Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Privacy

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 38

Full-Text Articles in Social and Behavioral Sciences

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes Jun 2015

Workshop | Body Worn Video Recorders: The Socio-Technical Implications Of Gathering Direct Evidence, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

- From in-car video recording to body-worn video recording

- Exploring available technologies: how do they work, pros and cons

- Storing direct evidence in secure storage: factors to consider

- Citizens “shooting” back with POV tech – what are their rights?

- Crowdsourced sousveillance- harnessing public data for forensic profiling

- Police force policies and practices on the application of new media


Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes Jun 2015

Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

Could sports men and women who are monitored using wearable computers actually be playing to a global theatre to ensure the upkeep of their performance benchmarks instead of consciously watching and reacting to what is happening in the game they are playing? What are the social implications of heart rate monitors and GPS units now embedded into player clothing? What were some of the reflections from the IEEE ISTAS13 meeting on Wearable Computers in Every Day Life? What were some of the main messages that you walked away with from that conference? What made the greatest impression on us was …


Connected: To Everyone And Everything, Katherine Albrecht, Katina Michael Dec 2013

Connected: To Everyone And Everything, Katherine Albrecht, Katina Michael

Associate Professor Katina Michael

The activist group CASPIAN (Consumers Against Supermarket Privacy Invasion and Numbering) was founded in 1999 by Katherine Albrecht, the very same year that Kevin Ashton co-founder and executive director of the then Auto-ID Center at MIT made a presentation to Proctor & Gamble with a title that included the phrase “Internet of Things”. According to Ashton, “the most numerous and important routers of all” are people but people have limitations and are not very good at capturing data about objects in the physical world. In 2001, Ashton’s automatic identification vision had become a lot clearer. At the Auto-ID Center during …


The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer Dec 2013

The Mechanisms Of Interpersonal Privacy In Social Networking Websites: A Study Of Subconscious Processes, Social Network Analysis, And Fear Of Social Exclusion, Bryan I. Hammer

Graduate Theses and Dissertations

With increasing usage of Social networking sites like Facebook there is a need to study privacy. Previous research has placed more emphasis on outcome-oriented contexts, such as e-commerce sites. In process-oriented contexts, like Facebook, privacy has become a source of conflict for users. The majority of architectural privacy (e.g. privacy policies, website mechanisms) enables the relationship between a user and business, focusing on the institutional privacy concern and trust; however, architectural privacy mechanisms that enables relationships between and among users is lacking. This leaves users the responsibility to manage privacy for their interpersonal relationships. This research focuses on the following …


Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan Nov 2013

Immigration Policing And Federalism Through The Lens Of Technology, Surveillance, And Privacy, Anil Kalhan

Anil Kalhan

With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided over the largest expansion of state and local immigration policing in U.S. history with its implementation of the “Secure Communities” program, which integrates immigration and criminal history database systems in order to automatically ascertain the immigration status of every individual who is arrested and booked by state and local police nationwide. By 2012, over one fifth …


No Limits To Watching?, Katina Michael, M.G. Michael Nov 2013

No Limits To Watching?, Katina Michael, M.G. Michael

M. G. Michael

Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.


No Limits To Watching?, Katina Michael, M.G. Michael Nov 2013

No Limits To Watching?, Katina Michael, M.G. Michael

Professor Katina Michael

Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.


What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller Nov 2013

What Do We Worry About When We Worry About Price Discrimination? The Law And Ethics Of Using Personal Information For Pricing, Akiva A. Miller

Akiva A Miller

New information technologies have dramatically increased sellers’ ability to engage in retail price discrimination. Debates over using personal information for price discrimination frequently treat it as a single problem, and are not sufficiently sensitive to the variety of price discrimination practices, the different kinds of information they require in order to succeed, and the different ethical concerns they raise. This paper explores the ethical and legal debate over regulating price discrimination facilitated by consumers’ personal information. Various kinds of “privacy remedies”—self-regulation, technological fixes, state regulation, and legislating private causes of legal action—each have their place. By drawing distinctions between various …


Hospitality Review Volume 31 Issue 2 2013, Fiu Hospitality Review Nov 2013

Hospitality Review Volume 31 Issue 2 2013, Fiu Hospitality Review

Hospitality Review

No abstract provided.


What You Want Is Not What You Get: Predicting Sharing Policies For Text-Based Content On Facebook, Arunesh Sinha, Li Yan, Lujo Bauer Nov 2013

What You Want Is Not What You Get: Predicting Sharing Policies For Text-Based Content On Facebook, Arunesh Sinha, Li Yan, Lujo Bauer

Research Collection Lee Kong Chian School Of Business

As the amount of content users publish on social networking sites rises, so do the danger and costs of inadvertently sharing content with an unintended audience. Studies repeatedly show that users frequently misconfigure their policies or misunderstand the privacy features offered by social networks. A way to mitigate these problems is to develop automated tools to assist users in correctly setting their policy. This paper explores the viability of one such approach: we examine the extent to which machine learning can be used to deduce users' sharing preferences for content posted on Facebook. To generate data on which to evaluate …


Social Media, Privacy, And The Employment Relationship: The American Experience, Ariana R. Levinson Sep 2013

Social Media, Privacy, And The Employment Relationship: The American Experience, Ariana R. Levinson

Ariana R. Levinson

This article posits that privacy issues arising in the United States from the use of social media and the employment relationship are similar to those that have arisen around the world. It suggests, however, that the patchwork of governing legal claims arising under different laws in different jurisdictions may be unique. After a brief introduction, the second section describes the recent passage of legislation in several states that may protect the privacy of job applicants’ passwords to social-media sites. The third section describes the various claims employees may bring under the federal Electronic Communications Privacy Act, in tort for invasion …


Zach's News, Georgia Southern University, Zach S. Henderson Library Sep 2013

Zach's News, Georgia Southern University, Zach S. Henderson Library

University Libraries News Online (2008-2023)

  • Constitution Day- The Right to Privacy in the 21st Century


Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D Aug 2013

Privacy And Confidentiality Of Student Intellectual Property, Ruth A. Hodges Ph.D

Georgia International Conference on Information Literacy

See presentation description.


Individuals’ Privacy Conceptions And Perceptions: A Translation From Privacy In General To Privacy With Gmail And Google, Stephanie Jean Cleary Aug 2013

Individuals’ Privacy Conceptions And Perceptions: A Translation From Privacy In General To Privacy With Gmail And Google, Stephanie Jean Cleary

Boise State University Theses and Dissertations

While privacy is not a new issue for Americans, the skyrocketing presence and use of technologies has altered existing notions and definitions of privacy. Although previous researchers have examined and tested privacy theories and privacy is currently being discussed by policy makers, privacy and rights advocacy groups, and online companies, individuals’ perspectives on privacy remain unknown and unheard. Therefore, this study interviewed nine individuals’ about their conceptions and perceptions of privacy in general and in the contexts of Gmail, Google, and Google, Inc. This study used inductive and deductive thematic analysis to identify and interpret patterns from participants’ interview transcriptions …


A Fresh Look At Privacy--Why Does It Matter, Who Cares, And What Should Librarians Do About It?, Trina J. Magi Jul 2013

A Fresh Look At Privacy--Why Does It Matter, Who Cares, And What Should Librarians Do About It?, Trina J. Magi

University Libraries Faculty and Staff Publications

Provides a brief introduction to several reasons privacy is important to people and society, cites numerous studies reporting on people's attitudes about privacy, and recommends ways librarians can work to protect patron privacy.


Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael Jun 2013

Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael

Associate Professor Katina Michael

It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …


Privacy And The News Media, Stephen D. Cooper May 2013

Privacy And The News Media, Stephen D. Cooper

Stephen D. Cooper

The right of the public to know and the right of the individual to be let alone are inherently in conflict. The origins of these rights are quite different: the former derived from the First Amendment's protection of a free press, the latter in a law journal article published in the late nineteenth century. So, too, has the development of these ideas followed different paths: the former as Constitutional law, the latter as tort law. This article examines the relationship between privacy law and the press. A century ago two lawyers called for legal relief from aggressive newspaper reporters. At …


Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum May 2013

Snopa And The Ppa: Do You Know What It Means For You? If Snopa (Social Networking Online Protection Act) Or Ppa (Password Protection Act) Do Not Pass, The Snooping Could Cause You Trouble, Angela Goodrum

Angela Goodrum

No abstract provided.


