43,696 research outputs found

    Unlocking the Fifth Amendment: Passwords and Encrypted Devices

    Get PDF
    Each year, law enforcement seizes thousands of electronic devices—smartphones, laptops, and notebooks—that it cannot open without the suspect’s password. Without this password, the information on the device sits completely scrambled behind a wall of encryption. Sometimes agents will be able to obtain the information by hacking, discovering copies of data on the cloud, or obtaining the password voluntarily from the suspects themselves. But when they cannot, may the government compel suspects to disclose or enter their password? This Article considers the Fifth Amendment protection against compelled disclosures of passwords—a question that has split and confused courts. It measures this right against the legal right of law enforcement, armed with a warrant, to search the device that it has validly seized. Encryption cases present the unique hybrid scenario that link and entangle the Fourth and Fifth Amendments. In a sense, this Article explores whose rights should prevail. This Article proposes a novel settlement that draws upon the best aspects of Fourth and Fifth Amendment law: the government can compel a suspect to decrypt only those files it already knows she possesses. This rule follows from existing Fifth Amendment case law and, as a corollary to the fundamental nature of strong encryption, also represents the best accommodation of law enforcement needs against individual privacy

    How to Add a Day to Your Work Week

    Full text link

    Emotional Outlet Malls: Exploring Retail Therapy

    Get PDF
    People turn to shopping as an emotional outlet. This article focuses on the concept of retail therapy highlighting the personal benefits, possible issues, and research development surrounding the topic. Negative connotations regarding retail therapy exist, and today, scholars are reexamining retail therapy as a distress-motivated act of consumption from a psychological and emotional perspective. A variety of perspectives can be used to analyze shopping therapy as a face-to-face transaction, an online experience, and a simulated experience in order to explain the emotional component related to shopping

    Behavioral Psychology

    Full text link
    Excerpt: Behavioral psychology is concerned with the conditions involved in development, maintenance, and control of the behavior of individuals and other organisms. Behavioral approaches have been developed in many areas of applied psychology. These raise a number of issues important from a Christian perspective

    Three applications for mobile epidemic algorithms

    Get PDF
    This paper presents a framework for the pervasive sharing of data using wireless networks. 'FarCry' uses the mobility of users to carry files between separated networks. Through a mix of ad-hoc and infrastructure-based wireless networking, files are transferred between users without their direct involvement. As users move to different locations, files are then transmitted on to other users, spreading and sharing information. We examine three applications of this framework. Each of these exploits the physically proximate nature of social gatherings. As people group together in, for example, business meetings and cafés, this can be taken as an indication of similar interests, e.g. in the same presentation or in a type of music. MediaNet affords sharing of media files between strangers or friends, MeetingNet shares business documents in meetings, and NewsNet shares RSS feeds between mobile users. NewsNet also develops the use of pre-emptive caching: collecting information from others not for oneself, but for the predicted later sharing with others. We offer observations on developing this system for a mobile, multi-user, multi-device environment

    Is Cyberchondria a New Transdiagnostic Digital Compulsive Syndrome? A Systematic Review of the Evidence

    Get PDF
    © 2020 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).Background. Cyberchondria (CYB) has been described relatively recently as a behaviour characterized by excessive online searching for medical information that is associated with increasing levels of health anxiety. Although CYB has received some attention from researchers, there is no consensus about many of its aspects. Aims. We describe one of the first reported cases of a treatment-seeking patient with CYB. We review the published literature on the definition of CYB, its assessment, epidemiology, cost and burden, psychological models and mechanisms associated with CYB, relationships between CYB and mental disorders and prevention and treatment strategies. Methods: Systematic review of all peer-reviewed papers published within the PubMed, PsycINFO, and Cochrane Library databases. Results. 61 articles were selected. Nearly all the studies were descriptive and cross-sectional recruiting sample mainly from the general/university student population and collecting self-report data via online surveys. Data on epidemiology, clinical features, course, comorbidity and therapeutic interventions were scarce. CYB showed a self-reported association with health anxiety, hypochondriasis and obsessive-compulsive disorder (OCD) as well as other forms of problematic usage of the internet (PUI) The psychological mechanisms associated with CYB include low self-esteem, anxiety sensitivity, intolerance of uncertainty, pain catastrophizing and certain meta-cognitive beliefs. Conclusion: A working definition of CYB includes excessive online health searches that are compulsive and may serve the purpose of seeking reassurance, whilst leading to a worsening of anxiety or distress and further negative consequences. CYB represents a clinically relevant transdiagnostic compulsive behavioural syndrome, closely related to PUI and usually presenting in association with health anxiety, hypochondriasis and/or OCD. CYB is clearly in need of further study and we identify key areas for future research.Peer reviewe
    corecore