Search Results
Cybersecurity, Data Privacy & eDiscovery Law & Policy eJournal

Sponsored by...

Cleveland-Marshall College of Law logo Center for Cybersecurity & Privacy Protection Cleveland-Marshall College of Law Center Home Subscribe
1,044,020 Total downloads | Link to this page | Subscribe to this eJournal (requires login)

Viewing: 1 - 50 of 3,315 papers

1.

Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization

UCLA Law Review, Vol. 57, p. 1701, 2010, U of Colorado Law Legal Studies Research Paper No. 9-12
Number of pages: 77 Posted: 13 Jul 2012 Last Revised: 22 Feb 2015
Accepted Paper Series
Georgetown University Law Center
Downloads 21,021
2.

Big Other: Surveillance Capitalism and the Prospects of an Information Civilization

Journal of Information Technology (2015) 30, 75–89. doi:10.1057/jit.2015.5,
Number of pages: 15 Posted: 17 Apr 2015
Accepted Paper Series
Berkman Center for Internet & Society
Downloads 14,514
3.

Understanding Privacy

Daniel J. Solove, UNDERSTANDING PRIVACY, Harvard University Press, May 2008, GWU Legal Studies Research Paper No. 420, GWU Law School Public Law Research Paper No. 420
Number of pages: 24 Posted: 05 May 2008 Last Revised: 13 Jul 2014
Accepted Paper Series
George Washington University Law School
Downloads 11,586
4.

A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending it

72 George Washington Law Review 1208 (2004).
Number of pages: 36 Posted: 05 Aug 2003 Last Revised: 06 Jul 2016
Accepted Paper Series
University of Southern California Gould School of Law
Downloads 9,961
5.

FinTech, RegTech and the Reconceptualization of Financial Regulation

Northwestern Journal of International Law & Business, Forthcoming, University of Hong Kong Faculty of Law Research Paper No. 2016/035
Number of pages: 51 Posted: 05 Oct 2016 Last Revised: 26 Oct 2016
Accepted Paper Series
The University of Hong Kong - Faculty of Law, The University of Hong Kong - Faculty of Law and University of New South Wales (UNSW) - Faculty of Law
Downloads 9,474
6.

Facebook Tracks and Traces Everyone: Like This!

Tilburg Law School Legal Studies Research Paper Series No. 03/2011
Number of pages: 10 Posted: 01 Dec 2010 Last Revised: 11 Mar 2014
Working Paper Series
TNO Information and Communication Technology in Delft
Downloads 8,971
7.

Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning

Number of pages: 21 Posted: 30 Jul 2011
Working Paper Series
Worcester Polytechnic Institute (WPI), University of Wyoming, University of California, Berkeley - School of Information, Good Research and University of California, Berkeley - School of Information
Downloads 8,921
8.

A Brief History of Information Privacy Law

PROSKAUER ON PRIVACY, PLI, 2016, GWU Law School Public Law Research Paper No. 215
Number of pages: 53 Posted: 10 Jul 2006 Last Revised: 09 Feb 2017
Accepted Paper Series
George Washington University Law School
Downloads 8,037
9.

Big Data Ethics

Wake Forest Law Review, 2014
Number of pages: 40 Posted: 25 Jan 2014 Last Revised: 03 Jun 2014
Accepted Paper Series
Washington University School of Law and Washington University in St. Louis - School of Law
Downloads 7,906
10.

Encryption Workarounds

106 Georgetown Law Journal 989 (2018).
Number of pages: 31 Posted: 22 Mar 2017 Last Revised: 13 May 2018
Accepted Paper Series
University of Southern California Gould School of Law and Harvard University - Berkman Klein Center for Internet & Society
Downloads 7,852
11.

What Privacy Is For

Harvard Law Review, Vol. 126, 2013
Number of pages: 24 Posted: 15 Nov 2012 Last Revised: 23 Nov 2012
Accepted Paper Series
Georgetown University Law Center
Downloads 7,242
12.

Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security

107 California Law Review (2019, Forthcoming), U of Texas Law, Public Law Research Paper No. 692, U of Maryland Legal Studies Research Paper No. 2018-21
Number of pages: 59 Posted: 21 Jul 2018 Last Revised: 23 Aug 2018
Accepted Paper Series
University of Texas School of Law and University of Maryland Francis King Carey School of Law
Downloads 6,668
13.

How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies?

Number of pages: 20 Posted: 14 Apr 2010 Last Revised: 01 Feb 2014
Working Paper Series
University of California, Berkeley - School of Information, Center for Internet and Society, Stanford Law School, University of California, Berkeley - School of Law and University of Pennsylvania - Annenberg School for Communication
Downloads 6,236
14.

