Suchergebnisse
Filter
3168 Ergebnisse
Sortierung:
SSRN
The Monetization of Innovation *
SSRN
Working paper
The Genius & The Imbecile: Disentangling the 'Legal' Framework of Autonomy in Modern Liberal Eugenics, from Non-Therapeutic Gene Enhancement Use in Gene Editing Technologies
Current Debates in Social Sciences Conference which was held in İstanbul, on December 14-16, 2017 ; This paper intends to gravitate into a brief exposition of the framework of 'liberal eugenics' (often described as the more liberated, compassionate form of eugenics, distinguishing itself from the pejorative eugenics movements of the past, by employing an autonomous nature of decision making vis-à-vis parents and beneficiaries), considered from the perspective of non-therapeutic uses of gene editing technologies. Where emerging technologies (such as the gene editing technology known as CRISPR/Cas9) are concerned, democratic innovations need to be balanced against a social movement of a non-radical nature in the interest of enlightened medical discourse; taking into account that the variables of each regulatory space is often inundated with issues such as plurality, different ideals of morality and public opinion, and the determination of stewardship responsibilities, amongst others. Specifically, this paper intends to extrapolate on the 'legal' formulation of the modified concept of 'autonomy' that is central to the liberal eugenics paradigm. In essence, it has been described as 'liberal' because the underlying justification for a selection process excludes intervention from a State, and centralizes the role of the family as the key decision-maker in adjudging the proprieties of both therapeutic and non-therapeutic medical treatments. However, this paper hypothesizes that notwithstanding this 'gift' of autonomy, the legality of the concept in itself continues to raise the more discursive issues relating to gene modification/enhancement debates, germ-line modification, the savior sibling dilemma, distributive justice/access, disability, and considerations of primary/personhood of a human being, amongst others. This paper poses that the autonomous element in liberal eugenics may be an illusory disguise to escape the shackles of past negativities, and may still require a more holistic and reflected discourse as part of a regulatory or governance framework. ; https://www.econstor.eu/bitstream/10419/180037/1/9781912503056.pdf
BASE
Data Protection Authorities and Information Technology
In: Computer Law and Security Review, Forthcoming
SSRN
Will the Internet of Things Disrupt Healthcare?
In: Vanderbilt Journal of Entertainment & Technology Law, Band XIX, Heft 2
SSRN
Reproduction, Self, and State
In: Social research: an international quarterly, Band 69, Heft 1, S. 115-141
ISSN: 0037-783X
Communitarian Search and Seizure
In: The responsive community, Band 3, Heft 2, S. 32-42
ISSN: 1053-0754
Impact on personal security against the regulation of cybercrime at the University of Pamplona, Villa del Rosario headquarters ; Impacto sobre la seguridad personal frente a la regulación de la ciberdelincuencia en la Universidad de Pamplona, sede de Villa del Rosario
Computer crime and its evolution in Colombia, is relevant, the computer crimes described in Law 1273 of January 5, 2009 on the protection of information and data. Therefore, in the political constitution, article 15. All persons have the right to their personal and family privacy and their good name, and the State must respect them and enforce them, also, they have the right to know, update and rectify the information that they have been collected on them in databases and in archives of public and private entities. For this reason, cybercriminals, have specialized mainly in theft through computer means, this being the most common cybercrime in the city of Cúcuta, where citizens have been affected by this criminal modality in recent years. The research has a quantitative, non-experimental approach and the research design is descriptive-purposeful, random sampling and a sample of 100 students from the University of Pamplona, a questionnaire was applied. Results and analysis. The first category in social networks stood out, 84% in students responded that Yes, They have seen how the privacy of another person is exposed by the incorrect handling of information, photos, videos, etc., in social networks; Next, 95% of the students responded that Yes, they would like more information about computer crimes and information about their prevention and virtual theft category, 53% of the students answered that Yes, they know people victims of virtual thefts. To finalize, it is relevant that they provide information and guidance through training meetings and in turn implement group strategies to raise awareness in the educational community through personal security against the regulation of computer crimes. ; La delincuencia informática y su evolución en Colombia, es relevante, los