A duty of loyalty for privacy law

N Richards, W Hartzog - Wash. UL Rev., 2021 - HeinOnline
Data privacy law fails to stop companies from engaging in self-serving, opportunistic
behavior at the expense of those who trust them with their data. This is a problem. Modern …

What are the chances? explaining the epsilon parameter in differential privacy

P Nanayakkara, MA Smart, R Cummings… - 32nd USENIX Security …, 2023 - usenix.org
Differential privacy (DP) is a mathematical privacy notion increasingly deployed across
government and industry. With DP, privacy protections are probabilistic: they are bounded …

Hacking into China's cybersecurity law

JA Lee - Wake Forest L. Rev., 2018 - HeinOnline
HACKING INTO CHINA'S CYBERSECURITY LAW Page 1 HACKING INTO CHINA'S
CYBERSECURITY LAW Jyh-An Lee* China's Cybersecurity Law, which is thus far the most …

[图书][B] Owned: Property, privacy, and the new digital serfdom

JAT Fairfield - 2017 - books.google.com
In this compelling examination of the intersection of smart technology and the law, Joshua
AT Fairfield explains the crisis of digital ownership-how and why we no longer control our …

Surveillance policy making by procurement

C Crump - Wash. L. Rev., 2016 - HeinOnline
In Seattle, the police obtained a surveillance drone with the approval of a city council that did
not realize what it was doing. In Oakland, following a council review that lasted literally two …

“I just want to feel safe”: A Diary Study of Safety Perceptions on Social Media

EM Redmiles, J Bodford, L Blackwell - Proceedings of the International …, 2019 - ojs.aaai.org
Social media can increase social capital, provide entertainment, and enable meaningful
discourse. However, threats to safety experienced on social media platforms can inhibt …

Exploring user mental models of {End-to-End} encrypted communication tools

R Abu-Salma, EM Redmiles, B Ur, M Wei - 8th USENIX Workshop on …, 2018 - usenix.org
End-to-end (E2E) encrypted communication tools can help users keep their communications
secure from government or corporate surveillance. In this work, we conduct a quantitative …

Can You See Me Now?: Toward Reasonable Standards for Law Enforcement Access to Location Data That Congress Could Enact

SK Pell, C Soghoian - Berkeley Tech. LJ, 2012 - HeinOnline
The use of location information by law enforcement agencies is common and becoming
more so as technological improvements enable collection of more accurate and precise …

Understanding risks of privacy theater with differential privacy

MA Smart, D Sood, K Vaccaro - Proceedings of the ACM on Human …, 2022 - dl.acm.org
Differential privacy is one of the most popular technologies in the growing area of privacy-
conscious data analytics. But differential privacy, along with other privacy-enhancing …

The (in) effectiveness of voluntarily produced transparency reports

C Parsons - Business & Society, 2019 - journals.sagepub.com
This article analyzes the relative effectiveness and limitations of companies' voluntarily
produced transparency reports in promoting change in firm and government behavior. Such …