Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (14)
- Communication (10)
- Library and Information Science (10)
- Privacy Law (10)
- Physical Sciences and Mathematics (7)
-
- Business (6)
- Computer Sciences (6)
- Communication Technology and New Media (5)
- Economics (5)
- Engineering (5)
- Public Affairs, Public Policy and Public Administration (5)
- Science and Technology Studies (5)
- Computer Engineering (4)
- Legal Studies (4)
- Public Policy (4)
- Arts and Humanities (3)
- Constitutional Law (3)
- Digital Communications and Networking (3)
- Internet Law (3)
- Science and Technology Law (3)
- Administrative Law (2)
- Archival Science (2)
- Business Law, Public Responsibility, and Ethics (2)
- Computer Law (2)
- Consumer Protection Law (2)
- Databases and Information Systems (2)
- Education (2)
- Ethics and Political Philosophy (2)
- Information Security (2)
- Institution
-
- Washington University in St. Louis (4)
- University of Kentucky (3)
- City University of New York (CUNY) (2)
- Old Dominion University (2)
- University of Pennsylvania Carey Law School (2)
-
- Walden University (2)
- Yale University (2)
- Arcadia University (1)
- Bowdoin College (1)
- Clemson University (1)
- Collin College (1)
- Dartmouth College (1)
- Edith Cowan University (1)
- Embry-Riddle Aeronautical University (1)
- Florida International University (1)
- San Jose State University (1)
- Southern Methodist University (1)
- University of Central Florida (1)
- University of Massachusetts Boston (1)
- University of New Hampshire (1)
- University of Pittsburgh School of Law (1)
- University of South Carolina (1)
- University of South Florida (1)
- University of Washington Tacoma (1)
- University of Wollongong (1)
- Western University (1)
- William & Mary Law School (1)
- Zayed University (1)
- Publication
-
- Scholarship@WashULaw (4)
- All Faculty Scholarship (2)
- Cowles Foundation Discussion Papers (2)
- Open Educational Resources (2)
- Walden Dissertations and Doctoral Studies (2)
-
- All Works (1)
- Book Chapters (1)
- Comm-entary (1)
- Communication Faculty Publications (1)
- Computer Science Faculty Publications (1)
- Computer Science Technical Reports (1)
- FIMS Publications (1)
- Faculty of Engineering and Information Sciences - Papers: Part B (1)
- Geography Faculty Publications (1)
- Graduate Theses & Dissertations (1)
- Honors Projects (1)
- Human-Machine Communication (1)
- Joseph P. Healey Library Publications (1)
- Library Publications and Presentations (1)
- Marketing Faculty Publications (1)
- National Training Aircraft Symposium (NTAS) (1)
- Publications (1)
- Quest (1)
- Research outputs 2014 to 2021 (1)
- SMU Data Science Review (1)
- School of Information Student Research Journal (1)
- South Carolina Libraries (1)
- The Journal of Sociotechnical Critique (1)
- USF Tampa Graduate Theses and Dissertations (1)
- William & Mary Law Review (1)
- Publication Type
Articles 1 - 30 of 38
Full-Text Articles in Social and Behavioral Sciences
The Profession's Role In Helping Psychologists Balance Society's Interests With Their Clients' Interests, Alfred Allan
The Profession's Role In Helping Psychologists Balance Society's Interests With Their Clients' Interests, Alfred Allan
Research outputs 2014 to 2021
Objective:
Psychologists find it difficult to balance their clients' and society's interests when these interests differ from each other, such as when their clients pose a risk of harm to others. Society's increasing preoccupation with harm makes their task even more difficult. The first aim with this article is to determine the reactions of those who make, enforce, and use law to address society's concerns and how they impact on psychologists. The second aim is to propose how the profession can assist psychologists deal with the competing demands prompted by these reactions.
