficiency. To this end, VANETs should be designed to be resistant against various abuses and attacks. In this paper, we first review the existing proposals to provide security, privacy, and data aggregation in vehicle-to-vehicle communication. We then address the fundamental issue of achieving these conflicting properties in a unified solution, having observed that separate efforts cannot fulfill the VANET design objectives. A set of new mechanisms are suggested for efficiently managing identities …


An Examination Of Privacy Rules For Academic Advisors And College Student-Athletes: A Communication Privacy Management Perspective, Jason Thompson, Sandra Petronio, Dawn O. Braithwaite Jan 2012

An Examination Of Privacy Rules For Academic Advisors And College Student-Athletes: A Communication Privacy Management Perspective, Jason Thompson, Sandra Petronio, Dawn O. Braithwaite

Department of Communication Studies: Faculty Publications

This study explored how academic advisors managed revealed private information from college student-athletes. The 37 academic advisors were interviewed to address: What criteria advisors use to judge privacy rules regulating access or protection of shared private information from student-athletes, and how privacy-rule choices function in this context? Academic advisors interviewed represented 21 different institutions of the four NCAA division levels and 10 separate athletic conferences. Using Communication Privacy Management theory as a framework, findings indicated there were two main criteria: motivations and risk-benefit ratios used to develop privacy rules managing revealing and concealing the student-athlete’s private information.


News’ Australian Story Of Ethics And Self-Regulation: A Cautionary Tale, Rhonda Breit, Matthew Ricketson Jan 2012

News’ Australian Story Of Ethics And Self-Regulation: A Cautionary Tale, Rhonda Breit, Matthew Ricketson

Graduate School of Media and Communications

I know the newsrooms, I know how cultures develop, and I’m hugely confident that there is no improper or unethical behaviour in our newsrooms.

(ABC 2011, 14 July)
This is how News Limited Chairman and Chief Executive John Hartigan publicly defended the ethical culture of News’ Australian operations in the week following News of the World’s (NoW’s) closure. Speaking during an interview on ABC’s 7.30 Report, Hartigan continued in his defence of Rupert Murdoch’s Australian stable, following shock revelations that NoW had hacked into the phone messages of murdered teenager Milly Dowler:

We’re a company of values, like most companies, …


The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas Jan 2012

The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas

Journal Articles

The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …