Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Data privacy (2)
- Data protection (2)
- Cyber-Security (1)
- Cybersecurity (1)
- Cybersecurity risk (1)
-
- Debido proceso (1)
- Denunciante (1)
- Derechos digitales (1)
- Derechos humanos (1)
- Derivatives (1)
- Digital economy (1)
- European Union (1)
- Habeas data (1)
- Hackeo (1)
- Harvard Business Law Review (1)
- IDPL Global Data Privacy Prize (1)
- Information privacy (1)
- Informed cybertrading (1)
- Insider Trading (1)
- International privacy law (1)
- National security (1)
- Privacidad digital (1)
- Securities Fraud (1)
- Securities market (1)
- Vigilancia estatal (1)
Articles 1 - 4 of 4
Full-Text Articles in Law
Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez
Privacidad Digital En Ecuador: El Papel De La Vigilancia, La Jurisprudencia Y Los Derechos Humanos, Giselle Valdez
Independent Study Project (ISP) Collection
Este documento es un estudio de caso sobre la privacidad digital en Ecuador, cómo se protege y cómo se debe mejorar las protecciones. Comienzo presentando la falta de privacidad de la persona en Ecuador, a través de la reciente violación de datos y las tecnologías de vigilancia en todo el país desde China. Luego, para analizar la jurisprudencia y la falta de protección de la privacidad en la ley, hago la transición a un análisis legal de la privacidad de datos en Ecuador a través de la Constitución de 2008. Cuando establezco que falta privacidad digital en Ecuador, demuestro una …
Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley
Informed Trading And Cybersecurity Breaches, Joshua Mitts, Eric L. Talley
Faculty Scholarship
Cybersecurity has become a significant concern in corporate and commercial settings, and for good reason: a threatened or realized cybersecurity breach can materially affect firm value for capital investors. This paper explores whether market arbitrageurs appear systematically to exploit advance knowledge of such vulnerabilities. We make use of a novel data set tracking cybersecurity breach announcements among public companies to study trading patterns in the derivatives market preceding the announcement of a breach. Using a matched sample of unaffected control firms, we find significant trading abnormalities for hacked targets, measured in terms of both open interest and volume. Our results …
Introducing The Global Data Privacy Prize, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Introducing The Global Data Privacy Prize, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
If The Legislature Had Been Serious About Data Privacy..., Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
If The Legislature Had Been Serious About Data Privacy..., Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.