Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Privacy (3)
- Cybersecurity (2)
- Breach (1)
- Chilling effects (1)
- Complex Adaptive Systems (1)
-
- Compliance (1)
- Cross-jurisdictional privacy management (1)
- Data (1)
- Data breach (1)
- Data protection reform (1)
- Data security (1)
- Encryption (1)
- Evidence-based regulation (1)
- Framework (1)
- Hack (1)
- Jurisdiction (1)
- Law (1)
- Legal data (1)
- Policymaking (1)
- Risk management (1)
- Risk tolerance (1)
- Rulemaking (1)
- Security breach (1)
- Social sciences (1)
- Surveillance (1)
- Technology (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Law
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Capstones
Breadcrumbs: Privacy as a Privilege Abstract
By: Prachi Bhardwaj
In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.
That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
All Faculty Scholarship
No abstract provided.
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …