117 research outputs found
Technology-Facilitated Domestic and Family Violence: Protecting the Privacy and Safety of Victim-Survivors
Technology and privacy can be a double-edged sword for those experiencing domestic and family violence (DFV). Technology can be a mechanism for abuse and coercive control but is also offered to victim-survivors as a ‘solution’ to reduce risk and protect their safety. In theory, the law protects the privacy rights of victim-survivors, but poor practice and lapses in security mean that their information is often shared with those who seek to harm them. Perpetrators, particularly alleged perpetrators, also have a right to privacy, making it more difficult to protect victim-survivors. This paper analyses technology-facilitated domestic and family violence (TFDFV) through a privacy lens—drawing on privacy and DFV literature (and the little that lies at the intersection) and doctrinal analysis of Australian and New Zealand privacy and related laws applied to TFDFV. Recommendations are provided to better protect victim-survivors at the intersection of safety, technology and privacy. While the paper focuses on the Australian and New Zealand context, it hopes to motivate similar questions in other jurisdictions
Buying-off privacy concerns for mobility services in the Internet-of-things era: A discrete choice experiment on the case of mobile insurance
Internet-of-things technologies will enable collecting vast amounts of mobility data from car owners. Such connected car services can be value-adding but also create new privacy hazards. This paper studies whether and how privacy concerns of car owners can be compensated by offering monetary benefits. We study the case of usage based car insurance services for which the insurance fee is adapted to measured mileage and driving behaviour. A conjoint experiment shows that consumers prefer their current insurance products to usage based car insurance. However, when offered a minor financial compensation, they are willing to give up their privacy to car insurers. Consumers find privacy of behaviour and action more valuable than privacy of location and space. The study is a first to compare different forms of privacy in the acceptance of connected car services. Hereby, we contribute to more fine-grained understanding of privacy concerns in the acceptance of digital services, which will become more important than ever in the upcoming Internet-of-things era
An Inventory of Existing Neuroprivacy Controls
Brain-Computer Interfaces (BCIs) facilitate communication between brains and computers. As these devices become increasingly popular outside of the medical context, research interest in brain privacy risks and countermeasures has bloomed. Several neuroprivacy threats have been identified in the literature, including brain malware, personal data being contained in collected brainwaves and the inadequacy of legal regimes with regards to neural data protection. Dozens of controls have been proposed or implemented for protecting neuroprivacy, although it has not been immediately apparent what the landscape of neuroprivacy controls consists of. This paper inventories the implemented and proposed neuroprivacy risk mitigation techniques from open source repositories, BCI providers and the academic literature. These controls are mapped to the Hoepman privacy strategies and their implementation status is described. Several research directions for ensuring the protection of neuroprivacy are identified
New Differential Privacy Communication Pipeline and Design Framework
Organizations started to adopt differential privacy (DP) techniques hoping to
persuade more users to share personal data with them. However, many users do
not understand DP techniques, thus may not be willing to share. Previous
research suggested that the design of DP mechanism communication could
influence users' willingness to share data. Based on the prior work, we propose
a new communication pipeline that starts by asking users about their privacy
concerns and then provides a customized DP mechanism and communication. We also
propose a design framework that systemically explores effective communication
designs ranging from a text-based high-level description to a step-by-step
interactive storyboard. Based on the framework, we created 17 designs and
recruited five people to evaluate. Our user study showed that text-based
descriptions have the highest clarity in all scenarios, while the step-by-step
interactive storyboards have the potential to persuade users to trust central
DP. Our future work will optimize the design and conduct a large-scale efficacy
study.Comment: poste
Artificial intelligence in space
In the next coming years, space activities are expected to undergo a radical
transformation with the emergence of new satellite systems or new services
which will incorporate the contributions of artificial intelligence and machine
learning defined as covering a wide range of innovations from autonomous
objects with their own decision-making power to increasingly sophisticated
services exploiting very large volumes of information from space. This chapter
identifies some of the legal and ethical challenges linked to its use. These
legal and ethical challenges call for solutions which the international
treaties in force are not sufficient to determine and implement. For this
reason, a legal methodology must be developed that makes it possible to link
intelligent systems and services to a system of rules applicable thereto. It
discusses existing legal AI-based tools amenable for making space law
actionable, interoperable and machine readable for future compliance tools.Comment: 32 page
데이터 보호 표준의 중요한 분기점 미국과 유럽연합의 데이터 보호 법률 비교
학위논문 (석사) -- 서울대학교 대학원 : 국제대학원 국제학과(국제협력전공), 2020. 8. 신성호.In the last few decades, technology has faced an extraordinary evolution that has revolutionized the way we communicate. In particular, the rise of the Internet and digital platforms has turned data into an incredibly powerful, global resource. Yet, through the increasing sophistication of technology, the world now faces a major privacy dilemma, and governments must make critical decisions to determine whether established privacy laws encompass personal data on the Internet.