delitos informáticos descritos en la ley 1273 de 5 de enero de 2009 de la protección de la información y los datos. Por lo tanto, En la constitución política, artículo 15. Todas las personas tienen derecho a su intimidad personal y familiar y a su buen nombre, y el Estado debe respetarlos y hacerlos respetar, también, tienen derecho a conocer, actualizar y rectificar las informaciones que se hayan recogido sobre ellas en bancos de datos y en archivos de entidades públicas y privadas. Por tal motivo, los delincuentes informáticos, se han especializado principalmente en el hurto a través de medios informáticos, siendo este el delito informático de mayor ocurrencia en la ciudad de Cúcuta, donde los ciudadanos, se han visto afectados por esta modalidad delictiva en los últimos años. La investigación tiene como enfoque cuantitativo, no experimental y el diseño de la investigación es descriptivo- propositivo, un muestreo al azar y una muestra de 100 estudiantes de la Universidad de Pamplona, se aplicó un cuestionario. Resultados y análisis. La primera categoría en las redes sociales se destacó, un 84% en los estudiantes respondieron que Si, Han visto como la intimidad de otra persona queda al descubierto por el incorrecto manejo de información, fotos, vídeos, etc, en las redes sociales; seguidamente, un 95% en los estudiantes respondieron que Si, quisieran tener más información sobre los delitos informáticos e información sobre su prevención y la categoría hurto virtual, un 53% en los estudiantes respondieron que Si, conocen personas víctimas de hurtos virtuales. Para finiquitar, es relevante que suministren información y orientación a través de encuentros formativos y a su vez implementar las estrategias grupales para concientizar a la comunidad educativa a través de la seguridad personal frente a la regulación de los delitos informáticos.
BASE
The Eye in the Sky Delivers (and Influences) What You Buy
In: 24University of Pennsylvania Journal of Constitutional Law,1329(2022)
SSRN
Basic administrative law for paralegals
Administrative law and administrative agencies -- Development of administrative law and the delegation doctrine -- Agency discretion -- Client rights -- Agency rules and regulations -- Investigations and information gathering -- Informal proceedings -- Administrative agency hearings -- Judicial review -- The right to know and the right to privacy -- Paralegalism in administrative law.
An Institutional Emphasis
Professor Schwartz is an important scholar of the interface between the difficult moral concept of privacy and the new information technologies. Someday a book will tell the story of modem history through the lens of privacy: village lives well known to neighbors; the claims of the national state (taxes, military service); the social welfare state; and the possibilities and dangers of modem biology. As Paul Schwartz has written, DNA and other tools can tell us a great deal about ourselves and can improve our lives; they can also tell employers, drug companies, prospective in-laws, and the police things we prefer they not know. Today's privacy questions will seem like nursery school in a few years. My students divide fifty-fifty when asked if they would prefer free local telephone service if each outgoing call were preceded by a fifteen-second commercial, tailored to their calling patterns (you call for pizza, I for sushi). The British publisher of Harry Potter books charges two pounds for a plain-cover copy, which permits an adult to read the book on the London underground without embarrassment. Living Americans can establish descent from Thomas Jefferson. Amazon can use and sell my book-buying tastes. The plastic membership card I use to enter the Museum of Modem Art allows the museum to keep track of my visits. Contemporary thinking about law is well suited for analysis of these issues as they arise. Who should have the "right" to the information? Should we bar sale? What is the appropriate remedy for violation? With information located in cyberspace, what terrestrial jurisdiction's law should control? The Schwartz emphasis is on republican values: how do we, collectively, want to live our lives? It is on the importance of marketguiding structures: what is meaningful consent? what should be the default rule? And it is on the chicken-and-egg direction of influence as norms are formed. Especially with rapidly changing technology, we and our friends are likely to think that what occurs is normal. How can organized society make itself think about whether evolving expectations create the best possible world? Asking these questions, Professor Schwartz chooses several lenses through which to observe incompletenesses and simplifications in standard rhetoric. Yes, there are arguments for decentralization, for markets, for industry self-regulation, and for contract. But yes also, there is need for collective public action and seemingly – horrors- – even for government.
