271,110 research outputs found
Restoring a Public Interest Vision of Law in the Age of the Internet
In November 2003, Mr. Marc Rotenberg, Executive Director of the Electronic Privacy Information Center, lectured at Duke Law School on the importance of protecting individual privacy. In his remarks, Mr. Rotenberg recounted the successful campaign against the government\u27s Clipper Chip proposal. He argued that successful public interest advocacy in the Internet age requires the participation of experts from many fields, public engagement, and a willingness to avoid a simple balancing analysis. He further concluded that privacy may be one of the defining issues of a free society in the twenty-first century
BACK TO KATZ: REASONABLE EXPECTATION OF PRIVACY IN THE FACEBOOK AGE
Part I of this Note discusses the evolution of Fourth Amendment jurisprudence in reaction to advancing technology, the Supreme Court and circuit courts’ disposition in dealing with electronic “beeper” tracking (the technology that predated GPS), and the legal doctrine governing the government’s use of cellular phones to conduct surveillance of individuals both retroactively and in real-time. Part II examines the developing split among the federal circuits and state courts over whether GPS surveillance of vehicles constitutes a search, as well as the parallel concerns raised in recent published opinions by magistrate judges as to whether government requests for cell-site information from third party service providers require a warrant. Part III of this Note argues for the adoption of a rule that GPS surveillance constitutes a search and seizure and should require a warrant because the privacy expectation—that the government is not tracking its citizens twenty-four hours per day—is still one that society considers legitimate. It also argues that increasing public use or consent to third party use of GPS technology does not destroy an individual’s reasonable expectation of privacy in his movements, nor indicate that society no longer views these expectations as reasonable. In fact, increased public awareness of recent technological invasions of privacy may be producing an increased demand for control over information
The Impact of Information Security Technologies Upon Society
This paper's aims are concerned with the effects of information security technologies upon society in general and civil society organisations in particular. Information security mechanisms have the potential to act as enablers or disablers for the work of civil society groups. Recent increased emphasis on national security issues by state actors, particularly 'anti-terrorism' initiatives, have resulted in legislative instruments that impinge upon the civil liberties of many citizens and have the potential to restrict the free flow of information vital for civil society actors. The nascent area of cyberactivism, or hactivism, is at risk of being labelled cyberterrorism, with the accompanying change of perception from a legitimate form of electronic civil disobedience to an abhorrent crime. Biometric technology can be an invasive intrusion into citizens' privacy. Internet censorship and surveillance is widespread and increasing. These implementations of information security technology are becoming more widely deployed with profound implications for the type of societies that will result
EHRs at King Fahad Specialist Hospital : an overview of professionals' perspectives on the use of biometric patient identification for privacy and confidentiality, taking into consideration culture and religion : a thesis presented in partial fulfilment of the requirements of the degree of Master in Information Science, Massey University, Albany, Auckland, New Zealand
The Kingdom of Saudi Arabia is focused on expanding use of biometric technologies
and it is a matter of time before this expansion includes medical institutions. However
there is a lack of research on Electronic Health Records (EHRs) in Saudi Arabian
hospitals, especially on the staff views and attitudes in relation to confidentiality,
privacy, and security policies in the context of Saudi society, which is governed largely
by culture and Islam. This research utilised an online survey tool to ask doctors,
managers, and IT professionals, at the King Fahad Specialist Hospital (KFSH) about
these aspects and explored if they recommend the classic non-biometric access method
over the rather intrusive, yet more advanced, biometric patient identification (BPI)
technology. Encouragingly, all the participants recommended BPI methods with the
least favoured method being the facial recognition method for Saudi female patients.
This study also focused on whether staff believed that religious and cultural issues
influence EHR privacy and confidentiality, as the literature showed that in certain cases
unauthorised revelation of an EHR could lead to honorary killing of the patient.
