Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

La Nullità Del Contratto Nella Commercializzazione A Distanza Di Servizi Finanziari, Valerio Sangiovanni Oct 2008

La Nullità Del Contratto Nella Commercializzazione A Distanza Di Servizi Finanziari, Valerio Sangiovanni

Valerio Sangiovanni

No abstract provided.


L'Informazione Del Consumatore Nella Commercializzazione A Distanza Di Servizi Finanziari, Valerio Sangiovanni Jul 2008

L'Informazione Del Consumatore Nella Commercializzazione A Distanza Di Servizi Finanziari, Valerio Sangiovanni

Valerio Sangiovanni

No abstract provided.


Google Booksearch And Library Digitization, Laura Quilter, Jack Lerner Mar 2008

Google Booksearch And Library Digitization, Laura Quilter, Jack Lerner

Laura Quilter

No abstract provided.


Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti Jan 2008

Just Click Submit: The Collection, Dissemination And Tagging Of Personally Identifying Information, Corey A. Ciocchetti

Corey A Ciocchetti

As the twenty-first century bustles forward, the e-commerce arena becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of personally identifying information (PII) and mine it in sophisticated databases to discover consumer trends and desires. This process provides many benefits – such as tailored websites and relevant marketing – that few Web surfers would care to do without. However, serious threats lurk in cyberspace and are enhanced by consumers who continue to submit vast amounts of information in a state of relative unawareness. Not wanting to miss out on their Web surfing experience, visitors submit …


The Privacy Matrix, Corey A. Ciocchetti Jan 2008

The Privacy Matrix, Corey A. Ciocchetti

Corey A Ciocchetti

The twenty-first-century e-commerce environment is a scary place. Lurking within are technologically-sophisticated e-threats ready to compromise an individual’s personally identifying information (PII). At the same time, consumers submit vast amounts of PII into cyberspace without comprehending such dangers while businesses stumble to protect the information they collect and sell it on the open market. The United States legal system – currently a mixture of self-regulation and a patchwork of federal/state legislation – is ill-equipped to deal with these e-threats effectively. A new paradigm is needed. The Privacy Matrix paradigm categorizes the most prominent e-threats into three stages of the PII …