As leaders in technological innovation and privacy legislation, the world is looking to the United States and the European Union to establish standards in data protection. However, despite ideological similarities between the two powers, it is clear that the U.S. and EU have vastly different approaches to data legislation. On one hand, the EU has passed the most comprehensive and strictest data protection rules in the world, while the U.S. has struggled to institute uniform regulations. A sharp rise in cyber-attacks and data misuse cases have led many to question why the U.S. has been unable or unwilling to legislate protection laws, while the EU has been quick to do so. With mounting public pressure, the U.S. now faces a critical juncture in its data policies, and must delineate its stance on data protection. In order to unpack the current approaches to data protection in the U.S. and the EU, this research will dive into the historical response to privacy and personal information through comparative analysis and case studies.Chapter I. Introduction 1
1. Background 1
2. Literature Review 3
Chapter II. Research Plan 14
1. Research Question 14
2. Significance of the Research 17
3. Research Methodology 18
4. Conceptual Framework 19
Chapter III. Data Protection Legislation in the European Union 22
1. Defining "personal information" in the EU 22
2. A History of Data Protection in the EU 23
3. The EU'S General Data Protection Regulations 27
4. Initial Reactions to GDPR 33
5. Analysis of EU Data Protection Laws 34
Chapter IV. Data Protection Legislation in the United States 36
1. Defining "personal information" in the U.S. 36
2. U.S. Data Protection Legislation 38
3. U.S. Case Studies 50
4. Barriers to Legislation in the U.S. 54
5. Analysis of U.S. Data Protection Laws 59
Chapter V. Comparative Analysis 60
Chapter VI. Conclusion 63
Bibliography 68
Tables and Figures - 79Maste
Privacy in the Era of Big Data: Unlocking the Blue Oceans of Data Paradigm in Malaysia
Big Data has revolutionized the process of online activities such as marketing and advertisement based on individual preferences in the eCommerce industry. In Malaysia, the integration of Big Data in the commercial and business environment is keenly felt by establishing the National Big Data Analytics Framework catalyzing further economic growth in all sectors. However, the distinct features of Big Data spawn issues relating to privacy, such as data profiling, lack of transparency regarding privacy policies, accidental disclosures of data, false data or false analytics results. Hence, this research provides an insight into the intersection between Big Data and an individual's fundamental rights. The trade-off between privacy breaching and preserving is becoming more intense due to the rapid advancement of Big Data. Suggesting comparative analysis method as the data analysis approach, the adequacy of the Malaysian Personal Data Protection Act 2010 (PDPA 2010) in governing the risks of Big Data is evaluated against the European Union General Data Protection Regulation (GDPR) in managing the risk arising from the integration of Big Data. This research is hoped to initiate the improvement to the legislative framework, provides fundamentals to the formulation of national policy, and creation of specific law on Big Data in Malaysia, which will subsequently benefit industrial players and stakeholders
- …