11 research outputs found
Examining the Anomalies, Explaining the Value: Should the USA FREEDOM Actâs Metadata Program be Extended?
Edward Snowdenâs disclosure of National Security Agency (âNSAâ) bulk collection of communications metadata was a highly disturbing shock to the American public. The intelligence community was surprised by the response, as it had largely not anticipated a strong negative public reaction to this surveillance program. Controversy over the bulk metadata collection led to the 2015 passage of the USA FREEDOM Act. The law mandated that the intelligence community would collect the Call Detail Records (âCDRâ) from telephone service providers in strictly limited ways, not in bulk, and only under order from the Foreign Intelligence Surveillance Court. The new program initially seemed to be working well, although the fact that from 40 court orders in both 2016 and 2017, the NSA collected hundreds of millions of CDRs created public concern. Then in June 2018 the NSA announced it had purged three yearsâ worth of CDRs due to âtechnical irregularitiesâ; later the agency made clear that it would not seek the programâs renewal.
This Article demystifies these situations, analyzing how forty orders might lead to the collection of several million CDRs and providing the first explanation that fits the facts of what might have caused the âtechnical irregularitiesâ leading to the purge of records. This Article also exposes a rather remarkable lacuna in Congressional oversight: even at the time of the passage of the USA FREEDOM Act a changing terrorist threat environment and changing communications technologies had effectively eliminated value of the CDR collection. We conclude with recommendations on conducting intelligence oversight
Paying for Privacy and the Personal Data Economy
Growing demands for privacy and increases in the quantity and variety of consumer data have engendered various business offerings to allow companies, and in some instances consumers, to capitalize on these developments. One such example is the emerging âpersonal data economyâ (PDE) in which companies, such as Datacoup, purchase data directly from individuals. At the opposite end of the spectrum, the âpay-for-privacyâ (PFP) model requires consumers to pay an additional fee to prevent their data from being collected and mined for advertising purposes. This Article conducts a simultaneous in-depth exploration of the impact of burgeoning PDE and PFP models. It identifies a typology of data-business models, and it uncovers thesimilarities and tensions between a data market controlled by established companies that have historically collected and mined consumer data for their primary benefit and one in which consumers play a central role in monetizing their own data. The Article makes three claims. First, it contends that PFP models facilitate thetransformation of privacy into a tradable product in the online setting, may worsen unequal access to privacy, and could further enable predatory and discriminatory behavior. Second, while the PDE may allow consumers to regain a semblance of control over their information by enabling them to decide when and with whom to share their data, consumersâ direct transfer or disclosure of personal data to companies for a price or personalized deals creates challenges similar to those found in the PFP context and generates additional concerns associated with innovative monetization techniques. Third, existing frameworks and proposals may not sufficiently ameliorate these concerns. The Article concludes by offering a path forward
Privacy For Whom? A Multi-Stakeholder Exploration of Privacy Designs
Privacy is considered one of the fundamental human rights. Researchers have been investigating privacy issues in various domains, such as our physical privacy, data privacy, privacy as a legal right, and privacy designs. In the Human-Computer Interaction field, privacy researchers have been focusing on understanding people\u27s privacy concerns when they interact with computing systems, designing and building privacy-enhancing technologies to help people mitigate these concerns, and investigating how people\u27s privacy perceptions and the privacy designs influence people\u27s behaviors.
Existing privacy research has been overwhelmingly focusing on the privacy needs of end-users, i.e., people who use a system or a product, such as Internet users and smartphone users. However, as our computing systems are becoming more and more complex, privacy issues within these systems have started to impact not only the end-users but also other stakeholders, and privacy-enhancing mechanisms designed for the end-users can also affect multiple stakeholders beyond the users.
In this dissertation, I examine how different stakeholders perceive privacy-related issues and expect privacy designs to function across three application domains: online behavioral advertising, drones, and smart homes. I choose these three domains because they represent different multi-stakeholder environments with varying nature of complexity. In particular, these environments present the opportunities to study technology-mediated interpersonal relationships, i.e., the relationship between primary users (owners, end-users) and secondary users (bystanders), and to investigate how these relationships influence people\u27s privacy perceptions and their desired ways of privacy protection.
Through a combination of qualitative, quantitative, and design methods, including interviews, surveys, participatory designs, and speculative designs, I present how multi-stakeholder considerations change our understandings of privacy and influence privacy designs. I draw design implications from the study results and guide future privacy designs to consider the needs of different stakeholders, e.g., cooperative mechanisms that aim to enhance the communication between primary and secondary users.
In addition, this methodological approach allows researchers to directly and proactively engage with multiple stakeholders and explore their privacy perceptions and expected privacy designs. This is different from what has been commonly used in privacy literature and as such, points to a methodological contribution.
Finally, this dissertation shows that when applying the theory of Contextual Integrity in a multi-stakeholder environment, there are hidden contextual factors that may alter the contextual informational norms. I present three examples from the study results and argue that it is necessary to carefully examine such factors in order to clearly identify the contextual norms. I propose a research agenda to explore best practices of applying the theory of Contextual Integrity in a multi-stakeholder environment
Skyler and Bliss
Hong Kong remains the backdrop to the science fiction movies of my youth. The city reminds me of my former training in the financial sector. It is a city in which I could have succeeded in finance, but as far as art goes it is a young city, and I am a young artist. A frustration emerges; much like the mould, the artist also had to develop new skills by killing off his former desires and manipulating technology. My new series entitled HONG KONG surface project shows a new direction in my artistic research in which my technique becomes ever simpler, reducing the traces of pixelation until objects appear almost as they were found and photographed. Skyler and Bliss presents tectonic plates based on satellite images of the Arctic. Working in a hot and humid Hong Kong where mushrooms grow ferociously, a city artificially refrigerated by climate control, this series provides a conceptual image of a imaginary typographic map for survival. (Laurent Segretier
Digital Transformation
The amount of literature on Digital Transformation is staggeringâand it keeps growing. Why, then,
come out with yet another such document? Moreover, any text aiming at explaining the Digital
Transformation by presenting a snapshot is going to become obsolete in a blink of an eye, most likely to
be already obsolete at the time it is first published.
