Showing 1 - 8 of 8
Persistent link: https://www.econbiz.de/10012908557
Prepared for the North Carolina Law Review symposium on police body-worn Cameras (“BWC”s), this Article shows that BWCs can be conceptualized as an example of the Internet of Things (“IoT”). By combining the previously separate literatures on BWCs and IoT, this Article shows how insights...
Persistent link: https://www.econbiz.de/10012920706
This article is part of a Wisconsin Law Review symposium in honor of the work of Neil Komesar, and particularly his book “Imperfect Alternatives: Choosing Institutions in Law, Economics, and Public Policy.” I used this as the main text in 2003 for one of the first law school courses on...
Persistent link: https://www.econbiz.de/10014162877
This article presents and analyzes significant ways that both the European Union and the United States are stricter in certain respects than the other, for the privacy of government requests for information. The ways that both sides are stricter in significant respects has not been clearly...
Persistent link: https://www.econbiz.de/10014122794
This article examines the tension between social networks as enablers of political mobilization (sharing information is good) and as threats to privacy (sharing information is bad). A central theme is that social networks are platforms to create associations. Linguistically, “networks” and...
Persistent link: https://www.econbiz.de/10014041726
The goal of this article is to provide a framework for assessing issues of data portability and other required transfers of data. Greater portability and other required transfers of data can have pro-competitive effects – if more companies have access to commercially valuable data, then there...
Persistent link: https://www.econbiz.de/10014093910
This article examines the interaction between data privacy, which was a highly salient political issue before the events of September 11, and cyber-security and homeland security, which became much more salient after those events. The article illustrates the shift in salience by examining the...
Persistent link: https://www.econbiz.de/10014103569
This paper is the first systematic examination of the effects of data localization laws on cybersecurity. This paper focuses on the effects of “hard” data localization, where transfer of data is prohibited to other countries. Other “softer” versions of data localization also exist, such...
Persistent link: https://www.econbiz.de/10013300004