Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Communication (10)
- Engineering (9)
- Law (9)
- Business (7)
- Library and Information Science (7)
-
- Science and Technology Studies (7)
- Economics (6)
- Public Affairs, Public Policy and Public Administration (6)
- Communication Technology and New Media (5)
- Computer Law (5)
- Computer Sciences (5)
- Law and Society (5)
- Physical Sciences and Mathematics (5)
- Sociology (5)
- Internet Law (4)
- Public Policy (4)
- Social Media (4)
- Criminology (3)
- Information Literacy (3)
- Jurisprudence (3)
- Other Engineering (3)
- Privacy Law (3)
- Social Policy (3)
- Technology and Innovation (3)
- Administrative Law (2)
- Arts and Humanities (2)
- Civil Rights and Discrimination (2)
- Consumer Protection Law (2)
- Education (2)
- Institution
-
- Selected Works (9)
- University of Wollongong (4)
- Yale University (4)
- SelectedWorks (3)
- Singapore Management University (3)
-
- City University of New York (CUNY) (2)
- Georgia Southern University (2)
- Western University (2)
- Boise State University (1)
- Edith Cowan University (1)
- Florida International University (1)
- Sacred Heart University (1)
- University of Arkansas, Fayetteville (1)
- University of Denver (1)
- University of New Hampshire (1)
- University of Pennsylvania Carey Law School (1)
- University of Vermont (1)
- Publication
-
- Cowles Foundation Discussion Papers (4)
- Professor Katina Michael (3)
- Alexander Hayes Mr. (2)
- Associate Professor Katina Michael (2)
- FIMS Publications (2)
-
- Faculty of Engineering and Information Sciences - Papers: Part A (2)
- Akiva A Miller (1)
- All Faculty Scholarship (1)
- All Open Access Legacy Dissertations and Capstone Projects (1)
- Angela Goodrum (1)
- Anil Kalhan (1)
- Ariana R. Levinson (1)
- Boise State University Theses and Dissertations (1)
- Collaborative Librarianship (1)
- Georgia International Conference on Information Literacy (1)
- Graduate Theses and Dissertations (1)
- Hospitality Review (1)
- Law Faculty Scholarship (1)
- M. G. Michael (1)
- Michael Friedewald (1)
- Perspectives@SMU (1)
- Publications and Research (1)
- Research Collection Lee Kong Chian School Of Business (1)
- Research Collection School Of Computing and Information Systems (1)
- School of Computer Science & Engineering Faculty Publications (1)
- Stephen D. Cooper (1)
- Theses : Honours (1)
- University Libraries Faculty and Staff Publications (1)
- University Libraries News Online (2008-2023) (1)
- Publication Type
- File Type
Articles 1 - 30 of 38
Full-Text Articles in Social and Behavioral Sciences
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes
Alexander Hayes Mr.
- From in-car video recording to body-worn video recording
- Exploring available technologies: how do they work, pros and cons
- Storing direct evidence in secure storage: factors to consider
- Citizens “shooting” back with POV tech – what are their rights?
- Crowdsourced sousveillance- harnessing public data for forensic profiling
- Police force policies and practices on the application of new media
Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes
Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes
Alexander Hayes Mr.
