498,642 research outputs found

    Carpenter v. United States: How Many Cell Phone Location Points Constitute a Search Under the Fourth Amendment?

    Get PDF
    In Carpenter v. United States, the Supreme Court will decide whether the government’s acquisition of a suspect’s cell site location information (“CSLI”) during an ongoing criminal investigation is a “search” under the Fourth Amendment, and thus requires a showing of probable cause to obtain a warrant. This opinion will have future consequences for Americans and their privacy interests as cell sites continue to be built and CSLI records increasingly contain more private information about cell phone users. This commentary argues that that the necessity of owning and using cell phones renders past tests obsolete. With wavering, subjective expectations of what information is actually private in society today, the Court should thus create a new test that makes a prescriptive claim about expectations of privacy and compares newer technologies with older ones. The Court should hold that obtaining CSLI records without a warrant is an unreasonable search under the Fourth Amendment

    Carpenter v. United States: How Many Cell Phone Location Points Constitute a Search Under the Fourth Amendment?

    Get PDF
    In Carpenter v. United States, the Supreme Court will decide whether the government’s acquisition of a suspect’s cell site location information (“CSLI”) during an ongoing criminal investigation is a “search” under the Fourth Amendment, and thus requires a showing of probable cause to obtain a warrant. This opinion will have future consequences for Americans and their privacy interests as cell sites continue to be built and CSLI records increasingly contain more private information about cell phone users. This commentary argues that that the necessity of owning and using cell phones renders past tests obsolete. With wavering, subjective expectations of what information is actually private in society today, the Court should thus create a new test that makes a prescriptive claim about expectations of privacy and compares newer technologies with older ones. The Court should hold that obtaining CSLI records without a warrant is an unreasonable search under the Fourth Amendment

    Unfair Collection: Reclaiming Control of Publicly Available Personal Information from Data Scrapers

    Get PDF
    Rising enthusiasm for consumer data protection in the United States has resulted in several states advancing legislation to protect the privacy of their residents’ personal information. But even the newly enacted California Privacy Rights Act (CPRA)—the most comprehensive data privacy law in the country— leaves a wide-open gap for internet data scrapers to extract, share, and monetize consumers’ personal information while circumventing regulation. Allowing scrapers to evade privacy regulations comes with potentially disastrous consequences for individuals and society at large. This Note argues that even publicly available personal information should be protected from bulk collection and misappropriation by data scrapers. California should reform its privacy legislation to align with the European Union’s General Data Privacy Regulation (GDPR), which requires data scrapers to provide notice to data subjects upon the collection of their personal information regardless of its public availability. This reform could lay the groundwork for future legislation at the federal level

    Preserving The Safety And Confidentiality Of Data Mining Information In Health Care: A literature review

    Full text link
    Daily, massive volume of data are produced due to the internet of things' rapid development, which has now permeated the healthcare industry. Recent advances in data mining have spawned a new field of a study dubbed privacy-preserving data mining (PPDM). PPDM technique or approach enables the extraction of actionable insight from enormous volume of data while safeguarding the privacy of individual information and benefiting the entire society Medical research has taken a new course as a result of data mining with healthcare data to detect diseases earlier and improve patient care. Data integration necessitates the sharing of sensitive patient information. However, substantial privacy issues are raised in connection with the storage and transmission of potentially sensitive information. Disclosing sensitive information infringes on patients' privacy. This paper aims to conduct a review of related work on privacy-preserving mechanisms, data protection regulations, and mitigating tactics. The review concluded that no single strategy outperforms all others. Hence, future research should focus on adequate techniques for privacy solutions in the age of massive medical data and the standardization of evaluation standards

    GINA, Big Data, and the Future of Employee Privacy

    Get PDF
    Threats to privacy abound in modern society, but individuals currently enjoy little meaningful legal protection for their privacy interests. We argue that the Genetic Information Nondiscrimination Act (GINA) offers a blueprint for preventing employers from breaching employee privacy. GINA has faced significant criticism since its enactment in 2008: commentators have dismissed the law as ill-conceived, unnecessary, and ineffective. While we concede that GINA may have failed to alleviate anxieties about medical genetic testing, we assert that it has unappreciated value as an employee-privacy statute. In the era of big data, protections for employee privacy are more pressing than protections against genetic discrimination. Instead of failed legislation, GINA could represent the future of employment law

    A Forward-Looking Conceptualization of Information Privacy

    Get PDF
    Privacy is a fluid and ever-evolving concept, studied across multiple fields and with numerous definitions. Privacy research in information systems (IS) is extensive yet has not traveled far beyond the IS realm and fully engaged in the broader conversations being had with regards to privacy. This research seeks to define a larger sense of privacy that integrates the many working definitions across fields, along with related concepts, and to develop an alternative framework that can account for the constant technological and socio-technical changes through which to engage in privacy research. One such framework is developed and tested, grounded in the idea of the relative distribution of digital information decision rights across groups within a society, demonstrating the utility for future-oriented research that allows for active theorization that can adapt to rates of technological progress and resulting socio-technical changes

    Will privacy barriers limit the uptake of intelligent transport systems?

