Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (13)
- Communication (10)
- Internet Law (10)
- Science and Technology Studies (10)
- Computer Law (9)
-
- Engineering (8)
- Public Affairs, Public Policy and Public Administration (8)
- Computer Sciences (7)
- Physical Sciences and Mathematics (7)
- Sociology (7)
- Business (6)
- Communication Technology and New Media (6)
- Criminology (6)
- Law and Society (6)
- Other Engineering (6)
- Public Policy (6)
- Social Policy (6)
- Technology and Innovation (6)
- First Amendment (3)
- Library and Information Science (3)
- Privacy Law (3)
- Communications Law (2)
- Law Librarianship (2)
- Legal Studies (2)
- Mass Communication (2)
- Social Media (2)
- Administrative Law (1)
- Antitrust and Trade Regulation (1)
- Bioinformatics (1)
- Institution
-
- University of Wollongong (4)
- Selected Works (3)
- SelectedWorks (3)
- Aga Khan University (1)
- Bridgewater State University (1)
-
- Maurer School of Law: Indiana University (1)
- Southwestern Oklahoma State University (1)
- Technological University Dublin (1)
- University at Buffalo School of Law (1)
- University of Nebraska - Lincoln (1)
- University of Pennsylvania Carey Law School (1)
- Washington University in St. Louis (1)
- Western University (1)
- William & Mary Law School (1)
- Wright State University (1)
- Publication
-
- Associate Professor Katina Michael (3)
- Professor Katina Michael (3)
- Administrative Issues Journal (1)
- All Faculty Scholarship (1)
- Articles by Maurer Faculty (1)
-
- Communication Studies Faculty Publications (1)
- Department of Communication Studies: Faculty Publications (1)
- FIMS Presentations (1)
- Faculty of Engineering and Information Sciences - Papers: Part A (1)
- Graduate School of Media and Communications (1)
- Journal Articles (1)
- Kno.e.sis Publications (1)
- Library Staff Publications (1)
- Michael Friedewald (1)
- Payal Arora (1)
- Reports (1)
- Scholarship@WashULaw (1)
- Simon Chesterman (1)
- Publication Type
Articles 1 - 22 of 22
Full-Text Articles in Social and Behavioral Sciences
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael
Associate Professor Katina Michael
The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael
Professor Katina Michael
This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
Simon Chesterman
This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Glogging Your Every Move, Lisa Wachsmuth, Katina Michael
Professor Katina Michael
"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."
"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.
"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
Who's In Charge Here? Information Privacy In A Social Networking World, Lisa Di Valentino
FIMS Presentations
No abstract provided.
Legal And Managerial Issues In Airport Scanning, Joan Hubbard
Legal And Managerial Issues In Airport Scanning, Joan Hubbard
Administrative Issues Journal
After the September 11 terrorist attacks on the U.S., the National Commission on Terrorist Attacks Upon the United States recommended that The TSA and the Congress give priority attention to improving the ability of screening checkpoints to detect explosives on passengers. As the legality of the TSA’s full-body scanner program continues to be debated, the federal government is investigating the next generation of airport screening technology. The privacy debate centers on the Department of Homeland Security’s use of full-body scanners to screen passengers at the nation’s major airports.
Privacy Preserving Boosting In The Cloud With Secure Half-Space Queries, Shumin Guo, Keke Chen
Privacy Preserving Boosting In The Cloud With Secure Half-Space Queries, Shumin Guo, Keke Chen
Kno.e.sis Publications
This paper presents a preliminary study on the PerturBoost approach that aims to provide efficient and secure classifier learning in the cloud with both data and model privacy preserved.