Method:
A legal-ethical analysis was used to identify …
Thaw Publications, Carl Landwehr, David Kotz
Thaw Publications, Carl Landwehr, David Kotz
Computer Science Technical Reports
In 2013, the National Science Foundation's Secure and Trustworthy Cyberspace program awarded a Frontier grant to a consortium of four institutions, led by Dartmouth College, to enable trustworthy cybersystems for health and wellness. As of this writing, the Trustworthy Health and Wellness (THaW) project's bibliography includes more than 130 significant publications produced with support from the THaW grant; these publications document the progress made on many fronts by the THaW research team. The collection includes dissertations, theses, journal papers, conference papers, workshop contributions and more. The bibliography is organized as a Zotero library, which provides ready access to citation materials …
Open Banking: Credit Market Competition When Borrowers Own The Data, Zhiguo He, Jing Huang, Jidong Zhou
Open Banking: Credit Market Competition When Borrowers Own The Data, Zhiguo He, Jing Huang, Jidong Zhou
Cowles Foundation Discussion Papers
Open banking facilitates data sharing consented by customers who generate the data, with a regulatory goal of promoting competition between traditional banks and challenger fintech entrants. We study lending market competition when sharing banks’ customer data enables better borrower screening or targeting by fintech lenders. Open banking could make the entire financial industry better off yet leave all borrowers worse off, even if borrowers could choose whether to share their data. We highlight the importance of equilibrium credit quality inference from borrowers’ endogenous sign-up decisions. When data sharing triggers privacy concerns by facilitating exploitative targeted loans, the equilibrium sign-up population …
Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib
Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib
USF Tampa Graduate Theses and Dissertations
Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.
To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …
Open Banking: Credit Market Competition When Borrowers Own The Data, Zhiguo He, Jing Huang, Jidong Zhou
Open Banking: Credit Market Competition When Borrowers Own The Data, Zhiguo He, Jing Huang, Jidong Zhou
Cowles Foundation Discussion Papers
Open banking facilitates data sharing consented to by customers who generate the data, with the regulatory goal of promoting competition between traditional banks and challenger fintech entrants. We study lending market competition when sharing banks’ customer transaction data enables better borrower screening. Open banking can make the entire financial industry better off yet leave all borrowers worse off, even if borrowers have the control of whether to share their banking data. We highlight the importance of the equilibrium credit quality inference from borrowers’ endogenous sign-up decisions. We also study extensions with fintech affinities and data sharing on borrower preferences.
Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally
Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally
Computer Science Faculty Publications
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks (VANETs). Today car manufacturers have already started to equip vehicles with sophisticated sensors that can provide many assistive features such as front collision avoidance, automatic lane tracking, partial autonomous driving, suggestive lane changing, and so on. Such technological advancements are enabling the adoption of VANETs not only to provide safer and more comfortable driving experience but also provide many other useful services to the driver as well as passengers of a vehicle. However, privacy, authentication and secure message dissemination are some of the main issues that …
The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post
The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post
All Faculty Scholarship
The right of publicity protects persons against unauthorized uses of their identity, most typically their names, images, or voices. The right is in obvious tension with freedom of speech. Yet courts seeking to reconcile the right with the First Amendment have to date produced only a notoriously confused muddle of inconsistent constitutional doctrine. In this Article, we suggest a way out of the maze. We propose a relatively straightforward framework for analyzing how the right of publicity should be squared with First Amendment principles.
At the root of contemporary constitutional confusion lies a failure to articulate the precise state interests …
Privacy, Ethics, And Access In Digital Libraries, Kelley Rowan, Rebecca Bakker
Privacy, Ethics, And Access In Digital Libraries, Kelley Rowan, Rebecca Bakker
Works of the FIU Libraries
This presentation shares privacy challenges that librarians in the Digital Collections Center at FIU have encountered when working with the creators of content in the institutional repository and digital collections. The presenters share a brief history of privacy laws and the ethical concerns inherent in the juxtaposition between access and privacy. This presentation suggests possible solutions for other digital librarians concerned about privacy and take down requests.
