Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 6 of 6
Full-Text Articles in Law
The Rule Of Law In Cyberspace, Mireille Hildebrandt
The Rule Of Law In Cyberspace, Mireille Hildebrandt
Mireille Hildebrandt
This is a translation of my inaugural lecture at Radboud University Nijmegen. The Dutch version has been published as a booklet, the English version in available on my bepress site.
Gouvernementalité Algorithmique Et Perspectives D'Émancipation : Le Disparate Comme Condition D'Individuation Par La Relation?, Antoinette Rouvroy, Thomas Berns
Gouvernementalité Algorithmique Et Perspectives D'Émancipation : Le Disparate Comme Condition D'Individuation Par La Relation?, Antoinette Rouvroy, Thomas Berns
Antoinette Rouvroy
La gouvernementalité algorithmique se caractérise notamment par le double mouvement suivant : a) l’abandon de toute forme d’« échelle », d’« étalon », de hiérarchie, au profit d’une normativité immanente et évolutive en temps réel, dont émerge un « double statistique » du monde et qui semble faire table rase des anciennes hiérarchies dessinée par l’homme normal ou l’homme moyen ; b) l’évitement de toute confrontation avec les individus dont les occasions de subjectivation se trouvent raréfiées. Ce double mouvement nous paraît le fruit de la focalisation de la statistique contemporaine sur les relations. Nous tentons d’évaluer dans quelle mesure …
Leashing The Internet Watchdog: Legislative Restraints On Electronic Surveillance In The U.S. And U.K., John P. Heekin
Leashing The Internet Watchdog: Legislative Restraints On Electronic Surveillance In The U.S. And U.K., John P. Heekin
John P. Heekin
This article examines the legislative approaches undertaken by the United States and the United Kingdom to regulate the surveillance and interception of electronic communications. Drawing from the recognition of individual privacy in each country, the author explores the development and impact of statutory provisions enacted to accomplish effective oversight of the respective intelligence services. In the U.S., the shifting purposes and provisions of the Foreign Intelligence Surveillance Act of 1978 are tracked from implementation to its revisions following the terrorist attacks of September 11, 2001. Along that timeline, a distinct trend toward greater deference to Executive authority for electronic surveillance …
The Meaning And The Mining Of Legal Texts, Mireille Hildebrandt
The Meaning And The Mining Of Legal Texts, Mireille Hildebrandt
Mireille Hildebrandt
Positive law, inscribed in legal texts, entails an authority not inherent in literary texts, generating legal consequences that can have real effects on a person’s life and liberty. The interpretation of legal texts, necessarily a normative undertaking, resists the mechanical application of rules, though still requiring a measure of predictability, coherence with other relevant legal norms and compliance with constitutional safeguards. The present proliferation of legal texts on the internet (codes, statutes, judgments, treaties, doctrinal treatises) renders the selection of relevant texts and cases next to impossible. We may expect that systems to mine these texts to find arguments that …
Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti
Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti
Corey A Ciocchetti
As the twenty-first century bustles forward, the e-commerce arena becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires. This process provides many benefits – such as tailored websites and relevant marketing – that few Web surfers would care to do without. However, serious threats lurk in cyberspace and are enhanced by consumers who continue to submit vast amounts of information in a state of relative unawareness. Not wanting to miss out on their Web surfing experience, visitors submit …
E-Commerce And Information Privacy: Privacy Policies As Personal Information Protectors, Corey A. Ciocchetti
E-Commerce And Information Privacy: Privacy Policies As Personal Information Protectors, Corey A. Ciocchetti
Corey A Ciocchetti
This article dives into the contemporary debate surrounding information privacy in the twenty-first century e-commerce environment through the lens of consumers submitting personally identifying information into the vast abyss of cyberspace. I argue that this information must be better protected and that United States law should emphasize electronic privacy policies as privacy-protecting devices. Currently, the United States operates under primarily a self-regulatory environment where the federal and state governments allow industry to regulate the use and content of their privacy policies. This article details current state of the United States legal regime, addresses its inefficiencies in this area and proposes …