117 research outputs found

    Technology-Facilitated Domestic and Family Violence: Protecting the Privacy and Safety of Victim-Survivors

    Get PDF
    Technology and privacy can be a double-edged sword for those experiencing domestic and family violence (DFV). Technology can be a mechanism for abuse and coercive control but is also offered to victim-survivors as a ‘solution’ to reduce risk and protect their safety. In theory, the law protects the privacy rights of victim-survivors, but poor practice and lapses in security mean that their information is often shared with those who seek to harm them. Perpetrators, particularly alleged perpetrators, also have a right to privacy, making it more difficult to protect victim-survivors. This paper analyses technology-facilitated domestic and family violence (TFDFV) through a privacy lens—drawing on privacy and DFV literature (and the little that lies at the intersection) and doctrinal analysis of Australian and New Zealand privacy and related laws applied to TFDFV. Recommendations are provided to better protect victim-survivors at the intersection of safety, technology and privacy. While the paper focuses on the Australian and New Zealand context, it hopes to motivate similar questions in other jurisdictions

    Buying-off privacy concerns for mobility services in the Internet-of-things era: A discrete choice experiment on the case of mobile insurance

    Get PDF
    Internet-of-things technologies will enable collecting vast amounts of mobility data from car owners. Such connected car services can be value-adding but also create new privacy hazards. This paper studies whether and how privacy concerns of car owners can be compensated by offering monetary benefits. We study the case of usage based car insurance services for which the insurance fee is adapted to measured mileage and driving behaviour. A conjoint experiment shows that consumers prefer their current insurance products to usage based car insurance. However, when offered a minor financial compensation, they are willing to give up their privacy to car insurers. Consumers find privacy of behaviour and action more valuable than privacy of location and space. The study is a first to compare different forms of privacy in the acceptance of connected car services. Hereby, we contribute to more fine-grained understanding of privacy concerns in the acceptance of digital services, which will become more important than ever in the upcoming Internet-of-things era

    An Inventory of Existing Neuroprivacy Controls

    Get PDF
    Brain-Computer Interfaces (BCIs) facilitate communication between brains and computers. As these devices become increasingly popular outside of the medical context, research interest in brain privacy risks and countermeasures has bloomed. Several neuroprivacy threats have been identified in the literature, including brain malware, personal data being contained in collected brainwaves and the inadequacy of legal regimes with regards to neural data protection. Dozens of controls have been proposed or implemented for protecting neuroprivacy, although it has not been immediately apparent what the landscape of neuroprivacy controls consists of. This paper inventories the implemented and proposed neuroprivacy risk mitigation techniques from open source repositories, BCI providers and the academic literature. These controls are mapped to the Hoepman privacy strategies and their implementation status is described. Several research directions for ensuring the protection of neuroprivacy are identified

    New Differential Privacy Communication Pipeline and Design Framework

    Full text link
    Organizations started to adopt differential privacy (DP) techniques hoping to persuade more users to share personal data with them. However, many users do not understand DP techniques, thus may not be willing to share. Previous research suggested that the design of DP mechanism communication could influence users' willingness to share data. Based on the prior work, we propose a new communication pipeline that starts by asking users about their privacy concerns and then provides a customized DP mechanism and communication. We also propose a design framework that systemically explores effective communication designs ranging from a text-based high-level description to a step-by-step interactive storyboard. Based on the framework, we created 17 designs and recruited five people to evaluate. Our user study showed that text-based descriptions have the highest clarity in all scenarios, while the step-by-step interactive storyboards have the potential to persuade users to trust central DP. Our future work will optimize the design and conduct a large-scale efficacy study.Comment: poste

