16,881 research outputs found

    Limiting the Collective Right to Exclude

    Get PDF
    For decades, society’s disparate interests and priorities have stymied attempts to resolve issues of housing affordability and equity. Zoning law and servitude law, both of which have been robustly empowered by decades of jurisprudence, effectively grant communities the legal right and ability to exclude various sorts of residences from their wealthiest neighborhoods. Exclusion by housing type results in exclusion of categories of people, namely, renters, the relatively poor, and racial minorities. Although our society’s housing woes may indeed be intractable if we continue to treat a group’s right to exclude with the level of deference that such exclusionary efforts currently enjoy, this treatment is unjustifiable. Courts should acknowledge and consider the broad public and private costs that are created by a group’s unfettered right to exclude. A more balanced approach would weigh individual autonomy to control property and various public harms resulting from community exclusions against legitimate community needs to exclude certain residents and uses. Judicial limits of the collective right to exclude may enable real progress toward fair and affordable housing to be achieved at last

    Affordable Housing Law and Policy in an Era of Big Data

    Get PDF

    Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data

    Get PDF
    When a legacy system’s software architecture cannot be redesigned, implementing additional privacy requirements is often complex, unreliable and costly to maintain. This paper presents a privacy-by-design approach to reengineer web applications as linked data-enabled and implement access control and privacy preservation properties. The method is based on the knowledge of the application architecture, which for the Web of data is commonly designed on the basis of a model-view-controller pattern. Whereas wrapping techniques commonly used to link data of web applications duplicate the security source code, the new approach allows for the controlled disclosure of an application’s data, while preserving non-functional properties such as privacy preservation. The solution has been implemented and compared with existing linked data frameworks in terms of reliability, maintainability and complexity

    Evaluating incentive mechanisms for conserving habitat

    Get PDF
    Private lands have an important role in the success of the Endangered Species Act (ESA). The current command-andcontrol approach to protecting species on private land has resulted in disincentives to the landowner, which have decreased the ability of the ESA to protect many of our endangered and threatened species. Herein we define and evaluate, from an economic perspective, eight incentive mechanisms, including the status quo, for protecting species on private land. We highlight the strengths and weaknesses and compare and contrast the incentive mechanisms according to a distinct set of biological, landowner, and government criteria. Our discussion indicates that market instruments, such as tradable permits or taxes, which have been successful in controlling air pollution, are not as effective for habitat protection. Alternatively, voluntary incentive mechanisms can be designed such that landowners view habitat as an asset and are willing participants in protecting habitat. The incentive mechanism best suited for conserving habitat in a given region depends on many factors, including government funding, land values, quantity and quality of habitat, and the region's developmental pressure.Incentives, Conservation, TDRs, Subsidies, Zoning, conservation Easements, mitigation banking, impact fees

    DRM and Privacy

    Get PDF
    Interrogating the relationship between copyright enforcement and privacy raises deeper questions about the nature of privacy and what counts, or ought to count, as privacy invasion in the age of networked digital technologies. This Article begins, in Part II, by identifying the privacy interests that individuals enjoy in their intellectual activities and exploring the different ways in which certain implementations of DRM technologies may threaten those interests. Part III considers the appropriate scope of legal protection for privacy in the context of DRM, and argues that both the common law of privacy and an expanded conception of consumer protection law have roles to play in protecting the privacy of information users. As Parts II and III demonstrate, consideration of how the theory and law of privacy should respond to the development and implementation of DRM technologies also raises the reverse question: How should the development and implementation of DRM technologies respond to privacy theory and law? As artifacts designed to regulate user behavior, DRM technologies already embody value choices. Might privacy itself become one of the values embodied in DRM design? Part IV argues that with some conceptual and procedural adjustments, DRM technologies and related standard-setting processes could be harnessed to preserve and protect privacy
    • …
    corecore