Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Privacy

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 30 of 38

Full-Text Articles in Social and Behavioral Sciences

The Profession's Role In Helping Psychologists Balance Society's Interests With Their Clients' Interests, Alfred Allan Dec 2020

The Profession's Role In Helping Psychologists Balance Society's Interests With Their Clients' Interests, Alfred Allan

Research outputs 2014 to 2021

Objective:

Psychologists find it difficult to balance their clients' and society's interests when these interests differ from each other, such as when their clients pose a risk of harm to others. Society's increasing preoccupation with harm makes their task even more difficult. The first aim with this article is to determine the reactions of those who make, enforce, and use law to address society's concerns and how they impact on psychologists. The second aim is to propose how the profession can assist psychologists deal with the competing demands prompted by these reactions.

Method:

A legal-ethical analysis was used to identify …


Thaw Publications, Carl Landwehr, David Kotz Dec 2020

Thaw Publications, Carl Landwehr, David Kotz

Computer Science Technical Reports

In 2013, the National Science Foundation's Secure and Trustworthy Cyberspace program awarded a Frontier grant to a consortium of four institutions, led by Dartmouth College, to enable trustworthy cybersystems for health and wellness. As of this writing, the Trustworthy Health and Wellness (THaW) project's bibliography includes more than 130 significant publications produced with support from the THaW grant; these publications document the progress made on many fronts by the THaW research team. The collection includes dissertations, theses, journal papers, conference papers, workshop contributions and more. The bibliography is organized as a Zotero library, which provides ready access to citation materials …


Open Banking: Credit Market Competition When Borrowers Own The Data, Zhiguo He, Jing Huang, Jidong Zhou Nov 2020

Open Banking: Credit Market Competition When Borrowers Own The Data, Zhiguo He, Jing Huang, Jidong Zhou

Cowles Foundation Discussion Papers

Open banking facilitates data sharing consented by customers who generate the data, with a regulatory goal of promoting competition between traditional banks and challenger fintech entrants. We study lending market competition when sharing banks’ customer data enables better borrower screening or targeting by fintech lenders. Open banking could make the entire financial industry better off yet leave all borrowers worse off, even if borrowers could choose whether to share their data. We highlight the importance of equilibrium credit quality inference from borrowers’ endogenous sign-up decisions. When data sharing triggers privacy concerns by facilitating exploitative targeted loans, the equilibrium sign-up population …


Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib Nov 2020

Digital Identity: A Human-Centered Risk Awareness Study, Toufic N. Chebib

USF Tampa Graduate Theses and Dissertations

Cybersecurity threats and compromises have been at the epicenter of media attention; their risk and effect on people’s digital identity is something not to be taken lightly. Though cyber threats have affected a great number of people in all age groups, this study focuses on 55 to 75-year-olds, as this age group is close to retirement or already retired. Therefore, a notable compromise impacting their digital identity can have a major impact on their life.

To help guide this study, the following research question was formulated, “What are the risk perceptions of individuals, between the ages of 55 and 75 …


Open Banking: Credit Market Competition When Borrowers Own The Data, Zhiguo He, Jing Huang, Jidong Zhou Nov 2020

Open Banking: Credit Market Competition When Borrowers Own The Data, Zhiguo He, Jing Huang, Jidong Zhou

Cowles Foundation Discussion Papers

Open banking facilitates data sharing consented to by customers who generate the data, with the regulatory goal of promoting competition between traditional banks and challenger fintech entrants. We study lending market competition when sharing banks’ customer transaction data enables better borrower screening. Open banking can make the entire financial industry better off yet leave all borrowers worse off, even if borrowers have the control of whether to share their banking data. We highlight the importance of the equilibrium credit quality inference from borrowers’ endogenous sign-up decisions. We also study extensions with fintech affinities and data sharing on borrower preferences.


Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally Oct 2020

Secure Authentication And Privacy-Preserving Techniques In Vehicular Ad-Hoc Networks (Vanets), Dakshnamoorthy Manivannan, Shafika Showkat Moni, Sherali Zeadally

Computer Science Faculty Publications

In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks (VANETs). Today car manufacturers have already started to equip vehicles with sophisticated sensors that can provide many assistive features such as front collision avoidance, automatic lane tracking, partial autonomous driving, suggestive lane changing, and so on. Such technological advancements are enabling the adoption of VANETs not only to provide safer and more comfortable driving experience but also provide many other useful services to the driver as well as passengers of a vehicle. However, privacy, authentication and secure message dissemination are some of the main issues that …


The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post Oct 2020

The First Amendment And The Right(S) Of Publicity, Jennifer E. Rothman, Robert C. Post

All Faculty Scholarship

The right of publicity protects persons against unauthorized uses of their identity, most typically their names, images, or voices. The right is in obvious tension with freedom of speech. Yet courts seeking to reconcile the right with the First Amendment have to date produced only a notoriously confused muddle of inconsistent constitutional doctrine. In this Article, we suggest a way out of the maze. We propose a relatively straightforward framework for analyzing how the right of publicity should be squared with First Amendment principles.