Walled Gardens: Privacy Within Public Leisure Space Online And Offline, Payal Arora
Walled Gardens: Privacy Within Public Leisure Space Online And Offline, Payal Arora
Payal Arora
Social network sites are the new urban parks where people congregate, socialize and exercise leisure. Its web architectures however are being walled in, dictated by market systems and State ideologies. These cyber-enclosures are justified along the lines of privacy that garners protection, efficiency and functionality. There is significant concern for the potential irrevocable loss of the ‘public’ and ‘open’ character intended of internet infrastructures, fearing the fostering of social segregation, homogenization and corporatization of leisure and a loss of civic sense. This paper addresses these concerns by looking at contemporary material architectures that are shaping public social and leisure space, …
Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine
Access For All: A Review Of “Law Libraries, Government Transparency, And The Internet,” A Presentation By Daniel Schuman Of The Sunlight Foundation At The All-Sis Meeting, July 22, 2012, Susan David Demaine
Articles by Maurer Faculty
Attendees at the ALL-SIS Breakfast and Business Meeting at the AALL Annual Meeting had the pleasure of hearing from Daniel Schuman of the Sunlight Foundation speak on “Law Libraries, Government Transparency, and the Internet.” The Sunlight Foundation is a nonpartisan, nonprofit organization whose mission is to increase access to federal government information resources through advocacy and the development of information technology tools.
When Antitrust Met Facebook, Christopher S. Yoo
When Antitrust Met Facebook, Christopher S. Yoo
All Faculty Scholarship
Social networks are among the hottest phenomena on the Internet. Facebook eclipsed Google as the most visited website in both 2010 and 2011. Moreover, according to Nielsen estimates, as of the end of 2011 the average American spent nearly seven hours per month on Facebook, which is more time than they spent on Google, Yahoo!, YouTube, Microsoft, and Wikipedia combined. LinkedIn’s May 19, 2011 initial public offering (“IPO”) surpassed expectations, placing the value of the company at nearly $9 billion, and approximately a year later, its stock price had risen another 20 percent. Facebook followed suit a year later with …
Social Networking Among Irish 9-16 Year Olds, Brian O'Neill, Thuy Dinh
Social Networking Among Irish 9-16 Year Olds, Brian O'Neill, Thuy Dinh
Reports
Social networking is a hugely popular and fast-growing online activity for young people in Ireland. In the EU Kids Online survey, while SNS use was not the most frequently mentioned online activity (‘watching video clips’ and ‘playing computer games’ were the most often cited items), it features across all age groups, and particularly so for teenagers.
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta
Professor Katina Michael
The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …
Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele
Keeping And Deleting Patron Records In Law Libraries, Benjamin J. Keele
Library Staff Publications
No abstract provided.
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael
Associate Professor Katina Michael
With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.
Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke
Location Privacy Under Dire Threat As Uberveillance Stalks The Streets, Katina Michael, Roger Clarke
Associate Professor Katina Michael
Location tracking and monitoring applications have proliferated with the arrival of smart phones that are equipped with onboard global positioning system (GPS) chipsets. It is now possible to locate a smart phone user down to 10 metres of accuracy on average. Innovators have been quick to capitalise on this emerging market by introducing novel pedestrian tracking technologies which can denote the geographic path of a mobile user. At the same time there is contention by law enforcement personnel over the need for a warrant process to track an individual in a public space. This paper considers the future of location …
Public Perception Of The Data Environment And Information Transactions - A Selected-Survey Analysis Of The European Public's Views On The Data Environment And Data Transactions, Dara Hallinan, Michael Friedewald
Public Perception Of The Data Environment And Information Transactions - A Selected-Survey Analysis Of The European Public's Views On The Data Environment And Data Transactions, Dara Hallinan, Michael Friedewald
Michael Friedewald
When engaging in data transactions, it has consistently been observed that individuals' behaviour does not correspond with individuals' theoretically stated preferences about privacy and the importance of personal data. This paper considers this 'paradox'. First, through an analysis of selected surveys, we elaborate a picture of how the public perceives the data environment and their interaction with it. We find that, whilst the public places significant weight on the values of privacy and data protection and has a formal understanding of the features of the data environment, there is a significant knowledge deficit relating to the specifics of data flows …
Into The World Of Privatized Publicity: Online Privacy On Social Network Sites, Yongjun Shin
Into The World Of Privatized Publicity: Online Privacy On Social Network Sites, Yongjun Shin
Communication Studies Faculty Publications
Social network sites enable and drive users to express themselves, attract attention, and gain recognition from other people by disclosing private and sensational information about themselves to their networks as well as to the public. As a result, social network sites have affected the perception and concept of privacy. In this vein, this paper aims to discuss how to address the social transformation regarding privacy on SNS space through a systematic literature study. To this end, it reviews the current research on online privacy, particularly focusing on the logic of the users’ disclosure of personal information and changing notion of …
An Examination Of Privacy Rules For Academic Advisors And College Student-Athletes: A Communication Privacy Management Perspective, Jason Thompson, Sandra Petronio, Dawn O. Braithwaite
An Examination Of Privacy Rules For Academic Advisors And College Student-Athletes: A Communication Privacy Management Perspective, Jason Thompson, Sandra Petronio, Dawn O. Braithwaite
Department of Communication Studies: Faculty Publications
This study explored how academic advisors managed revealed private information from college student-athletes. The 37 academic advisors were interviewed to address: What criteria advisors use to judge privacy rules regulating access or protection of shared private information from student-athletes, and how privacy-rule choices function in this context? Academic advisors interviewed represented 21 different institutions of the four NCAA division levels and 10 separate athletic conferences. Using Communication Privacy Management theory as a framework, findings indicated there were two main criteria: motivations and risk-benefit ratios used to develop privacy rules managing revealing and concealing the student-athlete’s private information.