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Brave New World: Privacy, Data Sharing And Evidence Based Policy Making, Rhonda S. Binda
Brave New World: Privacy, Data Sharing And Evidence Based Policy Making, Rhonda S. Binda
Open Educational Resources
The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities in particular are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, governments are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more …
Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton
Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton
Book Chapters
Drawing on a wealth of experience in legal scholarship and publishing, Professor Jacqueline D. Lipton provides a useful legal guide for writers whatever their levels of expertise or categories of work (fiction, nonfiction, academic, journalism, freelance content development). This introductory chapter outlines the key legal and business issues authors are likely to face during the course of their careers, and emphasizes that most legal problems have solutions so law should never be an excuse to avoid writing something that an author feels strongly about creating. The larger work draws from case studies and hypothetical examples to address issues of copyright …
Covid-19 Is Spatial: Ensuring That Mobile Big Data Is Used For Social Good, Age Poom, Olle Järv, Matthew Zook, Tuuli Toivonen
Covid-19 Is Spatial: Ensuring That Mobile Big Data Is Used For Social Good, Age Poom, Olle Järv, Matthew Zook, Tuuli Toivonen
Geography Faculty Publications
The mobility restrictions related to COVID-19 pandemic have resulted in the biggest disruption to individual mobilities in modern times. The crisis is clearly spatial in nature, and examining the geographical aspect is important in understanding the broad implications of the pandemic. The avalanche of mobile Big Data makes it possible to study the spatial effects of the crisis with spatiotemporal detail at the national and global scales. However, the current crisis also highlights serious limitations in the readiness to take the advantage of mobile Big Data for social good, both within and beyond the interests of health sector. We propose …
It Is All About Location: Smartphones And Tracking The Spread Of Covid-19, Jordan Frith, Michael Saker
It Is All About Location: Smartphones And Tracking The Spread Of Covid-19, Jordan Frith, Michael Saker
Publications
Mobile phone location data have become tied to understandings of and responses to the COVID-19 pandemic. Data visualizations have used mobile phone data to inform people about how mobility practices may be linked to the spread of the virus, and governments have explored contact tracing that relies upon mobile phone data. This article examines how these uses of location data implicate three particular issues that have been present in the growing body of locative media research: (1) anonymized data are often not anonymous, (2) location data are not always representative and can exacerbate inequality, and (3) location data are a …
Never Secret Enough, James Sheehan
Never Secret Enough, James Sheehan
Quest
The Multiple Genre Argument
Research in progress for ENGL 1301: Composition I
Faculty Mentor: W. Scott Cheney, Ph.D.
The following paper represents exceptional research completed by a student in English 1301, the first course in the two-semester composition sequence at Collin College. Students in ENGL 1301 are introduced to the concept of academic research by learning to ask research-focused questions and then use library databases to find sources that provide answers. Because traditional research writing tends to emphasize sources over context, the following assignment works to disrupt the automatic methods that students have learned and asks them to think creatively …
From Protecting To Performing Privacy, Garfield Benjamin
From Protecting To Performing Privacy, Garfield Benjamin
The Journal of Sociotechnical Critique
Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …
Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey
Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey
School of Information Student Research Journal
The Deep Web and Dark Web are legitimate tools for use in the field of information science, adding to the discussion of patron privacy. The American Library Association policies on privacy and confidentiality combined with the advancement of internet technology necessitate that library professionals become fluent in Dark Web usability in libraries.
