10,153 research outputs found

    Doe v. Ashcroft and Its Place in the Judicial Trend: How the Courts Have Advanced Civil Liberties in Step with Advances in Technology

    Get PDF
    As many jurists and scholars have noted, the United States has a long-standing history of encroaching upon the civil liberties of its citizens, especially during times of war or conflict.\ud \ud For instance, during the Civil War, President Lincoln unilaterally suspended the writ of habeas corpus in response to increased violence and the threat of Southern succession.During World War I, Postmaster General Albert Burleson used the Espionage Act to suspend mailing privileges for certain “non-mailable” materials, such as newspapers and other dissident publications critical of the war effort

    Fighting Cybercrime After \u3cem\u3eUnited States v. Jones\u3c/em\u3e

    Get PDF
    In a landmark non-decision last term, five Justices of the United States Supreme Court would have held that citizens possess a Fourth Amendment right to expect that certain quantities of information about them will remain private, even if they have no such expectations with respect to any of the information or data constituting that whole. This quantitative approach to evaluating and protecting Fourth Amendment rights is certainly novel and raises serious conceptual, doctrinal, and practical challenges. In other works, we have met these challenges by engaging in a careful analysis of this “mosaic theory” and by proposing that courts focus on the technologies that make collecting and aggregating large quantities of information possible. In those efforts, we focused on reasonable expectations held by “the people” that they will not be subjected to broad and indiscriminate surveillance. These expectations are anchored in Founding-era concerns about the capacity for unfettered search powers to promote an authoritarian surveillance state. Although we also readily acknowledged that there are legitimate and competing governmental and law enforcement interests at stake in the deployment and use of surveillance technologies that implicate reasonable interests in quantitative privacy, we did little more. In this Article, we begin to address that omission by focusing on the legitimate governmental and law enforcement interests at stake in preventing, detecting, and prosecuting cyber-harassment and healthcare fraud

    CHORUS Deliverable 3.3: Vision Document - Intermediate version

    Get PDF
    The goal of the CHORUS vision document is to create a high level vision on audio-visual search engines in order to give guidance to the future R&D work in this area (in line with the mandate of CHORUS as a Coordination Action). This current intermediate draft of the CHORUS vision document (D3.3) is based on the previous CHORUS vision documents D3.1 to D3.2 and on the results of the six CHORUS Think-Tank meetings held in March, September and November 2007 as well as in April, July and October 2008, and on the feedback from other CHORUS events. The outcome of the six Think-Thank meetings will not just be to the benefit of the participants which are stakeholders and experts from academia and industry – CHORUS, as a coordination action of the EC, will feed back the findings (see Summary) to the projects under its purview and, via its website, to the whole community working in the domain of AV content search. A few subjections of this deliverable are to be completed after the eights (and presumably last) Think-Tank meeting in spring 2009

    Privacy Awareness in Mobile Business: How Mobile OS and Apps Support Transparency in the Use of Personal Data

    Get PDF
    Personal data of consumers has become a highly valuable resource in e-business. Tech-nologies like smartphones, social networks or search engines help to access, collect and monitor an almost infinite amount of data about consumers. In this environment the traditional notice and consent principle seems insufficient for effective privacy protec-tion. Awareness and control are constituting parts of an effective privacy management. This paper investigates how privacy awareness is supported in mobile business. Due to the critical privacy situation in this field, several third-party privacy enhancing mobile apps emerged beside the OS functionalities. The paper explores what information objects these awareness enhancing apps provide. Based on a detailed analysis of 19 apps, a set of 11 information objects is identified that contributes to 4 dimensions of privacy aware-ness. The findings show that the OS mainly focus on transparency regarding permission systems, that users can obtain more information about the use of their data by using specialized apps and that some dimensions of privacy awareness are almost not sup-ported and open for research as well as the development of new solutions
    corecore