Form follows function fails - as a sociological foundation of comparative law
In: Social epistemology: a journal of knowledge, culture and policy, Band 13, Heft 2, S. 113-128
ISSN: 1464-5297
12 Ergebnisse
Sortierung:
In: Social epistemology: a journal of knowledge, culture and policy, Band 13, Heft 2, S. 113-128
ISSN: 1464-5297
SSRN
The paper introduces an approach to privacy enhancing technologies that sees privacy not merely as an individual right, but as a public good. This understanding of privacy has recently gained ground in the debate on appropriate legal protection for privacy in an online environment. The jurisprudential idea that privacy is a public good and prerequisite for a functioning democracy also entails that its protection should not be left exclusively to the individual whose privacy is infringed. This idea finds its correspondence in our approach to privacy protection through obfuscation, where everybody in a group takes a small privacy risk to protect the anonymity of fellow group members. We show how these ideas can be computationally realised in an Investigative Data Acquisition Platform (IDAP). IDAP is an efficient symmetric Private Information Retrieval (PIR) protocol optimised for the specific purpose of facilitating public authorities' enquiries for evidence.
BASE
This paper discusses privacy enhancing technologies in the field of inter-agency data sharing, a key government objective for efficient public service delivery. We analyse the legal and conceptual framework that governs multi-agency cooperation in particular in the field of child protection work, and develop two approaches to represent relevant data protection ideas computationally in the infrastructure that agencies use to exchange sensitive personal data.
BASE
In: Edition Weblaw
In: 2, Colloquium 24
Small, apparently innocuous pieces of personal data, generated during online interactions, can, over time, collectively pose significant yet often unanticipated risks to personal reputation, and to employers' operational security. Such revelations arise from personal data shared intentionally by individuals, data shared about them by others, from tagging software, and from everyday cross-authentication practices. When brought together, unintended insights into personal habits, work patterns, emotions and political leanings can be gained by others, potentially creating adverse consequences for individuals e.g. via reputational damage, employers e.g. via cybercrime, and even for national security. Our research examines potential adverse revelations resulting from individual digital traces via the development of a tool that provides portraits of digital traces and reflects them back to the user. The tool will enable individuals to understand the cumulative nature of their data, and to better comprehend the resultant vulnerabilities. Our research also aims to identify conflict and ambiguity in cybersecurity service design and implementation when motivations and actions of employees are balanced against organisational security philosophy. This will enable mitigation against risks, issues and consequences of cumulative revelations from both an organisational and individual perspective. We focus here on an interview study conducted with 26 participants during the UK COVID-19 lockdown, examining their digital ecosystems, practices and experiences of cumulative revelations, where combined elements of their personal data revealed more than intended. We discuss individual awareness and perception of online presence, events that shape individual online behaviour, unanticipated sources of risk, and data privacy literacy. We discuss the implications of cumulative revelations for individuals and employers and the intersection with COVID-related homeworking on online practices and behaviours. We reflect on the potential of future digital tools to increase people's awareness of the information that they accidentally reveal about themselves online, with the aim of increasing personal agency.