At the root of contemporary constitutional confusion lies a failure to articulate the precise state interests …


Privacy, Ethics, And Access In Digital Libraries, Kelley Rowan, Rebecca Bakker Sep 2020

Privacy, Ethics, And Access In Digital Libraries, Kelley Rowan, Rebecca Bakker

Works of the FIU Libraries

This presentation shares privacy challenges that librarians in the Digital Collections Center at FIU have encountered when working with the creators of content in the institutional repository and digital collections. The presenters share a brief history of privacy laws and the ethical concerns inherent in the juxtaposition between access and privacy. This presentation suggests possible solutions for other digital librarians concerned about privacy and take down requests.


The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin Aug 2020

The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin

Open Educational Resources

Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.


Brave New World: Privacy, Data Sharing And Evidence Based Policy Making, Rhonda S. Binda Aug 2020

Brave New World: Privacy, Data Sharing And Evidence Based Policy Making, Rhonda S. Binda

Open Educational Resources

The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities in particular are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, governments are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more …


Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton Aug 2020

Law And Authors: A Legal Handbook For Writers (Introduction), Jacqueline D. Lipton

Book Chapters

Drawing on a wealth of experience in legal scholarship and publishing, Professor Jacqueline D. Lipton provides a useful legal guide for writers whatever their levels of expertise or categories of work (fiction, nonfiction, academic, journalism, freelance content development). This introductory chapter outlines the key legal and business issues authors are likely to face during the course of their careers, and emphasizes that most legal problems have solutions so law should never be an excuse to avoid writing something that an author feels strongly about creating. The larger work draws from case studies and hypothetical examples to address issues of copyright …


Covid-19 Is Spatial: Ensuring That Mobile Big Data Is Used For Social Good, Age Poom, Olle Järv, Matthew Zook, Tuuli Toivonen Jul 2020

Covid-19 Is Spatial: Ensuring That Mobile Big Data Is Used For Social Good, Age Poom, Olle Järv, Matthew Zook, Tuuli Toivonen

Geography Faculty Publications

The mobility restrictions related to COVID-19 pandemic have resulted in the biggest disruption to individual mobilities in modern times. The crisis is clearly spatial in nature, and examining the geographical aspect is important in understanding the broad implications of the pandemic. The avalanche of mobile Big Data makes it possible to study the spatial effects of the crisis with spatiotemporal detail at the national and global scales. However, the current crisis also highlights serious limitations in the readiness to take the advantage of mobile Big Data for social good, both within and beyond the interests of health sector. We propose …


It Is All About Location: Smartphones And Tracking The Spread Of Covid-19, Jordan Frith, Michael Saker Jul 2020

It Is All About Location: Smartphones And Tracking The Spread Of Covid-19, Jordan Frith, Michael Saker

Publications

Mobile phone location data have become tied to understandings of and responses to the COVID-19 pandemic. Data visualizations have used mobile phone data to inform people about how mobility practices may be linked to the spread of the virus, and governments have explored contact tracing that relies upon mobile phone data. This article examines how these uses of location data implicate three particular issues that have been present in the growing body of locative media research: (1) anonymized data are often not anonymous, (2) location data are not always representative and can exacerbate inequality, and (3) location data are a …


Never Secret Enough, James Sheehan Jun 2020

Never Secret Enough, James Sheehan

Quest

The Multiple Genre Argument

Research in progress for ENGL 1301: Composition I

Faculty Mentor: W. Scott Cheney, Ph.D.

The following paper represents exceptional research completed by a student in English 1301, the first course in the two-semester composition sequence at Collin College. Students in ENGL 1301 are introduced to the concept of academic research by learning to ask research-focused questions and then use library databases to find sources that provide answers. Because traditional research writing tends to emphasize sources over context, the following assignment works to disrupt the automatic methods that students have learned and asks them to think creatively …


From Protecting To Performing Privacy, Garfield Benjamin May 2020

From Protecting To Performing Privacy, Garfield Benjamin

The Journal of Sociotechnical Critique

Privacy is increasingly important in an age of facial recognition technologies, mass data collection, and algorithmic decision-making. Yet it persists as a contested term, a behavioural paradox, and often fails users in practice. This article critiques current methods of thinking privacy in protectionist terms, building on Deleuze's conception of the society of control, through its problematic relation to freedom, property and power. Instead, a new mode of understanding privacy in terms of performativity is provided, drawing on Butler and Sedgwick as well as Cohen and Nissenbaum. This new form of privacy is based on identity, consent and collective action, a …


Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey May 2020

Library Application Of Deep Web And Dark Web Technologies, Mollie L. Coffey

School of Information Student Research Journal

The Deep Web and Dark Web are legitimate tools for use in the field of information science, adding to the discussion of patron privacy. The American Library Association policies on privacy and confidentiality combined with the advancement of internet technology necessitate that library professionals become fluent in Dark Web usability in libraries.


