Repairing_Online_Reputation
Repairing Online Reputation: A New Multi-Modal Regulatory Approach Jacqueline D Lipton, Ph.D. * Abstract In today’s interconnected digital society, high pro file examples of online abuses abound. Cyberbullies lau nch attacks on the less powerful, often significantly d amaging victims’ reputations. Outside of reputational dam age, online harassment, bullying and stalking has led to severe emotional distress, loss of employment, physical assault and even death. Recent scholarship has identified this phenomenon b ut has done little more than note that current […]
Romanosky-Do_Data_Breach_Disclosure_Laws_Reduce_Identity_Theft
Do Data Breach Disclosure Laws Reduce Identity Theft? Sasha Romanosky, Rahul Telang, Alessandro Acquisti Heinz School of Public Policy and Management Carnegie Mellon University {sromanos, rtelang, acquisti} @andrew.cmu.edu ABSTRACT In the United States, identity theft resulted in co rporate and consumer losses of $56 billion dollars in 2005, with up to 30 percent of k […]
Relational_Surveillance_Final
1 FREEDOM OF ASSOCIATION IN A NETWORKED WORLD: FIRST AMENDMENT REGULATION OF RELATIONAL SURVEILLANCE Katherine J. Strandburg * Abstract: Recent controversies about the National Security Ag ency’s war- rantless wiretapping of international calls have ov ershadowed equally dis- turbing allegations that the government has acquire d access to a huge da- tabase of domestic call traffic data, revealing inf ormation about times, dates, and numbers called. Although communication c ontent tradition- ally has been the primar y focus of concern about […]
Regulating Privacy by Design
Electronic copy available at: http://ssrn.com/abstract=1837862 1 DRAFT: PLEAS E DO NOT CITE WITHOUT AUTHOR’S PERM ISSION REGULATING PRIVACY B Y D ESIGN Ira S. R ubinste in* Privac y o ffic ia ls in Europe a nd the US a re e mb rac ing ―p rivac y b y de sign‖ a s ne […]
Privacy’s-Other-Path
Privacy’s Other Path: Recovering the Law of Confidentiality NEIL M. R ICHARDS *&D ANIEL J. S OLOVE ** The familiar legend of privacy law holds that Samuel Warren and Louis Brandeis “invented” the right to privacy in 1890, and that William Prosser aided its develop- ment by recognizing four privacy torts in 1960. In this […]
Privacy_Government
SOLO 10.DOC 9/3/02 8:49 AM DIGITAL DOSSIERS AND THE DISSIPATION OF FOURTH AMENDMENT PRIVACY DANIEL J. S OLOVE * I. INTRODUCTION …………………………………………………………………… 1084 II. GOVERNMENT INFORMATION GATHERING AND THE PRIVATE SECTOR …………………………………………………………… 1089 A. T HIRD PARTY RECORDS AND THE GOVERNMENT ……………………….. 1089 B. G OVERNMENT -PRIVATE SECTOR INFORMATION FLOWS ………………. 1095 C. T HE […]
On Privacy Liberty in the Digital Revolution
ON PRIVACY: LIBERTY IN THE DIGITAL REVOL UTION Christina M. Gagnier * Cite as 11 J. HIGH TECH . L. 229 (2011) In the dorm room of some college freshman Political Science major at Any College U.S.A is a copy of John Stuart Mill’s On Liberty shoved under the bed. 1 Mill’s On Liberty , […]
People_Can_Be_So_Fake
Penn State Law Review Winter, 2010 Articles *809 PEOPLE CAN BE SO FAKE: A NEW DIMENSION TO PRIVACY AND TECHNOLOGY SCHOLARSHIP M. Ryan Calo [FNa1] Copyright (c) 2010 The Dickensen School of Law of The Pennsylvania State University; M. Ryan Calo This article updates the traditional discussion of privacy and technology, focused since the days […]
Model-Privacy-Regime
SOLOVE .DOC 2/2/2006 4:27:56 PM 357 A MODEL REGIME OF PRIVACY PROTECTION Daniel J. Solove* Chris Jay Hoofnagle** A series of major security breaches at companies with sensitive personal information has sparked significant attention to the prob- lems with privacy protection in the United States. Currently, the pri- vacy protections in the United States are […]
Narayanan-Ethical-Considerations-for-Web-based-Censorship-Measurement1
No Encore for Encore? Ethical questions for web -based censorship measurement 1 ARVIND NARAYANAN , BENDERT ZEVENBERGEN Abstract A pair of computer scientists recently developed a clever way to measure Internet filtering and censorship worldwide, including countries such as China and Iran. Their system, named Encore, does this by executing a snippet of code on […]