I Always Feel Like Somebody’S Watching Me: Student Perceptions Of Library Data Privacy, Megan Palmer, Amie D. Freeman, Jade Geary
I Always Feel Like Somebody’S Watching Me: Student Perceptions Of Library Data Privacy, Megan Palmer, Amie D. Freeman, Jade Geary
South Carolina Libraries
Data privacy has emerged as a controversial topic in higher education. As librarians, we recognize the importance of privacy and confidentiality for allowing patrons to learn and explore without unnecessary barriers or fear of repercussions. However, there is a growing trend of data collection and analysis in libraries that impacts a patron’s right to privacy. In a presentation given at the 2019 South Carolina Library Association Annual Conference, we explored issues of click-through-consent, data invasion, and awareness of the types of data tracked. We asked for audience engagement as we discussed future directions including a survey on student perceptions of …
Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly
Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly
Graduate Theses & Dissertations
This exploratory case study examines the impact of text messaging on mentoring relationships when used as an outreach between school counselors and high school students, where established relationships are lacking. An SMS gateway was used to mediate communication between school counselors (N=2) and students (N=5) over a three-month timeframe. The SMS gateway converted email, sent from counselors, to text messages, which were received on mobile devices of students and allowed students to respond back to counselors. Findings indicate that the use of text messaging may ease scheduling of face-to-face meetings between counselors and students, but evidence does not support any …
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
SMU Data Science Review
The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain distributed …
Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey
Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey
Library Publications and Presentations
This poster focuses on critical questions and examples of how student agency, privacy, and intellectual freedom can become a focus of open pedagogy and alternative assignments.Increasingly, instructors are offering opportunities for students to publicly share their work online — be it a class website, blog, or paper alternatives such as podcast episodes or short videos. These assignments have great potential to impact students’ digital identities and awareness of their own intellectual property rights beyond the parameters of the academic environment. This takes on increased importance when we consider that students from already marginalized identities may be more vulnerable to online …
Privacy Or The Polls: Public Voter Registration Laws As A Modern Form Of Vote Denial, Audrey Paige Sauer
Privacy Or The Polls: Public Voter Registration Laws As A Modern Form Of Vote Denial, Audrey Paige Sauer
William & Mary Law Review
On May 11, 2017, President Donald J. Trump signed an executive order establishing the Presidential Advisory Commission on Election Integrity (PACEI), with the mission to “study the registration and voting processes used in Federal elections.” Pursuant to this mission, Vice Chair of the Commission, Kansas Secretary of State Kris Kobach, sent out letters to state election officials soliciting all “publicly available voter roll data,” including all registrants’ full first and last names, middle names or initials, addresses, dates of birth, political party, last four digits of Social Security numbers if available, voter history from 2006 onward, information regarding any felony …
Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D.
Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D.
National Training Aircraft Symposium (NTAS)
Unmanned Aerial Systems (UAS), Unmanned Aeronautical Vehicles (UAV), drones and Personal Aerial Vehicles (PAV) constitute the greatest technological advancement since the jet age. (Elaine Chao, Secretary of Transportation, October 26, 2017) This technological advancement has prompted significant public policy challenges and the need for new laws regarding navigable airspace. This proposal investigates how airspace used by drones will evolve given existing Constitutional and common law principals. These principals will influence the creation, development and modification of UAS airspace regulations by the Federal Aviation Administration (FAA).
Two critical but unanswered questions concerning the National Airspace System, are where does navigable airspace …
Uses Unaddressed: How Social Technologies Tacitly Allow Gender-Based Violence, Brooke Marston
Uses Unaddressed: How Social Technologies Tacitly Allow Gender-Based Violence, Brooke Marston
Comm-entary
Growing technological capabilities have enhanced and intensified the potential for surveillance in many areas of life. Particularly, the placement of advanced technology in the hands of everyday people has produced ample opportunities for interpersonal monitoring. This growing capacity to surveil others we know without sophisticated techniques has concerning implications for acts of gender-based violence and intimate partner violence, which often hinge on surveillance, isolation, and control. Often, technology is used to the advantage of abusers in achieving such ends, and the wealth of personal information that is often available online leaves users vulnerable to acts of gender-based violence such as …
The Robot Privacy Paradox: Understanding How Privacy Concerns Shape Intentions To Use Social Robots, Christoph Lutz, Aurelia Tamò-Larrieux
The Robot Privacy Paradox: Understanding How Privacy Concerns Shape Intentions To Use Social Robots, Christoph Lutz, Aurelia Tamò-Larrieux
Human-Machine Communication
Conceptual research on robots and privacy has increased but we lack empirical evidence about the prevalence, antecedents, and outcomes of different privacy concerns about social robots. To fill this gap, we present a survey, testing a variety of antecedents from trust, technology adoption, and robotics scholarship. Respondents are most concerned about data protection on the manufacturer side, followed by social privacy concerns and physical concerns. Using structural equation modeling, we find a privacy paradox, where the perceived benefits of social robots override privacy concerns.