Three Paradoxes of Big Data

66 Stanford Law Review Online 41 (2013)
Number of pages: 6 Posted: 14 Sep 2013
Accepted Paper Series
Washington University School of Law and Washington University in St. Louis - School of Law
Downloads 5,975
15.

Chilling Effects: Online Surveillance and Wikipedia Use

Berkeley Technology Law Journal, Vol. 31, No. 1, p. 117, 2016
Number of pages: 66 Posted: 27 Apr 2016 Last Revised: 08 Sep 2016
Accepted Paper Series
University of Oxford - Oxford Internet Institute
Downloads 5,832
16.

Is Disruptive Blockchain Technology the Future of Financial Services?

69 The Consumer Finance Law Quarterly Report 232 (2016)
Number of pages: 11 Posted: 31 May 2016 Last Revised: 24 Dec 2017
Accepted Paper Series
Western Carolina University - College of Business
Downloads 5,729
17.

Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation

International Data Privacy Law, 2017
Number of pages: 47 Posted: 24 Jan 2017 Last Revised: 20 Sep 2017
Accepted Paper Series
University of Oxford - Oxford Internet Institute, University of Oxford - Oxford Internet Institute and University of Oxford - Oxford Internet Institute
Downloads 5,429
18.

The FTC and the New Common Law of Privacy

114 Columbia Law Review 583 (2014), GWU Legal Studies Research Paper No. 2013-120, GWU Law School Public Law Research Paper No. 2013-120
Number of pages: 94 Posted: 21 Aug 2013 Last Revised: 05 Apr 2014
Accepted Paper Series
George Washington University Law School and Northeastern University School of Law and Khoury College of Computer and Information Sciences
Downloads 5,425
19.

The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation

Adam Thierer, The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation, 21 RICH. J.L. & TECH. 6 (2015).
Number of pages: 118 Posted: 12 Sep 2014 Last Revised: 20 Feb 2015
Accepted Paper Series
Mercatus Center at George Mason University
Downloads 5,289
20.

The Internet as a Conduit for Criminal Activity

INFORMATION TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM, Pattavina, A., ed., pp. 77-98, Sage Publications, Inc., 2005 (revised 2010, 2015)
Number of pages: 19 Posted: 13 Jun 2005 Last Revised: 23 Oct 2015
Accepted Paper Series
University of Leeds, Centre for Criminal Justice Studies
Downloads 5,226
21.

Big Data: The End of Privacy or a New Beginning?

International Data Privacy Law (2013 Forthcoming), NYU School of Law, Public Law Research Paper No. 12-56
Number of pages: 15 Posted: 06 Oct 2012 Last Revised: 13 Mar 2014
Accepted Paper Series
New York University (NYU) - Information Law Institute
Downloads 5,134
22.

Blockchains and Data Protection in the European Union

Max Planck Institute for Innovation & Competition Research Paper No. 18-01
Number of pages: 32 Posted: 06 Dec 2017 Last Revised: 07 Feb 2018
Working Paper Series
Max Planck Institute for Innovation and Competition
Downloads 4,887
23.

Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy

Harvard Journal of Law and Technology, Volume 28, Number 1 Fall 2014
Number of pages: 76 Posted: 17 May 2014 Last Revised: 29 Dec 2014
Accepted Paper Series
West Point--Army Cyber Institute and Yale University - Yale Information Society Project
Downloads 4,678
24.

Privacy and Power: Computer Databases and Metaphors for Information Privacy

Stanford Law Review, Vol. 53, p. 1393, July 2001
Number of pages: 70 Posted: 14 Dec 2000 Last Revised: 27 Feb 2014
Accepted Paper Series
George Washington University Law School

Multiple version iconThere are 2 versions of this paper

Downloads 4,517
25.

Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms

Boston College Law Review, Vol. 55, No. 93, 2014, NYU School of Law, Public Law Research Paper No. 13-64, NYU Law and Economics Research Paper No. 13-36
Number of pages: 37 Posted: 17 Sep 2013 Last Revised: 28 Feb 2014
Accepted Paper Series
AI Now Institute and New York University School of Law
Downloads 4,413
26.

Big Data for All: Privacy and User Control in the Age of Analytics

11 Northwestern Journal of Technology and Intellectual Property 239 (2013)
Number of pages: 36 Posted: 20 Sep 2012 Last Revised: 01 Nov 2013
Accepted Paper Series
International Association of Privacy Professionals (IAPP) and Future of Privacy Forum
Downloads 4,308
27.

The Problem of 'Personal Data' in Cloud Computing - What Information is Regulated? The Cloud of Unknowing, Part 1

International Data Privacy Law (2011) 1 (4): 211-228, Queen Mary School of Law Legal Studies Research Paper No. 75/2011
Number of pages: 47 Posted: 15 Mar 2011 Last Revised: 11 Mar 2014
Accepted Paper Series
Imperial College London, Queen Mary University of London, School of Law - Centre for Commercial Law Studies and Queen Mary University of London, School of Law
Downloads 4,097
28.

Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4)

Yale Journal of International Law, Vol. 36, 2011
Number of pages: 39 Posted: 11 Sep 2010 Last Revised: 10 Aug 2014
Working Paper Series
Columbia Law School
Downloads 3,901
29.

Crypto-Securities Regulation: ICOs, Token Sales and Cryptocurrencies under EU Financial Law

European Company and Financial Law Review Forthcoming
Number of pages: 45 Posted: 30 Nov 2017 Last Revised: 21 Jul 2018
Accepted Paper Series
Humboldt University of Berlin and Ruprecht-Karls Universität Heidelberg
Downloads 3,753
30.

The Distributed Liability of Distributed Ledgers: Legal Risks of Blockchain

University of Illinois Law Review, 2017-2018, Forthcoming, University of Luxembourg Law Working Paper No. 007/2017, Center for Business & Corporate Law (CBC) Working Paper 002/2017, University of Hong Kong Faculty of Law Research Paper No. 2017/020, UNSW Law Research Paper No. 17-52, European Banking Institute Working Paper Series 14
Number of pages: 49 Posted: 15 Aug 2017 Last Revised: 13 Jul 2018
Accepted Paper Series
Universite du Luxembourg - Faculty of Law, Economics and Finance, University of New South Wales (UNSW) - Faculty of Law and The University of Hong Kong - Faculty of Law
Downloads 3,749
31.

Nothing to Hide: The False Tradeoff between Privacy and Security

Daniel J. Solove, NOTHING TO HIDE: THE FALSE TRADEOFF BETWEEN PRIVACY AND SECURITY, Chapter 1, Yale University Press, 2011, GWU Law School Public Law Research Paper No. 571, GWU Legal Studies Research Paper No. 571
Number of pages: 29 Posted: 11 May 2011 Last Revised: 06 Mar 2013
Accepted Paper Series
George Washington University Law School
Downloads 3,641
32.

The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services

Information, Communication & Society, pp. 1-20, 2018., TPRC 44: The 44th Research Conference on Communication, Information and Internet Policy, 2016.
Number of pages: 37 Posted: 02 Apr 2016 Last Revised: 18 Aug 2018
Accepted Paper Series
York University and University of Connecticut
Downloads 3,618
33.

Reconciling Personal Information in the United States and European Union

102 California Law Review 877 (2014), UC Berkeley Public Law Research Paper No. 2271442, GWU Legal Studies Research Paper No. 2013-77, GWU Law School Public Law Research Paper No. 2013-77
Number of pages: 40 Posted: 29 May 2013 Last Revised: 18 Oct 2015
Accepted Paper Series
University of California, Berkeley - School of Law and George Washington University Law School
Downloads 3,505
34.

Accountable Algorithms

University of Pennsylvania Law Review, Vol. 165, 2017 Forthcoming, Fordham Law Legal Studies Research Paper No. 2765268
Number of pages: 66 Posted: 16 Apr 2016 Last Revised: 20 Nov 2016
Accepted Paper Series
University of California, Berkeley - School of Information, Princeton University - Center for Information Technology Policy, Cornell University, Princeton University - Center for Information Technology Policy, Fordham University School of Law, Georgetown University Law Center and Princeton University - Center for Information Technology Policy
Downloads 3,472
35.

The Digital Person: Technology and Privacy in the Information Age

GWU Law School Public Law Research Paper No. 121, Daniel J. Solove, THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE, NYU Press, 2004
Number of pages: 17 Posted: 26 Oct 2004 Last Revised: 19 Jan 2017
Accepted Paper Series
George Washington University Law School
Downloads 3,396
36.

Global Data Privacy Laws: 89 Countries, and Accelerating

Privacy Laws & Business International Report, Issue 115, Special Supplement, February 2012, Queen Mary School of Law Legal Studies Research Paper No. 98/2012
Number of pages: 14 Posted: 06 Feb 2012 Last Revised: 02 Jul 2017
Accepted Paper Series
University of New South Wales, Faculty of Law
Downloads 3,392
37.

Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era

8 J. on Telecomm. and High Tech. L. 359, Berkman Center Research Publication No. 2009-07
Number of pages: 66 Posted: 18 Jun 2009 Last Revised: 27 Oct 2012
Accepted Paper Series
Yale University - Yale Information Society Project
Downloads 3,379
38.

The Rise and Fall of Invasive ISP Surveillance

University of Illinois Law Review, 2009, U of Colorado Law Legal Studies Research Paper No. 08-22
Number of pages: 83 Posted: 31 Aug 2008 Last Revised: 23 Dec 2013
Accepted Paper Series
Georgetown University Law Center
Downloads 3,361
39.