BASE
Is Data Protection-friendly Artificial Intelligence Possible? ; ¿Es posible una Inteligencia artificial respetuosa con la protección de datos?
Artificial Intelligence is a key challenge in the fourth industrial revolution we are living. The article aims to analyze its compatibility with the right to data protection. the principles underlying the regulation are analyzed and the fit of the characteristics of the technology with these principles is studied. The main rights of the subjects are highlighted, as well as the obligations of data controllers. Special attention is paid to algorithmic discrimination in the context of profiles and political marketing, which is a challenge to be avoided due to its violation of the principle of equality and fairness in the processing of personal information. It is essential to safeguard the right to algorithmic explainability. It concludes with an analysis of the necessary regulation currently under discussion in Europe. ; La Inteligencia artificial es un reto clave en la cuarta revolución industrial que vivimos. El artículo pretende analizar la compatibilidad de ésta con el derecho a la protección de datos. Para ello se analizan los principios que subyacen a la regulación y se estudia el encaje de las características de la tecnología en los mismos. Se destacan los principales derechos de los sujetos, así como las obligaciones de los responsables de los tratamientos. Especial atención se presta a la discriminación algorítmica en el caso de los perfiles y el marketing político, que supone un reto a evitar por su vulneración del principio de igualdad y justicia en el tratamiento de la información personal. Resulta esencial salvaguardar el derecho a la explicabilidad algorítmica. Se concluye con un análisis de la necesaria regulación que está en fase de discusión en Europa.
BASE
Public Policy Issues in Direct and Digital Marketing – Concerns and Initiatives: Public Policy in Direct and Digital Marketing
In: International journal of public administration in the digital age: IJPADA, Band 6, Heft 4, S. 54-71
ISSN: 2334-4539
Companies require information about customers to understand them, know their preferences, and develop relationships with them. Companies employ a number of direct and digital marketing channels to collect information and intelligence about customers. Marketers adopt a number of unfair practices for collecting information through direct and digital marketing and this raises concerns about consumer privacy. The article discusses the various aspects of consumer privacy and the need for protecting consumer privacy. The article further focuses on the various regulations enforced by regulatory bodies and governments of countries to protect customers. Various initiatives taken by companies to protect customers are discussed. Direct and digital marketing channels allow companies to collect information and intelligence about customers and to influence them. However, companies should be sensitive to customer concerns. This will help companies in building long-term customer relationships.
Methods for the de-identification of electronic health records for genomic research
Electronic health records are increasingly being linked to DNA repositories and used as a source of clinical information for genomic research. Privacy legislation in many jurisdictions, and most research ethics boards, require that either personal health information is de-identified or that patient consent or authorization is sought before the data are disclosed for secondary purposes. Here, I discuss how de-identification has been applied in current genomic research projects. Recent metrics and methods that can be used to ensure that the risk of re-identification is low and that disclosures are compliant with privacy legislation and regulations (such as the Health Insurance Portability and Accountability Act Privacy Rule) are reviewed. Although these methods can protect against the known approaches for re-identification, residual risks and specific challenges for genomic research are also discussed.
BASE
Methods for the de-identification of electronic health records for genomic research
In: http://genomemedicine.com/content/3/4/25
Abstract Electronic health records are increasingly being linked to DNA repositories and used as a source of clinical information for genomic research. Privacy legislation in many jurisdictions, and most research ethics boards, require that either personal health information is de-identified or that patient consent or authorization is sought before the data are disclosed for secondary purposes. Here, I discuss how de-identification has been applied in current genomic research projects. Recent metrics and methods that can be used to ensure that the risk of re-identification is low and that disclosures are compliant with privacy legislation and regulations (such as the Health Insurance Portability and Accountability Act Privacy Rule) are reviewed. Although these methods can protect against the known approaches for re-identification, residual risks and specific challenges for genomic research are also discussed.
BASE