Appendix A: Interview Guide With Privacy-Related Questions (Full Version), Anabel Quan-Haase, Dennis Ho
Appendix A: Interview Guide With Privacy-Related Questions (Full Version), Anabel Quan-Haase, Dennis Ho
FIMS Publications
Interview Guide: Networked individualism, East York Project
Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii
Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii
Walden Dissertations and Doctoral Studies
Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This studyâs …
Balancing Transparency And Privacy In A University Sexual Misconduct Case: A Legal Public Relations Case Study, Chelsea L. Woods, Shari R. Veil
Balancing Transparency And Privacy In A University Sexual Misconduct Case: A Legal Public Relations Case Study, Chelsea L. Woods, Shari R. Veil
Communication Faculty Publications
In 2016, the University of Kentucky became embroiled in an open records debate with its student newspaper, The Kentucky Kernel. Following a professor’s resignation amid a sexual misconduct investigation, the Kernel asked for records pertaining to the case. The University refused, claiming the information would violate survivors’ privacy. The decision sparked public backlash, forcing the University to combat accusations that it was prioritizing reputation over student safety. This case study provides insight into the crisis management process by exploring how key actors in the case made decisions. Drawing from theoretical perspectives including stakeholder theory and the ethics of care …
A New Approach To Keep The Privacy Information Of The Signer In A Digital Signature Scheme, Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh
A New Approach To Keep The Privacy Information Of The Signer In A Digital Signature Scheme, Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh
Faculty of Engineering and Information Sciences - Papers: Part B
In modern applications, such as Electronic Voting, e-Health, e-Cash, there is a need that the validity of a signature should be verified by only one responsible person. This is opposite to the traditional digital signature scheme where anybody can verify a signature. There have been several solutions for this problem, the first one is we combine a signature scheme with an encryption scheme; the second one is to use the group signature; and the last one is to use the strong designated verifier signature scheme with the undeniable property. In this paper, we extend the traditional digital signature scheme to …
Privacy And Access In The Massachusetts Society For The Prevention Of Cruelty To Children Records, Jessica Holden, Ana Roeschley
Privacy And Access In The Massachusetts Society For The Prevention Of Cruelty To Children Records, Jessica Holden, Ana Roeschley
Joseph P. Healey Library Publications
Archival collections that include records about victims and survivors of child abuse present unique challenges regarding privacy, access, and representation. With a long tenure of collecting on the history of social welfare, University Archives and Special Collections (UASC) in the Joseph P. Healey Library at the University of Massachusetts Boston had to address these challenges before processing and making available the historic inactive records of the Massachusetts Society for the Prevention of Cruelty to Children (MSPCC). UASC and the MSPCC took steps to ensure that the MSPCC collection would be accessible to the survivors represented in the records and to …
Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai
Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai
All Faculty Scholarship
Policymakers in the United States have just begun to address regulation of artificial intelligence technologies in recent years, gaining momentum through calls for additional research funding, piece-meal guidance, proposals, and legislation at all levels of government. This Article provides an overview of high-level federal initiatives for general artificial intelligence (AI) applications set forth by the U.S. president and responding agencies, early indications from the incoming Biden Administration, targeted federal initiatives for sector-specific AI applications, pending federal legislative proposals, and state and local initiatives. The regulation of the algorithmic ecosystem will continue to evolve as the United States continues to search …