    No full text
    Intelligent Transport Systems (ITS) have the potential to increase road-network capacities, reduce congestion and pollution, create shorter and more predictable journey times and significantly improve road-user safety. However, these technologies will also have the ability to track a citizen’s every move, extracting information about their daily lives. This data could range from information about the user’s driving style, to exactly where their vehicle was at any given time in its lifetime, right down to the radio station the driver listens to. It has been argued that privacy invasions caused by ITS will have a damaging effect on society, creating a ‘Big Brother’ or panopticon state.For these fears to be fulfilled, it needs to be the case that future users are not only concerned about the privacy impacts of ITS, but that the ITS will actually cause users to change their travel behaviour. This research examines the results of both a survey of 993 people across four culturally diverse European countries (the UK, Greece, Austria and the Netherlands). The survey primarily seeks to interrogate the factors influencing a future ITS user’s privacy concerns, their stated behavioural intention and their actual privacy behaviour.The results of this research show that privacy concerns could play a significant role in limiting the voluntary uptake rate of the technology. While this may not be critical to the success of all future ITS, future ITS which require high penetration rates to be successful will definitely need to consider the privacy aspects of their system. This research also indicates that when a future ITS user is required to decide whether to disclose their personal information, they will be influenced significantlymore by their demographics and the potential risks associated with disclosing the information than the rewards that are on offer. This means that ITS developers should attempt to use less sensitive data where possible, consider using a more trusted organisation to collect and store the required information and also consider the user’s perception on how secure a transfer method is

    Privacy in the Smart City - Applications, Technologies, Challenges and Solutions

    Get PDF
    Many modern cities strive to integrate information technology into every aspect of city life to create so-called smart cities. Smart cities rely on a large number of application areas and technologies to realize complex interactions between citizens, third parties, and city departments. This overwhelming complexity is one reason why holistic privacy protection only rarely enters the picture. A lack of privacy can result in discrimination and social sorting, creating a fundamentally unequal society. To prevent this, we believe that a better understanding of smart cities and their privacy implications is needed. We therefore systematize the application areas, enabling technologies, privacy types, attackers and data sources for the attacks, giving structure to the fuzzy term “smart city”. Based on our taxonomies, we describe existing privacy-enhancing technologies, review the state of the art in real cities around the world, and discuss promising future research directions. Our survey can serve as a reference guide, contributing to the development of privacy-friendly smart cities

    Empirical Investigation of the Role of Privacy and Data Protection in the Implementation of Electronic Government in Ghana

    Get PDF
    This study investigates the role of privacy and data protection in the implementation of e-government in developing countries. It examines the privacy and data protection issues which arise when e-government is introduced in Ghana. E-government is a way that governments liaise with their various departments and agencies through the use of information and communication technologies (ICTs). Through e-government, governments are able to provide better, effective and efficient services to their citizens. This new form of governments’ delivering services electronically to their citizens, businesses and various departments potentially offers benefits (for example, economic development, low costs and improved services) to society. However the implementation of e-government carries potential risks to users. The potential for online identity theft and fraud raises privacy concerns. From a theoretical foundation, fieldwork in Ghana, through interviews and focus groups, is used to investigate the issue of privacy and data protection in e-government implementation in an empirical setting. Interviewees included senior civil servants, political leaders, members of the Select Committee on Communication, academics, university students as well as stakeholders from private and public organisations. The research borrowed from the Straussian grounded theory approach as a technique to analyse the fieldwork data. The results of the study indicate that privacy and data protection does not currently play a significant role in e-government implementation in a developing country such as Ghana. Other factors such as access to information and communication technologies (Internet accessibility) and e-skills were found to be challenges which significantly impact individuals’ use of e-government. The study found that there is a low privacy concern among Ghanaian citizens. This was found to be significantly related to a lack of awareness of privacy issues; and also the national cultural dimensions of Ghanaian society. The study concludes by emphasising the importance of government investing in ICT infrastructure and public education to raise awareness of e-government services, as well as privacy and data protection issues. Implications for research and policy makers are discussed. The study suggests future research to investigate the further impact of privacy awareness on individuals’ adoption of e-government in a collectivist society such as Ghana.Government of Ghan

    Advanced Computer Ethics: A Study of Artificial Intelligence

    Get PDF
    Justice, Autonomy, Freedom, Democracy, Equality, Privacy and the Common Good are all values that can be supported or threatened by computer technology. Considering that computer technologies are the fundamental infrastructure of the Information Age, ethical questions arise regarding access and control, privacy, property, identity and professional responsibility. It is important as a future Computer Scientist and Game Developer that I understand the ethical boundaries involved in software development. In this course, I will examine these values as issues that arise at the intersection of ethics, computers, technology, and society are addressed. I will also be closely studying (and presenting a project) on Artificial Intelligence
    • 

    corecore