    Artificial intelligence in space

    Get PDF
    In the next coming years, space activities are expected to undergo a radical transformation with the emergence of new satellite systems or new services which will incorporate the contributions of artificial intelligence and machine learning defined as covering a wide range of innovations from autonomous objects with their own decision-making power to increasingly sophisticated services exploiting very large volumes of information from space. This chapter identifies some of the legal and ethical challenges linked to its use. These legal and ethical challenges call for solutions which the international treaties in force are not sufficient to determine and implement. For this reason, a legal methodology must be developed that makes it possible to link intelligent systems and services to a system of rules applicable thereto. It discusses existing legal AI-based tools amenable for making space law actionable, interoperable and machine readable for future compliance tools.Comment: 32 page

    Privacy principles, risks and harms

    Get PDF

    데이터 보호 표준의 중요한 분기점 미국과 유럽연합의 데이터 보호 법률 비교

    Get PDF
    학위논문 (석사) -- 서울대학교 대학원 : 국제대학원 국제학과(국제협력전공), 2020. 8. 신성호.In the last few decades, technology has faced an extraordinary evolution that has revolutionized the way we communicate. In particular, the rise of the Internet and digital platforms has turned data into an incredibly powerful, global resource. Yet, through the increasing sophistication of technology, the world now faces a major privacy dilemma, and governments must make critical decisions to determine whether established privacy laws encompass personal data on the Internet. As leaders in technological innovation and privacy legislation, the world is looking to the United States and the European Union to establish standards in data protection. However, despite ideological similarities between the two powers, it is clear that the U.S. and EU have vastly different approaches to data legislation. On one hand, the EU has passed the most comprehensive and strictest data protection rules in the world, while the U.S. has struggled to institute uniform regulations. A sharp rise in cyber-attacks and data misuse cases have led many to question why the U.S. has been unable or unwilling to legislate protection laws, while the EU has been quick to do so. With mounting public pressure, the U.S. now faces a critical juncture in its data policies, and must delineate its stance on data protection. In order to unpack the current approaches to data protection in the U.S. and the EU, this research will dive into the historical response to privacy and personal information through comparative analysis and case studies.Chapter I. Introduction 1 1. Background 1 2. Literature Review 3 Chapter II. Research Plan 14 1. Research Question 14 2. Significance of the Research 17 3. Research Methodology 18 4. Conceptual Framework 19 Chapter III. Data Protection Legislation in the European Union 22 1. Defining "personal information" in the EU 22 2. A History of Data Protection in the EU 23 3. The EU'S General Data Protection Regulations 27 4. Initial Reactions to GDPR 33 5. Analysis of EU Data Protection Laws 34 Chapter IV. Data Protection Legislation in the United States 36 1. Defining "personal information" in the U.S. 36 2. U.S. Data Protection Legislation 38 3. U.S. Case Studies 50 4. Barriers to Legislation in the U.S. 54 5. Analysis of U.S. Data Protection Laws 59 Chapter V. Comparative Analysis 60 Chapter VI. Conclusion 63 Bibliography 68 Tables and Figures - 79Maste

    Privacy in the Era of Big Data: Unlocking the Blue Oceans of Data Paradigm in Malaysia

    Get PDF
    Big Data has revolutionized the process of online activities such as marketing and advertisement based on individual preferences in the eCommerce industry. In Malaysia, the integration of Big Data in the commercial and business environment is keenly felt by establishing the National Big Data Analytics Framework catalyzing further economic growth in all sectors. However, the distinct features of Big Data spawn issues relating to privacy, such as data profiling, lack of transparency regarding privacy policies, accidental disclosures of data, false data or false analytics results. Hence, this research provides an insight into the intersection between Big Data and an individual's fundamental rights. The trade-off between privacy breaching and preserving is becoming more intense due to the rapid advancement of Big Data. Suggesting comparative analysis method as the data analysis approach, the adequacy of the Malaysian Personal Data Protection Act 2010 (PDPA 2010) in governing the risks of Big Data is evaluated against the European Union General Data Protection Regulation (GDPR) in managing the risk arising from the integration of Big Data. This research is hoped to initiate the improvement to the legislative framework, provides fundamentals to the formulation of national policy, and creation of specific law on Big Data in Malaysia, which will subsequently benefit industrial players and stakeholders
    corecore