Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Government surveillance (3)
- Data security (2)
- Fourth Amendment (2)
- Administrative law (1)
- Black Lives Matter (1)
-
- Book review (1)
- Civil Rights movement (1)
- Clapper (1)
- Communication (1)
- Consumer protection (1)
- Corporate responsibility (1)
- Corporations (1)
- Cybersecurity (1)
- Data (1)
- Data analytics (1)
- Data breach (1)
- Data collection (1)
- Digital technologies (1)
- Disruptive technologies (1)
- Expressive theory (1)
- Facebook (1)
- First Amendment (1)
- Gezi Park (1)
- Harm (1)
- Harms (1)
- Innovation (1)
- Internet law (1)
- Intrusion (1)
- Knowledge networks (1)
- Law and economics (1)
Articles 1 - 5 of 5
Full-Text Articles in Law
An Expressive Theory Of Privacy Intrusions, Craig Konnoth
An Expressive Theory Of Privacy Intrusions, Craig Konnoth
Publications
The harms of privacy intrusions are numerous. They include discrimination, reputational harm, and chilling effects on speech, thought, and behavior. However, scholarship has yet to fully recognize a kind of privacy harm that this article terms "expressive."
Depending on where the search is taking place and who the actors involved are--a teacher in a school, the police on the street, a food inspector in a restaurant--victims and observers might infer different messages from the search. The search marks the importance of certain societal values such as law enforcement or food safety. It can also send messages about certain groups by …
Rules For Digital Radicals, Scott Skinner-Thompson
Disruptive Platforms, Margot Kaminski
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Standing After Snowden: Lessons On Privacy Harm From National Security Surveillance Litigation, Margot E. Kaminski
Publications
Article III standing is difficult to achieve in the context of data security and data privacy claims. Injury in fact must be "concrete," "particularized," and "actual or imminent"--all characteristics that are challenging to meet with information harms. This Article suggests looking to an unusual source for clarification on privacy and standing: recent national security surveillance litigation. There we can find significant discussions of what rises to the level of Article III injury in fact. The answers may be surprising: the interception of sensitive information; the seizure of less sensitive information and housing of it in a database for analysis; and …
Entrepreneurial Administration, Philip J. Weiser
Entrepreneurial Administration, Philip J. Weiser
Publications
A core failing of today’s administrative state and modern administrative law scholarship is the lack of imagination as to how agencies should operate. On the conventional telling, public agencies follow specific grants of regulatory authority, use the traditional tools of notice-and-comment rulemaking and adjudication, and are checked by judicial review. In reality, however, effective administration depends on entrepreneurial leadership that spearheads policy experimentation and trial-and-error problem-solving, including the development of regulatory programs that use non-traditional tools.
Entrepreneurial administration takes place both at public agencies and private entities, each of which can address regulatory challenges and earn regulatory authority as a …