K. A. Taipale

Center for Advanced Studies in Science and Technology Policy

Executive Director

100 Hudson Street

10th Floor E

New York, NY 10013-2882

United States

SCHOLARLY PAPERS

14

DOWNLOADS
Rank 7,515

SSRN RANKINGS

Top 7,515

in Total Papers Downloads

9,844

SSRN CITATIONS

1

CROSSREF CITATIONS

4

Scholarly Papers (14)

1.

Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data

Number of pages: 83 Posted: 02 Jul 2004
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 1,937 (13,711)

Abstract:

Loading...

Data mining, domestic security, homeland security, privacy

2.

Technology, Security and Privacy: The Fear of Frankenstein, the Mythology of Privacy and the Lessons of King Ludd

Yale Journal of Law and Technology, Vol. 7, No. 123, December 2004
Number of pages: 79 Posted: 11 Oct 2004
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 1,805 (15,326)
Citation 1

Abstract:

Loading...

Technology, security, privacy, law enforcement, domestic security, national security, surveillance, collection, identification, information sharing, data analaysis, data mining

3.

Cyber-Deterrence

LAW, POLICY AND TECHNOLOGY: CYBERTERRORISM, INFORMATION, WARFARE, DIGITAL AND INTERNET IMMOBILIZATION, IGI Global, 2010
Number of pages: 62 Posted: 01 Feb 2009 Last Revised: 05 Aug 2014
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 1,721 (16,504)

Abstract:

Loading...

cyber-deterrence, cyber-war, cyber-attack, cybercrime, information warfare, critical infrastructure protection

4.

Whispering Wires and Warrantless Wiretaps: Data Mining and Foreign Intelligence Surveillance

NYU Review of Law & Security, No. 7, Supl. Bull. on L. & Sec., Spring 2006
Number of pages: 6 Posted: 20 Mar 2006
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 1,161 (29,801)

Abstract:

Loading...

foreign intelligence, surveillance, FISA, data mining, wiretaps

5.

Secondary Liability on the Internet: Towards a Performative Standard for Constitutive Responsibility.

Center for Advanced Studies Working Paper No. 04-2003
Number of pages: 26 Posted: 29 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 913 (41,843)
Citation 1

Abstract:

Loading...

internet, secondary liability, third party liability, ISP liability, constitutive liability, performative liability

6.

Seeking Symmetry on the Information Front: Confronting Global Jihad on the Internet

National Strategy Forum Review, Vol. 16, Summer 2007
Number of pages: 8 Posted: 18 May 2007
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 715 (58,328)

Abstract:

Loading...

information warfare, information operations, counterterrorism, use of Internet by terrorists

7.

Internet and Computer Crime: System Architecture as Crime Control

Center for Advanced Studies Working Paper No. 03-2003
Number of pages: 11 Posted: 26 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 647 (66,415)

Abstract:

Loading...

online crime control, cybercrime, internet service provider liability, Internet regulation, information system architecture

8.

The Ear of Dionysus: Rethinking Foreign Intelligence Surveillance

Yale Journal of Law and Technology, Vol. 9, Spring 2007
Number of pages: 34 Posted: 30 Jan 2007
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 584 (75,569)

Abstract:

Loading...

foreign intelligence surveillance, FISA, FISC, counterterrorism, electronic surveillance

9.

Information Technology as Agent of Change in Environmental Policy

Center for Advanced Studies Working Paper No. 05-2003
Number of pages: 73 Posted: 29 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 192 (251,659)

Abstract:

Loading...

environment, environmental regulation, market mechanisms, economic incentive mechanisms, information technology,

10.

Free Speech, Semiosis and Cyberspace: The Hyperlink as Nexus to Felicity

Center for Advanced Studies Working Paper No. 02-2003
Number of pages: 27 Posted: 29 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy
Downloads 169 (281,579)

Abstract:

Loading...

internet, free speech, semiotics, speech act theory, first amendment

11.

Power to the Edge? New Threats, New Responses

AMERICA'S SECURITY ROLE IN A CHANGING WORLD: A GLOBAL STRATEGIC ASSESSMENT 2009, National Defense University, 2009
Posted: 18 Sep 2008 Last Revised: 19 Feb 2009
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy

Abstract:

Loading...

national security, non state threats

12.

Transnational Intelligence and Surveillance: Security Envelopes, Trusted Systems, and the Panoptic Global Security State

Center for Advanced Studies Working Paper No. 05:06:01
Posted: 07 Jun 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy

Abstract:

Loading...

Transnational security, intelligence, surveillance, terrorism, security envelopes, trusted systems, freedom

13.

Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties

21st CENTURY INFORMATION TECHNOLOGIES AND ENABLING POLICIES FOR COUNTER-TERRORISM, Robert Popp and John Yen, eds., IEEE Press, 2005
Posted: 29 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy

Abstract:

Loading...

information sharing, counterterrorism, privacy, civil liberties, national security

14.

Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism

Posted: 14 Apr 2005
K. A. Taipale
Center for Advanced Studies in Science and Technology Policy

Abstract:

Loading...

counterterrorism, information warfare, information operations, information flow, national security, domestic security, law enforcement