Search Results
Cybersecurity, Data Privacy & eDiscovery Law & Policy eJournal

Sponsored by...

Cleveland-Marshall College of Law logo Center for Cybersecurity & Privacy Protection Cleveland-Marshall College of Law Center Home Subscribe
1,436,050 Total downloads | Link to this page | Subscribe to this eJournal (requires login)

Viewing: 1 - 50 of 4,408 papers

1.

Big Other: Surveillance Capitalism and the Prospects of an Information Civilization

Journal of Information Technology (2015) 30, 75–89. doi:10.1057/jit.2015.5
Number of pages: 15 Posted: 17 Apr 2015
Accepted Paper Series
Berkman Center for Internet & Society
Downloads 24,739
2.

Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization

UCLA Law Review, Vol. 57, p. 1701, 2010, U of Colorado Law Legal Studies Research Paper No. 9-12
Number of pages: 77 Posted: 13 Jul 2012 Last Revised: 22 Feb 2015
Accepted Paper Series
Georgetown University Law Center
Downloads 23,185
3.

Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security

107 California Law Review 1753 (2019), U of Texas Law, Public Law Research Paper No. 692, U of Maryland Legal Studies Research Paper No. 2018-21
Number of pages: 68 Posted: 21 Jul 2018 Last Revised: 17 Dec 2019
Accepted Paper Series
University of Texas School of Law and Boston University School of Law
Downloads 14,923
4.

Understanding Privacy

Daniel J. Solove, UNDERSTANDING PRIVACY, Harvard University Press, May 2008, GWU Legal Studies Research Paper No. 420, GWU Law School Public Law Research Paper No. 420
Number of pages: 24 Posted: 05 May 2008 Last Revised: 13 Jul 2014
Accepted Paper Series
George Washington University Law School
Downloads 14,624
5.

FinTech, RegTech and the Reconceptualization of Financial Regulation

Northwestern Journal of International Law & Business, Forthcoming, University of Hong Kong Faculty of Law Research Paper No. 2016/035
Number of pages: 51 Posted: 05 Oct 2016 Last Revised: 26 Oct 2016
Accepted Paper Series
The University of Hong Kong - Faculty of Law, The University of Hong Kong - Faculty of Law and University of New South Wales (UNSW) - Faculty of Law
Downloads 11,864
6.

A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending it

72 George Washington Law Review 1208 (2004).
Number of pages: 36 Posted: 05 Aug 2003 Last Revised: 06 Jul 2016
Accepted Paper Series
University of California, Berkeley School of Law
Downloads 10,575
7.

Facebook Tracks and Traces Everyone: Like This!

Tilburg Law School Legal Studies Research Paper Series No. 03/2011
Number of pages: 10 Posted: 01 Dec 2010 Last Revised: 11 Mar 2014
Working Paper Series
TNO Information and Communication Technology in Delft
Downloads 9,505
8.

A Brief History of Information Privacy Law

PROSKAUER ON PRIVACY, PLI, 2016, GWU Law School Public Law Research Paper No. 215
Number of pages: 53 Posted: 10 Jul 2006 Last Revised: 09 Feb 2017
Accepted Paper Series
George Washington University Law School
Downloads 9,249
9.

Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning

Number of pages: 21 Posted: 30 Jul 2011
Working Paper Series
Worcester Polytechnic Institute (WPI), University of Wyoming, University of California, Berkeley - School of Information, Good Research and University of California, Berkeley - School of Information
Downloads 9,246
10.

Big Data Ethics

Wake Forest Law Review, 2014
Number of pages: 40 Posted: 25 Jan 2014 Last Revised: 03 Jun 2014
Accepted Paper Series
Washington University School of Law and Washington University in St. Louis - School of Law
Downloads 8,961
11.

Encryption Workarounds

106 Georgetown Law Journal 989 (2018).
Number of pages: 31 Posted: 22 Mar 2017 Last Revised: 13 May 2018
Accepted Paper Series
University of California, Berkeley School of Law and Harvard University - Berkman Klein Center for Internet & Society
Downloads 8,562
12.

What Privacy Is For

Harvard Law Review, Vol. 126, 2013
Number of pages: 24 Posted: 15 Nov 2012 Last Revised: 23 Nov 2012
Accepted Paper Series
Georgetown University Law Center
Downloads 8,276
13.

Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation

International Data Privacy Law, 2017
Number of pages: 47 Posted: 24 Jan 2017 Last Revised: 08 Apr 2020
Accepted Paper Series
University of Oxford - Oxford Internet Institute, University of Oxford - Oxford Internet Institute and University of Oxford - Oxford Internet Institute
Downloads 7,060
14.

Is Disruptive Blockchain Technology the Future of Financial Services?

69 The Consumer Finance Law Quarterly Report 232 (2016)
Number of pages: 11 Posted: 31 May 2016 Last Revised: 24 Dec 2017
Accepted Paper Series
Prairie View A&M University - College of Business
Downloads 7,054
15.

How Different are Young Adults from Older Adults When it Comes to Information Privacy Attitudes and Policies?

Number of pages: 20 Posted: 14 Apr 2010 Last Revised: 01 Feb 2014
Working Paper Series
University of California, Berkeley - School of Information, Center for Internet and Society, Stanford Law School, University of California, Berkeley - School of Law and University of Pennsylvania - Annenberg School for Communication
Downloads 6,847
16.

Chilling Effects: Online Surveillance and Wikipedia Use

Berkeley Technology Law Journal, Vol. 31, No. 1, p. 117, 2016
Number of pages: 66 Posted: 27 Apr 2016 Last Revised: 08 Sep 2016
Accepted Paper Series
Downloads 6,564
17.

The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation

Adam Thierer, The Internet of Things and Wearable Technology: Addressing Privacy and Security Concerns without Derailing Innovation, 21 RICH. J.L. & TECH. 6 (2015).
Number of pages: 118 Posted: 12 Sep 2014 Last Revised: 20 Feb 2015
Accepted Paper Series
George Mason University - Mercatus Center
Downloads 6,497
18.

Three Paradoxes of Big Data

66 Stanford Law Review Online 41 (2013)
Number of pages: 6 Posted: 14 Sep 2013
Accepted Paper Series
Washington University School of Law and Washington University in St. Louis - School of Law
Downloads 6,391
19.

The Internet as a Conduit for Criminal Activity

INFORMATION TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM, Pattavina, A., ed., pp. 77-98, Sage Publications, Inc., 2005 (revised 2010, 2015)
Number of pages: 19 Posted: 13 Jun 2005 Last Revised: 23 Oct 2015
Accepted Paper Series
Centre for Criminal Justice Studies, School of Law, University of Leeds
Downloads 6,254
20.

Big Data: The End of Privacy or a New Beginning?

International Data Privacy Law (2013 Forthcoming), NYU School of Law, Public Law Research Paper No. 12-56
Number of pages: 15 Posted: 06 Oct 2012 Last Revised: 13 Mar 2014
Accepted Paper Series
New York University (NYU) - Information Law Institute
Downloads 6,128
21.

Blockchains and Data Protection in the European Union

Max Planck Institute for Innovation & Competition Research Paper No. 18-01
Number of pages: 32 Posted: 06 Dec 2017 Last Revised: 07 Feb 2018
Working Paper Series
Max Planck Institute for Innovation and Competition
Downloads 6,063
22.

The FTC and the New Common Law of Privacy

114 Columbia Law Review 583 (2014), GWU Legal Studies Research Paper No. 2013-120, GWU Law School Public Law Research Paper No. 2013-120
Number of pages: 94 Posted: 21 Aug 2013 Last Revised: 05 Apr 2014
Accepted Paper Series
George Washington University Law School and Northeastern University School of Law and Khoury College of Computer Sciences
Downloads 5,978
23.

