Showing 1 - 10 of 16
Prepared for the North Carolina Law Review symposium on police body-worn Cameras (“BWC”s), this Article shows that BWCs can be conceptualized as an example of the Internet of Things (“IoT”). By combining the previously separate literatures on BWCs and IoT, this Article shows how insights...
Persistent link: https://www.econbiz.de/10012920706
Persistent link: https://www.econbiz.de/10012908557
This article examines the tension between social networks as enablers of political mobilization (sharing information is good) and as threats to privacy (sharing information is bad). A central theme is that social networks are platforms to create associations. Linguistically, “networks” and...
Persistent link: https://www.econbiz.de/10014041726
This article is part of a Wisconsin Law Review symposium in honor of the work of Neil Komesar, and particularly his book “Imperfect Alternatives: Choosing Institutions in Law, Economics, and Public Policy.” I used this as the main text in 2003 for one of the first law school courses on...
Persistent link: https://www.econbiz.de/10014162877
The goal of this article is to provide a framework for assessing issues of data portability and other required transfers of data. Greater portability and other required transfers of data can have pro-competitive effects – if more companies have access to commercially valuable data, then there...
Persistent link: https://www.econbiz.de/10014093910
This article examines the interaction between data privacy, which was a highly salient political issue before the events of September 11, and cyber-security and homeland security, which became much more salient after those events. The article illustrates the shift in salience by examining the...
Persistent link: https://www.econbiz.de/10014103569
This paper is the first systematic examination of the effects of data localization laws on cybersecurity. This paper focuses on the effects of “hard” data localization, where transfer of data is prohibited to other countries. Other “softer” versions of data localization also exist, such...
Persistent link: https://www.econbiz.de/10013300004
A previous article proposed a model for when disclosure helps or hurts security, and provided reasons why computer security is often different in this respect than physical security. This paper provides a general approach for describing the incentives of actors to disclose about their software...
Persistent link: https://www.econbiz.de/10014061497
Persistent link: https://www.econbiz.de/10012746867
What legal tools do privacy advocates have available to defend an individual's right to privacy? How far does this right go? How should these rights be defended — or if necessary — curtailed? What is the role of Government, of the practicing bar, and of academics?
Persistent link: https://www.econbiz.de/10012954081