99,074 research outputs found

    Averting Robot Eyes

    Get PDF
    Home robots will cause privacy harms. At the same time, they can provide beneficial services—as long as consumers trust them. This Essay evaluates potential technological solutions that could help home robots keep their promises, avert their eyes, and otherwise mitigate privacy harms. Our goals are to inform regulators of robot-related privacy harms and the available technological tools for mitigating them, and to spur technologists to employ existing tools and develop new ones by articulating principles for avoiding privacy harms. We posit that home robots will raise privacy problems of three basic types: (1) data privacy problems; (2) boundary management problems; and (3) social/relational problems. Technological design can ward off, if not fully prevent, a number of these harms. We propose five principles for home robots and privacy design: data minimization, purpose specifications, use limitations, honest anthropomorphism, and dynamic feedback and participation. We review current research into privacy-sensitive robotics, evaluating what technological solutions are feasible and where the harder problems lie. We close by contemplating legal frameworks that might encourage the implementation of such design, while also recognizing the potential costs of regulation at these early stages of the technology

    Responsible Environmental Behavior, Energy Conservation, and Compact Fluorescent Bulbs: You Can Lead a Horse to Water, But Can You Make It Drink?

    Get PDF
    Despite professing to care about the environment and supporting environmental causes, individuals behave in environmentally irresponsible ways like driving when they can take public transportation, littering, or disposing of toxic materials in unsound ways. This is the author\u27s fourth exploration of how to encourage individuals to stop behaving irresponsibly about the environment they allege to care deeply about. The prior three articles all explored how the norm of environmental protection could be enlisted in this effort; this article applies those theoretical conclusions to the very practical task of getting people to switch the type of light bulb they use. To accomplish this, the article synthesizes the previous articles into an assumption about the critical role of norms in changing personal behavior and tests that assumption by exploring how to make individuals more responsible consumers of electricity and adhere to the concrete norm of energy conservation by swapping out their incandescent light bulbs for compact fluorescent lights (“CFLs”). The agreed upon goal behind energy conservation is to reduce the country’s reliance on fossil fuel-based energy production, thus reducing the emission of harmful airborne pollutants and greenhouse gases as well as the related environmental harms associated with coal production. One way to reduce residential energy consumption is to persuade individuals to switch to CFLs. Up to ninety percent of energy produced by incandescent bulbs is lost as heat; switching to CFLs is one way to prevent this energy loss

    After Over-Privileged Permissions: Using Technology and Design to Create Legal Compliance

    Get PDF
    Consumers in the mobile ecosystem can putatively protect their privacy with the use of application permissions. However, this requires the mobile device owners to understand permissions and their privacy implications. Yet, few consumers appreciate the nature of permissions within the mobile ecosystem, often failing to appreciate the privacy permissions that are altered when updating an app. Even more concerning is the lack of understanding of the wide use of third-party libraries, most which are installed with automatic permissions, that is permissions that must be granted to allow the application to function appropriately. Unsurprisingly, many of these third-party permissions violate consumers’ privacy expectations and thereby, become “over-privileged” to the user. Consequently, an obscurity of privacy expectations between what is practiced by the private sector and what is deemed appropriate by the public sector is exhibited. Despite the growing attention given to privacy in the mobile ecosystem, legal literature has largely ignored the implications of mobile permissions. This article seeks to address this omission by analyzing the impacts of mobile permissions and the privacy harms experienced by consumers of mobile applications. The authors call for the review of industry self-regulation and the overreliance upon simple notice and consent. Instead, the authors set out a plan for greater attention to be paid to socio-technical solutions, focusing on better privacy protections and technology embedded within the automatic permission-based application ecosystem

    To Buy or Not to Buy?:Vulnerability and the Criminalisation of Commercial BDSM

    Get PDF

    Are 21st-century citizens grieving for their loss of privacy?