A Right to Reasonable Inferences: Re-Thinking Data Protection Law in the Age of Big Data and AI

Columbia Business Law Review, 2019(2)
Number of pages: 130 Posted: 05 Oct 2018 Last Revised: 25 Jun 2019
Accepted Paper Series
University of Oxford - Oxford Internet Institute and University of Oxford - Oxford Internet Institute
Downloads 5,525
24.

The Biggest Lie on the Internet: Ignoring the Privacy Policies and Terms of Service Policies of Social Networking Services

Information, Communication & Society, pp. 1-20, 2018., TPRC 44: The 44th Research Conference on Communication, Information and Internet Policy, 2016.
Number of pages: 37 Posted: 02 Apr 2016 Last Revised: 18 Aug 2018
Accepted Paper Series
York University and University of Connecticut
Downloads 5,487
25.

The Distributed Liability of Distributed Ledgers: Legal Risks of Blockchain

University of Illinois Law Review, 2017-2018, Forthcoming, University of Luxembourg Law Working Paper No. 007/2017, Center for Business & Corporate Law (CBC) Working Paper 002/2017, University of Hong Kong Faculty of Law Research Paper No. 2017/020, UNSW Law Research Paper No. 17-52, European Banking Institute Working Paper Series 14
Number of pages: 49 Posted: 15 Aug 2017 Last Revised: 13 Jul 2018
Accepted Paper Series
Universite du Luxembourg - Faculty of Law, Economics and Finance, University of New South Wales (UNSW) - Faculty of Law and The University of Hong Kong - Faculty of Law
Downloads 5,228
26.

Your Secret Stingray's No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and Its Impact on National Security and Consumer Privacy

Harvard Journal of Law and Technology, Volume 28, Number 1 Fall 2014
Number of pages: 76 Posted: 17 May 2014 Last Revised: 29 Dec 2014
Accepted Paper Series
West Point--Army Cyber Institute and Yale University - Yale Information Society Project
Downloads 5,012
27.

Crypto-Securities Regulation: ICOs, Token Sales and Cryptocurrencies under EU Financial Law

15 European Company and Financial Law Review 645-696 (2018)
Number of pages: 45 Posted: 30 Nov 2017 Last Revised: 17 Apr 2019
Accepted Paper Series
Humboldt University of Berlin and Ruprecht-Karls Universität Heidelberg
Downloads 4,987
28.

Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms

Boston College Law Review, Vol. 55, No. 93, 2014, NYU School of Law, Public Law Research Paper No. 13-64, NYU Law and Economics Research Paper No. 13-36
Number of pages: 37 Posted: 17 Sep 2013 Last Revised: 28 Feb 2014
Accepted Paper Series
AI Now Institute and New York University School of Law
Downloads 4,789
29.

Artificial Intelligence & Human Rights: Opportunities & Risks

Berkman Klein Center Research Publication No. 2018-6
Number of pages: 63 Posted: 25 Oct 2018
Working Paper Series
Harvard Law School, Harvard University, Law School, Students , Harvard University - Berkman Klein Center for Internet & Society, Berkman Center for Internet & Society and Harvard University - Berkman Klein Center for Internet & Society
Downloads 4,756
30.

Big Data for All: Privacy and User Control in the Age of Analytics

11 Northwestern Journal of Technology and Intellectual Property 239 (2013)
Number of pages: 36 Posted: 20 Sep 2012 Last Revised: 01 Nov 2013
Accepted Paper Series
International Association of Privacy Professionals (IAPP) and Future of Privacy Forum
Downloads 4,699
31.

Privacy and Power: Computer Databases and Metaphors for Information Privacy

Stanford Law Review, Vol. 53, p. 1393, July 2001
Number of pages: 70 Posted: 14 Dec 2000 Last Revised: 27 Feb 2014
Accepted Paper Series
George Washington University Law School

Multiple version iconThere are 2 versions of this paper

Downloads 4,675
32.