I Always Feel Like Somebody’S Watching Me: Student Perceptions Of Library Data Privacy, Megan Palmer, Amie D. Freeman, Jade Geary May 2020

I Always Feel Like Somebody’S Watching Me: Student Perceptions Of Library Data Privacy, Megan Palmer, Amie D. Freeman, Jade Geary

South Carolina Libraries

Data privacy has emerged as a controversial topic in higher education. As librarians, we recognize the importance of privacy and confidentiality for allowing patrons to learn and explore without unnecessary barriers or fear of repercussions. However, there is a growing trend of data collection and analysis in libraries that impacts a patron’s right to privacy. In a presentation given at the 2019 South Carolina Library Association Annual Conference, we explored issues of click-through-consent, data invasion, and awareness of the types of data tracked. We asked for audience engagement as we discussed future directions including a survey on student perceptions of …


Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly Apr 2020

Text Messaging Between School Counselors And Students: An Exploratory Study, Nicholas R. Gilly

Graduate Theses & Dissertations

This exploratory case study examines the impact of text messaging on mentoring relationships when used as an outreach between school counselors and high school students, where established relationships are lacking. An SMS gateway was used to mediate communication between school counselors (N=2) and students (N=5) over a three-month timeframe. The SMS gateway converted email, sent from counselors, to text messages, which were received on mobile devices of students and allowed students to respond back to counselors. Findings indicate that the use of text messaging may ease scheduling of face-to-face meetings between counselors and students, but evidence does not support any …


The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels Apr 2020

The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels

SMU Data Science Review

The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain distributed …


Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey Apr 2020

Empowering Creators: Student Agency And Digital Safety In Alternative Assignments, Marisa Petrich, Erika Bailey

Library Publications and Presentations

This poster focuses on critical questions and examples of how student agency, privacy, and intellectual freedom can become a focus of open pedagogy and alternative assignments.Increasingly, instructors are offering opportunities for students to publicly share their work online — be it a class website, blog, or paper alternatives such as podcast episodes or short videos. These assignments have great potential to impact students’ digital identities and awareness of their own intellectual property rights beyond the parameters of the academic environment. This takes on increased importance when we consider that students from already marginalized identities may be more vulnerable to online …


Privacy Or The Polls: Public Voter Registration Laws As A Modern Form Of Vote Denial, Audrey Paige Sauer Apr 2020

Privacy Or The Polls: Public Voter Registration Laws As A Modern Form Of Vote Denial, Audrey Paige Sauer

William & Mary Law Review

On May 11, 2017, President Donald J. Trump signed an executive order establishing the Presidential Advisory Commission on Election Integrity (PACEI), with the mission to “study the registration and voting processes used in Federal elections.” Pursuant to this mission, Vice Chair of the Commission, Kansas Secretary of State Kris Kobach, sent out letters to state election officials soliciting all “publicly available voter roll data,” including all registrants’ full first and last names, middle names or initials, addresses, dates of birth, political party, last four digits of Social Security numbers if available, voter history from 2006 onward, information regarding any felony …


Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D. Mar 2020

Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D.

National Training Aircraft Symposium (NTAS)

Unmanned Aerial Systems (UAS), Unmanned Aeronautical Vehicles (UAV), drones and Personal Aerial Vehicles (PAV) constitute the greatest technological advancement since the jet age. (Elaine Chao, Secretary of Transportation, October 26, 2017) This technological advancement has prompted significant public policy challenges and the need for new laws regarding navigable airspace. This proposal investigates how airspace used by drones will evolve given existing Constitutional and common law principals. These principals will influence the creation, development and modification of UAS airspace regulations by the Federal Aviation Administration (FAA).

Two critical but unanswered questions concerning the National Airspace System, are where does navigable airspace …


Uses Unaddressed: How Social Technologies Tacitly Allow Gender-Based Violence, Brooke Marston Mar 2020

Uses Unaddressed: How Social Technologies Tacitly Allow Gender-Based Violence, Brooke Marston

Comm-entary

Growing technological capabilities have enhanced and intensified the potential for surveillance in many areas of life. Particularly, the placement of advanced technology in the hands of everyday people has produced ample opportunities for interpersonal monitoring. This growing capacity to surveil others we know without sophisticated techniques has concerning implications for acts of gender-based violence and intimate partner violence, which often hinge on surveillance, isolation, and control. Often, technology is used to the advantage of abusers in achieving such ends, and the wealth of personal information that is often available online leaves users vulnerable to acts of gender-based violence such as …