The FDC Initiative on Digital Reality felt there is a need to look at the Digital Transformation from the
point of view of a profound change that is pervading the entire societyâa change made possible by
technology and that keeps changing due to technology evolution opening new possibilities but is also a
change happening because it has strong economic reasons. The direction of this change is not easy to
predict because it is steered by a cultural evolution of society, an evolution that is happening in niches
and that may expand rapidly to larger constituencies and as rapidly may fade away. This creation,
selection by experimentation, adoption, and sudden disappearance, is what makes the whole scenario
so unpredictable and continuously changing.The amount of literature on Digital Transformation is staggeringâand it keeps growing. Why, then,
come out with yet another such document? Moreover, any text aiming at explaining the Digital
Transformation by presenting a snapshot is going to become obsolete in a blink of an eye, most likely to
be already obsolete at the time it is first published.
The FDC Initiative on Digital Reality felt there is a need to look at the Digital Transformation from the
point of view of a profound change that is pervading the entire societyâa change made possible by
technology and that keeps changing due to technology evolution opening new possibilities but is also a
change happening because it has strong economic reasons. The direction of this change is not easy to
predict because it is steered by a cultural evolution of society, an evolution that is happening in niches
and that may expand rapidly to larger constituencies and as rapidly may fade away. This creation,
selection by experimentation, adoption, and sudden disappearance, is what makes the whole scenario
so unpredictable and continuously changing
Recommended from our members
August 2005
News and Features
Nine Things o Know Before Selecting the Web Host for Your Business 6
Garner Holt: San Bernardinoâs Toymaker 7
Market Competition and Recent Reforms Will Keep Bringing Workersâ Comp Rates Down, If Preserved 8
Phishing and Casting 13
Columns
Close-Up 6
Corporate Pro file 7
Investments & Finance 9
Letters to the Editor 10
Opinions 11
Computers/Technology 13
Lists. Top Health Care Medical ClinicsâGroups 20
MBA/Executive Programs 22
Environmental Companies 34
Money/ Investments 23
Executive Time Out 26
Managing 27
Managing Bookshelf 39
New Business List: County of San Bernardino 41
New Business List: County of Riverside 42
Restaurant Review 14
Real Estate Notes 46
Calendar 4
Recommended from our members
Communications Law and Policy: Cases and Materials (Edition 8.0)
This is the most current edition of this book.
Disclaimer: This book is intended to be used for academic and reference purposes only. The publisher and authors are not rendering legal or professional advice and this book is not a substitute for such advice. Any opinions expressed in this book are the authors’ alone and should not be imputed to their employers or affiliated organizations.
This text has gone through eight editions across nearly a quarter century. The first edition appeared in 2001, published by Aspen Law & Business. The next three editions were published by Foundation Press, up to 2012. In 2016, Jerry Kang added Alan Butler as a co-author, and we decided to self-publish the fifth edition. Even back then the costs of legal casebooks had gotten out-of-hand, and legal publishers were doing little more than binding pages into a physical item. So, we decided to cut out the intermediary and provide substantial cost savings for students. In 2023, Blake Reid joined the author team, and we took the further step of releasing edition 7.5 of the book as a free PDF under a Creative Commons license. We’ve now reached the substantially revised eighth edition.
Throughout all editions, the book has retained one fundamental pedagogical principle: Organize learning first by concepts, then by industry. Our goal has been to prioritize a deeper conceptual understanding over industry-specific details because industries, and the technologies that make them possible, are always in flux. The current list of concepts is: (1) power, (2) entry, (3) pricing, (4) indecent content, (5) access, (6) classification, (7) internet platforms, and (8) privacy. The book devotes a chapter to each concept, with the first four chapters exploring a particular concept across multiple industries ranging from legacy telephony, broadcast, and cable TV to modern day internet. Chapters 5 and 6 jointly tackle the concepts of access and classification, with Chapter 5 focusing particularly on access issues in legacy industries and Chapter 6 examining how the legal classification of internet service providers has shaped access policy in the context of net neutrality. Chapter 7 shifts upward in the internet’s layer stack, to explore the responsibility of internet platforms for the content that they host. The final chapter surveys communications privacy topics that are appropriate for both communications law courses and privacy law courses. Although law and technology have evolved over the past quarter century, the book’s pedagogical commitments have remained the same, even as we have updated, simplified, and pruned.
One word of caution to faculty and students alike: the Supreme Court’s titanic decisions in Loper Bright and NetChoice on the last opinion day of the 2023–2024 term (just weeks before the release of this edition) are likely to have enormous, difficult-to-predict impacts on the future of American communications law. We have done our level best in this edition’s updates to set the table for vibrant conversations in your classrooms about the shifting administrative and constitutional law foundations of this field. But caveat emptor: things may evolve significantly and unpredictably over the next year. We encourage an especially high degree of situational awareness.</p
Marketing management for non-marketing managers : improving returns on marketing investments
https://egrove.olemiss.edu/aicpa_guides/2698/thumbnail.jp
Senate journal, 2 January 2002.
Titles and imprints vary; Some volumes include miscellaneous state documents and reports; Rules of the Senat