Slave to the Algorithm? Why a 'Right to an Explanation' Is Probably Not the Remedy You Are Looking For

16 Duke Law & Technology Review 18 (2017)
Number of pages: 67 Posted: 24 May 2017 Last Revised: 06 Dec 2017
Accepted Paper Series
University of Newcastle - Law School and University College London, Faculty of Laws
Downloads 4,443
33.

Cybersecurity Law, Policy, and Institutions (version 3.0)

Number of pages: 137 Posted: 26 Mar 2020
Working Paper Series
University of Texas School of Law
Downloads 4,395
34.

The Problem of 'Personal Data' in Cloud Computing - What Information is Regulated? The Cloud of Unknowing, Part 1

International Data Privacy Law (2011) 1 (4): 211-228, Queen Mary School of Law Legal Studies Research Paper No. 75/2011
Number of pages: 47 Posted: 15 Mar 2011 Last Revised: 11 Mar 2014
Accepted Paper Series
Imperial College London, Queen Mary University of London, School of Law - Centre for Commercial Law Studies and Centre for Commercial Law Studies, Queen Mary University of London, School of Law
Downloads 4,308
35.

Accountable Algorithms

University of Pennsylvania Law Review, Vol. 165, 2017 Forthcoming, Fordham Law Legal Studies Research Paper No. 2765268
Number of pages: 66 Posted: 16 Apr 2016 Last Revised: 20 Nov 2016
Accepted Paper Series
Naval Postgraduate School, Princeton University - Center for Information Technology Policy, Cornell University, Princeton University - Center for Information Technology Policy, Fordham University School of Law, Georgetown University Law Center and Princeton University - Center for Information Technology Policy
Downloads 4,220
36.

Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4)

Yale Journal of International Law, Vol. 36, 2011
Number of pages: 39 Posted: 11 Sep 2010 Last Revised: 10 Aug 2014
Working Paper Series
Columbia Law School
Downloads 4,212
37.

Nothing to Hide: The False Tradeoff between Privacy and Security

Daniel J. Solove, NOTHING TO HIDE: THE FALSE TRADEOFF BETWEEN PRIVACY AND SECURITY, Chapter 1, Yale University Press, 2011, GWU Law School Public Law Research Paper No. 571, GWU Legal Studies Research Paper No. 571
Number of pages: 29 Posted: 11 May 2011 Last Revised: 06 Mar 2013
Accepted Paper Series
George Washington University Law School
Downloads 4,092
38.

The Antitrust Case Against Facebook

Berkeley Business Law Journal Vol. 16, Issue 1, Forthcoming
Number of pages: 83 Posted: 07 Feb 2019 Last Revised: 09 Feb 2019
Accepted Paper Series
Thurman Arnold Project
Downloads 4,031
39.

Global Data Privacy Laws: 89 Countries, and Accelerating

Privacy Laws & Business International Report, Issue 115, Special Supplement, February 2012, Queen Mary School of Law Legal Studies Research Paper No. 98/2012
Number of pages: 14 Posted: 06 Feb 2012 Last Revised: 02 Jul 2017
Accepted Paper Series
University of New South Wales, Faculty of Law
Downloads 3,906
40.

Reconciling Personal Information in the United States and European Union

102 California Law Review 877 (2014), UC Berkeley Public Law Research Paper No. 2271442, GWU Legal Studies Research Paper No. 2013-77, GWU Law School Public Law Research Paper No. 2013-77
Number of pages: 40 Posted: 29 May 2013 Last Revised: 18 Oct 2015
Accepted Paper Series
University of California, Berkeley - School of Law and George Washington University Law School
Downloads 3,827
41.

