Just_Click_Submit_ The_Collection,_Dissemination_and_Tagging_of
J UST C LICK S UBMIT T HE C OLLECTION , D ISSEMINATION AND T AGGING OF P ERSONALLY IDENTIFYING INFORMATION As the twenty-first century bustles forward, the e-commerce becomes an ever more dangerous place. On a daily basis, websites collect vast amounts of pe rsonally identifying information (PII) and mine it in sophisticated databases […]
First_Generation_Laws
1 PRIVACY INVASIVE GEO -MASHUPS: PRIVACY 2.0 AND THE LIMITS OF FIRST GENERATION INFORMATI ON PRIVACY LAWS Mark Burdon † ABSTRACT Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web – based applications, such as Google Maps, is ensuring that mapping based applications are […]
Cookies_Constitution_and_Common-Law_2
DRAFT – PUBLISHED IN WINTER 2002 -2003 1 Cookies, The Constitution, and The Common Law: A Framework for the Right of Privacy on The Internet M ATTHEW C. KECK * That the individual shall have the full protection in person and in property is a principle as old as the common law; but it has […]
Calo_Boundaries_of_Privacy_Harm
THE BOUNDARIES OF PRIVACY HARM M. Ryan Calo * A BSTRACT This Essay describes the outer boundaries and core properties of privacy harm, an important, unique, but chronically under-t heorized injury. I argue that the vast majority of privacy harms fall into j ust two categories. The subjective category of privacy harm is the unwanted perception of observation. This category describes unwelcome men […]
Accountability as the Basis for Regulating Privacy Can Information Security Regulations Inform Privacy Policy
1 Accountability as the Basis for Regulating Privacy: Can Information Security Regulations Inform Privacy Policy? By Mary J. Culnan Slade Professor of Management and Information Technology IPM Department Bentley University [email protected] Ju ly 20, 2011 An earlier version of this paper was presented at the 2011 Privacy Law Scholars Conference, Berkeley, CA., June 2 -3, […]
Preserving_Identities_ Protecting_Personal_Identifying_Information
1 PRESERVING IDENTITIES: PROTECTING PERSONAL IDENTIFYING INFORMATION THROUGH ENHANCED PRIVACY POLICIES AND LAWS by Robert Sprague* and Corey Ciocchetti** “The common law has always recognized a man’s house as his castle . . . . Shall the courts thus close the front entrance to constituted authority, and open wide the back door to idle or […]
Jetten-Sharon-Selected-Issues-Concerning-the-Ethical-Use-of-Big-Data
Selected Issues Concerning the Ethical Use of Big Data Health Analytics I. Introduction a. Big Data Generally T he terms Big Data and Big Data analytics originally derive from the terms artificial intelligence, business intelligence , and business analytics ; terms used in the 1950s, 1990s, and 2000s, respectively . 1 Although some argue that […]
Harbour_&_ Koslov_ALJ 76-3_ANT314
SECTION 2 IN A WEB 2.0 WORLD: AN EXPANDED VISION OF RELEVANT PRODUCT MARKETS PAMELA JONES H ARBOUR TARA ISA K OSLOV * Section 2 enforcement by the U.S. antitrust authorities is back—at least, that is what the antitrust enforcers themselves have been saying. 1 An examination of Section 2 enforcement principles could not be […]
Privacy_Ethical_and_Legal_Considerations
Communication Law Review47 Privacy: Ethical and Legal Considerations 1 Raphael Cohen-Almagor, University of Haifa, Mount Carmel 2 Abstract Privacy is commonly understood as insulation from observability, a value asserted by individuals against the demands of a curious and intrusive society. It is intimately associated with our most profound values, our understanding of what it means […]