The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris May 2013

The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris

Cowles Foundation Discussion Papers

We analyze the welfare consequences of a monopolist having additional information about consumers’ tastes, beyond the prior distribution; the additional information can be used to charge different prices to different segments of the market, i.e., carry out “third degree price discrimination.” We show that the segmentation and pricing induced by the additional information can achieve every combination of consumer and producer surplus such that: (i) consumer surplus is non-negative, (ii) producer surplus is at least as high as profits under the uniform monopoly price, and (iii) total surplus does not exceed the efficient gains from trade. As well as characterizing …


The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris May 2013

The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris

Cowles Foundation Discussion Papers

We analyze the welfare consequences of a monopolist having additional information about consumers’ tastes, beyond the prior distribution; the additional information can be used to charge different prices to different segments of the market, i.e., carry out “third degree price discrimination.” We show that the segmentation and pricing induced by the additional information can achieve every combination of consumer and producer surplus such that: (i) consumer surplus is non-negative, (ii) producer surplus is at least as high as profits under the uniform monopoly price, and (iii) total surplus does not exceed the surplus generated by efficient trade.


The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris May 2013

The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris

Cowles Foundation Discussion Papers

We analyze the welfare consequences of a monopolist having additional information about consumers’ tastes, beyond the prior distribution; the additional information can be used to charge different prices to different segments of the market, i.e., carry out “third degree price discrimination.” We show that the segmentation and pricing induced by the additional information can achieve every combination of consumer and producer surplus such that: (i) consumer surplus is non-negative, (ii) producer surplus is at least as high as profits under the uniform monopoly price, and (iii) total surplus does not exceed the efficient gains from trade. As well as characterizing …


The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris May 2013

The Limits Of Price Discrimination, Dirk Bergemann, Benjamin Brooks, Stephen Morris

Cowles Foundation Discussion Papers

We analyze the welfare consequences of a monopolist having additional information about consumers’ tastes, beyond the prior distribution; the additional information can be used to charge different prices to different segments of the market, i.e., carry out “third degree price discrimination.” We show that the segmentation and pricing induced by the additional information can achieve every combination of consumer and producer surplus such that: (i) consumer surplus is non-negative, (ii) producer surplus is at least as high as profits under the uniform monopoly price, and (iii) total surplus does not exceed the surplus generated by efficient trade.


Your Love Is Public Now: Questioning The Use Of Personal Information In Authentication, Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao May 2013

Your Love Is Public Now: Questioning The Use Of Personal Information In Authentication, Payas Gupta, Swapna Gottipati, Jing Jiang, Debin Gao

Research Collection School Of Computing and Information Systems

Most social networking platforms protect user's private information by limiting access to it to a small group of members, typically friends of the user, while allowing (virtually) everyone's access to the user's public data. In this paper, we exploit public data available on Facebook to infer users' undisclosed interests on their profile pages. In particular, we infer their undisclosed interests from the public data fetched using Graph APIs provided by Facebook. We demonstrate that simply liking a Facebook page does not corroborate that the user is interested in the page. Instead, we perform sentiment-oriented mining on various attributes of a …


Technology And Privacy (Editorial), Michael Friedewald, Ronald J. Pohoryles Apr 2013

Technology And Privacy (Editorial), Michael Friedewald, Ronald J. Pohoryles

Michael Friedewald

No abstract provided.


Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier Mar 2013

Hidden Surveillance On Consumer Health Information Websites, Jacquelyn A. Burkell, Alexandre Fortier

FIMS Publications

Behavioural tracking presents a significant privacy risk to Canadians, particularly when their online behaviours reveal sensitive information that could be used to discriminate against them. This concern is particularly relevant in the context of online health information seeking, since searches can reveal details about health conditions and concerns that the individual may wish to keep private. The privacy threats are exacerbated because behavioural tracking mechanisms are large invisible to users, and many are unaware of the strategies and mechanisms available to track online behaviour. In this project, we seek to document the behavioural tracking practices of consumer health websites, and …


Living In Digital Asia: Better, Faster, Stronger?, Singapore Management University Jan 2013

Living In Digital Asia: Better, Faster, Stronger?, Singapore Management University

Perspectives@SMU

The rate at which Asia is embracing technology is simply "amazing", according to Olivier Muehlstein, principal consultant at the Boston Consulting Group. “It's astounding how digitally engaged and active people are in this part of the world. Southeast Asia is extremely connected; it's an anomaly,” he said, and cautioned that an important consequence from all of these changes, is that privacy does not exist anymore.


Mydigitalfootprint.Org: Young People And The Proprietary Ecology Of Everyday Data, Gregory Thomas Donovan Jan 2013

Mydigitalfootprint.Org: Young People And The Proprietary Ecology Of Everyday Data, Gregory Thomas Donovan

All Open Access Legacy Dissertations and Capstone Projects

Young people are the canaries in our contemporary data mine. They are at the forefront of complex negotiations over privacy, property, and security in environments saturated with information systems. The productive and entertaining promises of proprietary media have led to widespread adoption among youth whose daily activities now generate troves of data that are mined for governance and profit. As they text, email, network, and search within these proprietary ecologies, young people's identity configurations link up with modes of capitalist production. The MyDigitalFootprint.ORG Project was thus initiated to unpack and engage young people's material social relations with/in proprietary ecologies through …


Relations Among Privacy Notions For Signcryption And Key Invisible "Sign-Then-Encrypt", Yang Wang, Mark Manulis, Man Ho Allen Au, Willy Susilo Jan 2013

Relations Among Privacy Notions For Signcryption And Key Invisible "Sign-Then-Encrypt", Yang Wang, Mark Manulis, Man Ho Allen Au, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part A

Signcryption simultaneously offers authentication through unforgeability and confidentiality through indistinguishability against chosen ciphertext attacks by combining the functionality of digital signatures and public-key encryption into a single operation. Libert and Quisquater (PKC 2004) extended this set of basic requirements with the notions of ciphertext anonymity (or key privacy) and key invisibility to protect the identities of signcryption users and were able to prove that key invisibility implies ciphertext anonymity by imposing certain conditions on the underlying signcryption scheme.

This paper revisits the relationship amongst privacy notions for signcryption. We prove that key invisibility implies ciphertext anonymity without any additional restrictions. …


Privacy-Enhanced Keyword Search In Clouds, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au Jan 2013

Privacy-Enhanced Keyword Search In Clouds, Miao Zhou, Yi Mu, Willy Susilo, Man Ho Allen Au

Faculty of Engineering and Information Sciences - Papers: Part A

The advent of cloud computing has dramatically changed the IT scene, as it offers cost savings and improvements to major operations. Nevertheless, the major obstacle relies on the effort on how to secure sensitive data files that are outsourced to the cloud environment. To ensure confidentiality, the sensitive data are usually encrypted prior to being outsourced. Nevertheless, effective data utilization remains a challenging task and there is a clear need for a secure and efficient searching mechanism over the encrypted data in the cloud, to increase the us-ability of the secure cloud environment. Unfortunately, existing work in the area of …


Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel Jan 2013

Intellectual Property And Public Health – A White Paper, Ryan G. Vacca, James Ming Chen, Jay Dratler Jr., Thomas Folsom, Timothy S. Hall, Yaniv Heled, Frank A. Pasquale Iii, Elizabeth A. Reilly, Jeffrey Samuels, Katherine J. Strandburg, Kara W. Swanson, Andrew W. Torrance, Katharine A. Van Tassel

Law Faculty Scholarship

On October 26, 2012, the University of Akron School of Law’s Center for Intellectual Property and Technology hosted its Sixth Annual IP Scholars Forum. In attendance were thirteen legal scholars with expertise and an interest in IP and public health who met to discuss problems and potential solutions at the intersection of these fields. This report summarizes this discussion by describing the problems raised, areas of agreement and disagreement between the participants, suggestions and solutions made by participants and the subsequent evaluations of these suggestions and solutions. Led by the moderator, participants at the Forum focused generally on three broad …