The Robot Privacy Paradox: Understanding How Privacy Concerns Shape Intentions To Use Social Robots, Christoph Lutz, Aurelia Tamò-Larrieux Feb 2020

The Robot Privacy Paradox: Understanding How Privacy Concerns Shape Intentions To Use Social Robots, Christoph Lutz, Aurelia Tamò-Larrieux

Human-Machine Communication

Conceptual research on robots and privacy has increased but we lack empirical evidence about the prevalence, antecedents, and outcomes of different privacy concerns about social robots. To fill this gap, we present a survey, testing a variety of antecedents from trust, technology adoption, and robotics scholarship. Respondents are most concerned about data protection on the manufacturer side, followed by social privacy concerns and physical concerns. Using structural equation modeling, we find a privacy paradox, where the perceived benefits of social robots override privacy concerns.


Appendix A: Interview Guide With Privacy-Related Questions (Full Version), Anabel Quan-Haase, Dennis Ho Jan 2020

Appendix A: Interview Guide With Privacy-Related Questions (Full Version), Anabel Quan-Haase, Dennis Ho

FIMS Publications

Interview Guide: Networked individualism, East York Project


Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii Jan 2020

Exploring Mid-Market Strategies For Big Data Governance, Kenneth Stanley Knapton Iii

Walden Dissertations and Doctoral Studies

Many data scientists are struggling to adopt effective data governance practices as they transition from traditional data analysis to big data analytics. Data governance of big data requires new strategies to deal with the volume, variety, and velocity attributes of big data. The purpose of this qualitative multiple case study was to explore big data governance strategies employed by data scientists to provide a holistic perspective of those data for making decisions. The participants were 10 data scientists employed in multiple mid-market companies in the greater Salt Lake City, Utah area who have strategies to govern big data. This study’s …


Balancing Transparency And Privacy In A University Sexual Misconduct Case: A Legal Public Relations Case Study, Chelsea L. Woods, Shari R. Veil Jan 2020

Balancing Transparency And Privacy In A University Sexual Misconduct Case: A Legal Public Relations Case Study, Chelsea L. Woods, Shari R. Veil

Communication Faculty Publications

In 2016, the University of Kentucky became embroiled in an open records debate with its student newspaper, The Kentucky Kernel. Following a professor’s resignation amid a sexual misconduct investigation, the Kernel asked for records pertaining to the case. The University refused, claiming the information would violate survivors’ privacy. The decision sparked public backlash, forcing the University to combat accusations that it was prioritizing reputation over student safety. This case study provides insight into the crisis management process by exploring how key actors in the case made decisions. Drawing from theoretical perspectives including stakeholder theory and the ethics of care …


A New Approach To Keep The Privacy Information Of The Signer In A Digital Signature Scheme, Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh Jan 2020

A New Approach To Keep The Privacy Information Of The Signer In A Digital Signature Scheme, Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh

Faculty of Engineering and Information Sciences - Papers: Part B

In modern applications, such as Electronic Voting, e-Health, e-Cash, there is a need that the validity of a signature should be verified by only one responsible person. This is opposite to the traditional digital signature scheme where anybody can verify a signature. There have been several solutions for this problem, the first one is we combine a signature scheme with an encryption scheme; the second one is to use the group signature; and the last one is to use the strong designated verifier signature scheme with the undeniable property. In this paper, we extend the traditional digital signature scheme to …


Privacy And Access In The Massachusetts Society For The Prevention Of Cruelty To Children Records, Jessica Holden, Ana Roeschley Jan 2020

Privacy And Access In The Massachusetts Society For The Prevention Of Cruelty To Children Records, Jessica Holden, Ana Roeschley

Joseph P. Healey Library Publications

Archival collections that include records about victims and survivors of child abuse present unique challenges regarding privacy, access, and representation. With a long tenure of collecting on the history of social welfare, University Archives and Special Collections (UASC) in the Joseph P. Healey Library at the University of Massachusetts Boston had to address these challenges before processing and making available the historic inactive records of the Massachusetts Society for the Prevention of Cruelty to Children (MSPCC). UASC and the MSPCC took steps to ensure that the MSPCC collection would be accessible to the survivors represented in the records and to …


Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai Jan 2020

Regulation Of Algorithmic Tools In The United States, Christopher S. Yoo, Alicia Lai

All Faculty Scholarship

Policymakers in the United States have just begun to address regulation of artificial intelligence technologies in recent years, gaining momentum through calls for additional research funding, piece-meal guidance, proposals, and legislation at all levels of government. This Article provides an overview of high-level federal initiatives for general artificial intelligence (AI) applications set forth by the U.S. president and responding agencies, early indications from the incoming Biden Administration, targeted federal initiatives for sector-specific AI applications, pending federal legislative proposals, and state and local initiatives. The regulation of the algorithmic ecosystem will continue to evolve as the United States continues to search …