64 research outputs found

    People Can Be So Fake: A New Dimension to Privacy and Technology Scholarship

    Get PDF
    This article updates the traditional discussion of privacy and technology, focused since the days of Warren and Brandeis on the capacity of technology to manipulate information. It proposes a novel dimension to the impact of anthropomorphic or social design on privacy. Technologies designed to imitate people-through voice, animation, and natural language-are increasingly commonplace, showing up in our cars, computers, phones, and homes. A rich literature in communications and psychology suggests that we are hardwired to react to such technology as though a person were actually present. Social interfaces accordingly capture our attention, improve interactivity, and can free up our hands for other tasks. At the same time, technologies that imitate people have the potential to implicate long-standing privacy values. One of the well-documented effects on users of interfaces and devices that emulate people is the sensation of being observed and evaluated. Their presence can alter our attitude, behavior, and physiological state. Widespread adoption of such technology may accordingly lessen opportunities for solitude and chill curiosity and self-development. These effects are all the more dangerous in that they cannot be addressed through traditional privacy protections such as encryption or anonymization. At the same time, the unique properties of social technology also present an opportunity to improve privacy, particularly online

    Against Notice Skepticism in Privacy (and Elsewhere)

    Get PDF
    What follows is an exploration of innovative new ways to deliver privacy notice. Unlike traditional notice that relies upon text or symbols to convey information, emerging strategies of “visceral” notice leverage a consumer’s very experience of a product or service to warn or inform. A regulation might require that a cell phone camera make a shutter sound so people know their photo is being taken. Or a law could incentivize websites to be more formal (as opposed to casual) wherever they collect personal information, as formality tends to place people on greater guard about what they disclose. The thesis of this Article is that, for a variety of reasons, experience as a form of privacy disclosure is worthy of further study before we give in to calls to abandon notice as a regulatory strategy in privacy and elsewhere. In Part I, the Article examines the promise of radical new forms of experiential or visceral notice based in contemporary design psychology. This Part also compares and contrasts visceral notice to other regulator strategies that seek to “nudge” or influence consumer or citizen behavior. Part II discusses why the further exploration of visceral notice and other notice innovation is warranted. Part III explores potential challenges to visceral notice—for instance, from the First Amendment—and lays out some thoughts on the best regulatory context for requiring or incentivizing visceral notice. In particular, this Part highlights the potential of safe harbors and goal-based rules, i.e., rules that look to the outcome of a notice strategy rather than dictate precisely how notice must be delivered. This Article uses online privacy as a case study for several reasons. First, notice is among the only affirmative obligations that companies face with respect to privacy—online privacy is a quintessential notice regime. Second, the Internet is a context in which notice is widely understood to have failed, but where the nature of digital services means that viable regulatory alternatives are few and poor. Finally, the fact that websites are entirely designed environments furnishes unique opportunities for the sorts of untraditional interventions explored in Part I

    The Boundaries of Privacy Harm

    Get PDF
    Just as a burn is an injury caused by heat, so is privacy harm a unique injury with specific boundaries and characteristics. This Essay describes privacy harm as falling into two related categories. The subjective category of privacy harm is the perception of unwanted observation. This category describes unwelcome mental states—anxiety, embarrassment, fear—that stem from the belief that one is being watched or monitored. Examples of subjective privacy harms include everything from a landlord eavesdropping on his tenants to generalized government surveillance. The objective category of privacy harm is the unanticipated or coerced use of information concerning a person against that person. These are negative, external actions justified by reference to personal information. Examples include identity theft, the leaking of classified information that reveals an undercover agent, and the use of a drunk-driving suspect’s blood as evidence against him. The subjective and objective categories of privacy harm are distinct but related. Just as assault is the apprehension of battery, so is the perception of unwanted observation largely an apprehension of information-driven injury. The categories represent, respectively, the anticipation and consequence of a loss of control over personal information. This approach offers several advantages. It uncouples privacy harm from privacy violations, demonstrating that no person need commit a privacy violation for privacy harm to occur (and vice versa). It creates a “limiting principle” capable of revealing when another value—autonomy or equality, for instance—is more directly at stake. It also creates a “rule of recognition” that permits the identification of a privacy harm when no other harm is apparent. Finally, this approach permits the measurement and redress of privacy harm in novel ways

    Scylla or Charybdis: Navigating the Jurisprudence of Visual Clutter

    Get PDF
    This Note argues that passing close to Discovery Network is the safest route - municipalities can still drastically reduce visual clutter by regulating commercial speech alone without violating the First Amendment. Part I looks at the onsite/offsite distinction, a singularly popular method of sign regulation, and concludes that this distinction runs squarely afoul of Metromedia. Part II looks at the once-accepted alternative route - the commercial/noncommercial distinction - and argues that this distinction does not run afoul of Discovery Network. Rather, a close reading of Discovery Network permits the regulation of exclusively commercial billboards where, as typically, they outnumber noncommercial billboards. Part III acknowledges that other constitutional methods of regulation exist but suggests that the commercial/noncommercial distinction is superior for policy reasons. Specifically, jealous protection of commercial speech dilutes the protection afforded ideas. Part III concludes that the government has a responsibility to offset the dilution of the marketplace of ideas that results from excessive commercial speech

