1,980 research outputs found

    Winter 2010

    Get PDF

    Changes in information seeking behavior and reading patterns of Law students in digital environment: A Case Study

    Get PDF
    The present study analyzes the data collected from 65 students on their changing information seeking behavior. It is observed from the study that books and subscribed online legal databases are the main source of information to them and it is necessary to help and guide the students in using the library resources and services to meet their information requirement. Most of the students use Manupatra, WestLaw and LexixNexis online Legal databases to meet their information requirement

    Privacy in the Age of Autonomous Vehicles

    Full text link
    To prepare for the age of the intelligent, highly connected, and autonomous vehicle, a new approach to concepts of granting consent, managing privacy, and dealing with the need to interact quickly and meaningfully is needed. Additionally, in an environment where personal data is rapidly shared with a multitude of independent parties, there exists a need to reduce the information asymmetry that currently exists between the user and data collecting entities. This Article rethinks the traditional notice and consent model in the context of real-time communication between vehicles or vehicles and infrastructure or vehicles and other surroundings and proposes a re-engineering of current privacy concepts to prepare for a rapidly approaching digital future. In this future, multiple independent actors such as vehicles or other machines may seek personal information at a rate that makes the traditional informed consent model untenable. This Article proposes a two-step approach: As an attempt to meet and balance user needs for a seamless experience while preserving their rights to privacy, the first step is a less static consent paradigm able to better support personal data in systems which use machine based real-time communication and automation. In addition, the article proposes a radical re-thinking of the current privacy protection system by sharing the vision of “Privacy as a Service” as a second step, which is an independently managed method of granular technical privacy control that can better protect individual privacy while at the same time facilitating high-frequency communication in a machine-to-machine environment
    corecore