What Google Knows: Privacy and Internet Search Engines

Utah Law Review, Forthcoming
Number of pages: 72 Posted: 19 Oct 2007 Last Revised: 01 Feb 2014
Working Paper Series
International Association of Privacy Professionals (IAPP)
Downloads 3,281
40.

The Ultimate Unifying Approach to Complying with All Laws and Regulations

19 Green Bag 2d 223 (2016), GWU Law School Public Law Research Paper No. 2016-16, GWU Legal Studies Research Paper No. 2016-16
Number of pages: 4 Posted: 09 Feb 2016 Last Revised: 08 Jun 2016
Accepted Paper Series
George Washington University Law School and Northeastern University School of Law and Khoury College of Computer and Information Sciences
Downloads 3,244
41.

Empirical Analysis of Data Breach Litigation

Forthcoming in the Journal of Empirical Legal Studies, Temple University Legal Studies Research Paper No. 2012-30
Number of pages: 31 Posted: 16 Jan 2012 Last Revised: 01 Feb 2014
Accepted Paper Series
RAND Corporation, University of Pennsylvania Law School and Carnegie Mellon University - H. John Heinz III School of Public Policy and Management

Multiple version iconThere are 2 versions of this paper

Downloads 3,241
42.

A Model Regime of Privacy Protection (Version 3.0)

GWU Law School Public Law Research Paper No. 132, University of Illinois Law Review, Vol. 2006, No. 2, 2006
Number of pages: 48 Posted: 07 Feb 2006 Last Revised: 02 Aug 2014
Accepted Paper Series
George Washington University Law School and University of California, Berkeley - School of Information
Downloads 3,127
43.

Slave to the Algorithm? Why a 'Right to an Explanation' Is Probably Not the Remedy You Are Looking For

16 Duke Law & Technology Review 18 (2017)
Number of pages: 67 Posted: 24 May 2017 Last Revised: 06 Dec 2017
Accepted Paper Series
affiliation not provided to SSRN and University College London, Department of Science, Technology, Engineering and Public Policy (STEaPP)
Downloads 2,979
44.

Who is Responsible for 'Personal Data' in Cloud Computing? The Cloud of Unknowing, Part 2

International Data Privacy Law (2012) 2 (1): 3-18, Queen Mary School of Law Legal Studies Research Paper No. 77/2011
Number of pages: 31 Posted: 26 Mar 2011 Last Revised: 19 Jun 2014
Accepted Paper Series
Imperial College London, Queen Mary University of London, School of Law - Centre for Commercial Law Studies and Queen Mary University of London, School of Law
Downloads 2,807
45.

Algorithmic Entities

95 Washington University Law Review (Forthcoming)., UCLA School of Law, Law-Econ Research Paper No. 17-09
Number of pages: 69 Posted: 18 Apr 2017 Last Revised: 23 Feb 2018
Accepted Paper Series
University of California, Los Angeles (UCLA) - School of Law
Downloads 2,804
46.

Cyberwarfare: Law & Policy Proposals for U.S. & Global Governance

Virginia Lawyer, Vol. 58, p. 28, February 2010, GMU School of Public Policy Research Paper No. 2009-11
Number of pages: 5 Posted: 21 Jul 2009 Last Revised: 05 Apr 2015
Accepted Paper Series
George Mason University (Schar School of Policy & Government)
Downloads 2,802
47.

A Model for When Disclosure Helps Security: What Is Different About Computer and Network Security?

3 Journal on Telecommunications and High Technology Law 163 (2004)
Number of pages: 46 Posted: 18 Aug 2004 Last Revised: 16 Aug 2017
Accepted Paper Series
Georgia Institute of Technology - Scheller College of Business
Downloads 2,792
48.

Initial Coin Offerings: The Top 25 Jurisdictions and Their Comparative Regulatory Responses

CodeX Stanford Journal of Blockchain Law & Policy (2018), U of St. Thomas (Minnesota) Legal Studies Research Paper No. 18-07
Number of pages: 29 Posted: 15 Feb 2018 Last Revised: 18 May 2018
Working Paper Series
University of St. Thomas, Minnesota - School of Law
Downloads 2,766
49.

From Nuclear War to Net War: Analogizing Cyber Attacks in International Law

Berkley Journal of International Law (BJIL), Vol. 25, No. 3, 2009
Number of pages: 60 Posted: 04 May 2009
Accepted Paper Series
Indiana University - Kelley School of Business - Department of Business Law
Downloads 2,699
50.

Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework

Columbia Journal of Transnational Law, Vol. 37, 1998-99
Number of pages: 54 Posted: 19 May 2010
Accepted Paper Series
Naval War College - Stockton Center for the Study of International Law
Downloads 2,666