Why-Johnny-Can’t-Opt-Out1
Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral Advertising Pedro G. Leon, Blase Ur, Rebecca Balebako, Lorrie Faith Cranor, Richard Shay, and Yang Wang October 31, 2011 CMU-CyLab-11-017 CyLab Carnegie Mellon University Pittsburgh, PA 15213 Why Johnny Can’t Opt Out: A Usability Evaluation of Tools to Limit Online Behavioral […]
Toward Accountability in the Cloud
View from the Cloud Editor: George Pallis • [email protected] 2 Published by the IEEE Computer Society 1089-7801/11/$26.0 0 © 2011 IEEE IEEE INTERNET COMPUTING T he US National Institute of Standards and Technology defines cloud computing as “a model for enabling convenient, on-demand net work access to a shared pool of configurable computing resources (for […]
Toward a Cohesive Interpretation of the Electronic Communications Privacy Act for the Electronic Monitoring of Employees
Draft June 16 , 2011 Forthcoming 114 West Virginia Law R eview * Assistant Professor, University of Louisville, Louis D. Brandeis School of Law; J.D., University of Michigan. The author extends thanks to the many scholars who helped with this piece. The author cannot overstate her appreciation for Nancy Levit ‘s review of earlier drafts. […]
Token Attempt The Misrepresentation of Website Privacy Policies through the Misuse of P3P Compact Policy Tokens
Token Attempt: The Misrepresentation of Website Privacy Policies through the Misuse of P3P Compact Policy Tokens Pedro Giovanni Leon, Lorrie Faith Cranor, Aleecia M. McDonald, Robert McGuire September 10, 2010 CMU-CyLab-10-014 CyLab Carnegie Mellon University Pittsburgh, PA 15213 Token Attempt: The Misrepresentation of Website Privacy Policies through the Misuse of P3P Compact Policy Tokens Pedro […]
The_Future_of_Privacy_Policies_ A_Privacy_Nutrition_Label_Filled
THE FUTURE OF PRIVACY POLICIES : A P RIVACY N UTRITION LABEL FILLED WITH FAIR INFORMATION P RACTICES COREY A. CIOCCHETTI ∗ T ABLE OF CONTENTS Abstract………………………………………………………………………………………………………………………………………………… 2 I. Introduction ……………………………………………………………………………………………………………………………………….. 3 II. Privacy Policies: The Basics ……………………………………………………………………………………………………………….. 5 A. Fair Information Practices ………………………………………………………………………………………………………………. 8 (1) Notice of PII Practices Via Conspicuous Posting …………………………………………………………………………. 11 (2) Visitor Choice Regarding PII Dissemination ………………………………………………………………………………. 16 (3) Visitor Access to Collected PII ………………………………………………………………………………………………….. 19 (4) Integrity of Collected, Stored and Disseminated PII ……………………………………………………………………. 20 (5) Enforcement of Penalties for Broken Privacy Commitments ……………………………………………………….. 21 III. The Future of Privacy Policies: The Concept of a Privacy Label ………………………………………………………….. 23 A. Privacy Nutrition Labels: The Basics ……………………………………………………………………………………………… 24 B. Privacy Nutrition Labels: Incorporating Key FIPs ……………………………………………………………………………. 27 (1) Notice …………………………………………………………………………………………………………………………………….. 27 (2) Choice ……………………………………………………………………………………………………………………………………. 29 (3) Access ……………………………………………………………………………………………………………………………………. 30 (4) Integrity ………………………………………………………………………………………………………………………………….. 31 (5) Enforcement ……………………………………………………………………………………………………………………………. 32 IV. Conclusion …………………………………………………………………………………………………………………………………….. 35 ∗ […]
The Case for Online Obscurity
T HE C ASE FOR O NLINE O BSCURITY Woodrow Hartzog * and Fred eric Stutzman ** ABSTRACT: On the Internet, obscure information has a minimal risk of being discovered or understood by unintended recipients. Empirical research demonstrates that I nternet users rely on obscurity perhaps more than anything else to protect their privacy . […]
Repairing_Online_Reputation
Repairing Online Reputation: A New Multi-Modal Regulatory Approach Jacqueline D Lipton, Ph.D. * Abstract In today’s interconnected digital society, high pro file examples of online abuses abound. Cyberbullies lau nch attacks on the less powerful, often significantly d amaging victims’ reputations. Outside of reputational dam age, online harassment, bullying and stalking has led to severe emotional distress, loss of employment, physical assault and even death. Recent scholarship has identified this phenomenon b ut has done little more than note that current […]
First_Generation_Laws
1 PRIVACY INVASIVE GEO -MASHUPS: PRIVACY 2.0 AND THE LIMITS OF FIRST GENERATION INFORMATI ON PRIVACY LAWS Mark Burdon † ABSTRACT Online technological advances are pioneering the wider distribution of geospatial information for general mapping purposes. The use of popular web – based applications, such as Google Maps, is ensuring that mapping based applications are […]
Encryption_Safe_Harbours
ENCRYPTION SAFE H ARBOURS AND D ATA BREACH N OTIFICATION LAWS Mark Burdon a, Jason Reid a and Rouhshi Low a ABSTRACT Data breach notification laws require organizations to notify affected persons or regulatory authorities when an unauthorized acquisition of personal data occurs. Most laws provide a safe harbour to this obligation if acquired data […]
Chattering Laptops
Chattering Laptops Tuomas Aura 1 , Janne Lindqvist 2 , Michael Roe 1 , Anish Mohammed 3 1 Microsoft Research, Cambridge, UK 2 Helsinki University of Technology, Finland 3 Royal Holloway, University of London, UK Abstract. Mobile computer users often have a false sense of anonymity when they connect to the Internet at cafes, hotels, […]