    Get PDF
    Although much research exists that examines cognitive events leading up to information disclosure, such as risk-benefit analysis and state-based and trait-based attributes, minimal research exists that examines user responses after a direct or indirect breach of privacy. The present study examines 1,004 consumer responses to two different high-profile privacy breaches using sentiment analysis. Our findings indicate that individuals who experience an actual or surrogate privacy breach exhibit similar emotional responses, and that the pattern of responses resembles well-known reactions to other losses. Specifically, we present evidence that users contemplating evidence of a privacy invasion experience and communicate very similar responses as individuals who have lost loved ones, gone through a divorce or who face impending death because of a terminal illness. These responses parallel behavior associated with the KĂŒbler-Ross’s five stages of grief

    Shopping For Privacy: How Technology in Brick-and-Mortar Retail Stores Poses Privacy Risks for Shoppers

    Get PDF
    As technology continues to rapidly advance, the American legal system has failed to protect individual shoppers from the technology implemented into retail stores, which poses significant privacy risks but does not violate the law. In particular, I examine the technologies implemented into many brick-and-mortar stores today, many of which the average everyday shopper has no idea exists. This Article criticizes these technologies, suggesting that many, if not all of them, are questionable in their legality taking advantage of their status in a legal gray zone. Because the American judicial system cannot adequately protect the individual shopper from these questionable privacy practices, I call upon the Federal Trade Commission, the de facto privacy regulator in the United States, to increase its policing of physical retail stores to protect the shopper from any further harm

    Privacy as a Public Good

    Get PDF
    Privacy is commonly studied as a private good: my personal data is mine to protect and control, and yours is yours. This conception of privacy misses an important component of the policy problem. An individual who is careless with data exposes not only extensive information about herself, but about others as well. The negative externalities imposed on nonconsenting outsiders by such carelessness can be productively studied in terms of welfare economics. If all relevant individuals maximize private benefit, and expect all other relevant individuals to do the same, neoclassical economic theory predicts that society will achieve a suboptimal level of privacy. This prediction holds even if all individuals cherish privacy with the same intensity. As the theoretical literature would have it, the struggle for privacy is destined to become a tragedy. But according to the experimental public-goods literature, there is hope. Like in real life, people in experiments cooperate in groups at rates well above those predicted by neoclassical theory. Groups can be aided in their struggle to produce public goods by institutions, such as communication, framing, or sanction. With these institutions, communities can manage public goods without heavy-handed government intervention. Legal scholarship has not fully engaged this problem in these terms. In this Article, we explain why privacy has aspects of a public good, and we draw lessons from both the theoretical and the empirical literature on public goods to inform the policy discourse on privacy

    Forum Selection Clauses and Consumer Contracts in Canada

    Get PDF
    Every day, billions of people use the online social media platform, Facebook. Facebook requires, as a condition of use, that users “accept” its terms and conditions—which include a forum selection clause nominating California as the exclusive forum for dispute resolution. In Douez v. Facebook, the Supreme Court of Canada considered whether this forum selection clause was enforceable, or whether the plaintiff could proceed with her suit in British Columbia. The Supreme Court of Canada ultimately decided that the forum selection clause was not enforceable. It held that the plaintiff had established “strong cause” for departing from the forum selection clause. The Court premised its decision on two primary considerations: the contract involved a consumer and was one of adhesion, and the claim involved the vindication of privacy rights. The Court’s analysis suffers from several major weaknesses that will undoubtedly cause confusion in this area of law. This Article will examine those weaknesses, and argue that the Supreme Court of Canada actually abandoned the strong cause test that it claimed to be applying. The consequence of the Douez decision is that many forum selection clauses—at least in the consumer context—will be rendered unenforceable. While this may be a salutary development from the perspective of consumer protection, it will undoubtedly have an effect on companies choosing to do business in Canada

    Transparency and the Marketplace for Student Data

    Get PDF
    Student lists are commercially available for purchase on the basis of ethnicity, affluence, religion, lifestyle, awkwardness, and even a perceived or predicted need for family planning services. This study seeks to provide an understanding of the commercial marketplace for student data and the interaction with privacy law. Over several years, Fordham CLIP reviewed publicly-available sources, made public records requests to educational institutions, and collected marketing materials received by high school students. The study uncovered and documents an overall lack of transparency in the student information commercial marketplace and an absence of law to protect student information.https://ir.lawnet.fordham.edu/clip/1003/thumbnail.jp
    • 

    corecore