9 research outputs found

    A Prolegomenon to Information Technology Ethics

    Get PDF
    Information Systems Working Papers Serie

    Comparative Cybersecurity Law in Socialist Asia

    Get PDF
    This Article is a comparative study of the cybersecurity laws adopted in China and Vietnam in 2017 and 2018, respectively. The two laws both converge and diverge. Their convergences include the stringent regulation of banned acts, network operators, critical infrastructure, data localization, and personal data. These are all shaped by the immediate diffusion of China\u27s Cybersecurity Law in Vietnam and broader structural factors: namely, the common features of the socialist state, socialist legality, and the statist approach to human rights. The foundational divergence is between the Chinese notion of cybersecurity sovereignty and the Vietnamese notion of national cyberspace, which is due to the global diffusion of cybersecurity law in Vietnam and the differences in technological infrastructure and developmental approaches-Chinese exceptionalism and Vietnamese universalism. This Article has implications for comparative law generally and comparative cybersecurity law particularly

    Privacy and Private Law: The Dilemma of Justification

    Get PDF
    In recent years there has been a remarkable convergence across several common law jurisdictions regarding the need to recognize some form of a tort of invasion of privacy, particularly with respect to the publication of private facts. Despite this convergence, the author argues that there remains a palpable “containment anxiety” at play in the jurisprudence that is responsible for a number of recurring tensions regarding the scope of protection.Instead of focusing on the question of how to define privacy, this paper frames the containment anxiety at issue in the cases in terms of a justificatory dilemma rather than a definitional one. Using the work of Mill and Kant, the author argues that if we understand privacy rights as protecting either the value of autonomy or freedom from harm then we can justify a narrow legal right to privacy. Although this can explain the containment anxiety in the jurisprudence, it severely undermines the growing recognition of the importance of privacy. Therefore this paper proposes an alternative justification for privacy rights that is rooted in the value of protecting identity interests, where identity is understood in terms of one's capacity for self-presentation.On assiste depuis quelques années à une convergence remarquable à travers plusieurs juridictions de common law quant au besoin de reconnaître une forme de délit d’atteinte à la vie privée, plus particulièrement en ce qui a trait à la publication de faits privés. Malgré cette convergence, l’auteur maintient qu’il existe toujours un certain « malaise » quant aux limites à imposer aux mesures de protection. Ce malaise, qui se fait sentir dans la jurisprudence, est responsable de certaines tensions récurrentes quant à l’étendue de la protection à accorder à la vie privée. Plutôt que de se concentrer sur une définition de la vie privée, cet article présente le malaise dont il est question dans les arrêts en termes d’un dilemme de justification plutôt que de définition. En se basant sur les travaux de Mill et de Kant, l’auteur fait valoir que si nous entendons le droit à la vie privée comme protégeant soit l’autonomie, soit l’exemption du mal, il est alors possible de justifier un droit étroit à la vie privée. Si cette approche peut expliquer le malaise ressenti dans la jurisprudence, elle mine sévèrement l’importance croissante qui est accordée à la vie privée. Cet essai propose donc une justification alternative du droit à la vie privée qui se fonde sur l’importance de protéger les intérêts identitaires, où l’identité est conçue en termes de la capacité d’autoreprésentation d’une personne

    “I WONDER WHAT YOU THINK OF ME”: A QUALITATIVE APPROACH TO EXAMINING STEREOTYPE AWARENESS IN APPALACHIAN STUDENTS

    Get PDF
    Historically, Appalachia has been stereotyped as being a culture bred in poverty and ignorance. Much research has shown that stereotyping reveals a pattern of behavioral change and an impact on psychological well-being for the stereotyped (e.g., Pinel, 1999; Woodcock, Jernandez, Estrada, & Schultz, 2012), and has largely been centered on race and gender (e.g., Byrnes, 2008; Tuckman & Monetti, 2011). Less is known about the development of culture-specific stereotypes such as those related to Appalachians – a highly stigmatized group (Daniels, 2014; Otto, 2002). The purpose of this study was to gain an understanding of how adolescents in rural Appalachia develop awareness of stereotypes about Appalachia. Stratified random sampling was used to select twelve students (Grades 6-12) belonging to a small school district located in the Appalachian region of eastern Kentucky who were invited to participate in individual interviews. Eight of the participants self-identified as Appalachian, but for distinct reasons. Students characterized Appalachia for its strong sense of community, accessibility to nature, and lack of opportunities. All students readily identified negative Appalachian stereotypes, but most, particularly older students, were quick to defend the integrity of their culture and community. When discussing cultural stereotypes, the richness of student responses varied by grade-level

    MAPPING THE INFORMATION ENVIRONMENT: LEGAL ASPECTS OF MODULARIZATION AND DIGITALIZATION

    Get PDF
    The Article highlights the language of the digital and the principle of modularization as the basic concepts which the further development of the information environment will have to pivot around, regardless of how conflicts between freedom and control are temporarily solved. Perceiving both the computer and the Internet as complex systems, the authors look at how modular design of these systems freed the functionality of applications from the physicality of infrastructures, describe the evolutionary gains adhering to modularity, and how to preserve them - elaborating on the issues of access to the cable platform for broadband Internet and to virtual networks for computer technology. Their second focus shows how digitalization of information makes possible the merger of content and its protection. Especially through the use of DRM systems, private actors can create right enforcement mechanisms independent of the State. The legal system therefore faces new and more complex relations between private will and public sovereignty. In such a merged system it is harder to maintain freedom - much like in the fusion of function and infrastructure

    Private life in cyberspace

    No full text
    corecore