    Against Notice Skepticism in Privacy (and Elsewhere)

    Get PDF
    What follows is an exploration of innovative new ways to deliver privacy notice. Unlike traditional notice that relies upon text or symbols to convey information, emerging strategies of “visceral” notice leverage a consumer’s very experience of a product or service to warn or inform. A regulation might require that a cell phone camera make a shutter sound so people know their photo is being taken. Or a law could incentivize websites to be more formal (as opposed to casual) wherever they collect personal information, as formality tends to place people on greater guard about what they disclose. The thesis of this Article is that, for a variety of reasons, experience as a form of privacy disclosure is worthy of further study before we give in to calls to abandon notice as a regulatory strategy in privacy and elsewhere. In Part I, the Article examines the promise of radical new forms of experiential or visceral notice based in contemporary design psychology. This Part also compares and contrasts visceral notice to other regulator strategies that seek to “nudge” or influence consumer or citizen behavior. Part II discusses why the further exploration of visceral notice and other notice innovation is warranted. Part III explores potential challenges to visceral notice—for instance, from the First Amendment—and lays out some thoughts on the best regulatory context for requiring or incentivizing visceral notice. In particular, this Part highlights the potential of safe harbors and goal-based rules, i.e., rules that look to the outcome of a notice strategy rather than dictate precisely how notice must be delivered. This Article uses online privacy as a case study for several reasons. First, notice is among the only affirmative obligations that companies face with respect to privacy—online privacy is a quintessential notice regime. Second, the Internet is a context in which notice is widely understood to have failed, but where the nature of digital services means that viable regulatory alternatives are few and poor. Finally, the fact that websites are entirely designed environments furnishes unique opportunities for the sorts of untraditional interventions explored in Part I

    Against Notice Skepticism in Privacy (and Elsewhere)

    Get PDF
    The article explores innovative new ways to deliver privacy notice. According to the California law, a company offering an online service should be linked to a privacy policy due to the fact that consumers compare privacy policies in order to decide what services to use. It informs that the U.S. Federal Trade Commission is responsible for enforcing consumer privacy online and is guided by a set of principles which include notice/awareness, choice/consent and integrity/security

    Reputation Agent: Prompting Fair Reviews in Gig Markets

    Full text link
    Our study presents a new tool, Reputation Agent, to promote fairer reviews from requesters (employers or customers) on gig markets. Unfair reviews, created when requesters consider factors outside of a worker's control, are known to plague gig workers and can result in lost job opportunities and even termination from the marketplace. Our tool leverages machine learning to implement an intelligent interface that: (1) uses deep learning to automatically detect when an individual has included unfair factors into her review (factors outside the worker's control per the policies of the market); and (2) prompts the individual to reconsider her review if she has incorporated unfair factors. To study the effectiveness of Reputation Agent, we conducted a controlled experiment over different gig markets. Our experiment illustrates that across markets, Reputation Agent, in contrast with traditional approaches, motivates requesters to review gig workers' performance more fairly. We discuss how tools that bring more transparency to employers about the policies of a gig market can help build empathy thus resulting in reasoned discussions around potential injustices towards workers generated by these interfaces. Our vision is that with tools that promote truth and transparency we can bring fairer treatment to gig workers.Comment: 12 pages, 5 figures, The Web Conference 2020, ACM WWW 202

    The Concise Guide to PHARMACOLOGY 2013/14: overview.

    No full text
    The Concise Guide to PHARMACOLOGY 2013/14 provides concise overviews of the key properties of over 2000 human drug targets with their pharmacology, plus links to an open access knowledgebase of drug targets and their ligands (www.guidetopharmacology.org), which provides more detailed views of target and ligand properties from the IUPHAR database. The full contents can be found at http://onlinelibrary.wiley.com/doi/10.1111/bph.12444/full. This compilation of the major pharmacological targets is divided into seven areas of focus: G protein-coupled receptors, ligand-gated ion channels, ion channels, catalytic receptors, nuclear hormone receptors, transporters and enzymes. These are presented with nomenclature guidance and summary information on the best available pharmacological tools, alongside key references and suggestions for further reading. A new landscape format has easy to use tables comparing related targets. It is a condensed version of material contemporary to late 2013, which is presented in greater detail and constantly updated on the website www.guidetopharmacology.org, superseding data presented in previous Guides to Receptors & Channels. It is produced in conjunction with NC-IUPHAR and provides the official IUPHAR classification and nomenclature for human drug targets, where appropriate. It consolidates information previously curated and displayed separately in IUPHAR-DB and GRAC and provides a permanent, citable, point-in-time record that will survive database updates

    An Evaluation Schema for the Ethical Use of Autonomous Robotic Systems in Security Applications

    Full text link
    • …
    corecore