Could sports men and women who are monitored using wearable computers actually be playing to a global theatre to ensure the upkeep of their performance benchmarks instead of consciously watching and reacting to what is happening in the game they are playing? What are the social implications of heart rate monitors and GPS units now embedded into player clothing? What were some of the reflections from the IEEE ISTAS13 meeting on Wearable Computers in Every Day Life? What were some of the main messages that you walked away with from that conference? What made the greatest impression on us was …
Connected: To Everyone And Everything, Katherine Albrecht, Katina Michael
Connected: To Everyone And Everything, Katherine Albrecht, Katina Michael
Associate Professor Katina Michael
The activist group CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) was founded in 1999 by Katherine Albrecht, the very same year that Kevin Ashton co-founder and executive director of the then Auto-ID Center at MIT made a presentation to Proctor & Gamble with a title that included the phrase “Internet of Things”. According to Ashton, “the most numerous and important routers of all” are people but people have limitations and are not very good at capturing data about objects in the physical world. In 2001, Ashton’s automatic identification vision had become a lot clearer. At the Auto-ID Center during …
The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer
Graduate Theses and Dissertations
With increasing usage of Social networking sites like Facebook there is a need to study privacy. Previous research has placed more emphasis on outcome-oriented contexts, such as e-commerce sites. In process-oriented contexts, like Facebook, privacy has become a source of conflict for users. The majority of architectural privacy (e.g. privacy policies, website mechanisms) enables the relationship between a user and business, focusing on the institutional privacy concern and trust; however, architectural privacy mechanisms that enables relationships between and among users is lacking. This leaves users the responsibility to manage privacy for their interpersonal relationships. This research focuses on the following …
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan
Anil Kalhan
With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …
No Limits To Watching?, Katina Michael, M.G. Michael
No Limits To Watching?, Katina Michael, M.G. Michael
M. G. Michael
Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.
No Limits To Watching?, Katina Michael, M.G. Michael
No Limits To Watching?, Katina Michael, M.G. Michael
Professor Katina Michael
Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller
Akiva A Miller
New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …
Hospitality Review Volume 31 Issue 2 2013, Fiu Hospitality Review
Hospitality Review Volume 31 Issue 2 2013, Fiu Hospitality Review
Hospitality Review
No abstract provided.
What You Want Is Not What You Get: Predicting Sharing Policies For Text-Based Content On Facebook, Arunesh Sinha, Li Yan, Lujo Bauer
What You Want Is Not What You Get: Predicting Sharing Policies For Text-Based Content On Facebook, Arunesh Sinha, Li Yan, Lujo Bauer
Research Collection Lee Kong Chian School Of Business
As the amount of content users publish on social networking sites rises, so do the danger and costs of inadvertently sharing content with an unintended audience. Studies repeatedly show that users frequently misconfigure their policies or misunderstand the privacy features offered by social networks. A way to mitigate these problems is to develop automated tools to assist users in correctly setting their policy. This paper explores the viability of one such approach: we examine the extent to which machine learning can be used to deduce users' sharing preferences for content posted on Facebook. To generate data on which to evaluate …
Social Media, Privacy, And The Employment Relationship: The American Experience, Ariana R. Levinson
Social Media, Privacy, And The Employment Relationship: The American Experience, Ariana R. Levinson
Ariana R. Levinson
Zach's News, Georgia Southern University, Zach S. Henderson Library
Zach's News, Georgia Southern University, Zach S. Henderson Library
University Libraries News Online (2008-2023)
- Constitution Day- The Right to Privacy in the 21st Century
Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D
Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D
Georgia International Conference on Information Literacy
See presentation description.
Individuals’ Privacy Conceptions And Perceptions: A Translation From Privacy In General To Privacy With Gmail And Google, Stephanie Jean Cleary
Individuals’ Privacy Conceptions And Perceptions: A Translation From Privacy In General To Privacy With Gmail And Google, Stephanie Jean Cleary
Boise State University Theses and Dissertations
While privacy is not a new issue for Americans, the skyrocketing presence and use of technologies has altered existing notions and definitions of privacy. Although previous researchers have examined and tested privacy theories and privacy is currently being discussed by policy makers, privacy and rights advocacy groups, and online companies, individuals’ perspectives on privacy remain unknown and unheard. Therefore, this study interviewed nine individuals’ about their conceptions and perceptions of privacy in general and in the contexts of Gmail, Google, and Google, Inc. This study used inductive and deductive thematic analysis to identify and interpret patterns from participants’ interview transcriptions …
A Fresh Look At Privacy--Why Does It Matter, Who Cares, And What Should Librarians Do About It?, Trina J. Magi
A Fresh Look At Privacy--Why Does It Matter, Who Cares, And What Should Librarians Do About It?, Trina J. Magi
University Libraries Faculty and Staff Publications
Provides a brief introduction to several reasons privacy is important to people and society, cites numerous studies reporting on people's attitudes about privacy, and recommends ways librarians can work to protect patron privacy.
Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael
Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael
Associate Professor Katina Michael
It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …
Privacy And The News Media, Stephen D. Cooper
Privacy And The News Media, Stephen D. Cooper
Stephen D. Cooper
The right of the public to know and the right of the individual to be let alone are inherently in conflict. The origins of these rights are quite different: the former derived from the First Amendment's protection of a free press, the latter in a law journal article published in the late nineteenth century. So, too, has the development of these ideas followed different paths: the former as Constitutional law, the latter as tort law. This article examines the relationship between privacy law and the press. A century ago two lawyers called for legal relief from aggressive newspaper reporters. At …
Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum
Angela Goodrum
No abstract provided.
The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris
The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris
Cowles Foundation Discussion Papers
We analyze the welfare consequences of a monopolist having additional information about consumers’ tastes, beyond the prior distribution; the additional information can be used to charge different prices to different segments of the market, i.e., carry out “third degree price discrimination.” We show that the segmentation and pricing induced by the additional information can achieve every combination of consumer and producer surplus such that: (i) consumer surplus is non-negative, (ii) producer surplus is at least as high as profits under the uniform monopoly price, and (iii) total surplus does not exceed the efficient gains from trade. As well as characterizing …
The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris
The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris
Cowles Foundation Discussion Papers
We analyze the welfare consequences of a monopolist having additional information about consumers’ tastes, beyond the prior distribution; the additional information can be used to charge different prices to different segments of the market, i.e., carry out “third degree price discrimination.” We show that the segmentation and pricing induced by the additional information can achieve every combination of consumer and producer surplus such that: (i) consumer surplus is non-negative, (ii) producer surplus is at least as high as profits under the uniform monopoly price, and (iii) total surplus does not exceed the surplus generated by efficient trade.
The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris
The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris
Cowles Foundation Discussion Papers
We analyze the welfare consequences of a monopolist having additional information about consumers’ tastes, beyond the prior distribution; the additional information can be used to charge different prices to different segments of the market, i.e., carry out “third degree price discrimination.” We show that the segmentation and pricing induced by the additional information can achieve every combination of consumer and producer surplus such that: (i) consumer surplus is non-negative, (ii) producer surplus is at least as high as profits under the uniform monopoly price, and (iii) total surplus does not exceed the efficient gains from trade. As well as characterizing …
The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris
The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris
Cowles Foundation Discussion Papers
We analyze the welfare consequences of a monopolist having additional information about consumers’ tastes, beyond the prior distribution; the additional information can be used to charge different prices to different segments of the market, i.e., carry out “third degree price discrimination.” We show that the segmentation and pricing induced by the additional information can achieve every combination of consumer and producer surplus such that: (i) consumer surplus is non-negative, (ii) producer surplus is at least as high as profits under the uniform monopoly price, and (iii) total surplus does not exceed the surplus generated by efficient trade.
Your Love Is Public Now: Questioning The Use Of Personal Information In Authentication, Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao
Your Love Is Public Now: Questioning The Use Of Personal Information In Authentication, Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao
Research Collection School Of Computing and Information Systems
Most social networking platforms protect user's private information by limiting access to it to a small group of members, typically friends of the user, while allowing (virtually) everyone's access to the user's public data. In this paper, we exploit public data available on Facebook to infer users' undisclosed interests on their profile pages. In particular, we infer their undisclosed interests from the public data fetched using Graph APIs provided by Facebook. We demonstrate that simply liking a Facebook page does not corroborate that the user is interested in the page. Instead, we perform sentiment-oriented mining on various attributes of a …
Technology And Privacy (Editorial), Michael Friedewald, Ronald J. Pohoryles
Technology And Privacy (Editorial), Michael Friedewald, Ronald J. Pohoryles
Michael Friedewald
No abstract provided.
Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier
Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier
FIMS Publications
Behavioural tracking presents a significant privacy risk to Canadians, particularly when their online behaviours reveal sensitive information that could be used to discriminate against them. This concern is particularly relevant in the context of online health information seeking, since searches can reveal details about health conditions and concerns that the individual may wish to keep private. The privacy threats are exacerbated because behavioural tracking mechanisms are large invisible to users, and many are unaware of the strategies and mechanisms available to track online behaviour. In this project, we seek to document the behavioural tracking practices of consumer health websites, and …
Living In Digital Asia: Better, Faster, Stronger?, Singapore Management University
Living In Digital Asia: Better, Faster, Stronger?, Singapore Management University
Perspectives@SMU
The rate at which Asia is embracing technology is simply "amazing", according to Olivier Muehlstein, principal consultant at the Boston Consulting Group. “It's astounding how digitally engaged and active people are in this part of the world. Southeast Asia is extremely connected; it's an anomaly,” he said, and cautioned that an important consequence from all of these changes, is that privacy does not exist anymore.
Mydigitalfootprint.Org: Young People And The Proprietary Ecology Of Everyday Data, Gregory Thomas Donovan
Mydigitalfootprint.Org: Young People And The Proprietary Ecology Of Everyday Data, Gregory Thomas Donovan
All Open Access Legacy Dissertations and Capstone Projects
Young people are the canaries in our contemporary data mine. They are at the forefront of complex negotiations over privacy, property, and security in environments saturated with information systems. The productive and entertaining promises of proprietary media have led to widespread adoption among youth whose daily activities now generate troves of data that are mined for governance and profit. As they text, email, network, and search within these proprietary ecologies, young people's identity configurations link up with modes of capitalist production. The MyDigitalFootprint.ORG Project was thus initiated to unpack and engage young people's material social relations with/in proprietary ecologies through …
Relations Among Privacy Notions For Signcryption And Key Invisible "Sign-Then-Encrypt", Yang Wang, Mark Manulis, Man Ho Allen Au, Willy Susilo
Relations Among Privacy Notions For Signcryption And Key Invisible "Sign-Then-Encrypt", Yang Wang, Mark Manulis, Man Ho Allen Au, Willy Susilo
Faculty of Engineering and Information Sciences - Papers: Part A
Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and public-key encryption into a single operation. Libert and Quisquater (PKC 2004) extended this set of basic requirements with the notions of ciphertext anonymity (or key privacy) and key invisibility to protect the identities of signcryption users and were able to prove that key invisibility implies ciphertext anonymity by imposing certain conditions on the underlying signcryption scheme.
This paper revisits the relationship amongst privacy notions for signcryption. We prove that key invisibility implies ciphertext anonymity without any additional restrictions. …
Privacy-Enhanced Keyword Search In Clouds, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au
Privacy-Enhanced Keyword Search In Clouds, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au
Faculty of Engineering and Information Sciences - Papers: Part A
The advent of cloud computing has dramatically changed the IT scene, as it offers cost savings and improvements to major operations. Nevertheless, the major obstacle relies on the effort on how to secure sensitive data files that are outsourced to the cloud environment. To ensure confidentiality, the sensitive data are usually encrypted prior to being outsourced. Nevertheless, effective data utilization remains a challenging task and there is a clear need for a secure and efficient searching mechanism over the encrypted data in the cloud, to increase the us-ability of the secure cloud environment. Unfortunately, existing work in the area of …
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel
Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel
Law Faculty Scholarship
On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions. Led by the moderator, participants at the Forum focused generally on three broad …