Implications of this research include the need for comprehensive staff training on being
culturally aware, as well as training on EHR security policy, privacy, and
confidentiality
Analisis privasi data pengguna contact tracing application pengendalian COVID-19 di Indonesia berdasarkan PERPRES RI No. 95 tahun 2018 tentang sistem pemerintahan berbasis elektronik
The presence of user contact applications in the community as a means of preventing and overcoming the spread of COVID-19 can pose another risk to the potential dangers of protecting data privacy from contact tracing. This research examines more deeply related to user privacy policies through 3 (three) samples of android-based user contact applications that are used as a means of preventing, overcoming and controlling the spread of the COVID-19 virus in today's society and by reviewing the rules contained in the Presidential Regulation of the Republic. Indonesian No. 95 of 2018 concerning Electronic-Based Government Systems (SPBE). The study in this study was prepared using the method of literature study, observation and qualitative analysis. A comparison was made regarding the data privacy of the three samples, which was then evaluated and matched with the form of the privacy policy according to Presidential Regulation No. 95 of 2018 concerning Electronic-Based Government Systems (SPBE) and according to the ideal form of data privacy policy based on several experts. Comparative data is obtained through related applications and other electronic media which are then discussed together to conclude and evaluate the data privacy policies of the three sample applications. Based on this research, it can be concluded that privacy intervention to deal with damage and save lives is legal as long as its use is in accordance with regulations in the health, disaster, telecommunications, informatics and other related fields; in this case listed in the Presidential Decree No. 95 of 2018 concerning Electronic-Based Government Systems (SPBE) and there needs to be an increase in efforts to maintain the security and confidentiality of user data privacy through continuous system and data maintenance, encryption of data privacy storage in the manager's data warehouse and added with other data privacy policies can guarantee the security and confidentiality of the privacy of user data
Invisible Pixels Are Dead, Long Live Invisible Pixels!
Privacy has deteriorated in the world wide web ever since the 1990s. The
tracking of browsing habits by different third-parties has been at the center
of this deterioration. Web cookies and so-called web beacons have been the
classical ways to implement third-party tracking. Due to the introduction of
more sophisticated technical tracking solutions and other fundamental
transformations, the use of classical image-based web beacons might be expected
to have lost their appeal. According to a sample of over thirty thousand images
collected from popular websites, this paper shows that such an assumption is a
fallacy: classical 1 x 1 images are still commonly used for third-party
tracking in the contemporary world wide web. While it seems that ad-blockers
are unable to fully block these classical image-based tracking beacons, the
paper further demonstrates that even limited information can be used to
accurately classify the third-party 1 x 1 images from other images. An average
classification accuracy of 0.956 is reached in the empirical experiment. With
these results the paper contributes to the ongoing attempts to better
understand the lack of privacy in the world wide web, and the means by which
the situation might be eventually improved.Comment: Forthcoming in the 17th Workshop on Privacy in the Electronic Society
(WPES 2018), Toronto, AC
Privacy Issues in the Era of Ubiquitous Commerce
The vision of ubiquitous commerce (u-commerce) is realized through the convergence of electronic, mobile, television, voice and silent commerce applications. The ubiquity, universality, uniqueness, and unison of u-commerce will provide two principal benefits for individual users and companies: increased convenience as well as more personalized and customized services. However, u-commerce will also bring new issues such as a greater degree of privacy concerns that will impact individual users, companies, and the society at large. This paper proposes and elaborates on a conceptual framework for privacy in the u-commerce era. It combines Lessig’s macro-level perspective – the four-factor model of privacy – with Adam’s micro-level perspective – the perceived privacy factors model. Using this framework, privacy issues related to ucommerce are discussed and future research directions are presented
ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging
The social demand for email end-to-end encryption is barely supported by
mainstream service providers. Autocrypt is a new community-driven open
specification for e-mail encryption that attempts to respond to this demand. In
Autocrypt the encryption keys are attached directly to messages, and thus the
encryption can be implemented by email clients without any collaboration of the
providers. The decentralized nature of this in-band key distribution, however,
makes it prone to man-in-the-middle attacks and can leak the social graph of
users. To address this problem we introduce ClaimChain, a cryptographic
construction for privacy-preserving authentication of public keys. Users store
claims about their identities and keys, as well as their beliefs about others,
in ClaimChains. These chains form authenticated decentralized repositories that
enable users to prove the authenticity of both their keys and the keys of their
contacts. ClaimChains are encrypted, and therefore protect the stored
information, such as keys and contact identities, from prying eyes. At the same
time, ClaimChain implements mechanisms to provide strong non-equivocation
properties, discouraging malicious actors from distributing conflicting or
inauthentic claims. We implemented ClaimChain and we show that it offers
reasonable performance, low overhead, and authenticity guarantees.Comment: Appears in 2018 Workshop on Privacy in the Electronic Society
(WPES'18
Chief Justice Warren and 1984
George Orwell\u27s 1984 predicts a society dominated by a totalitarian government. Chief Justice Earl Warren was primarily responsible for a jurisprudence that would not countenance the kind of society envisaged in 1984. This Commentary traces the significant criminal procedure decisions of the Warren Court that helped to ensure that Orwel\u27s chilling prediction would remain only fiction. It first focuses on decisions that advanced fourth amendment privacy protections. It next examines the Warren Court\u27s concern for protecting the rights of the criminal defendant and for curbing illegal and oppressive police conduct. The Commentary then notes that as modern methods of electronic surveillance develop, the potential for governmental intrusion on individual privacy rights increases. It concludes with a warning: if society moves toward the Orwellian state, Supreme Court decisions alone will not be enough to safeguard the individual from the trend
- …