18,664 research outputs found
Technology Roadmap for Standards of Healthcare Data Cyber Security: Influence of Public Policy on Consumer Healthcare Cyber Security Protections
From the dot com boom to now the Internet of Things (IoT) and Machine Learning era, the evolving digital world that people live in has brought new challenges for protecting personal data and information. IoT devices, smart phones, numerous apps, and more, constantly collect personal health data with many positive intentions. However, the recent overturning of Roe vs. Wade by the United States Supreme Court has generated concerns in particular on who and how personal health data can be used by both governments and private companies with unintended consequences for users. Cyber security and regulations for protecting personal health data is more important than ever before. Through both a literature review and then the creation of a technology policy based road map, this paper establishes a methodology to answer the following research question: How will cyber security technology evolve with the influence of public policy in order to better protect consumer healthcare data privacy rights
Sony, Cyber Security, and Free Speech: Preserving the First Amendment in the Modern World
Reprinted from 16 U.C. Davis Bus. L.J. 309 (2016). This paper explores the Sony hack in 2014 allegedly launched by the North Korean government in retaliation over Sony’s production of The Interview and considers the hack’s chilling impact on speech in technology. One of the most devastating cyber attacks in history, the hack exposed approximately thirty- eight million files of sensitive data, including over 170,000 employee emails, thousands of employee social security numbers and unreleased footage of upcoming movies. The hack caused Sony to censor the film and prompted members of the entertainment industry at large to tailor their communication and conform storylines to societal standards. Such censorship cuts the First Amendment at its core and exemplifies the danger cyber terror poses to freedom of speech by compromising Americans’ privacy in digital mediums. This paper critiques the current methods for combatting cyber terror, which consist of unwieldy federal criminal laws and controversial information sharing policies, while proposing more promising solutions that unleash the competitive power of the free market with limited government regulation. It also recommends legal, affordable and user-friendly tools anyone can use to secure their technology, recapture their privacy and exercise their freedom of speech online without fear of surreptitious surveillance or retaliatory exposure
Open Data, Grey Data, and Stewardship: Universities at the Privacy Frontier
As universities recognize the inherent value in the data they collect and
hold, they encounter unforeseen challenges in stewarding those data in ways
that balance accountability, transparency, and protection of privacy, academic
freedom, and intellectual property. Two parallel developments in academic data
collection are converging: (1) open access requirements, whereby researchers
must provide access to their data as a condition of obtaining grant funding or
publishing results in journals; and (2) the vast accumulation of 'grey data'
about individuals in their daily activities of research, teaching, learning,
services, and administration. The boundaries between research and grey data are
blurring, making it more difficult to assess the risks and responsibilities
associated with any data collection. Many sets of data, both research and grey,
fall outside privacy regulations such as HIPAA, FERPA, and PII. Universities
are exploiting these data for research, learning analytics, faculty evaluation,
strategic decisions, and other sensitive matters. Commercial entities are
besieging universities with requests for access to data or for partnerships to
mine them. The privacy frontier facing research universities spans open access
practices, uses and misuses of data, public records requests, cyber risk, and
curating data for privacy protection. This paper explores the competing values
inherent in data stewardship and makes recommendations for practice, drawing on
the pioneering work of the University of California in privacy and information
security, data governance, and cyber risk.Comment: Final published version, Sept 30, 201
Funding Era Free Speech Theory: Applying Traditional Speech Protection to the Regulation of Anonymous Cyberspace
Abstract Background Blunt trauma is the most frequent mechanism of injury in multiple trauma, commonly resulting from road traffic collisions or falls. Two of the most frequent injuries in patients with multiple trauma are chest trauma and extremity fracture. Several trauma mouse models combine chest trauma and head injury, but no trauma mouse model to date includes the combination of long bone fractures and chest trauma. Outcome is essentially determined by the combination of these injuries. In this study, we attempted to establish a reproducible novel multiple trauma model in mice that combines blunt trauma, major injuries and simple practicability. Methods Ninety-six male C57BL/6 N mice (n = 8/group) were subjected to trauma for isolated femur fracture and a combination of femur fracture and chest injury. Serum samples of mice were obtained by heart puncture at defined time points of 0 h (hour), 6 h, 12 h, 24 h, 3 d (days), and 7 d. Results A tendency toward reduced weight and temperature was observed at 24 h after chest trauma and femur fracture. Blood analyses revealed a decrease in hemoglobin during the first 24 h after trauma. Some animals were killed by heart puncture immediately after chest contusion; these animals showed the most severe lung contusion and hemorrhage. The extent of structural lung injury varied in different mice but was evident in all animals. Representative H&E-stained (Haematoxylin and Eosin-stained) paraffin lung sections of mice with multiple trauma revealed hemorrhage and an inflammatory immune response. Plasma samples of mice with chest trauma and femur fracture showed an up-regulation of IL-1β (Interleukin-1β), IL-6, IL-10, IL-12p70 and TNF-α (Tumor necrosis factor- α) compared with the control group. Mice with femur fracture and chest trauma showed a significant up-regulation of IL-6 compared to group with isolated femur fracture. Conclusions The multiple trauma mouse model comprising chest trauma and femur fracture enables many analogies to clinical cases of multiple trauma in humans and demonstrates associated characteristic clinical and pathophysiological changes. This model is easy to perform, is economical and can be used for further research examining specific immunological questions
Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e
In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus on the technologies that make collecting and aggregating large quantities of information possible. In those efforts, we focused on reasonable expectations held by “the people” that they will not be subjected to broad and indiscriminate surveillance. These expectations are anchored in Founding-era concerns about the capacity for unfettered search powers to promote an authoritarian surveillance state. Although we also readily acknowledged that there are legitimate and competing governmental and law enforcement interests at stake in the deployment and use of surveillance technologies that implicate reasonable interests in quantitative privacy, we did little more. In this Article, we begin to address that omission by focusing on the legitimate governmental and law enforcement interests at stake in preventing, detecting, and prosecuting cyber-harassment and healthcare fraud
- …