Counterfactual Explanations Without Opening the Black Box: Automated Decisions and the GDPR

Harvard Journal of Law & Technology, 31 (2), 2018
Number of pages: 47 Posted: 02 Nov 2017 Last Revised: 22 Apr 2019
Accepted Paper Series
University of Oxford - Oxford Internet Institute, University of Oxford - Oxford Internet Institute and University of Surrey
Downloads 3,593
42.

The Digital Person: Technology and Privacy in the Information Age

GWU Law School Public Law Research Paper No. 121, Daniel J. Solove, THE DIGITAL PERSON: TECHNOLOGY AND PRIVACY IN THE INFORMATION AGE, NYU Press, 2004
Number of pages: 17 Posted: 26 Oct 2004 Last Revised: 19 Jan 2017
Accepted Paper Series
George Washington University Law School
Downloads 3,559
43.

Caught in the Cloud: Privacy, Encryption, and Government Back Doors in the Web 2.0 Era

8 J. on Telecomm. and High Tech. L. 359, Berkman Center Research Publication No. 2009-07
Number of pages: 66 Posted: 18 Jun 2009 Last Revised: 27 Oct 2012
Accepted Paper Series
Yale University - Yale Information Society Project
Downloads 3,480
44.

The Data Protection Officer Handbook

The Data Protection Officer Handbook, 2019
Number of pages: 247 Posted: 02 Aug 2019
Accepted Paper Series
Oxford Martin School - Global Cyber Capacity Centre and Independent
Downloads 3,464
45.

What Google Knows: Privacy and Internet Search Engines

Utah Law Review, Forthcoming
Number of pages: 72 Posted: 19 Oct 2007 Last Revised: 01 Feb 2014
Working Paper Series
International Association of Privacy Professionals (IAPP)
Downloads 3,443
46.

The Transparent Self Under Big Data Profiling: Privacy and Chinese Legislation on the Social Credit System

Vol. 12, No. 2, The Journal of Comparative Law (2017) 356-378, University of Hong Kong Faculty of Law Research Paper No. 2017/011
Number of pages: 25 Posted: 27 Jun 2017 Last Revised: 06 Feb 2018
Accepted Paper Series
The University of Hong Kong - Faculty of Law and The University of Hong Kong - Faculty of Law
Downloads 3,433
47.

The Rise and Fall of Invasive ISP Surveillance

University of Illinois Law Review, 2009, U of Colorado Law Legal Studies Research Paper No. 08-22
Number of pages: 83 Posted: 31 Aug 2008 Last Revised: 23 Dec 2013
Accepted Paper Series
Georgetown University Law Center
Downloads 3,404
48.

Empirical Analysis of Data Breach Litigation

Forthcoming in the Journal of Empirical Legal Studies, Temple University Legal Studies Research Paper No. 2012-30
Number of pages: 31 Posted: 16 Jan 2012 Last Revised: 01 Feb 2014
Accepted Paper Series
RAND Corporation, University of Pennsylvania Law School and Carnegie Mellon University - H. John Heinz III School of Public Policy and Management

Multiple version iconThere are 2 versions of this paper

Downloads 3,371
49.

The Ultimate Unifying Approach to Complying with All Laws and Regulations

19 Green Bag 2d 223 (2016), GWU Law School Public Law Research Paper No. 2016-16, GWU Legal Studies Research Paper No. 2016-16
Number of pages: 4 Posted: 09 Feb 2016 Last Revised: 26 Jan 2020
Accepted Paper Series
George Washington University Law School and Northeastern University School of Law and Khoury College of Computer Sciences
Downloads 3,364
50.

Initial Coin Offerings: The Top 25 Jurisdictions and Their Comparative Regulatory Responses

CodeX Stanford Journal of Blockchain Law & Policy (2018), U of St. Thomas (Minnesota) Legal Studies Research Paper No. 18-07
Number of pages: 29 Posted: 15 Feb 2018 Last Revised: 18 May 2018
Working Paper Series
University of St. Thomas, Minnesota - School of Law
Downloads 3,331