BASE
Small, apparently innocuous pieces of personal data, generated during online interactions, can, over time, collectively pose significant yet often unanticipated risks to personal reputation, and to employers' operational security. Such revelations arise from personal data shared intentionally by individuals, data shared about them by others, from tagging software, and from everyday cross-authentication practices. When brought together, unintended insights into personal habits, work patterns, emotions and political leanings can be gained by others, potentially creating adverse consequences for individuals e.g. via reputational damage, employers e.g. via cybercrime, and even for national security. Our research examines potential adverse revelations resulting from individual digital traces via the development of a tool that provides portraits of digital traces and reflects them back to the user. The tool will enable individuals to understand the cumulative nature of their data, and to better comprehend the resultant vulnerabilities. Our research also aims to identify conflict and ambiguity in cybersecurity service design and implementation when motivations and actions of employees are balanced against organisational security philosophy. This will enable mitigation against risks, issues and consequences of cumulative revelations from both an organisational and individual perspective. We focus here on an interview study conducted with 26 participants during the UK COVID-19 lockdown, examining their digital ecosystems, practices and experiences of cumulative revelations, where combined elements of their personal data revealed more than intended. We discuss individual awareness and perception of online presence, events that shape individual online behaviour, unanticipated sources of risk, and data privacy literacy. We discuss the implications of cumulative revelations for individuals and employers and the intersection with COVID-related homeworking on online practices and behaviours. We reflect on the potential of future digital tools to increase people's awareness of the information that they accidentally reveal about themselves online, with the aim of increasing personal agency.Our research examines potential adverse revelations resulting from individual digital traces via the development of a tool that provides portraits of digital traces and reflects them back to the user. The tool will enable individuals to understand the cumulative nature of their data, and to better comprehend the resultant vulnerabilities. Our research also aims to identify conflict and ambiguity in cybersecurity service design and implementation when motivations and actions of employees are balanced against organisational security philosophy. This will enable mitigation against risks, issues and consequences of cumulative revelations from both an organisational and individual perspective.We focus here on an interview study conducted with 26 participants during the UK COVID-19 lockdown, examining their digital ecosystems, practices and experiences of cumulative revelations, where combined elements of their personal data revealed more than intended. We discuss individual awareness and perception of online presence, events that shape individual online behaviour, unanticipated sources of risk, and data privacy literacy. We discuss the implications of cumulative revelations for individuals and employers and the intersection with COVID-related homeworking on online practices and behaviours. We reflect on the potential of future digital tools to increase people's awareness of the information that they accidentally reveal about themselves online, with the aim of increasing personal agency.
BASE
The European Commission consulted between December 5, 2013 and March 5, 2014 on a wide-ranging review of EU copyright rules.[2] This response by the CREATe Centre attempts to make two contributions: (1) the process of policy formation matters for the evolution of the EU legal framework, and so we offer a short critique of the consultation format; (2) we summarise available evidence in seven thematic areas where CREATe has developed or is developing research (term of protection, libraries and archives, disabilities, text and data mining, user-generated content, fair remuneration for authors and performers, and respect for rights). CREATe understands evidence here as empirically grounded, but open to historical and comparative approaches.
BASE
The European Medical Information Framework (EMIF) project, funded through the IMI programme (Innovative Medicines Initiative Joint Undertaking under Grant Agreement No. 115372), has designed and implemented a federated platform to connect health data from a variety of sources across Europe, to facilitate large scale clinical and life sciences research. It enables approved users to analyse securely multiple, diverse, data via a single portal, thereby mediating research opportunities across a large quantity of research data. EMIF developed a code of practice (ECoP) to ensure the privacy protection of data subjects, protect the interests of data sharing parties, comply with legislation and various organisational policies on data protection, uphold best practices in the protection of personal privacy and information governance, and eventually promote these best practices more widely. EMIF convened an Ethics Advisory Board (EAB), to provide feedback on its approach, platform, and the EcoP. The most important challenges the ECoP team faced were: how to define, control and monitor the purposes (kinds of research) for which federated health data are used; the kinds of organisation that should be permitted to conduct permitted research; and how to monitor this. This manuscript explores those issues, offering the combined insights of the EAB and EMIF core ECoP team. For some issues, a consensus on how to approach them is proposed. For other issues, a singular approach may be premature but the challenges are summarised to help the community to debate the topic further. Arguably, the issues and their analyses have application beyond EMIF, to many research infrastructures connected to health data sources.
BASE
In: Edinburgh School of Law Research Paper No. 2021/12
SSRN
In: Big data & society, Band 8, Heft 1, S. 205395172110061
ISSN: 2053-9517
How can digitised assets of Galleries, Libraries, Archives and Museums be reused to unlock new value? What are the implications of viewing large-scale cultural heritage data as an economic resource, to build new products and services upon? Drawing upon valuation studies, we reflect on both the theory and practicalities of using mass-digitised heritage content as an economic driver, stressing the need to consider the complexity of commercial-based outcomes within the context of cultural and creative industries. However, we also problematise the act of considering such heritage content as a resource to be exploited for economic growth, in order to inform how we consider, develop, deliver and value mass-digitisation. Our research will be of interest to those wishing to understand a rapidly changing research and innovation landscape, those considering how to engage memory institutions in data-driven activities and those critically evaluating years of mass-digitisation across the heritage sector.