The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas
The Sidis Case And The Origins Of Modern Privacy Law, Samantha Barbas
Journal Articles
The American press, it’s been said, is freer to invade personal privacy than perhaps any other in the world. The tort law of privacy, as a shield against unwanted media exposure of private life, is very weak. The usual reason given for the weakness of U.S. privacy law as a bar on the publication of private information is the strong tradition of First Amendment freedom. But “freedom of the press” alone cannot explain why liberty to publish has been interpreted as a right to print truly intimate matters or to thrust people into the spotlight against their will. Especially in …
Robust Distributed Privacy-Preserving Secure Aggregation In Vehicular Communication, Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo
Robust Distributed Privacy-Preserving Secure Aggregation In Vehicular Communication, Bo Qin, Qianhong Wu, Josep Domingo-Ferrer, Willy Susilo
Faculty of Engineering and Information Sciences - Papers: Part A
Vehicular ad hoc networks (VANETs), formed by computers embedded in vehicles and the traffic infrastructure, are expected to develop in the near future to improve traffic safety and efficiency. To this end, VANETs should be designed to be resistant against various abuses and attacks. In this paper, we first review the existing proposals to provide security, privacy, and data aggregation in vehicle-to-vehicle communication. We then address the fundamental issue of achieving these conflicting properties in a unified solution, having observed that separate efforts cannot fulfill the VANET design objectives. A set of new mechanisms are suggested for efficiently managing identities …
News’ Australian Story Of Ethics And Self-Regulation: A Cautionary Tale, Rhonda Breit, Matthew Ricketson
News’ Australian Story Of Ethics And Self-Regulation: A Cautionary Tale, Rhonda Breit, Matthew Ricketson
Graduate School of Media and Communications
I know the newsrooms, I know how cultures develop, and I’m hugely confident that there is no improper or unethical behaviour in our newsrooms.
(ABC 2011, 14 July)
This is how News Limited Chairman and Chief Executive John Hartigan publicly defended the ethical culture of News’ Australian operations in the week following News of the World’s (NoW’s) closure. Speaking during an interview on ABC’s 7.30 Report, Hartigan continued in his defence of Rupert Murdoch’s Australian stable, following shock revelations that NoW had hacked into the phone messages of murdered teenager Milly Dowler:
We’re a company of values, like most companies, …
Electronic Privacy And Employee Speech, Pauline Kim
Electronic Privacy And Employee Speech, Pauline Kim
Scholarship@WashULaw
The boundary between work and private life is blurring as a result of changes in the organization of work and advances in technology. Current privacy law is ill-equipped to address these changes and as a result, employees’ privacy in their electronic communications is only weakly protected from employer scrutiny. At the same time, the law increasingly protects certain socially valued forms of employee speech. In particular, collective speech, speech that enforces workplace regulations and speech that deters or reports employer wrong-doing are explicitly protected by law from employer reprisals. These two developments — weak protection of employee privacy and increased …